last executing test programs: 16.510665404s ago: executing program 0 (id=10958): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @remote}, 0x7}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x20008814) 15.947880785s ago: executing program 0 (id=10959): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000817000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) futex(&(0x7f000000cffc), 0xb, 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000048000)=0x1, 0x0) 13.040044922s ago: executing program 0 (id=10961): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x8, 0x3, 0x530, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x460, 0xffffffff, 0xffffffff, 0x460, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'bridge0\x00'}, 0x0, 0x1b0, 0x1d8, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@unspec=@conntrack2={{0xc0}, {{@ipv6=@private1, [0xff000000, 0xffffffff, 0xff, 0xffffffff], @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, [0xffffff00, 0xff, 0xffffffff, 0xffffffff], @ipv6=@empty, [0xff000000, 0xff, 0xff, 0xff], @ipv6=@local, [0xffffffff, 0xff000000, 0xff000000, 0xffffff00], 0x80, 0x54, 0x3b, 0x4e20, 0x4e23, 0x4e21, 0x4e23, 0x446, 0x39a}, 0x100, 0x20}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'erspan0\x00', 'gre0\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x4b}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0xfffffffe, 0xe, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x590) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x4f1387d18319b8d7, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x7, 0xfff4}, {0x9, 0xa}, {0xc, 0xb}}}, 0x24}, 0x1, 0x0, 0x0, 0x2008800}, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2, 0x2}) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x5, 0xe, @dev={0xfe, 0x80, '\x00', 0x17}, 0x7}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x33, &(0x7f0000000100)=[{&(0x7f0000000000)=',', 0x584}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 12.260514695s ago: executing program 0 (id=10962): io_uring_setup(0x650b, &(0x7f0000000180)={0x0, 0x2c3f, 0x0, 0x21, 0xab}) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket(0x28, 0x5, 0x0) r2 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r2, 0x4) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvfrom$inet_nvme(r1, 0x0, 0x0, 0x40000002, 0x0, 0x0) 9.129990305s ago: executing program 0 (id=10965): timer_create(0x1, &(0x7f00000000c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = io_uring_setup(0x9f9, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0x3, 0x20002f7}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0xfffffffffffffda2, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0x42795000) open(&(0x7f0000000000)='./file0\x00', 0x4142, 0xba) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000004200)={0x50, 0x0, r3, {0x7, 0x29, 0x2, 0x80000}}, 0x50) syz_fuse_handle_req(r2, &(0x7f00000042c0)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", 0x2000, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x20, 0x0, 0x0, {0x0, 0x3}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) 4.551283834s ago: executing program 1 (id=10970): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008300), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) syz_fuse_handle_req(r0, &(0x7f0000006300), 0x2000, &(0x7f00000041c0)={&(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x29, 0x7, 0x22110039, 0x1000, 0x0, 0x7ff, 0x58, 0x0, 0x0, 0x6, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$incfs_metadata(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380), 0x0, 0x0, 0x1) 2.551613062s ago: executing program 0 (id=10971): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) syz_clone(0x1144280, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x395e000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) userfaultfd(0x801) io_setup(0x1, &(0x7f0000000040)) 1.739250416s ago: executing program 1 (id=10972): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x1, 0x12) 1.142702388s ago: executing program 1 (id=10973): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000200)=[@window={0x3, 0x9, 0x7}, @window={0x3, 0x6, 0x7}, @mss={0x2, 0x7}, @window={0x3, 0x0, 0x7e8f}, @timestamp, @window={0x3, 0x80, 0x101}, @sack_perm, @mss={0x2, 0x5}], 0x8) 840.410265ms ago: executing program 1 (id=10974): r0 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) recvfrom$inet_nvme(r0, 0x0, 0x0, 0x40000002, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$unix(r0, &(0x7f0000000240)=""/50, 0x32, 0x10120, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 578.110029ms ago: executing program 1 (id=10975): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xf, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x43}}}, 0x0, 0xb55, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = memfd_create(&(0x7f0000000280)='-B\xd5N4:)\x00\x8a\xd7Uw\x00\xbc\xa92\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x19\xea\xef\xe3\xe1@\x84\x13\xefZb:\x8f\t\x01B\xec\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@Ip]D\xd6\r\xac\v#co\xd5\xb9\xc806\xa8\x99\xffs7\xa1b1\xb1;i)j\x0e\x1e\xedI\xa2\x80\x89\x1d\xd9p!\xc8<\"\xf0\xc8\xae\x96J\xe2]\x01\x86\xb7.<\xf5N\xd3\x94W1\xff\x18z>\xa7q,\xf7\x96\xb8{\x8e\xbf4\xe0\x95\x1ce\xe4\x85\xcdi\xed\xd3>\xeb\xa5\xaf\x87\x90@\xd1\xbd`^\xfa\xb6\x9cj\x13/\xc5\\W\x04\br\x17X\xe3\xfb\xc8\xd4\xaeX\xc9s\xd18\xd9L\xbf\xa0\xa6\xdf2\a\x99i\xb1/\x19@\x1cq\xeb?\xc1z:\x913\xfa8\xac\xd3q\xe4vPGUOMX\x164\xec\x06i\x85\x93\x87YB.e\xea2|A\x95\x05\xc3\x11\xde\xa0\x14*4\x83J\xa1\xddc\xde\x91 sO\xfb\xcc\r\xa8\x05\xa3\xab\xe6\xb5\xe4\x8b\x128\xa8\x05\xf9\f\xb4\x97\x1c\x82\xfd\x80O\x00\x00\x00\x00\x00\x00\x00', 0x1) r1 = dup(r0) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c464a030103ff0700000000000002000300040000003e03000038000000d600000097700000fe03200001000700080007000000000003"], 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 0s ago: executing program 1 (id=10976): bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_io_uring_setup(0x4175, &(0x7f0000000180)={0x0, 0xbf56, 0x10000, 0x3, 0x2d0}, &(0x7f0000000440), &(0x7f0000000400), &(0x7f0000000000)) io_uring_enter(r0, 0x7b20, 0xe93c, 0x0, 0x0, 0x0) io_setup(0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountstats\x00') syz_io_uring_setup(0x2e94, &(0x7f00000002c0)={0x0, 0x5982, 0x8, 0x2, 0x3be}, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x11, &(0x7f00000009c0)="95", 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) kernel console output (not intermixed with test programs): vmsg) from [<815df280>] (__sys_recvmsg+0x88/0xdc) [ 8904.666203][T30584] r8:864d0900 r7:00010101 r6:20004400 r5:864d0901 r4:00000004 [ 8904.666220][T30584] [<815df1f8>] (__sys_recvmsg) from [<815df2e8>] (sys_recvmsg+0x14/0x18) [ 8904.666286][T30584] r8:8020029c r7:00000129 r6:0012ed04 r5:00000000 r4:00000000 [ 8904.666302][T30584] [<815df2d4>] (sys_recvmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8904.666369][T30584] Exception stack(0xf36e9fa8 to 0xf36e9ff0) [ 8904.666408][T30584] 9fa0: 00000000 00000000 00000004 20004400 00010101 00000000 [ 8904.666448][T30584] 9fc0: 00000000 00000000 0012ed04 00000129 003462d8 00000000 00000001 76f2d0dc [ 8904.666473][T30584] 9fe0: 76f2ce88 76f2ce78 00018bc4 00130300 [ 8907.179354][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 8907.179683][ T28] audit: type=1400 audit(2000007468.780:33919): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8907.230256][ T28] audit: type=1400 audit(2000007468.830:33920): avc: denied { ioctl } for pid=30586 comm="syz.0.10691" path="socket:[94382]" dev="sockfs" ino=94382 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8907.250052][ T28] audit: type=1400 audit(2000007468.850:33921): avc: denied { read write open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8907.251720][ T28] audit: type=1400 audit(2000007468.850:33922): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8907.384530][ T28] audit: type=1400 audit(2000007468.980:33923): avc: denied { write } for pid=30586 comm="syz.0.10691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8907.780811][ T28] audit: type=1400 audit(2000007469.380:33924): avc: denied { allowed } for pid=30586 comm="syz.0.10691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 8908.124753][ T28] audit: type=1400 audit(2000007469.720:33925): avc: denied { read } for pid=30588 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8908.140291][ T28] audit: type=1400 audit(2000007469.740:33926): avc: denied { create } for pid=30586 comm="syz.0.10691" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 8908.217029][ T28] audit: type=1400 audit(2000007469.810:33927): avc: denied { ioctl } for pid=30586 comm="syz.0.10691" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=94387 ioctlcmd=0x586e scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 8908.609294][ T28] audit: type=1400 audit(2000007470.210:33928): avc: denied { ioctl } for pid=30586 comm="syz.0.10691" path="socket:[94382]" dev="sockfs" ino=94382 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8912.560581][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 8912.563672][ T28] audit: type=1400 audit(2000007474.160:33973): avc: denied { read } for pid=30594 comm="syz.1.10695" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8912.603515][ T28] audit: type=1400 audit(2000007474.200:33974): avc: denied { open } for pid=30594 comm="syz.1.10695" path="net:[4026532744]" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8912.612034][ T28] audit: type=1400 audit(2000007474.200:33975): avc: denied { create } for pid=30594 comm="syz.1.10695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8912.879927][ T28] audit: type=1400 audit(2000007474.480:33976): avc: denied { read } for pid=30599 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8913.069826][ T28] audit: type=1400 audit(2000007474.670:33977): avc: denied { write } for pid=30594 comm="syz.1.10695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8913.448820][ T28] audit: type=1400 audit(2000007475.050:33978): avc: denied { mounton } for pid=30599 comm="syz.0.10696" path="/5362/file0" dev="tmpfs" ino=29060 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 8913.453566][ T28] audit: type=1400 audit(2000007475.050:33979): avc: denied { mount } for pid=30599 comm="syz.0.10696" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 8913.588546][ T28] audit: type=1400 audit(2000007475.190:33980): avc: denied { write } for pid=30594 comm="syz.1.10695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8913.979610][ T28] audit: type=1400 audit(2000007475.580:33981): avc: denied { unmount } for pid=30599 comm="syz.0.10696" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 8914.132970][ T28] audit: type=1400 audit(2000007475.730:33982): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 8917.579340][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 8917.579772][ T28] audit: type=1400 audit(2000007479.180:34004): avc: denied { write } for pid=30601 comm="syz.1.10698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8917.700789][ T28] audit: type=1400 audit(2000007479.300:34005): avc: denied { ioctl } for pid=30606 comm="syz.0.10699" path="/dev/audio" dev="devtmpfs" ino=726 ioctlcmd=0x4dfc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8917.725912][ T28] audit: type=1400 audit(2000007479.320:34006): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8917.726374][ T28] audit: type=1400 audit(2000007479.320:34007): avc: denied { open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8917.729568][ T28] audit: type=1400 audit(2000007479.320:34008): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8917.784467][ T28] audit: type=1400 audit(2000007479.380:34009): avc: denied { read write } for pid=30601 comm="syz.1.10698" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8917.818476][ T28] audit: type=1400 audit(2000007479.420:34010): avc: denied { open } for pid=30601 comm="syz.1.10698" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8918.067610][ T28] audit: type=1400 audit(2000007479.660:34011): avc: denied { read } for pid=30608 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8918.309029][ T28] audit: type=1400 audit(2000007479.910:34012): avc: denied { write } for pid=30601 comm="syz.1.10698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8918.318836][ T28] audit: type=1400 audit(2000007479.920:34013): avc: denied { read } for pid=30601 comm="syz.1.10698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8922.661470][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 8922.662289][ T28] audit: type=1400 audit(2000007484.260:34047): avc: denied { allowed } for pid=30620 comm="syz.0.10704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 8922.752202][ T28] audit: type=1400 audit(2000007484.350:34048): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8922.771259][ T28] audit: type=1400 audit(2000007484.370:34049): avc: denied { create } for pid=30620 comm="syz.0.10704" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 8922.820461][ T28] audit: type=1400 audit(2000007484.420:34050): avc: denied { allowed } for pid=30620 comm="syz.0.10704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 8922.948076][ T28] audit: type=1400 audit(2000007484.540:34051): avc: denied { read write open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8922.949750][ T28] audit: type=1400 audit(2000007484.540:34052): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8923.245282][ T28] audit: type=1400 audit(2000007484.840:34053): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8923.272976][ T28] audit: type=1400 audit(2000007484.860:34054): avc: denied { read write open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8923.285922][ T28] audit: type=1400 audit(2000007484.890:34055): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8923.629152][ T28] audit: type=1400 audit(2000007485.230:34056): avc: denied { read } for pid=30622 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8927.759395][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 8927.759829][ T28] audit: type=1400 audit(2000007489.360:34092): avc: denied { ioctl } for pid=30628 comm="syz.0.10707" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x4b34 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8927.923947][ T28] audit: type=1400 audit(2000007489.520:34093): avc: denied { read } for pid=30631 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8927.971377][ T28] audit: type=1400 audit(2000007489.570:34094): avc: denied { bind } for pid=30628 comm="syz.0.10707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8928.387818][ T28] audit: type=1400 audit(2000007489.980:34095): avc: denied { read write } for pid=30631 comm="syz.1.10708" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dpkg_var_lib_t:s0" [ 8928.403146][ T28] audit: type=1400 audit(2000007490.000:34096): avc: denied { open } for pid=30631 comm="syz.1.10708" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dpkg_var_lib_t:s0" [ 8928.650929][T30632] FAULT_INJECTION: forcing a failure. [ 8928.650929][T30632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 8928.778817][T30632] CPU: 0 UID: 0 PID: 30632 Comm: syz.1.10708 Tainted: G L syzkaller #0 PREEMPT [ 8928.778982][T30632] Tainted: [L]=SOFTLOCKUP [ 8928.779007][T30632] Hardware name: ARM-Versatile Express [ 8928.779031][T30632] Call trace: [ 8928.779075][T30632] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 8928.779200][T30632] r7:60000113 r6:60000113 r5:8231b914 r4:00000000 [ 8928.779221][T30632] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 8928.779277][T30632] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 8928.779341][T30632] r7:00000000 r6:00000000 r5:83186200 r4:82b4edc8 [ 8928.779358][T30632] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 8928.779422][T30632] [<809ccb70>] (should_fail_ex) from [<809ccda8>] (should_fail+0x14/0x18) [ 8928.779492][T30632] r8:76ff1f08 r7:00000000 r6:00000000 r5:f3791f68 r4:00000002 [ 8928.779511][T30632] [<809ccd94>] (should_fail) from [<809ccdc8>] (should_fail_usercopy+0x1c/0x20) [ 8928.779570][T30632] [<809ccdac>] (should_fail_usercopy) from [<805bf348>] (simple_read_from_buffer+0x80/0x140) [ 8928.779630][T30632] [<805bf2c8>] (simple_read_from_buffer) from [<80643810>] (proc_fail_nth_read+0xb8/0x108) [ 8928.779704][T30632] r10:80643758 r9:00000001 r8:00000002 r7:f3791f68 r6:0000000f r5:76ff1f08 [ 8928.779762][T30632] r4:83186200 r3:f3791e9f [ 8928.779783][T30632] [<80643758>] (proc_fail_nth_read) from [<805808a0>] (vfs_read+0xc0/0x328) [ 8928.779858][T30632] r8:83186200 r7:f3791f68 r6:76ff1f08 r5:8651ae80 r4:0000000f [ 8928.779875][T30632] [<805807e0>] (vfs_read) from [<80581534>] (ksys_read+0x74/0xec) [ 8928.779945][T30632] r10:00000003 r9:83186200 r8:8020029c r7:00000000 r6:00000000 r5:8651ae80 [ 8928.779966][T30632] r4:8651ae83 [ 8928.779984][T30632] [<805814c0>] (ksys_read) from [<805815bc>] (sys_read+0x10/0x14) [ 8928.780047][T30632] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 8928.780064][T30632] [<805815ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8928.780117][T30632] Exception stack(0xf3791fa8 to 0xf3791ff0) [ 8928.780158][T30632] 1fa0: 00000000 00000000 00000004 76ff1f08 0000000f 00000000 [ 8928.780201][T30632] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76ff20dc [ 8928.780232][T30632] 1fe0: 76ff1e58 76ff1e44 0010b524 00112108 [ 8929.367775][ T28] audit: type=1400 audit(2000007490.610:34097): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8929.369079][ T28] audit: type=1400 audit(2000007490.970:34098): avc: denied { open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8929.370059][ T28] audit: type=1400 audit(2000007490.970:34099): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8930.004747][ T28] audit: type=1400 audit(2000007491.600:34100): avc: denied { read } for pid=30640 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8930.819206][ T28] audit: type=1400 audit(2000007492.420:34101): avc: denied { read } for pid=30640 comm="syz.1.10709" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8932.817136][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 8932.817637][ T28] audit: type=1400 audit(2000007494.410:34110): avc: denied { write } for pid=30642 comm="syz.1.10710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8932.817882][ T28] audit: type=1400 audit(2000007494.410:34111): avc: denied { read } for pid=30642 comm="syz.1.10710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8935.279263][ T28] audit: type=1400 audit(2000007496.880:34112): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8935.282216][ T28] audit: type=1400 audit(2000007496.880:34113): avc: denied { open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8935.289527][ T28] audit: type=1400 audit(2000007496.880:34114): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8936.140560][ T28] audit: type=1400 audit(2000007497.740:34115): avc: denied { read } for pid=30645 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8936.718232][ T28] audit: type=1400 audit(2000007498.320:34116): avc: denied { create } for pid=30645 comm="syz.1.10711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8936.787376][ T28] audit: type=1400 audit(2000007498.380:34117): avc: denied { ioctl } for pid=30645 comm="syz.1.10711" path="socket:[93737]" dev="sockfs" ino=93737 ioctlcmd=0x8935 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8936.819808][ T28] audit: type=1400 audit(2000007498.420:34118): avc: denied { module_request } for pid=30645 comm="syz.1.10711" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8937.077367][ T28] audit: type=1400 audit(2000007498.670:34119): avc: denied { sys_module } for pid=30645 comm="syz.1.10711" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8937.904555][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 8937.909136][ T28] audit: type=1400 audit(2000007499.500:34121): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8937.911181][ T28] audit: type=1400 audit(2000007499.500:34122): avc: denied { open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8937.914836][ T28] audit: type=1400 audit(2000007499.500:34123): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8939.067381][ T28] audit: type=1400 audit(2000007500.660:34124): avc: denied { read } for pid=30649 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8939.179188][ T28] audit: type=1400 audit(2000007500.780:34125): avc: denied { create } for pid=30649 comm="syz.1.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8939.218770][ T28] audit: type=1400 audit(2000007500.820:34126): avc: denied { setopt } for pid=30649 comm="syz.1.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8939.777698][ T28] audit: type=1400 audit(2000007501.370:34127): avc: denied { create } for pid=30649 comm="syz.1.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8939.948753][ T28] audit: type=1400 audit(2000007501.550:34128): avc: denied { create } for pid=30649 comm="syz.1.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8939.951347][ T28] audit: type=1400 audit(2000007501.550:34129): avc: denied { write } for pid=30649 comm="syz.1.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8939.965903][ T28] audit: type=1400 audit(2000007501.560:34130): avc: denied { read } for pid=30649 comm="syz.1.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8942.964748][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 8942.965992][ T28] audit: type=1400 audit(2000007504.560:34158): avc: denied { read } for pid=30655 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8943.300238][ T28] audit: type=1400 audit(2000007504.900:34159): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8943.308181][ T28] audit: type=1400 audit(2000007504.910:34160): avc: denied { open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8943.313667][ T28] audit: type=1400 audit(2000007504.910:34161): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8943.379894][ T28] audit: type=1400 audit(2000007504.980:34162): avc: denied { create } for pid=30655 comm="syz.0.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8943.759192][ T28] audit: type=1400 audit(2000007505.360:34163): avc: denied { ioctl } for pid=30655 comm="syz.0.10715" path="socket:[94486]" dev="sockfs" ino=94486 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8943.929371][ T28] audit: type=1400 audit(2000007505.530:34164): avc: denied { bind } for pid=30655 comm="syz.0.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8944.079668][ T28] audit: type=1400 audit(2000007505.680:34165): avc: denied { write } for pid=30655 comm="syz.0.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8944.081232][ T28] audit: type=1400 audit(2000007505.680:34166): avc: denied { read } for pid=30655 comm="syz.0.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8944.303786][ T28] audit: type=1400 audit(2000007505.900:34167): avc: denied { read } for pid=30657 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8946.692123][T30661] FAULT_INJECTION: forcing a failure. [ 8946.692123][T30661] name failslab, interval 1, probability 0, space 0, times 0 [ 8946.692544][T30661] CPU: 0 UID: 0 PID: 30661 Comm: syz.1.10717 Tainted: G L syzkaller #0 PREEMPT [ 8946.692625][T30661] Tainted: [L]=SOFTLOCKUP [ 8946.692644][T30661] Hardware name: ARM-Versatile Express [ 8946.692666][T30661] Call trace: [ 8946.692748][T30661] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 8946.692871][T30661] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 8946.692893][T30661] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 8946.692948][T30661] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 8946.693015][T30661] r7:00000dc0 r6:00000000 r5:840f8000 r4:82b17d48 [ 8946.693034][T30661] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 8946.693096][T30661] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 8946.693205][T30661] r8:000002c8 r7:00000dc0 r6:00000000 r5:00000000 r4:83001540 [ 8946.693243][T30661] [<8054ee98>] (should_failslab) from [<805289dc>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 8946.693313][T30661] [<80528988>] (__kmalloc_cache_noprof) from [<8150b180>] (snd_mixer_oss_put_volume1_sw+0x8c/0x174) [ 8946.693408][T30661] r10:8150b730 r9:86b01400 r8:82522738 r7:00000008 r6:838241e0 r5:83824040 [ 8946.693429][T30661] r4:8420b800 [ 8946.693449][T30661] [<8150b0f4>] (snd_mixer_oss_put_volume1_sw) from [<8150b95c>] (snd_mixer_oss_put_volume1+0x22c/0x2d0) [ 8946.693523][T30661] r9:848b85c8 r8:00000008 r7:86c30580 r6:848b813c r5:84c93c00 r4:00000000 [ 8946.693539][T30661] [<8150b730>] (snd_mixer_oss_put_volume1) from [<81509a8c>] (snd_mixer_oss_ioctl1+0x244/0xae0) [ 8946.693613][T30661] r8:848b8000 r7:00000000 r6:20000580 r5:86c30580 r4:00000006 [ 8946.693632][T30661] [<81509848>] (snd_mixer_oss_ioctl1) from [<8150a3cc>] (snd_mixer_oss_ioctl+0x14/0x18) [ 8946.693703][T30661] r10:840f8000 r9:00000004 r8:867a9500 r7:20000580 r6:40406f06 r5:867a9501 [ 8946.693723][T30661] r4:00000000 [ 8946.693739][T30661] [<8150a3b8>] (snd_mixer_oss_ioctl) from [<8059c12c>] (sys_ioctl+0x244/0xb5c) [ 8946.693795][T30661] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8946.693844][T30661] Exception stack(0xf3a69fa8 to 0xf3a69ff0) [ 8946.693911][T30661] 9fa0: 00000000 00000000 00000004 40406f06 20000580 00000000 [ 8946.693954][T30661] 9fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76ff20dc [ 8946.693985][T30661] 9fe0: 76ff1e88 76ff1e78 00018bc4 00130300 [ 8946.694021][T30661] r10:00000036 r9:840f8000 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 8946.694042][T30661] r4:00000000 [ 8948.064682][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 8948.065049][ T28] audit: type=1400 audit(2000007509.660:34190): avc: denied { read } for pid=30664 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8948.431266][ T28] audit: type=1400 audit(2000007510.030:34191): avc: denied { create } for pid=30662 comm="syz.0.10718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8948.458879][ T28] audit: type=1400 audit(2000007510.060:34192): avc: denied { create } for pid=30662 comm="syz.0.10718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8948.461340][ T28] audit: type=1400 audit(2000007510.060:34193): avc: denied { write } for pid=30662 comm="syz.0.10718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8948.464645][ T28] audit: type=1400 audit(2000007510.060:34194): avc: denied { read } for pid=30662 comm="syz.0.10718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8948.700007][ T28] audit: type=1400 audit(2000007510.300:34195): avc: denied { ioctl } for pid=30662 comm="syz.0.10718" path="socket:[94499]" dev="sockfs" ino=94499 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8948.980854][ T28] audit: type=1400 audit(2000007510.580:34196): avc: denied { read } for pid=30664 comm="syz.1.10719" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8948.981338][ T28] audit: type=1400 audit(2000007510.580:34197): avc: denied { open } for pid=30664 comm="syz.1.10719" path="net:[4026532744]" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8949.109924][ T28] audit: type=1400 audit(2000007510.710:34198): avc: denied { write } for pid=30662 comm="syz.0.10718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8949.219196][ T28] audit: type=1400 audit(2000007510.820:34199): avc: denied { ioctl } for pid=30662 comm="syz.0.10718" path="socket:[94499]" dev="sockfs" ino=94499 ioctlcmd=0x5565 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8953.291377][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 8953.291677][ T28] audit: type=1400 audit(2000007514.890:34237): avc: denied { read } for pid=30675 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8954.107493][ T28] audit: type=1400 audit(2000007515.690:34238): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8954.147290][ T28] audit: type=1400 audit(2000007515.690:34239): avc: denied { open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8954.149395][ T28] audit: type=1400 audit(2000007515.750:34240): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8954.926276][ T28] audit: type=1400 audit(2000007516.520:34241): avc: denied { read } for pid=30677 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8955.030938][ T28] audit: type=1400 audit(2000007516.630:34242): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8955.139646][ T28] audit: type=1400 audit(2000007516.740:34243): avc: denied { create } for pid=30677 comm="syz.0.10724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8955.172887][ T28] audit: type=1400 audit(2000007516.770:34244): avc: denied { setopt } for pid=30677 comm="syz.0.10724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8955.201215][ T28] audit: type=1400 audit(2000007516.800:34245): avc: denied { read write open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8955.202669][ T28] audit: type=1400 audit(2000007516.800:34246): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8958.662861][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 8958.664386][ T28] audit: type=1400 audit(2000007520.260:34276): avc: denied { read } for pid=30679 comm="syz.1.10725" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8958.669119][ T28] audit: type=1400 audit(2000007520.270:34277): avc: denied { open } for pid=30679 comm="syz.1.10725" path="/dev/ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8958.820093][ T28] audit: type=1400 audit(2000007520.420:34278): avc: denied { read } for pid=30685 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8959.111045][ T28] audit: type=1400 audit(2000007520.710:34279): avc: denied { write } for pid=30679 comm="syz.1.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8959.136854][ T28] audit: type=1400 audit(2000007520.730:34280): avc: denied { read } for pid=30679 comm="syz.1.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8959.167622][ T28] audit: type=1400 audit(2000007520.760:34281): avc: denied { allowed } for pid=30685 comm="syz.0.10727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 8959.193036][ T28] audit: type=1400 audit(2000007520.790:34282): avc: denied { create } for pid=30685 comm="syz.0.10727" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 8959.518457][ T28] audit: type=1400 audit(2000007521.120:34283): avc: denied { read } for pid=30685 comm="syz.0.10727" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8959.520012][ T28] audit: type=1400 audit(2000007521.120:34284): avc: denied { open } for pid=30685 comm="syz.0.10727" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8959.985472][ T28] audit: type=1400 audit(2000007521.570:34285): avc: denied { create } for pid=30679 comm="syz.1.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8964.005827][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 8964.006823][ T28] audit: type=1400 audit(2000007525.600:34316): avc: denied { read } for pid=30694 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8964.332097][ T28] audit: type=1400 audit(2000007525.930:34317): avc: denied { read } for pid=30695 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8964.334909][ T28] audit: type=1400 audit(2000007525.930:34318): avc: denied { create } for pid=30694 comm="syz.1.10730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8964.372867][ T28] audit: type=1400 audit(2000007525.970:34319): avc: denied { setopt } for pid=30694 comm="syz.1.10730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8964.403147][ T28] audit: type=1400 audit(2000007526.000:34320): avc: denied { create } for pid=30694 comm="syz.1.10730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8964.407446][ T28] audit: type=1400 audit(2000007526.000:34321): avc: denied { write } for pid=30694 comm="syz.1.10730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8964.410646][ T28] audit: type=1400 audit(2000007526.010:34322): avc: denied { read } for pid=30694 comm="syz.1.10730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8964.587822][ T28] audit: type=1400 audit(2000007526.180:34323): avc: denied { ioctl } for pid=30694 comm="syz.1.10730" path="socket:[94567]" dev="sockfs" ino=94567 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8964.661033][ T28] audit: type=1400 audit(2000007526.260:34324): avc: denied { write } for pid=30694 comm="syz.1.10730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8964.744138][ T28] audit: type=1400 audit(2000007526.340:34325): avc: denied { read } for pid=30695 comm="syz.0.10731" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8969.218812][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 8969.219174][ T28] audit: type=1400 audit(2000007530.820:34356): avc: denied { create } for pid=30702 comm="syz.0.10734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 8969.428605][ T28] audit: type=1400 audit(2000007531.030:34357): avc: denied { write } for pid=30704 comm="syz.1.10735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8969.587079][ T28] audit: type=1400 audit(2000007531.180:34358): avc: denied { write } for pid=30704 comm="syz.1.10735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8969.855927][ T28] audit: type=1400 audit(2000007531.450:34359): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8970.026969][ T28] audit: type=1400 audit(2000007531.620:34360): avc: denied { read write open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8970.027187][ T28] audit: type=1400 audit(2000007531.620:34361): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8970.549539][ T28] audit: type=1400 audit(2000007532.150:34362): avc: denied { read } for pid=30713 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8970.679262][ T28] audit: type=1400 audit(2000007532.280:34363): avc: denied { read } for pid=30713 comm="syz.0.10736" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8970.684858][ T28] audit: type=1400 audit(2000007532.280:34364): avc: denied { open } for pid=30713 comm="syz.0.10736" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8970.924510][ T28] audit: type=1400 audit(2000007532.520:34365): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8974.604767][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 8974.604994][ T28] audit: type=1400 audit(2000007536.200:34387): avc: denied { read } for pid=30724 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8975.201354][ T28] audit: type=1400 audit(2000007536.800:34388): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8975.347327][ T28] audit: type=1400 audit(2000007536.940:34389): avc: denied { read write open } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8975.347715][ T28] audit: type=1400 audit(2000007536.940:34390): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8975.709961][ T28] audit: type=1400 audit(2000007537.310:34391): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8975.807155][ T28] audit: type=1400 audit(2000007537.400:34392): avc: denied { read write open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8975.807586][ T28] audit: type=1400 audit(2000007537.400:34393): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8976.128125][ T28] audit: type=1400 audit(2000007537.720:34394): avc: denied { read } for pid=30726 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8976.403798][ T28] audit: type=1400 audit(2000007538.000:34395): avc: denied { read } for pid=30727 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8976.422041][ T28] audit: type=1400 audit(2000007538.020:34396): avc: denied { create } for pid=30726 comm="syz.1.10741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8980.383929][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 8980.384424][ T28] audit: type=1400 audit(2000007541.980:34438): avc: denied { read } for pid=30740 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8980.901792][ T28] audit: type=1400 audit(2000007542.500:34439): avc: denied { create } for pid=30740 comm="syz.1.10746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8980.977672][ T28] audit: type=1400 audit(2000007542.570:34440): avc: denied { read } for pid=30741 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8981.101172][ T28] audit: type=1400 audit(2000007542.700:34441): avc: denied { ioctl } for pid=30740 comm="syz.1.10746" path="socket:[94631]" dev="sockfs" ino=94631 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8981.188997][ T28] audit: type=1400 audit(2000007542.790:34442): avc: denied { bind } for pid=30740 comm="syz.1.10746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8981.280523][ T28] audit: type=1400 audit(2000007542.880:34443): avc: denied { read } for pid=30741 comm="syz.0.10747" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8981.283472][ T28] audit: type=1400 audit(2000007542.880:34444): avc: denied { open } for pid=30741 comm="syz.0.10747" path="/dev/vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8981.539932][ T28] audit: type=1400 audit(2000007543.140:34445): avc: denied { write } for pid=30740 comm="syz.1.10746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8981.689205][T30742] FAULT_INJECTION: forcing a failure. [ 8981.689205][T30742] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 8981.728607][T30742] CPU: 1 UID: 0 PID: 30742 Comm: syz.1.10746 Tainted: G L syzkaller #0 PREEMPT [ 8981.728757][T30742] Tainted: [L]=SOFTLOCKUP [ 8981.728779][T30742] Hardware name: ARM-Versatile Express [ 8981.728799][T30742] Call trace: [ 8981.728838][T30742] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 8981.728944][T30742] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 8981.728963][T30742] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 8981.729010][T30742] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 8981.729067][T30742] r7:20000140 r6:00000000 r5:84790000 r4:82b4edc8 [ 8981.729084][T30742] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 8981.729138][T30742] [<809ccb70>] (should_fail_ex) from [<809ccda8>] (should_fail+0x14/0x18) [ 8981.729213][T30742] r8:00000020 r7:20000140 r6:f3ebde28 r5:00000000 r4:f3ebdf20 [ 8981.729232][T30742] [<809ccd94>] (should_fail) from [<809ccdc8>] (should_fail_usercopy+0x1c/0x20) [ 8981.729285][T30742] [<809ccdac>] (should_fail_usercopy) from [<815dccdc>] (copy_msghdr_from_user+0x50/0x1e0) [ 8981.729343][T30742] [<815dcc8c>] (copy_msghdr_from_user) from [<815dcee4>] (___sys_sendmsg+0x78/0xd0) [ 8981.729404][T30742] r8:00000020 r7:00000000 r6:85972040 r5:f3ebdf20 r4:f3ebde6c [ 8981.729421][T30742] [<815dce6c>] (___sys_sendmsg) from [<815def6c>] (__sys_sendmsg+0x8c/0xe0) [ 8981.729488][T30742] r9:84790000 r8:867a9580 r7:00000020 r6:20000140 r5:867a9580 r4:00000003 [ 8981.729506][T30742] [<815deee0>] (__sys_sendmsg) from [<815defd4>] (sys_sendmsg+0x14/0x18) [ 8981.729569][T30742] r8:8020029c r7:00000128 r6:0012ed04 r5:00000000 r4:00000000 [ 8981.729586][T30742] [<815defc0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8981.729631][T30742] Exception stack(0xf3ebdfa8 to 0xf3ebdff0) [ 8981.729667][T30742] dfa0: 00000000 00000000 00000003 20000140 00000020 00000000 [ 8981.729699][T30742] dfc0: 00000000 00000000 0012ed04 00000128 003462d8 00000000 00000001 76ff20dc [ 8981.729724][T30742] dfe0: 76ff1e88 76ff1e78 00018bc4 00130300 [ 8981.821964][ T28] audit: type=1400 audit(2000007543.420:34446): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8981.956733][ T28] audit: type=1400 audit(2000007543.420:34447): avc: denied { open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8985.455551][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 8985.455868][ T28] audit: type=1400 audit(2000007547.050:34465): avc: denied { module_request } for pid=30746 comm="syz.1.10749" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8985.527236][ T28] audit: type=1400 audit(2000007547.120:34466): avc: denied { sys_module } for pid=30746 comm="syz.1.10749" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8985.545986][ T28] audit: type=1400 audit(2000007547.140:34467): avc: denied { module_request } for pid=30746 comm="syz.1.10749" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8985.778903][ T28] audit: type=1400 audit(2000007547.380:34468): avc: denied { write } for pid=30746 comm="syz.1.10749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8986.479376][ T28] audit: type=1400 audit(2000007548.080:34469): avc: denied { execute } for pid=30754 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 8986.482345][ T28] audit: type=1400 audit(2000007548.080:34470): avc: denied { execute_no_trans } for pid=30754 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 8986.499864][ T28] audit: type=1400 audit(2000007548.100:34471): avc: denied { execute } for pid=30754 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 8986.562868][ T28] audit: type=1400 audit(2000007548.160:34472): avc: denied { execmem } for pid=30754 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 8986.615437][ T28] audit: type=1400 audit(2000007548.210:34473): avc: denied { read } for pid=30755 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8986.615797][ T28] audit: type=1400 audit(2000007548.210:34474): avc: denied { open } for pid=30755 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8987.133699][T25828] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8987.190968][T25828] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8987.270163][T25828] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8987.349723][T25828] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8988.041055][T25828] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 8988.071051][T25828] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 8988.076374][T25828] bond0 (unregistering): Released all slaves [ 8988.224982][T25828] hsr_slave_0: left promiscuous mode [ 8988.232628][T25828] hsr_slave_1: left promiscuous mode [ 8988.268186][T25828] veth1_macvtap: left promiscuous mode [ 8988.268744][T25828] veth0_macvtap: left promiscuous mode [ 8988.269401][T25828] veth1_vlan: left promiscuous mode [ 8988.269700][T25828] veth0_vlan: left promiscuous mode [ 8990.482644][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 8990.483036][ T28] audit: type=1400 audit(2000007552.080:34554): avc: denied { read } for pid=30884 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 8990.638320][ T28] audit: type=1400 audit(2000007552.240:34555): avc: denied { search } for pid=30882 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.640523][ T28] audit: type=1400 audit(2000007552.240:34556): avc: denied { search } for pid=30882 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.646012][ T28] audit: type=1400 audit(2000007552.240:34557): avc: denied { search } for pid=30882 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.658456][ T28] audit: type=1400 audit(2000007552.250:34558): avc: denied { getattr } for pid=30882 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=42 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8990.662157][ T28] audit: type=1400 audit(2000007552.250:34559): avc: denied { search } for pid=30882 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.665100][ T28] audit: type=1400 audit(2000007552.250:34560): avc: denied { search } for pid=30882 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.669056][ T28] audit: type=1400 audit(2000007552.250:34561): avc: denied { search } for pid=30882 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.672679][ T28] audit: type=1400 audit(2000007552.250:34562): avc: denied { search } for pid=30882 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8990.676025][ T28] audit: type=1400 audit(2000007552.250:34563): avc: denied { remove_name } for pid=30882 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=42 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8991.048251][ T2960] 8021q: adding VLAN 0 to HW filter on device eth1 [ 8991.214652][T30755] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 8991.233822][T30755] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 8991.454887][T30885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30885 comm=syz.0.10753 [ 8992.925586][ T2960] 8021q: adding VLAN 0 to HW filter on device eth2 [ 8993.051092][T30755] hsr_slave_0: entered promiscuous mode [ 8993.062933][T30755] hsr_slave_1: entered promiscuous mode [ 8993.068540][T30755] debugfs: 'hsr0' already exists in 'hsr' [ 8993.072285][T30755] Cannot create hsr debugfs directory [ 8994.209259][T30755] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 8994.214680][T30755] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 8994.222449][T30755] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 8994.241579][T30755] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 8994.250879][T30755] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 8994.263303][T30755] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 8994.272348][T30755] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 8994.298704][T30755] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 8995.534166][ T28] kauditd_printk_skb: 177 callbacks suppressed [ 8995.534540][ T28] audit: type=1400 audit(2000007557.130:34741): avc: denied { sys_module } for pid=30755 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8995.534800][ T28] audit: type=1400 audit(2000007557.130:34742): avc: denied { module_request } for pid=30755 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8995.568539][ T28] audit: type=1400 audit(2000007557.160:34743): avc: denied { write } for pid=31086 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8995.607401][ T28] audit: type=1400 audit(2000007557.200:34744): avc: denied { open } for pid=31086 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8995.713393][ T28] audit: type=1400 audit(2000007557.310:34745): avc: denied { ioctl } for pid=31076 comm="syz.0.10755" path="socket:[94798]" dev="sockfs" ino=94798 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8996.024450][ T28] audit: type=1400 audit(2000007557.620:34746): avc: denied { write } for pid=31089 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8996.025801][ T28] audit: type=1400 audit(2000007557.620:34747): avc: denied { open } for pid=31089 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8996.132335][ T28] audit: type=1400 audit(2000007557.730:34748): avc: denied { bind } for pid=31076 comm="syz.0.10755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8996.212169][T30755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 8996.309332][ T28] audit: type=1400 audit(2000007557.910:34749): avc: denied { module_request } for pid=30755 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8996.412913][ T28] audit: type=1400 audit(2000007558.010:34750): avc: denied { write } for pid=31090 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9000.571894][ T28] kauditd_printk_skb: 241 callbacks suppressed [ 9000.575764][ T28] audit: type=1400 audit(2000007562.170:34992): avc: denied { search } for pid=31125 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9000.583294][ T28] audit: type=1400 audit(2000007562.170:34993): avc: denied { read } for pid=31125 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9000.588922][ T28] audit: type=1400 audit(2000007562.170:34994): avc: denied { open } for pid=31125 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9000.600073][ T28] audit: type=1400 audit(2000007562.170:34995): avc: denied { getattr } for pid=31125 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9000.600587][ T28] audit: type=1400 audit(2000007562.190:34996): avc: denied { getattr } for pid=31125 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.dhcp" dev="tmpfs" ino=47 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9000.641466][ T28] audit: type=1400 audit(2000007562.220:34997): avc: denied { read write } for pid=3103 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9000.641955][ T28] audit: type=1400 audit(2000007562.230:34998): avc: denied { open } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9000.642277][ T28] audit: type=1400 audit(2000007562.230:34999): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9000.757941][ T28] audit: type=1400 audit(2000007562.350:35000): avc: denied { search } for pid=31129 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9000.760666][ T28] audit: type=1400 audit(2000007562.350:35001): avc: denied { search } for pid=31129 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9001.703531][T30755] veth0_vlan: entered promiscuous mode [ 9001.783525][T30755] veth1_vlan: entered promiscuous mode [ 9001.989398][T30755] veth0_macvtap: entered promiscuous mode [ 9002.020010][T30755] veth1_macvtap: entered promiscuous mode [ 9002.151143][T19507] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 9002.153907][T19507] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 9002.161172][T19507] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 9002.165334][T19507] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 9003.272226][T31147] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=514 sclass=netlink_audit_socket pid=31147 comm=syz.1.10751 [ 9003.898237][T30759] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9003.979262][T30759] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9004.074357][T30759] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9004.191953][T30759] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9004.973330][T30759] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9005.019442][T30759] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9005.040844][T30759] bond0 (unregistering): Released all slaves [ 9005.167347][T30759] hsr_slave_0: left promiscuous mode [ 9005.170916][T30759] hsr_slave_1: left promiscuous mode [ 9005.197782][T30759] veth1_macvtap: left promiscuous mode [ 9005.198372][T30759] veth0_macvtap: left promiscuous mode [ 9005.199435][T30759] veth1_vlan: left promiscuous mode [ 9005.604995][ T28] kauditd_printk_skb: 267 callbacks suppressed [ 9005.605573][ T28] audit: type=1400 audit(2000007567.200:35269): avc: denied { search } for pid=31193 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.619970][ T28] audit: type=1400 audit(2000007567.220:35270): avc: denied { search } for pid=31193 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.649523][ T28] audit: type=1400 audit(2000007567.220:35271): avc: denied { search } for pid=31193 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.650035][ T28] audit: type=1400 audit(2000007567.220:35272): avc: denied { getattr } for pid=31193 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.dhcp" dev="tmpfs" ino=50 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9005.650274][ T28] audit: type=1400 audit(2000007567.220:35273): avc: denied { search } for pid=31193 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.650504][ T28] audit: type=1400 audit(2000007567.220:35274): avc: denied { search } for pid=31193 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.650705][ T28] audit: type=1400 audit(2000007567.220:35275): avc: denied { search } for pid=31193 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.650899][ T28] audit: type=1400 audit(2000007567.220:35276): avc: denied { search } for pid=31193 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.651104][ T28] audit: type=1400 audit(2000007567.220:35277): avc: denied { remove_name } for pid=31193 comm="rm" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=50 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9005.651307][ T28] audit: type=1400 audit(2000007567.220:35278): avc: denied { unlink } for pid=31193 comm="rm" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=50 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9010.000530][T31150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9010.044760][T31150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9010.199651][ T2960] 8021q: adding VLAN 0 to HW filter on device eth1 [ 9010.649579][ T28] kauditd_printk_skb: 308 callbacks suppressed [ 9010.649914][ T28] audit: type=1400 audit(2000007572.250:35587): avc: denied { sys_module } for pid=31150 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9010.650169][ T28] audit: type=1400 audit(2000007572.250:35588): avc: denied { module_request } for pid=31150 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9011.348449][ T28] audit: type=1400 audit(2000007572.890:35589): avc: denied { module_request } for pid=31150 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9011.713772][ T28] audit: type=1400 audit(2000007573.310:35590): avc: denied { write } for pid=31371 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9011.730913][ T28] audit: type=1400 audit(2000007573.320:35591): avc: denied { sys_module } for pid=31150 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9011.731380][ T28] audit: type=1400 audit(2000007573.320:35592): avc: denied { module_request } for pid=31150 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9011.759334][ T28] audit: type=1400 audit(2000007573.350:35593): avc: denied { write open } for pid=31371 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9011.762077][ T28] audit: type=1400 audit(2000007573.350:35594): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9011.780130][ T28] audit: type=1400 audit(2000007573.350:35595): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9011.782827][ T28] audit: type=1400 audit(2000007573.350:35596): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9012.722700][T31150] hsr_slave_0: entered promiscuous mode [ 9012.731293][T31150] hsr_slave_1: entered promiscuous mode [ 9015.085933][T31150] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 9015.189100][T31150] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 9015.193381][T31150] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 9015.237732][T31150] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 9015.242923][T31150] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 9015.272229][T31150] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 9015.280242][T31150] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 9015.309267][T31150] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 9016.067708][ T28] kauditd_printk_skb: 108 callbacks suppressed [ 9016.068414][ T28] audit: type=1400 audit(2000007577.660:35705): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9016.068672][ T28] audit: type=1400 audit(2000007577.660:35706): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9016.068754][ T28] audit: type=1400 audit(2000007577.660:35707): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9016.154199][ T28] audit: type=1400 audit(2000007577.750:35708): avc: denied { write } for pid=31529 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9016.173210][ T28] audit: type=1400 audit(2000007577.770:35709): avc: denied { sys_module } for pid=31150 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9016.173551][ T28] audit: type=1400 audit(2000007577.770:35710): avc: denied { module_request } for pid=31150 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9016.208724][ T28] audit: type=1400 audit(2000007577.800:35711): avc: denied { write open } for pid=31529 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9016.233489][ T28] audit: type=1400 audit(2000007577.830:35712): avc: denied { allowed } for pid=31533 comm="syz.1.10782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 9016.260642][ T28] audit: type=1400 audit(2000007577.860:35713): avc: denied { create } for pid=31533 comm="syz.1.10782" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9016.262700][ T28] audit: type=1400 audit(2000007577.860:35714): avc: denied { map } for pid=31533 comm="syz.1.10782" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=95810 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9019.725526][T31150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9021.265487][ T28] kauditd_printk_skb: 152 callbacks suppressed [ 9021.266160][ T28] audit: type=1400 audit(2000007582.860:35867): avc: denied { search } for pid=31559 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9021.267028][ T28] audit: type=1400 audit(2000007582.860:35868): avc: denied { search } for pid=31559 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9021.267284][ T28] audit: type=1400 audit(2000007582.860:35869): avc: denied { search } for pid=31559 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9021.384927][ T28] audit: type=1400 audit(2000007582.960:35870): avc: denied { search } for pid=31550 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9021.401743][ T28] audit: type=1400 audit(2000007583.000:35871): avc: denied { sys_module } for pid=31150 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9021.403779][ T28] audit: type=1400 audit(2000007583.000:35872): avc: denied { module_request } for pid=31150 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9021.452212][ T28] audit: type=1400 audit(2000007583.050:35873): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9021.468814][ T28] audit: type=1400 audit(2000007583.070:35874): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9021.479206][ T28] audit: type=1400 audit(2000007583.080:35875): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9021.783958][ T28] audit: type=1400 audit(2000007583.380:35876): avc: denied { write } for pid=31562 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9026.320846][ T28] kauditd_printk_skb: 154 callbacks suppressed [ 9026.329075][ T28] audit: type=1400 audit(2000007587.920:36031): avc: denied { sys_module } for pid=31150 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9026.331110][ T28] audit: type=1400 audit(2000007587.920:36032): avc: denied { module_request } for pid=31150 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9026.350277][ T28] audit: type=1400 audit(2000007587.950:36033): avc: denied { search } for pid=31586 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9026.353648][ T28] audit: type=1400 audit(2000007587.950:36034): avc: denied { search } for pid=31586 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9026.358538][ T28] audit: type=1400 audit(2000007587.950:36035): avc: denied { search } for pid=31586 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9026.362223][ T28] audit: type=1400 audit(2000007587.960:36036): avc: denied { getattr } for pid=31586 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=57 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9026.366887][ T28] audit: type=1400 audit(2000007587.960:36037): avc: denied { search } for pid=31586 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9026.375023][ T28] audit: type=1400 audit(2000007587.970:36038): avc: denied { search } for pid=31586 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9026.379479][ T28] audit: type=1400 audit(2000007587.970:36039): avc: denied { search } for pid=31586 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9026.382428][ T28] audit: type=1400 audit(2000007587.970:36040): avc: denied { search } for pid=31586 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9027.994685][T31150] veth0_vlan: entered promiscuous mode [ 9028.017592][T31150] veth1_vlan: entered promiscuous mode [ 9028.087326][T31150] veth0_macvtap: entered promiscuous mode [ 9028.101987][T31150] veth1_macvtap: entered promiscuous mode [ 9028.191525][T25828] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 9028.191964][T25828] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 9028.192333][T25828] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 9028.192580][T25828] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 9031.385358][ T28] kauditd_printk_skb: 102 callbacks suppressed [ 9031.385760][ T28] audit: type=1400 audit(2000007592.990:36143): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9031.427652][ T28] audit: type=1400 audit(2000007593.010:36144): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9031.428076][ T28] audit: type=1400 audit(2000007593.010:36145): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9032.084724][ T28] audit: type=1400 audit(2000007593.680:36146): avc: denied { write } for pid=31634 comm="syz.0.10801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 9032.138740][ T28] audit: type=1400 audit(2000007593.740:36147): avc: denied { allowed } for pid=31637 comm="syz.1.10802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 9032.273118][ T28] audit: type=1400 audit(2000007593.870:36148): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9032.286758][ T28] audit: type=1400 audit(2000007593.870:36149): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9032.287144][ T28] audit: type=1400 audit(2000007593.880:36150): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9033.058211][ T28] audit: type=1400 audit(2000007594.650:36151): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9033.058750][ T28] audit: type=1400 audit(2000007594.650:36152): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9036.591447][T31675] netlink: 16 bytes leftover after parsing attributes in process `syz.1.10817'. [ 9036.832816][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 9036.833187][ T28] audit: type=1400 audit(2000007598.430:36218): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9036.848202][ T28] audit: type=1400 audit(2000007598.450:36219): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9036.857974][ T28] audit: type=1400 audit(2000007598.450:36220): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9039.900363][ T28] audit: type=1400 audit(2000007601.500:36221): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9039.918347][ T28] audit: type=1400 audit(2000007601.520:36222): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9039.937854][ T28] audit: type=1400 audit(2000007601.530:36223): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9040.361256][ T28] audit: type=1400 audit(2000007601.960:36224): avc: denied { allowed } for pid=31679 comm="syz.1.10819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 9040.428975][ T28] audit: type=1400 audit(2000007602.030:36225): avc: denied { create } for pid=31679 comm="syz.1.10819" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9041.122405][ T28] audit: type=1400 audit(2000007602.720:36226): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9041.125263][ T28] audit: type=1400 audit(2000007602.720:36227): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.053445][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 9042.055253][ T28] audit: type=1400 audit(2000007603.650:36235): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.059120][ T28] audit: type=1400 audit(2000007603.650:36236): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.062486][ T28] audit: type=1400 audit(2000007603.660:36237): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.204788][ T28] audit: type=1400 audit(2000007603.800:36238): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.208388][ T28] audit: type=1400 audit(2000007603.800:36239): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.212741][ T28] audit: type=1400 audit(2000007603.800:36240): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.320591][ T28] audit: type=1400 audit(2000007603.920:36241): avc: denied { write } for pid=31688 comm="syz.1.10823" name="if_inet6" dev="proc" ino=4026532937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 9042.379940][ T28] audit: type=1400 audit(2000007603.980:36242): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.382528][ T28] audit: type=1400 audit(2000007603.980:36243): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9042.389028][ T28] audit: type=1400 audit(2000007603.980:36244): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9046.374946][T31729] ptrace attach of "/syz-executor exec"[31730] was attempted by "/syz-executor exec"[31729] [ 9047.899205][ T28] kauditd_printk_skb: 86 callbacks suppressed [ 9047.900378][ T28] audit: type=1400 audit(2000007609.500:36331): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9047.903067][ T28] audit: type=1400 audit(2000007609.500:36332): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9047.906996][ T28] audit: type=1400 audit(2000007609.500:36333): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9047.999447][ T28] audit: type=1400 audit(2000007609.600:36334): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9047.999853][ T28] audit: type=1400 audit(2000007609.600:36335): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9048.000170][ T28] audit: type=1400 audit(2000007609.600:36336): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9048.191203][ T28] audit: type=1400 audit(2000007609.790:36337): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9048.196746][ T28] audit: type=1400 audit(2000007609.790:36338): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9048.197164][ T28] audit: type=1400 audit(2000007609.790:36339): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9048.289807][ T28] audit: type=1400 audit(2000007609.890:36340): avc: denied { bpf } for pid=31740 comm="syz.0.10845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9053.374969][ T28] kauditd_printk_skb: 98 callbacks suppressed [ 9053.375719][ T28] audit: type=1400 audit(2000007614.970:36439): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9053.489860][ T28] audit: type=1400 audit(2000007615.090:36440): avc: denied { read write open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9053.493834][ T28] audit: type=1400 audit(2000007615.090:36441): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9053.849993][ T28] audit: type=1400 audit(2000007615.450:36442): avc: denied { create } for pid=31767 comm="syz.0.10856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9053.891981][ T28] audit: type=1400 audit(2000007615.480:36443): avc: denied { write } for pid=31767 comm="syz.0.10856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9053.966828][ T28] audit: type=1400 audit(2000007615.480:36444): avc: denied { read } for pid=31767 comm="syz.0.10856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9053.980739][ T28] audit: type=1400 audit(2000007615.580:36445): avc: denied { create } for pid=31767 comm="syz.0.10856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9054.027619][ T28] audit: type=1400 audit(2000007615.630:36446): avc: denied { ioctl } for pid=31767 comm="syz.0.10856" path="socket:[96564]" dev="sockfs" ino=96564 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9054.030742][ T28] audit: type=1400 audit(2000007615.630:36447): avc: denied { module_request } for pid=31767 comm="syz.0.10856" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 9054.302086][ T28] audit: type=1400 audit(2000007615.900:36448): avc: denied { sys_module } for pid=31767 comm="syz.0.10856" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 9059.506764][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 9059.507105][ T28] audit: type=1400 audit(2000007621.100:36489): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9059.660742][ T28] audit: type=1400 audit(2000007621.180:36490): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9059.682277][ T28] audit: type=1400 audit(2000007621.180:36491): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.287096][ T28] audit: type=1400 audit(2000007621.880:36492): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.294269][ T28] audit: type=1400 audit(2000007621.890:36493): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.294745][ T28] audit: type=1400 audit(2000007621.890:36494): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.699000][ T28] audit: type=1400 audit(2000007622.300:36495): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.736769][ T28] audit: type=1400 audit(2000007622.320:36496): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.737045][ T28] audit: type=1400 audit(2000007622.320:36497): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9060.762106][ T28] audit: type=1326 audit(2000007622.350:36498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31795 comm="syz.0.10866" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 9064.999121][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 9065.000290][ T28] audit: type=1400 audit(2000007626.600:36540): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9065.047211][ T28] audit: type=1400 audit(2000007626.610:36541): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9065.152689][ T28] audit: type=1400 audit(2000007626.640:36542): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9065.499706][ T28] audit: type=1400 audit(2000007627.100:36543): avc: denied { name_bind } for pid=31810 comm="syz.0.10873" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 9065.502398][ T28] audit: type=1400 audit(2000007627.100:36544): avc: denied { node_bind } for pid=31810 comm="syz.0.10873" saddr=::ffff:172.20.20.187 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 9067.907938][ T28] audit: type=1400 audit(2000007629.500:36545): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9067.914807][ T28] audit: type=1400 audit(2000007629.510:36546): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9067.926844][ T28] audit: type=1400 audit(2000007629.520:36547): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9068.009767][ T28] audit: type=1400 audit(2000007629.610:36548): avc: denied { prog_load } for pid=31815 comm="syz.0.10874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9068.013188][ T28] audit: type=1400 audit(2000007629.610:36549): avc: denied { bpf } for pid=31815 comm="syz.0.10874" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9069.112248][T31826] macvtap1: entered promiscuous mode [ 9069.112796][T31826] vlan1: entered promiscuous mode [ 9069.113617][T31826] macvtap1: entered allmulticast mode [ 9069.113754][T31826] vlan1: entered allmulticast mode [ 9069.113800][T31826] veth0_vlan: entered allmulticast mode [ 9069.149265][T31826] vlan1: left allmulticast mode [ 9069.149610][T31826] veth0_vlan: left allmulticast mode [ 9069.150088][T31826] vlan1: left promiscuous mode [ 9070.758715][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 9070.759105][ T28] audit: type=1400 audit(2000007632.360:36588): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9070.759411][ T28] audit: type=1400 audit(2000007632.360:36589): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9070.759661][ T28] audit: type=1400 audit(2000007632.360:36590): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9071.187092][ T28] audit: type=1400 audit(2000007632.770:36591): avc: denied { map_create } for pid=31837 comm="syz.0.10883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9071.946084][ T28] audit: type=1400 audit(2000007633.540:36592): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9071.947070][ T28] audit: type=1400 audit(2000007633.540:36593): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9071.989751][ T28] audit: type=1400 audit(2000007633.540:36594): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9072.202875][ T28] audit: type=1400 audit(2000007633.800:36595): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9072.204457][ T28] audit: type=1400 audit(2000007633.800:36596): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9072.205500][ T28] audit: type=1400 audit(2000007633.800:36597): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.839953][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 9077.845631][ T28] audit: type=1400 audit(2000007639.440:36624): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.848922][ T28] audit: type=1400 audit(2000007639.440:36625): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.853524][ T28] audit: type=1400 audit(2000007639.440:36626): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.926147][ T28] audit: type=1400 audit(2000007639.520:36627): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.928856][ T28] audit: type=1400 audit(2000007639.520:36628): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.935979][ T28] audit: type=1400 audit(2000007639.530:36629): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.977067][ T28] audit: type=1400 audit(2000007639.570:36630): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.986164][ T28] audit: type=1400 audit(2000007639.580:36631): avc: denied { read write open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9077.993788][ T28] audit: type=1400 audit(2000007639.590:36632): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9078.036956][ T28] audit: type=1400 audit(2000007639.630:36633): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9082.847844][ T28] kauditd_printk_skb: 90 callbacks suppressed [ 9082.848164][ T28] audit: type=1400 audit(2000007644.450:36724): avc: denied { unmount } for pid=31150 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 9082.910632][ T28] audit: type=1400 audit(2000007644.510:36725): avc: denied { read write } for pid=31896 comm="syz.1.10908" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9082.911010][ T28] audit: type=1400 audit(2000007644.510:36726): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9082.911099][ T28] audit: type=1400 audit(2000007644.510:36727): avc: denied { open } for pid=31896 comm="syz.1.10908" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9082.912471][ T28] audit: type=1400 audit(2000007644.510:36728): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9082.913396][ T28] audit: type=1400 audit(2000007644.510:36729): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9082.940068][ T28] audit: type=1400 audit(2000007644.540:36730): avc: denied { mounton } for pid=31896 comm="syz.1.10908" path="/91/file0" dev="tmpfs" ino=481 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 9082.945142][ T28] audit: type=1400 audit(2000007644.540:36731): avc: denied { mount } for pid=31896 comm="syz.1.10908" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 9083.002769][ T28] audit: type=1400 audit(2000007644.600:36732): avc: denied { read write } for pid=31900 comm="syz.0.10909" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9083.008181][ T28] audit: type=1400 audit(2000007644.610:36733): avc: denied { open } for pid=31900 comm="syz.0.10909" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9088.064625][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 9088.065039][ T28] audit: type=1400 audit(2000007649.660:36761): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9088.065303][ T28] audit: type=1400 audit(2000007649.660:36762): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9088.122597][ T28] audit: type=1400 audit(2000007649.720:36763): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9088.570743][ T28] audit: type=1400 audit(2000007650.170:36764): avc: denied { name_bind } for pid=31921 comm="syz.1.10915" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 9088.575247][ T28] audit: type=1400 audit(2000007650.170:36765): avc: denied { node_bind } for pid=31921 comm="syz.1.10915" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 9088.797358][ T28] audit: type=1400 audit(2000007650.390:36766): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9088.799817][ T28] audit: type=1400 audit(2000007650.400:36767): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9088.830915][ T28] audit: type=1400 audit(2000007650.430:36768): avc: denied { unmount } for pid=31150 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 9088.833174][ T28] audit: type=1400 audit(2000007650.430:36769): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9088.897562][ T28] audit: type=1400 audit(2000007650.480:36770): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9093.861326][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 9093.861675][ T28] audit: type=1400 audit(2000007655.460:36823): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9093.861933][ T28] audit: type=1400 audit(2000007655.460:36824): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9093.875952][ T28] audit: type=1400 audit(2000007655.460:36825): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9094.021968][ T28] audit: type=1400 audit(2000007655.620:36826): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9094.023470][ T28] audit: type=1400 audit(2000007655.620:36827): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9094.024602][ T28] audit: type=1400 audit(2000007655.620:36828): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9094.252783][ T28] audit: type=1400 audit(2000007655.850:36829): avc: denied { read write } for pid=31952 comm="syz.1.10928" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9094.259260][ T28] audit: type=1400 audit(2000007655.860:36830): avc: denied { open } for pid=31952 comm="syz.1.10928" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9094.291377][ T28] audit: type=1400 audit(2000007655.890:36831): avc: denied { mounton } for pid=31952 comm="syz.1.10928" path="/102/file0" dev="tmpfs" ino=537 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 9094.319002][ T28] audit: type=1400 audit(2000007655.910:36832): avc: denied { mount } for pid=31952 comm="syz.1.10928" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 9099.153676][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 9099.154045][ T28] audit: type=1400 audit(2000007660.750:36850): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9099.177019][ T28] audit: type=1400 audit(2000007660.770:36851): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9099.177432][ T28] audit: type=1400 audit(2000007660.770:36852): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9099.409998][ T28] audit: type=1400 audit(2000007661.010:36853): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9099.436849][ T28] audit: type=1400 audit(2000007661.030:36854): avc: denied { read write open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9099.437221][ T28] audit: type=1400 audit(2000007661.030:36855): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9099.437496][ T28] audit: type=1400 audit(2000007661.030:36856): avc: denied { read write } for pid=31967 comm="syz.1.10933" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9099.437686][ T28] audit: type=1400 audit(2000007661.030:36857): avc: denied { open } for pid=31967 comm="syz.1.10933" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9099.437875][ T28] audit: type=1400 audit(2000007661.040:36858): avc: denied { ioctl } for pid=31967 comm="syz.1.10933" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9099.747535][ T28] audit: type=1400 audit(2000007661.330:36859): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9104.362575][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 9104.363144][ T28] audit: type=1400 audit(2000007665.960:36897): avc: denied { unmount } for pid=31150 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 9104.747178][ T28] audit: type=1400 audit(2000007666.340:36898): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9104.747798][ T28] audit: type=1400 audit(2000007666.340:36899): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9104.747885][ T28] audit: type=1400 audit(2000007666.340:36900): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9105.008652][ T28] audit: type=1400 audit(2000007666.610:36901): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9105.009094][ T28] audit: type=1400 audit(2000007666.610:36902): avc: denied { open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9105.020723][ T28] audit: type=1400 audit(2000007666.620:36903): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9105.478489][ T28] audit: type=1400 audit(2000007667.080:36904): avc: denied { name_bind } for pid=31992 comm="syz.0.10942" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 9105.479047][ T28] audit: type=1400 audit(2000007667.080:36905): avc: denied { node_bind } for pid=31992 comm="syz.0.10942" saddr=::ffff:172.20.20.187 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 9105.639593][ T28] audit: type=1400 audit(2000007667.240:36906): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9106.272624][T31995] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10943'. [ 9109.570671][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 9109.570895][ T28] audit: type=1400 audit(2000007671.170:36928): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9109.574377][ T28] audit: type=1400 audit(2000007671.170:36929): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9109.576070][ T28] audit: type=1400 audit(2000007671.170:36930): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9109.592317][ T28] audit: type=1400 audit(2000007671.190:36931): avc: denied { prog_load } for pid=32006 comm="syz.0.10945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9109.597127][ T28] audit: type=1400 audit(2000007671.190:36932): avc: denied { bpf } for pid=32006 comm="syz.0.10945" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9109.602404][ T28] audit: type=1400 audit(2000007671.190:36933): avc: denied { allowed } for pid=32006 comm="syz.0.10945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 9109.611871][ T28] audit: type=1400 audit(2000007671.210:36934): avc: denied { create } for pid=32006 comm="syz.0.10945" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9109.612948][ T28] audit: type=1400 audit(2000007671.210:36935): avc: denied { map } for pid=32006 comm="syz.0.10945" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9109.615588][ T28] audit: type=1400 audit(2000007671.210:36936): avc: denied { read write } for pid=32006 comm="syz.0.10945" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9109.631973][ T28] audit: type=1400 audit(2000007671.230:36937): avc: denied { map } for pid=32006 comm="syz.0.10945" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9114.672388][ T28] kauditd_printk_skb: 113 callbacks suppressed [ 9114.672851][ T28] audit: type=1400 audit(2000007676.130:37051): avc: denied { open } for pid=32055 comm="syz.0.10955" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9114.683865][ T28] audit: type=1400 audit(2000007676.280:37052): avc: denied { ioctl } for pid=32055 comm="syz.0.10955" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9114.698027][ T28] audit: type=1400 audit(2000007676.300:37053): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9114.768548][ T28] audit: type=1400 audit(2000007676.340:37054): avc: denied { read write open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9114.818759][ T28] audit: type=1400 audit(2000007676.340:37055): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9114.902775][ T28] audit: type=1400 audit(2000007676.500:37056): avc: denied { ioctl } for pid=32055 comm="syz.0.10955" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9114.903280][ T28] audit: type=1400 audit(2000007676.500:37057): avc: denied { ioctl } for pid=32055 comm="syz.0.10955" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9114.996937][ T28] audit: type=1400 audit(2000007676.590:37058): avc: denied { read write } for pid=31150 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9115.036120][ T28] audit: type=1400 audit(2000007676.630:37059): avc: denied { read write open } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9115.053998][ T28] audit: type=1400 audit(2000007676.650:37060): avc: denied { ioctl } for pid=31150 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9119.750088][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 9119.750732][ T28] audit: type=1400 audit(2000007681.350:37089): avc: denied { create } for pid=32072 comm="syz.1.10963" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9119.809077][ T28] audit: type=1400 audit(2000007681.410:37090): avc: denied { ioctl } for pid=32072 comm="syz.1.10963" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=97629 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9119.830455][ T28] audit: type=1400 audit(2000007681.430:37091): avc: denied { allowed } for pid=32073 comm="syz.0.10962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 9119.847775][ T28] audit: type=1400 audit(2000007681.450:37092): avc: denied { create } for pid=32073 comm="syz.0.10962" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9119.869658][ T28] audit: type=1400 audit(2000007681.470:37093): avc: denied { prog_load } for pid=32073 comm="syz.0.10962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9119.914804][ T28] audit: type=1400 audit(2000007681.510:37094): avc: denied { bpf } for pid=32073 comm="syz.0.10962" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9119.927398][ T28] audit: type=1400 audit(2000007681.510:37095): avc: denied { prog_load } for pid=32073 comm="syz.0.10962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9119.947125][ T28] audit: type=1400 audit(2000007681.540:37096): avc: denied { perfmon } for pid=32073 comm="syz.0.10962" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9119.957217][ T28] audit: type=1400 audit(2000007681.550:37097): avc: denied { bpf } for pid=32073 comm="syz.0.10962" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9119.977303][ T28] audit: type=1400 audit(2000007681.570:37098): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9124.924663][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 9124.926204][ T28] audit: type=1400 audit(2000007686.510:37135): avc: denied { read write } for pid=32085 comm="syz.1.10967" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 9124.931226][ T28] audit: type=1400 audit(2000007686.530:37136): avc: denied { open } for pid=32085 comm="syz.1.10967" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 9124.958385][ T28] audit: type=1400 audit(2000007686.560:37137): avc: denied { ioctl } for pid=32085 comm="syz.1.10967" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:checkpolicy_exec_t:s0" [ 9124.979097][ T28] audit: type=1400 audit(2000007686.580:37138): avc: denied { read write } for pid=32080 comm="syz.0.10965" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9124.982583][ T28] audit: type=1400 audit(2000007686.580:37139): avc: denied { open } for pid=32080 comm="syz.0.10965" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9125.867878][T30759] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 9126.132906][ T28] audit: type=1400 audit(2000007687.730:37140): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9126.135425][ T28] audit: type=1400 audit(2000007687.730:37141): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9126.149934][ T28] audit: type=1400 audit(2000007687.730:37142): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9126.311978][ T28] audit: type=1400 audit(2000007687.910:37143): avc: denied { map_create } for pid=32092 comm="syz.1.10968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 9126.337266][ T28] audit: type=1400 audit(2000007687.930:37144): avc: denied { bpf } for pid=32092 comm="syz.1.10968" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 9130.011262][ C0] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 9130.237394][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 9130.237796][ T28] audit: type=1400 audit(2000007691.830:37171): avc: denied { execmem } for pid=32102 comm="syz.0.10971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 9130.408579][ T28] audit: type=1400 audit(2000007692.010:37172): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9130.408946][ T28] audit: type=1400 audit(2000007692.010:37173): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9130.409128][ T28] audit: type=1400 audit(2000007692.010:37174): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9130.675078][ T28] audit: type=1400 audit(2000007692.270:37175): avc: denied { read write } for pid=30755 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9130.675479][ T28] audit: type=1400 audit(2000007692.270:37176): avc: denied { open } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9130.688898][ T28] audit: type=1400 audit(2000007692.290:37177): avc: denied { ioctl } for pid=30755 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9130.811008][ T28] audit: type=1400 audit(2000007692.410:37178): avc: denied { create } for pid=32111 comm="syz.1.10974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 9130.832999][ T28] audit: type=1400 audit(2000007692.430:37179): avc: denied { connect } for pid=32111 comm="syz.1.10974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 9130.847546][ T28] audit: type=1400 audit(2000007692.450:37180): avc: denied { read } for pid=32111 comm="syz.1.10974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 9131.408359][T32114] process 'syz.1.10975' launched '/dev/fd/4' with NULL argv: empty string added [ 9133.002326][T32104] ------------[ cut here ]------------ [ 9133.002709][T32104] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.0.10971/32104 [ 9133.004432][T32104] Modules linked in: [ 9133.005940][T32104] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 9133.006608][T32104] CPU: 1 UID: 0 PID: 32104 Comm: syz.0.10971 Tainted: G L syzkaller #0 PREEMPT [ 9133.007474][T32104] Tainted: [L]=SOFTLOCKUP [ 9133.007716][T32104] Hardware name: ARM-Versatile Express [ 9133.008018][T32104] Call trace: [ 9133.008264][T32104] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 9133.008993][T32104] r7:82a1e6fc r6:00000000 r5:8231b914 r4:00000001 [ 9133.009458][T32104] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 9133.010031][T32104] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 9133.010596][T32104] r7:82a1e6fc r6:00000000 r5:8479c980 r4:82c7bd3c [ 9133.011610][T32104] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 9133.012485][T32104] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 9133.013301][T32104] r7:80265f80 [ 9133.013609][T32104] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 9133.014062][T32104] r3:82a0b544 r2:00000001 r1:823023fc r0:82309cdc [ 9133.014512][T32104] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 9133.015156][T32104] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 9133.015994][T32104] r8:00000009 r7:8230aed8 r6:df939de4 r5:8479c980 r4:00000000 [ 9133.016669][T32104] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 9133.018782][T32104] r10:8479d074 r9:00000000 r8:df939e90 r7:8479d250 r6:00000080 r5:8479c980 [ 9133.021499][T32104] r4:8479c980 [ 9133.021715][T32104] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 9133.022080][T32104] r8:df939e90 r7:8479d250 r6:833afc00 r5:8479c980 r4:84fbd5c0 [ 9133.022366][T32104] [<802572f8>] (do_exit) from [<80257fa8>] (do_group_exit+0x40/0x8c) [ 9133.022706][T32104] r7:0000000a [ 9133.022866][T32104] [<80257f68>] (do_group_exit) from [<80268fd0>] (get_signal+0xa8c/0xab4) [ 9133.023210][T32104] r7:0000000a r4:8479c980 [ 9133.023405][T32104] [<80268544>] (get_signal) from [<8022a648>] (do_work_pending+0x11c/0x4e8) [ 9133.023797][T32104] r10:b5403587 r9:1ffffd00 r8:fffffff2 r7:8479d1ec r6:00000000 r5:df939fb0 [ 9133.024107][T32104] r4:8479c980 [ 9133.024278][T32104] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 9133.024599][T32104] Exception stack(0xdf939fb0 to 0xdf939ff8) [ 9133.024833][T32104] 9fa0: 1ffffff8 00000000 00000001 1dcd6500 [ 9133.025131][T32104] 9fc0: 00000000 00000000 00000000 00000000 003462d8 00000000 00000001 76faa0dc [ 9133.025453][T32104] 9fe0: 00ec82e0 1ffffff8 00310000 00130e48 60000010 ffffffff [ 9133.025724][T32104] r10:00000001 r9:8479c980 r8:00000000 r7:8479c980 r6:ffffffff r5:60000010 [ 9133.025982][T32104] r4:00130e48 [ 9133.028939][T32104] Rebooting in 86400 seconds..