last executing test programs: 40m36.620494195s ago: executing program 1 (id=1002): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) r2 = openat$mixer(0xffffff9c, &(0x7f0000000000), 0x22140, 0x0) r3 = dup2(r2, r2) ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={0x14, r1, 0x4, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8084) 40m36.501245099s ago: executing program 1 (id=1003): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='sched\x00') accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80000) mq_open(&(0x7f0000000000)='}*\xf3\\\x00', 0x40, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000100)={{}, {0x3}}) r2 = syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x1) close$binfmt(r2) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)={0x14, 0x0, 0x100, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) exit(0xa671) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) write$binfmt_register(r3, 0x0, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) 40m33.92837226s ago: executing program 1 (id=1006): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = dup2(r0, r0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x4, 0xa, 0x500, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x40010) r2 = socket$nl_generic(0x10, 0x3, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_void(r2, 0x1, 0x19, 0x20000000, 0x2) 40m33.829365612s ago: executing program 1 (id=1007): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb1e529137c7bbb0c) write$P9_RVERSION(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1300000009af1fa5cf3ba33c47beb12886c34b"], 0x13) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x205) openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 40m33.698331407s ago: executing program 1 (id=1008): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x2400c010}, 0x48d4) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x154}}, 0x1) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f00000001c0)) openat$selinux_user(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 40m33.209551142s ago: executing program 1 (id=1009): close(0xffffffffffffffff) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x0, 0xff, 0x3}}, 0x18) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[], 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x8805) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x20000000) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="d0000000939fc8fe68e5237fa35976f503", @ANYRES16=0x0, @ANYBLOB="38082dbd7000fddbdf250b0000000c000280080003000100000054000180060004004e230000080009001c000000060004004e22000008000800900d000008000600776c63000800050004000000070006007272000008000b007369700008000b007369700006000100080000000800060001000000440001800800050001000000090006006e6f6e65000000000800050002000000080009000c000000080005000400000014000300ac1e010100000000000000000000000008000600060000000800050007000000"], 0xd0}, 0x1, 0x0, 0x0, 0x800}, 0x40800) 40m33.209344242s ago: executing program 32 (id=1009): close(0xffffffffffffffff) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x0, 0xff, 0x3}}, 0x18) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[], 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x8805) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x20000000) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="d0000000939fc8fe68e5237fa35976f503", @ANYRES16=0x0, @ANYBLOB="38082dbd7000fddbdf250b0000000c000280080003000100000054000180060004004e230000080009001c000000060004004e22000008000800900d000008000600776c63000800050004000000070006007272000008000b007369700008000b007369700006000100080000000800060001000000440001800800050001000000090006006e6f6e65000000000800050002000000080009000c000000080005000400000014000300ac1e010100000000000000000000000008000600060000000800050007000000"], 0xd0}, 0x1, 0x0, 0x0, 0x800}, 0x40800) 19.730695602s ago: executing program 2 (id=4687): r0 = syz_open_dev$hidraw(&(0x7f0000000940), 0x0, 0x4a141) syz_usb_disconnect(0xffffffffffffffff) writev(r0, &(0x7f0000001a80)=[{&(0x7f0000000680)="fbd886a1", 0x4}], 0x1) 19.058881818s ago: executing program 2 (id=4688): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000280)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010028bd7000fbdbdf251a00000004002e8008000300", @ANYRES32=r3], 0x6c}, 0x1, 0x1000000, 0x0, 0x20040040}, 0x20040) 17.945907364s ago: executing program 2 (id=4689): r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002480)=[{{&(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000007000000830b040a010102e0000002007c"], 0x94}}], 0x2, 0x0) 17.424989724s ago: executing program 2 (id=4690): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4004810) socket$inet6(0x10, 0x3, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x35dc00, 0x0) r0 = openat$sysfs(0xffffff9c, 0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000240), 0x2, 0x40102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2f) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x50}}, 0x4000000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000e80)={0x2020}, 0x2020) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00"/12], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2, 0xb0a3}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff0, 0xf1}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0xffff, 0xfffffff3}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 13.229198609s ago: executing program 2 (id=4691): futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r0, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a000000", 0x14) 10.005440725s ago: executing program 0 (id=4694): r0 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000440)=@usbdevfs_driver={0x80000001, 0x4, 0x0}) 9.87071921s ago: executing program 0 (id=4695): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x147c40, 0x0) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000001b00)=ANY=[@ANYBLOB="ff"], 0x0) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000001200)=""/4096, 0xffe00}], 0x5, 0x0, 0x0, 0x0) 9.718702258s ago: executing program 0 (id=4696): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x2b00, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x4000}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) write$UHID_INPUT(r2, &(0x7f0000002080)={0xc, {"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", 0x100f}}, 0x1006) 6.959355321s ago: executing program 0 (id=4697): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0xfffffffc, @remote, 0x1}, 0x1c) 6.51915764s ago: executing program 0 (id=4698): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 6.059924282s ago: executing program 0 (id=4699): syz_open_dev$sndctrl(&(0x7f0000000080), 0x3, 0x82000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000280)=ANY=[@ANYRES64, @ANYRESDEC], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x23, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000002) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x0, 0x4}, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = fsopen(&(0x7f00000001c0)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000000c0)='test_dummy_encryption', &(0x7f0000000180)='v1to_da_alloc', 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './cgroup\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000e00)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0xe, 0x0, &(0x7f0000000340)='GPL\x00'}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) r6 = syz_io_uring_setup(0x10f, &(0x7f0000000380)={0x0, 0x211a, 0x0, 0x4, 0x306}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000040)=0xffefffdc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x1, r5, 0x0}) io_uring_enter(r6, 0x3516, 0xc2de, 0x8, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, 0x0}, 0x0) 0s ago: executing program 2 (id=4700): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x5, 0x2, 0x401, 0x1, 0xcc6, 0xfff, 0x5c952399, 0x48, 0x3ff, 0x802, 0x2, 0x3, 0x1, 0x9, 0xe1cb, 0x6, 0x80004, 0x3, 0x392, 0x2, 0xfffffffd, 0x0, 0xfffffff5, 0xffffeadb, 0x3, 0x3c, 0x8, 0x4, 0x8000000, 0x9]}) ioctl$COMEDI_BUFINFO(r0, 0xc02c640e, &(0x7f0000000240)={0x3, 0x4, 0x0, 0xffff, 0x59, 0x43d, 0x3}) kernel console output (not intermixed with test programs): sadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2518.003803][ T29] audit: type=1400 audit(2517.930:32963): avc: denied { read open } for pid=20436 comm="syz.0.4429" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2519.378065][T20458] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=136 sclass=netlink_xfrm_socket pid=20458 comm=syz.2.4430 [ 2523.011826][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 2523.016334][ T29] audit: type=1400 audit(2522.940:33022): avc: denied { unmount } for pid=16531 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2523.140697][ T29] audit: type=1400 audit(2523.070:33023): avc: denied { create } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2523.175197][ T29] audit: type=1400 audit(2523.100:33024): avc: denied { write } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2523.219532][ T29] audit: type=1400 audit(2523.150:33025): avc: denied { create } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2523.223972][ T29] audit: type=1400 audit(2523.150:33026): avc: denied { bind } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2523.230604][ T29] audit: type=1400 audit(2523.160:33027): avc: denied { accept } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2523.235177][ T29] audit: type=1400 audit(2523.160:33028): avc: denied { write } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2523.244224][ T29] audit: type=1400 audit(2523.170:33029): avc: denied { write } for pid=20487 comm="syz.2.4435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2523.827148][ T29] audit: type=1400 audit(2523.750:33030): avc: denied { read write } for pid=20487 comm="syz.2.4435" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2523.877890][ T29] audit: type=1400 audit(2523.810:33031): avc: denied { read write open } for pid=20487 comm="syz.2.4435" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2528.155111][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 2528.155859][ T29] audit: type=1400 audit(2528.080:33069): avc: denied { create } for pid=20520 comm="syz.0.4445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2528.594814][ T29] audit: type=1400 audit(2528.520:33070): avc: denied { read } for pid=20527 comm="syz.2.4447" dev="nsfs" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2528.597710][ T29] audit: type=1400 audit(2528.520:33071): avc: denied { open } for pid=20527 comm="syz.2.4447" path="net:[4026532714]" dev="nsfs" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2528.610417][ T29] audit: type=1400 audit(2528.540:33072): avc: denied { create } for pid=20527 comm="syz.2.4447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2528.630057][ T29] audit: type=1400 audit(2528.560:33073): avc: denied { read } for pid=20527 comm="syz.2.4447" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2528.635075][ T29] audit: type=1400 audit(2528.560:33074): avc: denied { open } for pid=20527 comm="syz.2.4447" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2528.679636][ T29] audit: type=1400 audit(2528.610:33075): avc: denied { write } for pid=20527 comm="syz.2.4447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2528.689925][ T29] audit: type=1400 audit(2528.620:33076): avc: denied { read } for pid=20527 comm="syz.2.4447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2528.695371][ T29] audit: type=1400 audit(2528.620:33077): avc: denied { read } for pid=20527 comm="syz.2.4447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2528.787663][ T29] audit: type=1400 audit(2528.720:33078): avc: denied { read } for pid=20527 comm="syz.2.4447" dev="nsfs" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2533.222549][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 2533.226779][ T29] audit: type=1400 audit(2533.150:33102): avc: denied { read } for pid=20562 comm="syz.0.4463" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2533.228656][ T29] audit: type=1400 audit(2533.150:33103): avc: denied { open } for pid=20562 comm="syz.0.4463" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2533.233814][ T29] audit: type=1400 audit(2533.150:33104): avc: denied { create } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.238185][ T29] audit: type=1400 audit(2533.170:33105): avc: denied { create } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.241465][ T29] audit: type=1400 audit(2533.170:33106): avc: denied { write } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.244028][ T29] audit: type=1400 audit(2533.170:33107): avc: denied { read } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.258567][ T29] audit: type=1400 audit(2533.190:33108): avc: denied { write } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.274047][ T29] audit: type=1400 audit(2533.200:33109): avc: denied { write } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.289359][ T29] audit: type=1400 audit(2533.200:33110): avc: denied { read } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2533.289731][ T29] audit: type=1400 audit(2533.220:33111): avc: denied { read } for pid=20562 comm="syz.0.4463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2538.967293][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 2538.967733][ T29] audit: type=1400 audit(2538.900:33148): avc: denied { create } for pid=20582 comm="syz.0.4470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2538.973422][ T29] audit: type=1400 audit(2538.900:33149): avc: denied { write } for pid=20582 comm="syz.0.4470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2539.837695][ T29] audit: type=1400 audit(2539.760:33150): avc: denied { read write } for pid=20586 comm="syz.2.4472" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2539.838097][ T29] audit: type=1400 audit(2539.760:33151): avc: denied { open } for pid=20586 comm="syz.2.4472" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2539.838440][ T29] audit: type=1400 audit(2539.770:33152): avc: denied { map } for pid=20586 comm="syz.2.4472" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2539.857693][ T29] audit: type=1400 audit(2539.770:33153): avc: denied { execute } for pid=20586 comm="syz.2.4472" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2539.919878][ T29] audit: type=1400 audit(2539.850:33154): avc: denied { mounton } for pid=20586 comm="syz.2.4472" path="/520/file0" dev="tmpfs" ino=2914 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2539.943733][ T29] audit: type=1400 audit(2539.870:33155): avc: denied { mount } for pid=20586 comm="syz.2.4472" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2542.547528][ T29] audit: type=1400 audit(2542.480:33156): avc: denied { unmount } for pid=16531 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2542.740107][ T29] audit: type=1400 audit(2542.670:33157): avc: denied { mounton } for pid=20599 comm="syz.2.4474" path="/521/file0" dev="tmpfs" ino=2921 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2542.740349][T20600] fuse: Bad value for 'fd' [ 2544.409078][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 2544.409485][ T29] audit: type=1400 audit(2544.340:33178): avc: denied { create } for pid=20613 comm="syz.2.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2544.422526][ T29] audit: type=1400 audit(2544.350:33179): avc: denied { bind } for pid=20613 comm="syz.2.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2544.433759][ T29] audit: type=1400 audit(2544.360:33180): avc: denied { accept } for pid=20613 comm="syz.2.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2544.472043][ T29] audit: type=1400 audit(2544.400:33181): avc: denied { write } for pid=20613 comm="syz.2.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2544.599150][ T29] audit: type=1400 audit(2544.530:33182): avc: denied { create } for pid=20616 comm="syz.2.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2544.607103][ T29] audit: type=1400 audit(2544.540:33183): avc: denied { create } for pid=20616 comm="syz.2.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2544.610120][ T29] audit: type=1400 audit(2544.540:33184): avc: denied { write } for pid=20616 comm="syz.2.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2544.614753][ T29] audit: type=1400 audit(2544.540:33185): avc: denied { read } for pid=20616 comm="syz.2.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2544.618785][ T29] audit: type=1400 audit(2544.550:33186): avc: denied { read } for pid=20616 comm="syz.2.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2544.655349][ T29] audit: type=1400 audit(2544.580:33187): avc: denied { write } for pid=20616 comm="syz.2.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2546.887609][T20629] FAULT_INJECTION: forcing a failure. [ 2546.887609][T20629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2546.889241][T20629] CPU: 1 UID: 0 PID: 20629 Comm: syz.2.4484 Not tainted syzkaller #0 PREEMPT [ 2546.889348][T20629] Hardware name: ARM-Versatile Express [ 2546.889455][T20629] Call trace: [ 2546.889502][T20629] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2546.889623][T20629] r7:dfb1de20 r6:00000000 r5:60000013 r4:82252424 [ 2546.889646][T20629] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2546.889755][T20629] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2546.889827][T20629] r5:850eec00 r4:8294f590 [ 2546.889846][T20629] [<8021f8bc>] (dump_stack) from [<80986bf8>] (should_fail_ex+0x1c4/0x228) [ 2546.889921][T20629] [<80986a34>] (should_fail_ex) from [<80986c70>] (should_fail+0x14/0x18) [ 2546.889998][T20629] r8:04008000 r7:dfb1de20 r6:20000200 r5:00000000 r4:dfb1df20 [ 2546.890019][T20629] [<80986c5c>] (should_fail) from [<80986c90>] (should_fail_usercopy+0x1c/0x20) [ 2546.890075][T20629] [<80986c74>] (should_fail_usercopy) from [<815590d8>] (copy_msghdr_from_user+0x50/0x130) [ 2546.890141][T20629] [<81559088>] (copy_msghdr_from_user) from [<81559230>] (___sys_sendmsg+0x78/0xd0) [ 2546.890211][T20629] r8:04008000 r7:00000000 r6:85471b80 r5:dfb1df20 r4:dfb1de64 [ 2546.890229][T20629] [<815591b8>] (___sys_sendmsg) from [<815596ec>] (__sys_sendmsg+0x8c/0xe0) [ 2546.890299][T20629] r10:00000128 r9:850eec00 r8:85e68540 r7:04008000 r6:20000200 r5:85e68541 [ 2546.890320][T20629] r4:00000003 [ 2546.890337][T20629] [<81559660>] (__sys_sendmsg) from [<81559754>] (sys_sendmsg+0x14/0x18) [ 2546.890403][T20629] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 2546.890421][T20629] [<81559740>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2546.890471][T20629] Exception stack(0xdfb1dfa8 to 0xdfb1dff0) [ 2546.890515][T20629] dfa0: 00000000 00000000 00000003 20000200 04008000 00000000 [ 2546.890552][T20629] dfc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f800bc [ 2546.890583][T20629] dfe0: 76f7fec0 76f7feb0 0001928c 00132970 [ 2550.247950][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 2550.248392][ T29] audit: type=1400 audit(2550.180:33253): avc: denied { create } for pid=20652 comm="syz.0.4493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2550.284177][ T29] audit: type=1400 audit(2550.210:33254): avc: denied { unmount } for pid=15944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2550.448742][ T29] audit: type=1400 audit(2550.380:33255): avc: denied { create } for pid=20661 comm="syz.0.4496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2550.452905][ T29] audit: type=1400 audit(2550.380:33256): avc: denied { write } for pid=20661 comm="syz.0.4496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2550.776148][ T29] audit: type=1400 audit(2550.660:33257): avc: denied { name_bind } for pid=20663 comm="syz.0.4497" src=128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 2550.776564][ T29] audit: type=1400 audit(2550.670:33258): avc: denied { read } for pid=20663 comm="syz.0.4497" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2550.776965][ T29] audit: type=1400 audit(2550.680:33259): avc: denied { read open } for pid=20663 comm="syz.0.4497" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2550.777189][ T29] audit: type=1400 audit(2550.680:33260): avc: denied { ioctl } for pid=20663 comm="syz.0.4497" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x5102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2550.907785][ T29] audit: type=1400 audit(2550.840:33261): avc: denied { read write } for pid=20666 comm="syz.0.4499" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2550.910385][ T29] audit: type=1400 audit(2550.840:33262): avc: denied { open } for pid=20666 comm="syz.0.4499" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2555.388126][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 2555.389383][ T29] audit: type=1400 audit(2555.310:33316): avc: denied { accept } for pid=20696 comm="syz.0.4510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2555.391378][ T29] audit: type=1400 audit(2555.310:33317): avc: denied { create } for pid=20696 comm="syz.0.4510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2555.393256][ T29] audit: type=1400 audit(2555.310:33318): avc: denied { ioctl } for pid=20696 comm="syz.0.4510" path="socket:[54009]" dev="sockfs" ino=54009 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2555.403550][ T29] audit: type=1400 audit(2555.330:33319): avc: denied { bind } for pid=20696 comm="syz.0.4510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2555.408992][ T29] audit: type=1400 audit(2555.340:33320): avc: denied { write } for pid=20696 comm="syz.0.4510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2555.412012][T20697] vxcan1: tx address claim with dlc 1 [ 2555.420743][ T29] audit: type=1400 audit(2555.350:33321): avc: denied { write } for pid=20696 comm="syz.0.4510" path="socket:[54008]" dev="sockfs" ino=54008 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2555.600016][ T29] audit: type=1400 audit(2555.530:33322): avc: denied { create } for pid=20705 comm="syz.0.4513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2555.611415][ T29] audit: type=1400 audit(2555.540:33323): avc: denied { create } for pid=20705 comm="syz.0.4513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2555.624295][ T29] audit: type=1400 audit(2555.550:33324): avc: denied { create } for pid=20705 comm="syz.0.4513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2555.637851][ T29] audit: type=1400 audit(2555.570:33325): avc: denied { write } for pid=20705 comm="syz.0.4513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2560.954577][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 2560.955065][ T29] audit: type=1400 audit(2560.880:33374): avc: denied { unmount } for pid=16531 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2561.129513][ T29] audit: type=1400 audit(2561.060:33375): avc: denied { name_bind } for pid=20733 comm="syz.2.4522" src=128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 2561.138940][ T29] audit: type=1400 audit(2561.070:33376): avc: denied { read } for pid=20733 comm="syz.2.4522" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.142632][ T29] audit: type=1400 audit(2561.070:33377): avc: denied { read open } for pid=20733 comm="syz.2.4522" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.149032][ T29] audit: type=1400 audit(2561.080:33378): avc: denied { ioctl } for pid=20733 comm="syz.2.4522" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x5102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.258183][ T29] audit: type=1400 audit(2561.190:33379): avc: denied { read } for pid=20735 comm="syz.0.4523" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.262140][ T29] audit: type=1400 audit(2561.190:33380): avc: denied { read open } for pid=20735 comm="syz.0.4523" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.267801][ T29] audit: type=1400 audit(2561.200:33381): avc: denied { ioctl } for pid=20735 comm="syz.0.4523" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b8c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.277089][ T29] audit: type=1400 audit(2561.210:33382): avc: denied { ioctl } for pid=20735 comm="syz.0.4523" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.283680][T20736] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2561.306667][ T29] audit: type=1400 audit(2561.240:33383): avc: denied { read write } for pid=20735 comm="syz.0.4523" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.388190][T20736] SELinux: Context system_u:object_r:restorecond_exec_t:s0 is not valid (left unmapped). [ 2563.541585][T20780] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2563.542404][T20780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2565.358684][T20795] netlink: 'syz.0.4543': attribute type 16 has an invalid length. [ 2565.359835][T20795] netlink: 'syz.0.4543': attribute type 17 has an invalid length. [ 2565.991300][T11682] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.991592][T11682] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.991649][T11682] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.991683][T11682] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.996171][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 2565.996444][ T29] audit: type=1400 audit(2565.920:33484): avc: denied { create } for pid=20793 comm="syz.2.4542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2566.007590][ T29] audit: type=1400 audit(2565.930:33485): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.007944][ T29] audit: type=1400 audit(2565.930:33486): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.008135][ T29] audit: type=1400 audit(2565.930:33487): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.013848][ T29] audit: type=1400 audit(2565.940:33488): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.176327][ T29] audit: type=1400 audit(2566.090:33489): avc: denied { recv } for pid=20793 comm="syz.2.4542" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.176796][ T29] audit: type=1400 audit(2566.090:33490): avc: denied { ioctl } for pid=20793 comm="syz.2.4542" path="socket:[54130]" dev="sockfs" ino=54130 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2566.181361][ T29] audit: type=1400 audit(2566.110:33491): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.181796][ T29] audit: type=1400 audit(2566.110:33492): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2566.429901][ T29] audit: type=1400 audit(2566.360:33493): avc: denied { allowed } for pid=20800 comm="syz.0.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2569.516730][ T2859] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 2569.728377][ T2859] usb 1-1: Using ep0 maxpacket: 8 [ 2569.936290][ T2859] usb 1-1: New USB device found, idVendor=0ccd, idProduct=0038, bcdDevice=99.03 [ 2569.936643][ T2859] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2569.936950][ T2859] usb 1-1: Product: syz [ 2569.936999][ T2859] usb 1-1: Manufacturer: syz [ 2569.937044][ T2859] usb 1-1: SerialNumber: syz [ 2569.952497][ T2859] usb 1-1: config 0 descriptor?? [ 2570.269299][ T2859] usb 1-1: USB disconnect, device number 12 [ 2571.519834][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 2571.520342][ T29] audit: type=1400 audit(2571.450:33598): avc: denied { prog_load } for pid=20842 comm="syz.2.4551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2571.520636][ T29] audit: type=1400 audit(2571.450:33599): avc: denied { bpf } for pid=20842 comm="syz.2.4551" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.539419][ T29] audit: type=1400 audit(2571.470:33600): avc: denied { perfmon } for pid=20842 comm="syz.2.4551" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.541654][ T29] audit: type=1400 audit(2571.470:33601): avc: denied { bpf } for pid=20842 comm="syz.2.4551" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.615930][ T29] audit: type=1400 audit(2571.540:33602): avc: denied { prog_run } for pid=20842 comm="syz.2.4551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2571.626306][ T29] audit: type=1400 audit(2571.550:33603): avc: denied { create } for pid=20842 comm="syz.2.4551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2571.906881][T20843] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 2572.027916][T20843] bond0: (slave bond_slave_0): Releasing backup interface [ 2572.070456][T20843] bond0: (slave bond_slave_1): Releasing backup interface [ 2572.112713][T20843] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 2572.192976][ T29] audit: type=1400 audit(2572.110:33604): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2572.195253][ T29] audit: type=1400 audit(2572.120:33605): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2572.206501][ T29] audit: type=1400 audit(2572.120:33606): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2572.208927][ T29] audit: type=1400 audit(2572.130:33607): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2572.933560][T20848] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2572.935136][T20848] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2573.966829][T20856] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4556'. [ 2573.982040][T20856] netlink: 104 bytes leftover after parsing attributes in process `syz.2.4556'. [ 2576.883361][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 2576.883714][ T29] audit: type=1400 audit(2576.810:33697): avc: denied { read } for pid=20861 comm="syz.2.4559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2576.917738][ T29] audit: type=1400 audit(2576.850:33698): avc: denied { read } for pid=20861 comm="syz.2.4559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2576.961447][ T29] audit: type=1400 audit(2576.890:33699): avc: denied { prog_load } for pid=20861 comm="syz.2.4559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2576.963045][ T29] audit: type=1400 audit(2576.890:33700): avc: denied { bpf } for pid=20861 comm="syz.2.4559" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2576.967150][ T29] audit: type=1400 audit(2576.890:33701): avc: denied { perfmon } for pid=20861 comm="syz.2.4559" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2576.984037][ T29] audit: type=1400 audit(2576.910:33702): avc: denied { perfmon } for pid=20861 comm="syz.2.4559" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2577.028863][ T29] audit: type=1400 audit(2576.960:33703): avc: denied { perfmon } for pid=20861 comm="syz.2.4559" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2577.032425][ T29] audit: type=1400 audit(2576.960:33704): avc: denied { perfmon } for pid=20861 comm="syz.2.4559" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2577.032835][ T29] audit: type=1400 audit(2576.960:33705): avc: denied { bpf } for pid=20861 comm="syz.2.4559" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2577.103820][ T29] audit: type=1400 audit(2577.020:33706): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2587.592746][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 2587.593229][ T29] audit: type=1400 audit(2587.520:33757): avc: denied { read write } for pid=20864 comm="syz.2.4560" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.603922][ T29] audit: type=1400 audit(2587.530:33758): avc: denied { read write open } for pid=20864 comm="syz.2.4560" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.639073][ T29] audit: type=1400 audit(2587.570:33759): avc: denied { ioctl } for pid=20864 comm="syz.2.4560" path="/dev/ttynull" dev="devtmpfs" ino=609 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.659218][ T29] audit: type=1400 audit(2587.590:33760): avc: denied { read write } for pid=20864 comm="syz.2.4560" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.701257][ T29] audit: type=1400 audit(2587.630:33761): avc: denied { read write open } for pid=20864 comm="syz.2.4560" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2588.216292][ T29] audit: type=1400 audit(2588.140:33762): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2588.227841][ T29] audit: type=1400 audit(2588.140:33763): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2588.252427][ T29] audit: type=1400 audit(2588.150:33764): avc: denied { recv } for pid=19858 comm="syz.2.4251" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2588.254351][ T29] audit: type=1400 audit(2588.180:33765): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2588.274265][ T29] audit: type=1400 audit(2588.200:33766): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2596.131600][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 2596.132054][ T29] audit: type=1400 audit(2596.060:33772): avc: denied { read } for pid=20876 comm="syz.0.4564" name="usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2596.132395][ T29] audit: type=1400 audit(2596.060:33773): avc: denied { open } for pid=20876 comm="syz.0.4564" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2596.146716][ T29] audit: type=1400 audit(2596.070:33774): avc: denied { map } for pid=20876 comm="syz.0.4564" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2596.147153][ T29] audit: type=1400 audit(2596.070:33775): avc: denied { read } for pid=20876 comm="syz.0.4564" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2596.396521][ T29] audit: type=1400 audit(2596.280:33776): avc: denied { read } for pid=20876 comm="syz.0.4564" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2596.927382][ T29] audit: type=1400 audit(2596.860:33777): avc: denied { create } for pid=20876 comm="syz.0.4564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2597.980520][ T29] audit: type=1400 audit(2597.910:33778): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2597.986389][ T29] audit: type=1400 audit(2597.910:33779): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2598.028879][ T29] audit: type=1400 audit(2597.960:33780): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2598.030536][ T29] audit: type=1400 audit(2597.960:33781): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2601.421536][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 2601.422708][ T29] audit: type=1400 audit(2601.350:33849): avc: denied { module_request } for pid=20897 comm="syz.0.4570" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2601.816268][ T29] audit: type=1400 audit(2601.710:33850): avc: denied { prog_load } for pid=20897 comm="syz.0.4570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2601.816716][ T29] audit: type=1400 audit(2601.710:33851): avc: denied { bpf } for pid=20897 comm="syz.0.4570" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2601.816804][ T29] audit: type=1400 audit(2601.720:33852): avc: denied { perfmon } for pid=20897 comm="syz.0.4570" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2609.541326][ T29] audit: type=1400 audit(2609.460:33853): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.541790][ T29] audit: type=1400 audit(2609.470:33854): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.541872][ T29] audit: type=1400 audit(2609.470:33855): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.545416][ T29] audit: type=1400 audit(2609.470:33856): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.561622][ T29] audit: type=1400 audit(2609.490:33857): avc: denied { recv } for pid=15944 comm="syz-executor" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.586465][ T29] audit: type=1400 audit(2609.510:33858): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.591642][ T29] audit: type=1400 audit(2609.520:33859): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2609.651152][ T29] audit: type=1400 audit(2609.580:33860): avc: denied { create } for pid=20902 comm="syz.0.4571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2609.664185][ T29] audit: type=1400 audit(2609.590:33861): avc: denied { read } for pid=20902 comm="syz.0.4571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2610.181975][ T29] audit: type=1400 audit(2610.110:33862): avc: denied { bind } for pid=20902 comm="syz.0.4571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2611.003928][T20906] Illegal XDP return value 4294967262 on prog (id 16) dev N/A, expect packet loss! [ 2612.539509][T20912] tmpfs: Unsupported parameter 'huge' [ 2613.005152][T20915] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4576'. [ 2614.933438][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 2614.933865][ T29] audit: type=1400 audit(2614.860:33949): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2614.947061][ T29] audit: type=1400 audit(2614.880:33950): avc: denied { recv } for pid=87 comm="kworker/0:1H" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2614.980295][ T29] audit: type=1400 audit(2614.910:33951): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2614.980640][ T29] audit: type=1400 audit(2614.910:33952): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.006703][ T29] audit: type=1400 audit(2614.920:33953): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.015221][ T29] audit: type=1400 audit(2614.940:33954): avc: denied { recv } for pid=87 comm="kworker/0:1H" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.038185][ T29] audit: type=1400 audit(2614.960:33955): avc: denied { create } for pid=20920 comm="syz.0.4578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2615.059241][ T29] audit: type=1400 audit(2614.980:33956): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.059706][ T29] audit: type=1400 audit(2614.980:33957): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.060006][ T29] audit: type=1400 audit(2614.980:33958): avc: denied { bind } for pid=20920 comm="syz.0.4578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2615.590594][T20922] syzkaller0: entered promiscuous mode [ 2615.617028][T20922] syzkaller0: entered allmulticast mode [ 2620.016708][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 2620.017023][ T29] audit: type=1400 audit(2619.950:34017): avc: denied { allowed } for pid=20943 comm="syz.0.4583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2620.069731][ T29] audit: type=1400 audit(2620.000:34018): avc: denied { create } for pid=20943 comm="syz.0.4583" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2620.071993][ T29] audit: type=1400 audit(2620.000:34019): avc: denied { map } for pid=20943 comm="syz.0.4583" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=53036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2620.087210][ T29] audit: type=1400 audit(2620.000:34020): avc: denied { read write } for pid=20943 comm="syz.0.4583" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=53036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2620.682838][ T29] audit: type=1400 audit(2620.600:34021): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2620.683217][ T29] audit: type=1400 audit(2620.600:34022): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2620.683514][ T29] audit: type=1400 audit(2620.600:34023): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2620.699570][ T29] audit: type=1400 audit(2620.630:34024): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2620.702834][ T29] audit: type=1400 audit(2620.630:34025): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2620.714046][ T29] audit: type=1400 audit(2620.640:34026): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2624.240607][T20955] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2624.256836][T20955] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2625.176294][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 2625.176600][ T29] audit: type=1400 audit(2625.090:34073): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.176842][ T29] audit: type=1400 audit(2625.100:34074): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.210179][ T29] audit: type=1400 audit(2625.140:34075): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.210531][ T29] audit: type=1400 audit(2625.140:34076): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.213382][ T29] audit: type=1400 audit(2625.140:34077): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.218662][ T29] audit: type=1400 audit(2625.150:34078): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.227021][ T29] audit: type=1400 audit(2625.150:34079): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.227373][ T29] audit: type=1400 audit(2625.160:34080): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.372856][ T29] audit: type=1400 audit(2625.300:34081): avc: denied { prog_load } for pid=20963 comm="syz.2.4587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2625.375106][ T29] audit: type=1400 audit(2625.300:34082): avc: denied { bpf } for pid=20963 comm="syz.2.4587" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2630.200090][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 2630.200451][ T29] audit: type=1400 audit(2630.130:34148): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2630.200685][ T29] audit: type=1400 audit(2630.130:34149): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2630.204066][ T29] audit: type=1400 audit(2630.130:34150): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2630.218306][ T29] audit: type=1400 audit(2630.150:34151): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2630.268656][ T29] audit: type=1400 audit(2630.190:34152): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2630.271667][ T29] audit: type=1400 audit(2630.200:34153): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2631.079725][ T29] audit: type=1400 audit(2630.990:34154): avc: denied { prog_load } for pid=20982 comm="syz.2.4593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2631.081434][ T29] audit: type=1400 audit(2631.010:34155): avc: denied { bpf } for pid=20982 comm="syz.2.4593" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2631.160368][ T29] audit: type=1400 audit(2631.090:34156): avc: denied { prog_load } for pid=20982 comm="syz.2.4593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2631.164692][ T29] audit: type=1400 audit(2631.090:34157): avc: denied { bpf } for pid=20982 comm="syz.2.4593" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2635.315294][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 2635.328800][ T29] audit: type=1400 audit(2635.240:34197): avc: denied { read } for pid=20994 comm="syz.2.4595" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2635.398310][ T29] audit: type=1400 audit(2635.260:34198): avc: denied { read open } for pid=20994 comm="syz.2.4595" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2635.573181][ T29] audit: type=1400 audit(2635.490:34199): avc: denied { read write } for pid=20994 comm="syz.2.4595" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.573712][ T29] audit: type=1400 audit(2635.500:34200): avc: denied { open } for pid=20994 comm="syz.2.4595" path="/dev/sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.594855][ T29] audit: type=1400 audit(2635.510:34201): avc: denied { read write } for pid=20994 comm="syz.2.4595" name="midiC2D0" dev="devtmpfs" ino=737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.595412][ T29] audit: type=1400 audit(2635.520:34202): avc: denied { open } for pid=20994 comm="syz.2.4595" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2636.279959][ T29] audit: type=1400 audit(2636.210:34203): avc: denied { module_request } for pid=20994 comm="syz.2.4595" kmod="fs-iso9660" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2637.796719][ T29] audit: type=1400 audit(2637.700:34204): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2637.797052][ T29] audit: type=1400 audit(2637.700:34205): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2637.797330][ T29] audit: type=1400 audit(2637.700:34206): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2640.498648][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 2640.499083][ T29] audit: type=1400 audit(2640.430:34240): avc: denied { create } for pid=21003 comm="syz.2.4598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2640.508840][ T29] audit: type=1400 audit(2640.440:34241): avc: denied { read } for pid=21003 comm="syz.2.4598" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.511585][ T29] audit: type=1400 audit(2640.440:34242): avc: denied { open } for pid=21003 comm="syz.2.4598" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.658919][ T29] audit: type=1400 audit(2640.590:34243): avc: denied { create } for pid=21003 comm="syz.2.4598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2640.662385][ T29] audit: type=1400 audit(2640.590:34244): avc: denied { ioctl } for pid=21003 comm="syz.2.4598" path="socket:[54366]" dev="sockfs" ino=54366 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2640.664868][T21004] syzkaller0: entered promiscuous mode [ 2640.665000][T21004] syzkaller0: entered allmulticast mode [ 2640.801332][ T29] audit: type=1400 audit(2640.730:34245): avc: denied { write } for pid=21003 comm="syz.2.4598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2641.049649][ T29] audit: type=1400 audit(2640.980:34246): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.062505][ T29] audit: type=1400 audit(2640.990:34247): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.099035][ T29] audit: type=1400 audit(2641.030:34248): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.099379][ T29] audit: type=1400 audit(2641.030:34249): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2644.088384][T21024] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2644.097418][T21024] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2646.449958][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 2646.450291][ T29] audit: type=1400 audit(2646.380:34313): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.472856][ T29] audit: type=1400 audit(2646.400:34314): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.500036][ T29] audit: type=1400 audit(2646.430:34315): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.502869][ T29] audit: type=1400 audit(2646.430:34316): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.513204][ T29] audit: type=1400 audit(2646.440:34317): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.525145][ T29] audit: type=1400 audit(2646.450:34318): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.542838][ T29] audit: type=1400 audit(2646.470:34319): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.543325][ T29] audit: type=1400 audit(2646.470:34320): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.576699][ T29] audit: type=1400 audit(2646.510:34321): avc: denied { create } for pid=21034 comm="syz.0.4605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2647.289236][ T29] audit: type=1400 audit(2646.520:34322): avc: denied { execmem } for pid=21034 comm="syz.0.4605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2649.660009][T20473] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2649.743062][T20473] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2649.901189][T20473] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2649.999097][T20473] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2650.408700][T20473] bond0 (unregistering): Released all slaves [ 2650.507626][T20473] hsr_slave_0: left promiscuous mode [ 2650.510997][T20473] hsr_slave_1: left promiscuous mode [ 2650.536433][T20473] veth1_macvtap: left promiscuous mode [ 2650.537138][T20473] veth0_macvtap: left promiscuous mode [ 2650.537768][T20473] veth1_vlan: left promiscuous mode [ 2650.538288][T20473] veth0_vlan: left promiscuous mode [ 2651.953795][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 2651.954164][ T29] audit: type=1400 audit(2651.880:34395): avc: denied { read write } for pid=21050 comm="syz-executor" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2651.969217][ T29] audit: type=1400 audit(2651.900:34396): avc: denied { read write open } for pid=21050 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2651.973974][ T29] audit: type=1400 audit(2651.900:34397): avc: denied { ioctl } for pid=21050 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2651.978316][ T29] audit: type=1400 audit(2651.910:34398): avc: denied { write } for pid=21074 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2651.980954][ T29] audit: type=1400 audit(2651.910:34399): avc: denied { open } for pid=21074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2652.040794][ T29] audit: type=1400 audit(2651.970:34400): avc: denied { search } for pid=21074 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2652.068528][ T29] audit: type=1400 audit(2652.000:34401): avc: denied { search } for pid=21074 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2652.070602][ T29] audit: type=1400 audit(2652.000:34402): avc: denied { search } for pid=21074 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2652.072638][ T29] audit: type=1400 audit(2652.000:34403): avc: denied { search } for pid=21074 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2652.108297][ T29] audit: type=1400 audit(2652.040:34404): avc: denied { search } for pid=21097 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2655.329467][T21050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2655.384982][T21050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2657.299636][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 2657.300100][ T29] audit: type=1400 audit(2657.230:34647): avc: denied { module_request } for pid=21050 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2657.596429][ T29] audit: type=1400 audit(2657.520:34648): avc: denied { sys_module } for pid=21050 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2657.607005][ T29] audit: type=1400 audit(2657.540:34649): avc: denied { module_request } for pid=21050 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2657.884156][ T29] audit: type=1400 audit(2657.810:34650): avc: denied { module_request } for pid=21050 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2658.046534][ T29] audit: type=1400 audit(2657.970:34651): avc: denied { write } for pid=21287 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2658.046995][ T29] audit: type=1400 audit(2657.980:34652): avc: denied { open } for pid=21287 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2658.130708][ T29] audit: type=1400 audit(2658.060:34653): avc: denied { sys_module } for pid=21050 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2658.133693][ T29] audit: type=1400 audit(2658.060:34654): avc: denied { module_request } for pid=21050 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2658.476581][ T29] audit: type=1400 audit(2658.400:34655): avc: denied { write } for pid=21289 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2658.477000][ T29] audit: type=1400 audit(2658.400:34656): avc: denied { open } for pid=21289 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2658.671271][T21050] hsr_slave_0: entered promiscuous mode [ 2658.673784][T21050] hsr_slave_1: entered promiscuous mode [ 2658.687423][T21050] debugfs: 'hsr0' already exists in 'hsr' [ 2658.688390][T21050] Cannot create hsr debugfs directory [ 2660.427453][T21050] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2660.446572][T21050] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2660.491707][T21050] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2660.541559][T21050] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2662.258790][T21050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2662.325012][ T29] kauditd_printk_skb: 265 callbacks suppressed [ 2662.325294][ T29] audit: type=1400 audit(2662.250:34922): avc: denied { module_request } for pid=21050 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2662.504581][ T29] audit: type=1400 audit(2662.430:34923): avc: denied { search } for pid=21420 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2662.517680][ T29] audit: type=1400 audit(2662.440:34924): avc: denied { read } for pid=21420 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.518072][ T29] audit: type=1400 audit(2662.440:34925): avc: denied { open } for pid=21420 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.518153][ T29] audit: type=1400 audit(2662.440:34926): avc: denied { search } for pid=21420 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2662.518210][ T29] audit: type=1400 audit(2662.440:34927): avc: denied { search } for pid=21420 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2662.518286][ T29] audit: type=1400 audit(2662.440:34928): avc: denied { search } for pid=21420 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2662.518339][ T29] audit: type=1400 audit(2662.440:34929): avc: denied { read } for pid=21420 comm="cmp" name="resolv.conf.eth7.link" dev="tmpfs" ino=97 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.518383][ T29] audit: type=1400 audit(2662.440:34930): avc: denied { open } for pid=21420 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth7.link" dev="tmpfs" ino=97 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.518457][ T29] audit: type=1400 audit(2662.440:34931): avc: denied { getattr } for pid=21420 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2667.330223][ T29] kauditd_printk_skb: 507 callbacks suppressed [ 2667.334083][ T29] audit: type=1400 audit(2667.260:35439): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.347628][ T29] audit: type=1400 audit(2667.270:35440): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.349475][ T29] audit: type=1400 audit(2667.270:35441): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.351211][ T29] audit: type=1400 audit(2667.270:35442): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.366107][ T29] audit: type=1400 audit(2667.290:35443): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.366987][ T29] audit: type=1400 audit(2667.290:35444): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.367232][ T29] audit: type=1400 audit(2667.290:35445): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.367440][ T29] audit: type=1400 audit(2667.290:35446): avc: denied { read open } for pid=21464 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.367640][ T29] audit: type=1400 audit(2667.290:35447): avc: denied { getattr } for pid=21464 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.367829][ T29] audit: type=1400 audit(2667.290:35448): avc: denied { search } for pid=21464 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2669.166909][T21050] veth0_vlan: entered promiscuous mode [ 2669.210412][T21050] veth1_vlan: entered promiscuous mode [ 2669.329254][T21050] veth0_macvtap: entered promiscuous mode [ 2669.362747][T21050] veth1_macvtap: entered promiscuous mode [ 2669.493955][T21133] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2669.500116][T21133] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2669.504152][T21133] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2669.516983][T21133] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2672.753319][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 2672.753583][ T29] audit: type=1400 audit(2672.680:35578): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.753795][ T29] audit: type=1400 audit(2672.680:35579): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.768070][ T29] audit: type=1400 audit(2672.690:35580): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.796326][ T29] audit: type=1400 audit(2672.720:35581): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.811662][ T29] audit: type=1400 audit(2672.730:35582): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.824161][ T29] audit: type=1400 audit(2672.750:35583): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.848056][ T29] audit: type=1400 audit(2672.770:35584): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.848408][ T29] audit: type=1400 audit(2672.780:35585): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.943411][ T29] audit: type=1400 audit(2672.870:35586): avc: denied { read write } for pid=21482 comm="syz.2.4610" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2672.947776][ T29] audit: type=1400 audit(2672.880:35587): avc: denied { open } for pid=21482 comm="syz.2.4610" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2675.215317][ T2859] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 2675.446531][ T2859] usb 1-1: Using ep0 maxpacket: 8 [ 2675.605330][ T2859] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 2675.606264][ T2859] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 2675.606609][ T2859] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 2675.606868][ T2859] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 2675.607054][ T2859] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2675.607259][ T2859] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 2675.607418][ T2859] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2675.919127][ T2859] usb 1-1: GET_CAPABILITIES returned 0 [ 2675.924899][ T2859] usbtmc 1-1:16.0: can't read capabilities [ 2676.150440][ T9] usb 1-1: USB disconnect, device number 13 [ 2676.434587][T21509] comedi: valid board names for 8255 driver are: [ 2676.442238][T21509] 8255 [ 2676.442869][T21509] comedi: valid board names for vmk80xx driver are: [ 2676.445419][T21509] vmk80xx [ 2676.448254][T21509] comedi: valid board names for usbduxsigma driver are: [ 2676.450171][T21509] usbduxsigma [ 2676.451729][T21509] comedi: valid board names for usbduxfast driver are: [ 2676.455147][T21509] usbduxfast [ 2676.456939][T21509] comedi: valid board names for usbdux driver are: [ 2676.457070][T21509] usbdux [ 2676.457097][T21509] comedi: valid board names for ni6501 driver are: [ 2676.457116][T21509] ni6501 [ 2676.457132][T21509] comedi: valid board names for dt9812 driver are: [ 2676.457185][T21509] dt9812 [ 2676.457209][T21509] comedi: valid board names for ni_labpc_cs driver are: [ 2676.457229][T21509] ni_labpc_cs [ 2676.457243][T21509] comedi: valid board names for ni_daq_700 driver are: [ 2676.457260][T21509] ni_daq_700 [ 2676.457274][T21509] comedi: valid board names for labpc_pci driver are: [ 2676.457333][T21509] labpc_pci [ 2676.457353][T21509] comedi: valid board names for adl_pci9118 driver are: [ 2676.457403][T21509] pci9118dg [ 2676.457449][T21509] pci9118hg [ 2676.457471][T21509] pci9118hr [ 2676.457486][T21509] comedi: valid board names for 8255_pci driver are: [ 2676.457504][T21509] 8255_pci [ 2676.457520][T21509] comedi: valid board names for comedi_parport driver are: [ 2676.457536][T21509] comedi_parport [ 2676.457549][T21509] comedi: valid board names for comedi_test driver are: [ 2676.457566][T21509] comedi_test [ 2676.457639][T21509] comedi: valid board names for comedi_bond driver are: [ 2676.457664][T21509] comedi_bond [ 2677.255027][T21516] netlink: 32 bytes leftover after parsing attributes in process `syz.0.4615'. [ 2677.256399][T21516] netem: unknown loss type 13 [ 2677.256748][T21516] netem: change failed [ 2677.839849][ T29] kauditd_printk_skb: 87 callbacks suppressed [ 2677.840252][ T29] audit: type=1400 audit(2677.760:35675): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.840519][ T29] audit: type=1400 audit(2677.770:35676): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.840726][ T29] audit: type=1400 audit(2677.770:35677): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.845385][ T29] audit: type=1400 audit(2677.770:35678): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.868189][ T29] audit: type=1400 audit(2677.780:35679): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.873496][ T29] audit: type=1400 audit(2677.800:35680): avc: denied { recv } for pid=21050 comm="syz-executor" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.884242][ T29] audit: type=1400 audit(2677.810:35681): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.884674][ T29] audit: type=1400 audit(2677.810:35682): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2678.278550][ T29] audit: type=1400 audit(2678.210:35683): avc: denied { read write } for pid=21521 comm="syz.2.4617" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2678.280439][ T29] audit: type=1400 audit(2678.210:35684): avc: denied { open } for pid=21521 comm="syz.2.4617" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2678.288375][T21523] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2678.289123][T21523] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2682.859238][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 2682.859628][ T29] audit: type=1400 audit(2682.790:35750): avc: denied { read } for pid=21542 comm="syz.2.4622" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2682.859957][ T29] audit: type=1400 audit(2682.790:35751): avc: denied { open } for pid=21542 comm="syz.2.4622" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2682.863556][ T29] audit: type=1400 audit(2682.790:35752): avc: denied { map } for pid=21542 comm="syz.2.4622" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2682.866265][ T29] audit: type=1400 audit(2682.790:35753): avc: denied { ioctl } for pid=21542 comm="syz.2.4622" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2682.867997][ T29] audit: type=1400 audit(2682.800:35754): avc: denied { set_context_mgr } for pid=21542 comm="syz.2.4622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2682.892087][ T29] audit: type=1400 audit(2682.800:35755): avc: denied { ioctl } for pid=21542 comm="syz.2.4622" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2682.893663][ T29] audit: type=1400 audit(2682.800:35756): avc: denied { call } for pid=21542 comm="syz.2.4622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2682.893753][ T29] audit: type=1400 audit(2682.810:35757): avc: denied { transfer } for pid=21542 comm="syz.2.4622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2682.893827][ T29] audit: type=1400 audit(2682.810:35758): avc: denied { transfer } for pid=21542 comm="syz.2.4622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2682.902571][ T29] audit: type=1400 audit(2682.830:35759): avc: denied { map } for pid=21542 comm="syz.2.4622" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2682.999589][T21544] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4620'. [ 2689.572583][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 2689.573070][ T29] audit: type=1400 audit(2689.500:35804): avc: denied { unmount } for pid=21050 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2689.586141][ T29] audit: type=1400 audit(2689.510:35805): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.591907][ T29] audit: type=1400 audit(2689.520:35806): avc: denied { recv } for pid=21050 comm="syz-executor" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.629035][ T29] audit: type=1400 audit(2689.560:35807): avc: denied { recv } for pid=21050 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.630481][ T29] audit: type=1400 audit(2689.560:35808): avc: denied { recv } for pid=21050 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.656634][ T29] audit: type=1400 audit(2689.560:35809): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.656972][ T29] audit: type=1400 audit(2689.570:35810): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.657340][ T29] audit: type=1400 audit(2689.570:35811): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.657451][ T29] audit: type=1400 audit(2689.580:35812): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2689.657506][ T29] audit: type=1400 audit(2689.580:35813): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2693.304752][T21574] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2693.310527][T21574] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2694.547440][T21582] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4632'. [ 2694.959405][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 2694.959742][ T29] audit: type=1400 audit(2694.890:35887): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2694.976253][ T29] audit: type=1400 audit(2694.900:35888): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.017780][ T29] audit: type=1400 audit(2694.940:35889): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.018194][ T29] audit: type=1400 audit(2694.940:35890): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.018275][ T29] audit: type=1400 audit(2694.940:35891): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.030449][ T29] audit: type=1400 audit(2694.960:35892): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.052303][ T29] audit: type=1400 audit(2694.980:35893): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.054882][ T29] audit: type=1400 audit(2694.980:35894): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2695.436422][ T29] audit: type=1400 audit(2695.360:35895): avc: denied { read write } for pid=21585 comm="syz.2.4633" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2695.437365][ T29] audit: type=1400 audit(2695.360:35896): avc: denied { open } for pid=21585 comm="syz.2.4633" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2697.749090][T21595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2698.499249][T21595] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2698.504117][T21595] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2698.624828][T21595] veth1_vlan: left promiscuous mode [ 2698.648773][T21595] veth0_vlan: left promiscuous mode [ 2698.651378][T21595] veth0_vlan: entered promiscuous mode [ 2698.664334][T21595] veth1_vlan: entered promiscuous mode [ 2698.700689][T21595] veth1_macvtap: left promiscuous mode [ 2698.719562][T21595] veth0_macvtap: left promiscuous mode [ 2698.728293][T21595] veth0_macvtap: entered promiscuous mode [ 2698.748689][T21595] veth1_macvtap: entered promiscuous mode [ 2698.957470][T21059] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2698.957990][T21059] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2698.958134][T21059] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2698.958218][T21059] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2700.053662][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 2700.054046][ T29] audit: type=1400 audit(2699.980:36009): avc: denied { sys_module } for pid=21615 comm="syz.0.4642" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2700.054317][ T29] audit: type=1400 audit(2699.980:36010): avc: denied { module_request } for pid=21615 comm="syz.0.4642" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2700.221924][ T29] audit: type=1400 audit(2700.150:36011): avc: denied { create } for pid=21615 comm="syz.0.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2700.224261][ T29] audit: type=1400 audit(2700.150:36012): avc: denied { write } for pid=21615 comm="syz.0.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2700.229069][ T29] audit: type=1400 audit(2700.150:36013): avc: denied { module_request } for pid=21615 comm="syz.0.4642" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2700.373976][ T29] audit: type=1400 audit(2700.300:36014): avc: denied { read } for pid=21615 comm="syz.0.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2700.390078][ T29] audit: type=1400 audit(2700.320:36015): avc: denied { create } for pid=21615 comm="syz.0.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2700.406845][ T29] audit: type=1400 audit(2700.340:36016): avc: denied { write } for pid=21615 comm="syz.0.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2700.430177][ T29] audit: type=1400 audit(2700.360:36017): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2700.472087][ T29] audit: type=1400 audit(2700.400:36018): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2705.177220][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 2705.177489][ T29] audit: type=1400 audit(2705.110:36149): avc: denied { sys_module } for pid=21650 comm="syz.0.4653" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2705.177682][ T29] audit: type=1400 audit(2705.110:36150): avc: denied { module_request } for pid=21650 comm="syz.0.4653" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2705.449923][ T29] audit: type=1400 audit(2705.370:36151): avc: denied { map_create } for pid=21650 comm="syz.0.4653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2705.454230][ T29] audit: type=1400 audit(2705.380:36152): avc: denied { setopt } for pid=21650 comm="syz.0.4653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2705.459513][ T29] audit: type=1400 audit(2705.380:36153): avc: denied { create } for pid=21650 comm="syz.0.4653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2705.461840][ T29] audit: type=1400 audit(2705.390:36154): avc: denied { map_create } for pid=21650 comm="syz.0.4653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2705.468836][ T29] audit: type=1400 audit(2705.400:36155): avc: denied { prog_load } for pid=21650 comm="syz.0.4653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2705.469927][ T29] audit: type=1400 audit(2705.400:36156): avc: denied { bpf } for pid=21650 comm="syz.0.4653" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2705.473733][ T29] audit: type=1400 audit(2705.400:36157): avc: denied { perfmon } for pid=21650 comm="syz.0.4653" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2705.627974][T21651] bond0: (slave bond_slave_0): Releasing backup interface [ 2705.674827][T21651] bond0: (slave bond_slave_1): Releasing backup interface [ 2705.708841][T21651] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 2705.745479][T21651] netlink: 'syz.0.4653': attribute type 10 has an invalid length. [ 2705.754104][T21651] netlink: 40 bytes leftover after parsing attributes in process `syz.0.4653'. [ 2705.778908][T21651] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 2705.889556][ T29] audit: type=1400 audit(2705.810:36158): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.731313][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 2715.736249][ T29] audit: type=1400 audit(2715.660:36172): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.736614][ T29] audit: type=1400 audit(2715.660:36173): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.756479][ T29] audit: type=1400 audit(2715.670:36174): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.802122][ T29] audit: type=1400 audit(2715.720:36175): avc: denied { recv } for pid=2859 comm="kworker/1:3" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.903838][ T29] audit: type=1400 audit(2715.820:36176): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.904232][ T29] audit: type=1400 audit(2715.820:36177): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.904536][ T29] audit: type=1400 audit(2715.830:36178): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2716.176269][ T29] audit: type=1400 audit(2716.100:36179): avc: denied { read write } for pid=21660 comm="syz.2.4655" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.178745][ T29] audit: type=1400 audit(2716.110:36180): avc: denied { read write open } for pid=21660 comm="syz.2.4655" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.396393][ T29] audit: type=1400 audit(2716.320:36181): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2716.691720][T21663] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2716.692657][T21663] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2721.178459][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 2721.184433][ T29] audit: type=1400 audit(2721.110:36227): avc: denied { block_suspend } for pid=21671 comm="syz.2.4659" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2721.708137][ T29] audit: type=1400 audit(2721.640:36228): avc: denied { create } for pid=21671 comm="syz.2.4659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2721.712380][ T29] audit: type=1400 audit(2721.640:36229): avc: denied { write } for pid=21671 comm="syz.2.4659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2721.717512][ T29] audit: type=1400 audit(2721.650:36230): avc: denied { write } for pid=21671 comm="syz.2.4659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2721.721745][ T29] audit: type=1400 audit(2721.650:36231): avc: denied { block_suspend } for pid=21671 comm="syz.2.4659" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.249419][ T29] audit: type=1400 audit(2722.180:36232): avc: denied { read write } for pid=21671 comm="syz.2.4659" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2722.249864][ T29] audit: type=1400 audit(2722.180:36233): avc: denied { open } for pid=21671 comm="syz.2.4659" path="/dev/uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2722.293945][ T29] audit: type=1400 audit(2722.220:36234): avc: denied { map_create } for pid=21671 comm="syz.2.4659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2722.302093][ T29] audit: type=1400 audit(2722.230:36235): avc: denied { create } for pid=21671 comm="syz.2.4659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2722.313994][ T29] audit: type=1400 audit(2722.240:36236): avc: denied { write } for pid=21671 comm="syz.2.4659" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2723.724660][T21690] smc: net device bond0 applied user defined pnetid SYZ0 [ 2723.732169][T21690] smc: net device bond0 erased user defined pnetid SYZ0 [ 2729.008611][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 2729.009040][ T29] audit: type=1400 audit(2728.940:36286): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.025382][ T29] audit: type=1400 audit(2728.950:36287): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.060989][ T29] audit: type=1400 audit(2728.990:36288): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.061438][ T29] audit: type=1400 audit(2728.990:36289): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.085277][ T29] audit: type=1400 audit(2729.010:36290): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.104417][ T29] audit: type=1400 audit(2729.030:36291): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.120956][ T29] audit: type=1400 audit(2729.050:36292): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.121374][ T29] audit: type=1400 audit(2729.050:36293): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.145057][T21697] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4663'. [ 2729.148831][T21697] netlink: 'syz.2.4663': attribute type 5 has an invalid length. [ 2729.149835][T21697] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4663'. [ 2729.160326][T21697] geneve2: entered promiscuous mode [ 2729.162357][T21697] geneve2: entered allmulticast mode [ 2729.165070][ T38] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 256 - 0 [ 2729.166448][ T38] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 256 - 0 [ 2729.166584][ T38] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 256 - 0 [ 2729.166670][ T38] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 256 - 0 [ 2729.194262][ T29] audit: type=1400 audit(2729.120:36294): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.201215][ T29] audit: type=1400 audit(2729.130:36295): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2729.268706][T21701] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2729.270122][T21701] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2734.050658][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 2734.051073][ T29] audit: type=1400 audit(2733.980:36374): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2734.051333][ T29] audit: type=1400 audit(2733.980:36375): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2734.068005][ T29] audit: type=1400 audit(2734.000:36376): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2734.079417][ T29] audit: type=1400 audit(2734.000:36377): avc: denied { recv } for pid=21716 comm="syz.2.4670" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2734.087612][ T29] audit: type=1400 audit(2734.010:36378): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2734.089821][ T29] audit: type=1400 audit(2734.020:36379): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2734.100340][ T29] audit: type=1400 audit(2734.030:36380): avc: denied { prog_load } for pid=21716 comm="syz.2.4670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2734.103036][ T29] audit: type=1400 audit(2734.030:36381): avc: denied { bpf } for pid=21716 comm="syz.2.4670" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2734.109968][ T29] audit: type=1400 audit(2734.040:36382): avc: denied { perfmon } for pid=21716 comm="syz.2.4670" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2734.110492][ T29] audit: type=1400 audit(2734.040:36383): avc: denied { bpf } for pid=21716 comm="syz.2.4670" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.544937][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 2740.545298][ T29] audit: type=1400 audit(2740.470:36432): avc: denied { prog_load } for pid=21728 comm="syz.0.4672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2740.556378][ T29] audit: type=1400 audit(2740.470:36433): avc: denied { bpf } for pid=21728 comm="syz.0.4672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.560045][ T29] audit: type=1400 audit(2740.490:36434): avc: denied { perfmon } for pid=21728 comm="syz.0.4672" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.564542][ T29] audit: type=1400 audit(2740.490:36435): avc: denied { perfmon } for pid=21728 comm="syz.0.4672" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.564754][ T29] audit: type=1400 audit(2740.490:36436): avc: denied { bpf } for pid=21728 comm="syz.0.4672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.575006][ T29] audit: type=1400 audit(2740.500:36437): avc: denied { bpf } for pid=21728 comm="syz.0.4672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.575234][ T29] audit: type=1400 audit(2740.500:36438): avc: denied { perfmon } for pid=21728 comm="syz.0.4672" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.586831][ T29] audit: type=1400 audit(2740.500:36439): avc: denied { bpf } for pid=21728 comm="syz.0.4672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.590213][ T29] audit: type=1400 audit(2740.520:36440): avc: denied { perfmon } for pid=21728 comm="syz.0.4672" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.594690][ T29] audit: type=1400 audit(2740.520:36441): avc: denied { bpf } for pid=21728 comm="syz.0.4672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2745.959595][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 2745.960027][ T29] audit: type=1400 audit(2745.890:36572): avc: denied { create } for pid=21738 comm="syz.2.4676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2745.967520][ T29] audit: type=1400 audit(2745.900:36573): avc: denied { write } for pid=21738 comm="syz.2.4676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2745.980156][ T29] audit: type=1400 audit(2745.910:36574): avc: denied { read } for pid=21738 comm="syz.2.4676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2746.586167][ T29] audit: type=1400 audit(2746.510:36575): avc: denied { read write } for pid=21738 comm="syz.2.4676" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2746.586819][ T29] audit: type=1400 audit(2746.510:36576): avc: denied { read write open } for pid=21738 comm="syz.2.4676" path="/dev/sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2755.387781][ T29] audit: type=1400 audit(2755.310:36577): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.398825][ T29] audit: type=1400 audit(2755.330:36578): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.429612][ T29] audit: type=1400 audit(2755.360:36579): avc: denied { recv } for pid=21738 comm="syz.2.4676" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.431743][ T29] audit: type=1400 audit(2755.360:36580): avc: denied { recv } for pid=21738 comm="syz.2.4676" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.433926][ T29] audit: type=1400 audit(2755.360:36581): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.454689][ T29] audit: type=1400 audit(2755.380:36582): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.468149][ T29] audit: type=1400 audit(2755.390:36583): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.469982][ T29] audit: type=1400 audit(2755.400:36584): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2755.490354][ T29] audit: type=1400 audit(2755.420:36585): avc: denied { read } for pid=21744 comm="syz.0.4677" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2755.491784][ T29] audit: type=1400 audit(2755.420:36586): avc: denied { read open } for pid=21744 comm="syz.0.4677" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2755.522976][T21745] syzkaller0: entered promiscuous mode [ 2755.523361][T21745] syzkaller0: entered allmulticast mode [ 2755.861244][T21751] "syz.0.4678" (21751) uses obsolete ecb(arc4) skcipher [ 2758.298120][T21758] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 40 [ 2758.427132][T21764] comedi comedi0: Minor 12032 is invalid! [ 2759.266362][T21596] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 2759.479759][T21596] usb 1-1: too many configurations: 9, using maximum allowed: 8 [ 2759.498008][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.499454][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.501429][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2759.643235][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.644660][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.646761][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2759.664575][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.666444][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.669118][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2759.772696][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.773085][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.773356][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2759.853361][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.853690][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.853961][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2759.916031][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.917202][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.921333][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2759.988944][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2759.989291][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2759.989576][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2760.038989][T21596] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2760.040667][T21596] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2760.047474][T21596] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2760.119740][T21596] usb 1-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 2760.120068][T21596] usb 1-1: New USB device strings: Mfr=41, Product=64, SerialNumber=168 [ 2760.120328][T21596] usb 1-1: Product: syz [ 2760.120486][T21596] usb 1-1: Manufacturer: syz [ 2760.120640][T21596] usb 1-1: SerialNumber: syz [ 2760.141185][T21596] usb 1-1: config 0 descriptor?? [ 2760.236420][T21596] yurex 1-1:0.0: USB YUREX device now attached to Yurex #0 [ 2760.457427][T21596] usb 1-1: USB disconnect, device number 14 [ 2760.480687][T21596] yurex 1-1:0.0: USB YUREX #0 now disconnected [ 2760.530997][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 2760.531348][ T29] audit: type=1400 audit(2760.460:36732): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.577164][ T29] audit: type=1400 audit(2760.490:36733): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.589647][ T29] audit: type=1400 audit(2760.520:36734): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.590219][ T29] audit: type=1400 audit(2760.520:36735): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.598017][ T29] audit: type=1400 audit(2760.530:36736): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.619319][ T29] audit: type=1400 audit(2760.530:36737): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.650040][ T29] audit: type=1400 audit(2760.560:36738): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2760.650847][ T29] audit: type=1400 audit(2760.570:36739): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2761.011994][ T29] audit: type=1400 audit(2760.940:36740): avc: denied { recv } for pid=21766 comm="syz.2.4682" saddr=172.20.20.170 src=20001 daddr=172.20.20.170 dest=20001 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2761.033976][ T29] audit: type=1400 audit(2760.960:36741): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.370020][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 2767.370433][ T29] audit: type=1400 audit(2767.300:36806): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.387538][ T29] audit: type=1400 audit(2767.320:36807): avc: denied { recv } for pid=18910 comm="kworker/0:4" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.437899][ T29] audit: type=1400 audit(2767.370:36808): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.449166][ T29] audit: type=1400 audit(2767.370:36809): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.469860][ T29] audit: type=1400 audit(2767.390:36810): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.602905][ T29] audit: type=1400 audit(2767.530:36811): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.603202][ T29] audit: type=1400 audit(2767.530:36812): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.612177][ T29] audit: type=1400 audit(2767.540:36813): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.613956][ T29] audit: type=1400 audit(2767.540:36814): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.862615][ T29] audit: type=1400 audit(2767.790:36815): avc: denied { read } for pid=21792 comm="syz.0.4686" name="usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2770.881211][T21820] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.4694' sets config #-2147483647 [ 2773.761177][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 2773.761511][ T29] audit: type=1400 audit(2773.690:36893): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.778225][ T29] audit: type=1400 audit(2773.710:36894): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.819359][ T29] audit: type=1400 audit(2773.750:36895): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.819709][ T29] audit: type=1400 audit(2773.750:36896): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.832768][ T29] audit: type=1400 audit(2773.760:36897): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.876898][ T29] audit: type=1400 audit(2773.800:36898): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.877249][ T29] audit: type=1400 audit(2773.800:36899): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.890122][ T29] audit: type=1400 audit(2773.810:36900): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.894858][ T29] audit: type=1400 audit(2773.820:36901): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2774.186797][ T29] audit: type=1400 audit(2774.100:36902): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.806796][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 2780.807169][ T29] audit: type=1400 audit(2780.660:36939): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.807422][ T29] audit: type=1400 audit(2780.660:36940): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.807628][ T29] audit: type=1400 audit(2780.660:36941): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.807868][ T29] audit: type=1400 audit(2780.710:36942): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.831675][ T29] audit: type=1400 audit(2780.760:36943): avc: denied { recv } for pid=21830 comm="syz.0.4699" saddr=10.0.2.2 src=34834 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.847543][ T29] audit: type=1400 audit(2780.770:36944): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40366 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.856700][ T29] audit: type=1400 audit(2780.770:36945): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=40366 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2780.876828][ T29] audit: type=1400 audit(2780.800:36946): avc: denied { read append } for pid=21835 comm="syz.2.4700" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2780.879480][ T29] audit: type=1400 audit(2780.810:36947): avc: denied { open } for pid=21835 comm="syz.2.4700" path="/dev/comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2780.894004][T21836] 8<--- cut here --- [ 2780.894185][T21836] Unable to handle kernel paging request at virtual address fee04f2a when write [ 2780.894296][T21836] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 2780.895393][T21836] Internal error: Oops: a06 [#1] SMP ARM [ 2780.899532][T21836] Modules linked in: [ 2780.900009][T21836] CPU: 1 UID: 0 PID: 21836 Comm: syz.2.4700 Not tainted syzkaller #0 PREEMPT [ 2780.900352][T21836] Hardware name: ARM-Versatile Express [ 2780.900600][T21836] PC is at subdev_8255_io+0x60/0x6c [ 2780.900889][T21836] LR is at subdev_8255_io+0x4c/0x6c [ 2780.902276][T21836] pc : [<813db398>] lr : [<813db384>] psr: 60000013 [ 2780.902814][T21836] sp : dfaf9cb8 ip : dfaf9cb8 fp : dfaf9cd4 [ 2780.903095][T21836] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 2780.903370][T21836] r7 : 00004f27 r6 : 0000009b r5 : 840a36c0 r4 : 00004f2a [ 2780.903678][T21836] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 840a36c0 [ 2780.904078][T21836] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2780.904446][T21836] Control: 30c5387d Table: 85091540 DAC: 00000000 [ 2780.904767][T21836] Register r0 information: slab kmalloc-192 start 840a36c0 pointer offset 0 size 192 [ 2780.906124][T21836] Register r1 information: non-paged memory [ 2780.906681][T21836] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 2780.907369][T21836] Register r3 information: non-paged memory [ 2780.907624][T21836] Register r4 information: non-paged memory [ 2780.907903][T21836] Register r5 information: slab kmalloc-192 start 840a36c0 pointer offset 0 size 192 [ 2780.908370][T21836] Register r6 information: non-paged memory [ 2780.908629][T21836] Register r7 information: non-paged memory [ 2780.908880][T21836] Register r8 information: non-paged memory [ 2780.909135][T21836] Register r9 information: NULL pointer [ 2780.909397][T21836] Register r10 information: NULL pointer [ 2780.909644][T21836] Register r11 information: 2-page vmalloc region starting at 0xdfaf8000 allocated at kernel_clone+0xac/0x3ec [ 2780.910102][T21836] Register r12 information: 2-page vmalloc region starting at 0xdfaf8000 allocated at kernel_clone+0xac/0x3ec [ 2780.910586][T21836] Process syz.2.4700 (pid: 21836, stack limit = 0xdfaf8000) [ 2780.910928][T21836] Stack: (0xdfaf9cb8 to 0xdfafa000) [ 2780.911166][T21836] 9ca0: 813db338 840a36c0 [ 2780.911495][T21836] 9cc0: 00004f27 00004f27 dfaf9cf4 dfaf9cd8 813db070 813db344 00004f27 8050a54c [ 2780.911942][T21836] 9ce0: 85221000 85221000 dfaf9d14 dfaf9cf8 813db430 813db024 85221000 840a36c0 [ 2780.912407][T21836] 9d00: dfaf9da4 00004f27 dfaf9d54 dfaf9d18 813db624 813db3b0 8079d9dc 85b9f900 [ 2780.912749][T21836] 9d20: 828215f0 00000000 00000000 829d238c 840a36c0 840a3704 dfaf9d90 840a36c0 [ 2780.913081][T21836] 9d40: 00000000 82b25910 dfaf9d8c dfaf9d58 813ca520 813db574 200000c0 00000000 [ 2780.913426][T21836] 9d60: dfaf9d7c 200000c0 840a36c0 b5403587 200000c0 85865400 40946400 00000003 [ 2780.913755][T21836] 9d80: dfaf9e4c dfaf9d90 813c606c 813ca424 35353238 00000000 00000000 00000000 [ 2780.914085][T21836] 9da0: 00000000 00004f27 00000005 00000002 00000401 00000001 00000cc6 00000fff [ 2780.914533][T21836] 9dc0: 5c952399 00000048 000003ff 00000802 00000002 00000003 00000001 00000009 [ 2780.914893][T21836] 9de0: 0000e1cb 00000006 00080004 00000003 00000392 00000002 fffffffd 00000000 [ 2780.915249][T21836] 9e00: fffffff5 ffffeadb 00000003 0000003c 00000008 00000004 08000000 00000009 [ 2780.915671][T21836] 9e20: 00000000 c3bcd47f 00000000 85323e40 840a36c0 200000c0 200000c0 85865400 [ 2780.916241][T21836] 9e40: dfaf9f14 dfaf9e50 813c7038 813c5f78 00000000 dfaf9e54 dfaf9e54 c3bcd47f [ 2780.916597][T21836] 9e60: 00000000 00000000 824625b4 0000005f 840df210 840a36f0 841a436c 85865400 [ 2780.916962][T21836] 9e80: dfaf9ee4 dfaf9e90 807a779c 8079db94 00000064 00000001 00000000 dfaf9eac [ 2780.917315][T21836] 9ea0: 85afca90 83426cc0 00006400 0000000b dfaf9ea0 00000000 dfaf9d30 c3bcd47f [ 2780.917647][T21836] 9ec0: 85323e40 40946400 200000c0 200000c0 85323e40 00000003 dfaf9ef4 dfaf9ee8 [ 2780.917982][T21836] 9ee0: 807a78bc c3bcd47f dfaf9f14 40946400 00000000 85323e41 200000c0 85323e40 [ 2780.918333][T21836] 9f00: 00000003 85865400 dfaf9fa4 dfaf9f18 805789d0 813c6a68 ecac8b10 85865400 [ 2780.918665][T21836] 9f20: dfaf9f3c dfaf9f30 81a608b8 81a60788 dfaf9f54 dfaf9f40 8025c484 8028d914 [ 2780.919045][T21836] 9f40: dfaf9fb0 40000000 dfaf9f84 dfaf9f58 802229ec 8025c440 00000000 8281cfb4 [ 2780.919501][T21836] 9f60: dfaf9fb0 0014ced0 ecac8b10 80222940 00000000 c3bcd47f dfaf9fac 00000000 [ 2780.919844][T21836] 9f80: 00000000 00316308 00000036 8020029c 85865400 00000036 00000000 dfaf9fa8 [ 2780.920192][T21836] 9fa0: 80200060 805788ac 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2780.920528][T21836] 9fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fda0bc [ 2780.920915][T21836] 9fe0: 76fd9ec0 76fd9eb0 0001928c 00132970 60000010 00000003 00000000 00000000 [ 2780.921299][T21836] Call trace: [ 2780.921517][T21836] [<813db338>] (subdev_8255_io) from [<813db070>] (subdev_8255_do_config+0x58/0x60) [ 2780.921934][T21836] r7:00004f27 r6:00004f27 r5:840a36c0 r4:813db338 [ 2780.922195][T21836] [<813db018>] (subdev_8255_do_config) from [<813db430>] (subdev_8255_io_init+0x8c/0x9c) [ 2780.922572][T21836] r4:85221000 [ 2780.922753][T21836] [<813db3a4>] (subdev_8255_io_init) from [<813db624>] (dev_8255_attach+0xbc/0x114) [ 2780.923135][T21836] r7:00004f27 r6:dfaf9da4 r5:840a36c0 r4:85221000 [ 2780.923390][T21836] [<813db568>] (dev_8255_attach) from [<813ca520>] (comedi_device_attach+0x108/0x250) [ 2780.923779][T21836] r10:82b25910 r9:00000000 r8:840a36c0 r7:dfaf9d90 r6:840a3704 r5:840a36c0 [ 2780.924207][T21836] r4:829d238c [ 2780.924372][T21836] [<813ca418>] (comedi_device_attach) from [<813c606c>] (do_devconfig_ioctl+0x100/0x220) [ 2780.924768][T21836] r10:00000003 r9:40946400 r8:85865400 r7:200000c0 r6:b5403587 r5:840a36c0 [ 2780.925076][T21836] r4:200000c0 [ 2780.925244][T21836] [<813c5f6c>] (do_devconfig_ioctl) from [<813c7038>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 2780.925829][T21836] r8:85865400 r7:200000c0 r6:200000c0 r5:840a36c0 r4:85323e40 [ 2780.926255][T21836] [<813c6a5c>] (comedi_unlocked_ioctl) from [<805789d0>] (sys_ioctl+0x130/0xba0) [ 2780.926644][T21836] r10:85865400 r9:00000003 r8:85323e40 r7:200000c0 r6:85323e41 r5:00000000 [ 2780.926985][T21836] r4:40946400 [ 2780.927134][T21836] [<805788a0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2780.927470][T21836] Exception stack(0xdfaf9fa8 to 0xdfaf9ff0) [ 2780.927721][T21836] 9fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2780.928057][T21836] 9fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fda0bc [ 2780.928398][T21836] 9fe0: 76fd9ec0 76fd9eb0 0001928c 00132970 [ 2780.928647][T21836] r10:00000036 r9:85865400 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 2780.928955][T21836] r4:00000000 [ 2780.929404][T21836] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 2780.930039][T21836] ---[ end trace 0000000000000000 ]--- [ 2780.930863][T21836] Kernel panic - not syncing: Fatal exception [ 2780.933080][T21836] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:44:29 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=830f9808 R02=00000001 R03=00000040 R04=00000001 R05=830f9808 R06=00000040 R07=df801ea3 R08=00000000 R09=84371800 R10=00000000 R11=df801e7c R12=df801d80 R13=df801e50 R14=815900e0 R15=815e20f4 PSR=60000193 -ZC- A S svc32 s00=000000ff s01=00000000 d00=00000000000000ff s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=3633211c s15=39773b3a d07=39773b3a3633211c s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000000 R03=85865400 R04=829594b8 R05=80000193 R06=82827128 R07=00000000 R08=00000001 R09=00000000 R10=00002a30 R11=dfaf9a74 R12=00000000 R13=dfaf9a28 R14=00000042 R15=802e3d90 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000