last executing test programs: 23.756192327s ago: executing program 1 (id=1117): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@FILEID_UDF_WITH_PARENT={0x14}, &(0x7f0000002300), 0x0) 14.593983981s ago: executing program 1 (id=1118): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x40, r1, 0x1, 0x70bd27, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000011}, 0x20008004) 14.146169082s ago: executing program 1 (id=1119): openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffbfef}]}) r1 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000100)={0x8, r0}) ioctl$DMA_BUF_SET_NAME_A(r2, 0x40086203, &(0x7f00000001c0)='\x02\x00\x00\x00\x05\x00\x00\x00-control\x00') 13.834498862s ago: executing program 1 (id=1120): socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0x4) sendmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7080000, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="120000000000000029000000", @ANYRES64=r0], 0x108}}], 0x1, 0xc040) 13.139986899s ago: executing program 1 (id=1121): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_io_uring_setup(0x497, &(0x7f0000000400)={0x0, 0x7079, 0x0, 0x14, 0x28b}, &(0x7f0000000140)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_SYMLINKAT={0x26, 0x8, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x1}) io_uring_enter(r2, 0x7c45, 0x0, 0xe, 0x0, 0x0) 5.551293357s ago: executing program 0 (id=1122): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000000}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x6}, {0x66, 0x0, 0x0, 0x25702020}}, [], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.705612854s ago: executing program 0 (id=1123): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec779000) futex(&(0x7f000000cffc)=0x3, 0x5, 0x2, 0x0, 0x0, 0x5000000) 2.584316816s ago: executing program 0 (id=1124): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000180), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) 2.037327533s ago: executing program 0 (id=1125): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/comedi4\x00', 0x40, 0x0) ioctl$COMEDI_CMDTEST(r0, 0x8050640a, &(0x7f0000000200)={0x0, 0x2ffff, 0x100, 0xd2f, 0x2, 0x1, 0x0, 0x10001, 0x4, 0x101, 0x2, 0x2, &(0x7f00000002c0)=[0x7, 0x2], 0x2, 0x0}) 1.4877639s ago: executing program 0 (id=1126): unshare(0x26020480) r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r0}, 0x8000fff, 0x1541, 0x5}) 915.112998ms ago: executing program 0 (id=1127): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x6a02f080, 0x0, 0xfffffffffffffd7b, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=1128): sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x1) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r2, 0x40085112, &(0x7f0000000080)=@t={0x81, 0x8, 0x5, 0x6, @generic=0x2}) r3 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000240)={@id={0x2, 0x0, @auto="f2d594c1202ff3431f930b57732dcd63"}}) ioctl$COMEDI_DEVCONFIG(r3, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r3, 0x40946400, &(0x7f0000000680)={'8255\x00', [0x4f29, 0x5, 0x3, 0x9, 0x1, 0xb, 0x12, 0x2, 0x81, 0xfffffffc, 0x2, 0xfffffffe, 0x9, 0x1887, 0x61, 0x2, 0x8, 0x400009, 0x9, 0x5, 0x99, 0xc0, 0x400, 0xffffffff, 0x8001, 0x2000e69, 0x6, 0x80008, 0x4, 0x0, 0xffff0000]}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="80000000000101040000000000"], 0x80}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0xc) splice(r0, 0x0, r4, 0x0, 0x10d00, 0xf) kernel console output (not intermixed with test programs): :76f47f30 r7:00000000 r6:00000000 r5:ee19df68 r4:00000002 [ 524.903861][ T6526] [<80999a50>] (should_fail) from [<80999a84>] (should_fail_usercopy+0x1c/0x20) [ 524.903916][ T6526] [<80999a68>] (should_fail_usercopy) from [<805a6e74>] (simple_read_from_buffer+0x80/0x13c) [ 524.903973][ T6526] [<805a6df4>] (simple_read_from_buffer) from [<80624bbc>] (proc_fail_nth_read+0xb8/0x108) [ 524.904044][ T6526] r10:00000001 r9:80624b04 r8:00000002 r7:ee19df68 r6:0000000f r5:76f47f30 [ 524.904069][ T6526] r4:85c22400 r3:ee19de9f [ 524.904122][ T6526] [<80624b04>] (proc_fail_nth_read) from [<8056a650>] (vfs_read+0x98/0x324) [ 524.904341][ T6526] r8:76f47f30 r7:ee19df68 r6:85c22400 r5:0000000f r4:85d7c9c0 [ 524.904393][ T6526] [<8056a5b8>] (vfs_read) from [<8056b360>] (ksys_read+0x74/0xe8) [ 524.904541][ T6526] r10:00000003 r9:85c22400 r8:8020029c r7:00000000 r6:00000000 r5:85d7c9c0 [ 524.904596][ T6526] r4:85d7c9c3 [ 524.904627][ T6526] [<8056b2ec>] (ksys_read) from [<8056b3e4>] (sys_read+0x10/0x14) [ 524.904689][ T6526] r7:00000003 r6:00000004 r5:76f47f30 r4:0000000f [ 524.904713][ T6526] [<8056b3d4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 524.904760][ T6526] Exception stack(0xee19dfa8 to 0xee19dff0) [ 524.904803][ T6526] dfa0: 0000000f 76f47f30 00000004 76f47f30 0000000f 00000000 [ 524.904842][ T6526] dfc0: 0000000f 76f47f30 00000004 00000003 00310000 00000000 00006364 76f480bc [ 524.904873][ T6526] dfe0: 00000158 76f47ed0 000d801c 0013022c [ 527.880535][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 527.890451][ T29] audit: type=1400 audit(527.800:8241): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 527.957111][ T29] audit: type=1400 audit(527.880:8242): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 527.963267][ T29] audit: type=1400 audit(527.880:8243): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 527.975904][ T29] audit: type=1400 audit(527.900:8244): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 528.134134][ T29] audit: type=1400 audit(528.050:8245): avc: denied { read } for pid=6540 comm="syz.0.885" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 528.137230][ T29] audit: type=1400 audit(528.060:8246): avc: denied { read open } for pid=6540 comm="syz.0.885" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 528.147399][ T29] audit: type=1400 audit(528.070:8247): avc: denied { ioctl } for pid=6540 comm="syz.0.885" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x1277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 528.165283][ T29] audit: type=1400 audit(528.090:8248): avc: denied { ioctl } for pid=6540 comm="syz.0.885" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 528.170964][ T29] audit: type=1400 audit(528.090:8249): avc: denied { ioctl } for pid=6540 comm="syz.0.885" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x1278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 528.190443][ T29] audit: type=1400 audit(528.110:8250): avc: denied { create } for pid=6540 comm="syz.0.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 528.575400][ T6541] SELinux: policydb version -2037308212 does not match my version range 15-35 [ 528.577627][ T6541] SELinux: failed to load policy [ 530.169705][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.171222][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.183350][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.184853][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.186033][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.187201][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.188442][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.189645][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.190968][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.192082][ T5770] hid-generic 0009:00FF:0080.0001: unknown main item tag 0x0 [ 530.255647][ T5770] hid-generic 0009:00FF:0080.0001: hidraw0: HID v0.09 Device [syz0] on syz0 [ 532.849250][ T6578] capability: warning: `syz.1.892' uses deprecated v2 capabilities in a way that may be insecure [ 532.897745][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 532.901220][ T29] audit: type=1400 audit(532.820:8409): avc: denied { read } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 532.936026][ T29] audit: type=1400 audit(532.860:8410): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 532.964046][ T29] audit: type=1400 audit(532.880:8411): avc: denied { map } for pid=6572 comm="syz.1.892" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11000 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 532.970534][ T29] audit: type=1400 audit(532.890:8412): avc: denied { read write } for pid=6572 comm="syz.1.892" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11000 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 532.976998][ T29] audit: type=1400 audit(532.900:8413): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 533.020492][ T29] audit: type=1400 audit(532.940:8414): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 533.027732][ T29] audit: type=1400 audit(532.950:8415): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 533.065081][ T29] audit: type=1400 audit(532.990:8416): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 533.081916][ T29] audit: type=1400 audit(533.000:8417): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 533.121570][ T29] audit: type=1400 audit(533.040:8418): avc: denied { create } for pid=6572 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 536.025118][ T6604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6604 comm=syz.0.895 [ 536.035742][ T6604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6604 comm=syz.0.895 [ 538.147367][ T29] kauditd_printk_skb: 433 callbacks suppressed [ 538.157519][ T29] audit: type=1400 audit(538.070:8852): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.158133][ T29] audit: type=1400 audit(538.080:8853): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.158226][ T29] audit: type=1400 audit(538.080:8854): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.433632][ T29] audit: type=1400 audit(538.360:8855): avc: denied { create } for pid=6614 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 538.453462][ T29] audit: type=1400 audit(538.370:8856): avc: denied { write } for pid=6614 comm="syz.1.898" name="userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 538.457889][ T29] audit: type=1400 audit(538.380:8857): avc: denied { write open } for pid=6614 comm="syz.1.898" path="/dev/userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 538.481786][ T29] audit: type=1400 audit(538.390:8858): avc: denied { ioctl } for pid=6614 comm="syz.1.898" path="/dev/userfaultfd" dev="devtmpfs" ino=84 ioctlcmd=0x7202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 538.568695][ T29] audit: type=1400 audit(538.490:8859): avc: denied { setattr } for pid=6614 comm="syz.1.898" path="socket:[12300]" dev="sockfs" ino=12300 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 538.618226][ T29] audit: type=1400 audit(538.540:8860): avc: denied { setattr } for pid=6614 comm="syz.1.898" path="socket:[12300]" dev="sockfs" ino=12300 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 538.630083][ T29] audit: type=1400 audit(538.550:8861): avc: denied { setattr } for pid=6614 comm="syz.1.898" path="socket:[12300]" dev="sockfs" ino=12300 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.267576][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 543.271042][ T29] audit: type=1400 audit(543.190:9012): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.286332][ T29] audit: type=1400 audit(543.210:9013): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.294255][ T29] audit: type=1400 audit(543.220:9014): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.300825][ T29] audit: type=1400 audit(543.220:9015): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.306059][ T29] audit: type=1400 audit(543.230:9016): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.310062][ T29] audit: type=1400 audit(543.230:9017): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.331252][ T29] audit: type=1400 audit(543.250:9018): avc: denied { write } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.349560][ T29] audit: type=1400 audit(543.270:9019): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.359712][ T29] audit: type=1400 audit(543.280:9020): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.386155][ T29] audit: type=1400 audit(543.290:9021): avc: denied { create } for pid=6644 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 548.711670][ T29] kauditd_printk_skb: 511 callbacks suppressed [ 548.713142][ T29] audit: type=1400 audit(548.630:9533): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.729884][ T29] audit: type=1400 audit(548.650:9534): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.773148][ T29] audit: type=1400 audit(548.690:9535): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.783923][ T29] audit: type=1400 audit(548.700:9536): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.802206][ T29] audit: type=1400 audit(548.720:9537): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.812889][ T29] audit: type=1400 audit(548.730:9538): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.826969][ T29] audit: type=1400 audit(548.750:9539): avc: denied { write } for pid=6670 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 549.008042][ T29] audit: type=1400 audit(548.930:9540): avc: denied { create } for pid=6676 comm="syz.1.913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 549.017575][ T29] audit: type=1400 audit(548.940:9541): avc: denied { write } for pid=6676 comm="syz.1.913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 549.031502][ T29] audit: type=1400 audit(548.950:9542): avc: denied { module_request } for pid=6676 comm="syz.1.913" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 553.741122][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 553.743328][ T29] audit: type=1400 audit(553.660:9573): avc: denied { create } for pid=6686 comm="syz.0.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 553.857786][ T29] audit: type=1400 audit(553.780:9574): avc: denied { create } for pid=6688 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 553.860847][ T29] audit: type=1400 audit(553.780:9575): avc: denied { listen } for pid=6688 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 553.865550][ T29] audit: type=1400 audit(553.790:9576): avc: denied { write } for pid=6688 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 553.992144][ T29] audit: type=1400 audit(553.910:9577): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 554.014148][ T29] audit: type=1400 audit(553.930:9578): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 554.038962][ T29] audit: type=1400 audit(553.960:9579): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 554.291404][ T29] audit: type=1400 audit(554.210:9580): avc: denied { read } for pid=6691 comm="syz.0.917" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 554.299918][ T29] audit: type=1400 audit(554.220:9581): avc: denied { read open } for pid=6691 comm="syz.0.917" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 554.309917][ T29] audit: type=1400 audit(554.230:9582): avc: denied { ioctl } for pid=6691 comm="syz.0.917" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x1277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 558.348051][ T6706] random: crng reseeded on system resumption [ 559.041404][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 559.052786][ T29] audit: type=1400 audit(558.960:9653): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 559.063845][ T29] audit: type=1400 audit(558.980:9654): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 559.182367][ T29] audit: type=1400 audit(559.100:9655): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 559.317789][ T29] audit: type=1400 audit(559.240:9656): avc: denied { create } for pid=6711 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 559.383023][ T29] audit: type=1400 audit(559.290:9657): avc: denied { write } for pid=6711 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 559.677510][ T29] audit: type=1400 audit(559.600:9658): avc: denied { create } for pid=6711 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 559.766881][ T29] audit: type=1400 audit(559.690:9659): avc: denied { write } for pid=6711 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 559.890456][ T29] audit: type=1400 audit(559.810:9660): avc: denied { write } for pid=6711 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 560.043725][ T29] audit: type=1400 audit(559.960:9661): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 560.048468][ T29] audit: type=1400 audit(559.970:9662): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 560.734911][ T6714] FAULT_INJECTION: forcing a failure. [ 560.734911][ T6714] name failslab, interval 1, probability 0, space 0, times 0 [ 560.741265][ T6714] CPU: 1 UID: 0 PID: 6714 Comm: syz.0.924 Not tainted syzkaller #0 PREEMPT [ 560.741354][ T6714] Hardware name: ARM-Versatile Express [ 560.741369][ T6714] Call trace: [ 560.741395][ T6714] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 560.741471][ T6714] r7:00000000 r6:00000000 r5:60000013 r4:822958fc [ 560.741482][ T6714] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 560.741514][ T6714] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 560.741571][ T6714] r5:85961800 r4:82918c48 [ 560.741596][ T6714] [<8021eec0>] (dump_stack) from [<809999ec>] (should_fail_ex+0x1c4/0x228) [ 560.741646][ T6714] [<80999828>] (should_fail_ex) from [<8053a460>] (should_failslab+0x6c/0x94) [ 560.741684][ T6714] r8:85961800 r7:00000000 r6:00000cc0 r5:20000080 r4:830a1a80 [ 560.741693][ T6714] [<8053a3f4>] (should_failslab) from [<80519908>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 560.741734][ T6714] [<805198bc>] (kmem_cache_alloc_noprof) from [<80579b5c>] (getname_flags.part.0+0x28/0x18c) [ 560.741774][ T6714] r10:000000e3 r9:85961800 r8:00000000 r7:00000000 r6:82498930 r5:20000080 [ 560.741784][ T6714] r4:20000080 [ 560.741793][ T6714] [<80579b34>] (getname_flags.part.0) from [<8057f610>] (getname_flags+0x3c/0x50) [ 560.741828][ T6714] r9:85961800 r8:00000000 r7:ffffff9c r6:00000100 r5:00000000 r4:20000080 [ 560.741837][ T6714] [<8057f5d4>] (getname_flags) from [<805a4a24>] (path_setxattrat+0x14c/0x17c) [ 560.741870][ T6714] r5:20000080 r4:00000000 [ 560.741878][ T6714] [<805a48d8>] (path_setxattrat) from [<805a4c1c>] (sys_lsetxattr+0x34/0x3c) [ 560.741915][ T6714] r8:8020029c r7:000000e3 r6:00130308 r5:00000000 r4:20000300 [ 560.741923][ T6714] [<805a4be8>] (sys_lsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 560.741950][ T6714] Exception stack(0xdf94dfa8 to 0xdf94dff0) [ 560.741971][ T6714] dfa0: 00000000 00000000 20000080 20000300 00000000 00000000 [ 560.741990][ T6714] dfc0: 00000000 00000000 00130308 000000e3 00310000 00000000 00006364 76f410bc [ 560.742004][ T6714] dfe0: 76f40ec0 76f40eb0 000192bc 00132360 [ 560.742015][ T6714] r4:00000000 [ 562.882934][ T3699] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 563.100906][ T3699] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 563.101185][ T3699] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 563.110500][ T3699] usb 1-1: Product: syz [ 563.111002][ T3699] usb 1-1: Manufacturer: syz [ 563.111150][ T3699] usb 1-1: SerialNumber: syz [ 564.073748][ T29] kauditd_printk_skb: 214 callbacks suppressed [ 564.078813][ T29] audit: type=1400 audit(563.990:9877): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 564.166984][ T29] audit: type=1400 audit(564.090:9878): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.172836][ T29] audit: type=1400 audit(564.090:9879): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.179329][ T29] audit: type=1400 audit(564.100:9880): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.417798][ T29] audit: type=1400 audit(564.340:9881): avc: denied { create } for pid=6748 comm="syz.1.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 564.436304][ T29] audit: type=1400 audit(564.360:9882): avc: denied { ioctl } for pid=6748 comm="syz.1.932" path="socket:[13332]" dev="sockfs" ino=13332 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 564.447936][ T29] audit: type=1400 audit(564.370:9883): avc: denied { read } for pid=6748 comm="syz.1.932" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 564.450511][ T29] audit: type=1400 audit(564.370:9884): avc: denied { read open } for pid=6748 comm="syz.1.932" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 564.481622][ T29] audit: type=1400 audit(564.400:9885): avc: denied { ioctl } for pid=6748 comm="syz.1.932" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x127a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 564.493014][ T29] audit: type=1400 audit(564.410:9886): avc: denied { bind } for pid=6748 comm="syz.1.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 566.508866][ T6753] FAULT_INJECTION: forcing a failure. [ 566.508866][ T6753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.510902][ T6753] CPU: 1 UID: 0 PID: 6753 Comm: syz.1.934 Not tainted syzkaller #0 PREEMPT [ 566.511111][ T6753] Hardware name: ARM-Versatile Express [ 566.511143][ T6753] Call trace: [ 566.511190][ T6753] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 566.511299][ T6753] r7:00000000 r6:00000000 r5:60000013 r4:822958fc [ 566.511322][ T6753] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 566.511376][ T6753] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 566.511432][ T6753] r5:84efc800 r4:8294fc90 [ 566.511450][ T6753] [<8021eec0>] (dump_stack) from [<809999ec>] (should_fail_ex+0x1c4/0x228) [ 566.511515][ T6753] [<80999828>] (should_fail_ex) from [<80999a64>] (should_fail+0x14/0x18) [ 566.511585][ T6753] r8:00000000 r7:00000000 r6:82498930 r5:20000080 r4:20000080 [ 566.511602][ T6753] [<80999a50>] (should_fail) from [<80999a84>] (should_fail_usercopy+0x1c/0x20) [ 566.511654][ T6753] [<80999a68>] (should_fail_usercopy) from [<8099fae4>] (strncpy_from_user+0x20/0x1a0) [ 566.511815][ T6753] [<8099fac4>] (strncpy_from_user) from [<80579b78>] (getname_flags.part.0+0x44/0x18c) [ 566.511896][ T6753] r10:000000e3 r9:84efc800 r8:00000000 r7:00000000 r6:82498930 r5:20000080 [ 566.511918][ T6753] r4:8395d000 [ 566.511935][ T6753] [<80579b34>] (getname_flags.part.0) from [<8057f610>] (getname_flags+0x3c/0x50) [ 566.512049][ T6753] r9:84efc800 r8:00000000 r7:ffffff9c r6:00000100 r5:00000000 r4:20000080 [ 566.512069][ T6753] [<8057f5d4>] (getname_flags) from [<805a4a24>] (path_setxattrat+0x14c/0x17c) [ 566.512168][ T6753] r5:20000080 r4:00000000 [ 566.512187][ T6753] [<805a48d8>] (path_setxattrat) from [<805a4c1c>] (sys_lsetxattr+0x34/0x3c) [ 566.512372][ T6753] r8:8020029c r7:000000e3 r6:00130308 r5:00000000 r4:20000300 [ 566.512392][ T6753] [<805a4be8>] (sys_lsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 566.512446][ T6753] Exception stack(0xdf9b5fa8 to 0xdf9b5ff0) [ 566.512497][ T6753] 5fa0: 00000000 00000000 20000080 20000300 00000000 00000000 [ 566.512535][ T6753] 5fc0: 00000000 00000000 00130308 000000e3 00310000 00000000 00006364 76f690bc [ 566.512564][ T6753] 5fe0: 76f68ec0 76f68eb0 000192bc 00132360 [ 566.512589][ T6753] r4:00000000 [ 567.214489][ T6760] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6760 comm=syz.1.936 [ 567.581829][ T6762] fuse: Unknown parameter 'ootmode' [ 569.087314][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 569.095395][ T29] audit: type=1400 audit(569.010:9948): avc: denied { write } for pid=6770 comm="syz.1.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 570.267424][ T29] audit: type=1400 audit(570.190:9949): avc: denied { mount } for pid=6770 comm="syz.1.940" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 571.405294][ T29] audit: type=1400 audit(571.320:9950): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.410970][ T29] audit: type=1400 audit(571.330:9951): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.419366][ T29] audit: type=1400 audit(571.340:9952): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.687002][ T29] audit: type=1400 audit(571.610:9953): avc: denied { create } for pid=6773 comm="syz.1.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 571.698807][ T29] audit: type=1400 audit(571.620:9954): avc: denied { write } for pid=6773 comm="syz.1.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 571.718255][ T29] audit: type=1400 audit(571.640:9955): avc: denied { module_request } for pid=6773 comm="syz.1.941" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 571.939136][ T29] audit: type=1400 audit(571.860:9956): avc: denied { read } for pid=6773 comm="syz.1.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 571.956219][ T29] audit: type=1400 audit(571.880:9957): avc: denied { create } for pid=6773 comm="syz.1.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 572.643822][ T44] usb 1-1: USB disconnect, device number 3 [ 574.049858][ T6795] FAULT_INJECTION: forcing a failure. [ 574.049858][ T6795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.050425][ T6795] CPU: 0 UID: 0 PID: 6795 Comm: syz.0.946 Not tainted syzkaller #0 PREEMPT [ 574.050643][ T6795] Hardware name: ARM-Versatile Express [ 574.050678][ T6795] Call trace: [ 574.050739][ T6795] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 574.051220][ T6795] r7:00000000 r6:00000000 r5:60000013 r4:822958fc [ 574.051307][ T6795] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 574.051387][ T6795] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 574.051576][ T6795] r5:85962400 r4:8294fc90 [ 574.051642][ T6795] [<8021eec0>] (dump_stack) from [<809999ec>] (should_fail_ex+0x1c4/0x228) [ 574.051789][ T6795] [<80999828>] (should_fail_ex) from [<80999a64>] (should_fail+0x14/0x18) [ 574.051879][ T6795] r8:76f40f30 r7:00000000 r6:00000000 r5:dfd29f68 r4:00000002 [ 574.051902][ T6795] [<80999a50>] (should_fail) from [<80999a84>] (should_fail_usercopy+0x1c/0x20) [ 574.051969][ T6795] [<80999a68>] (should_fail_usercopy) from [<805a6e74>] (simple_read_from_buffer+0x80/0x13c) [ 574.052151][ T6795] [<805a6df4>] (simple_read_from_buffer) from [<80624bbc>] (proc_fail_nth_read+0xb8/0x108) [ 574.052365][ T6795] r10:00000001 r9:80624b04 r8:00000002 r7:dfd29f68 r6:0000000f r5:76f40f30 [ 574.052437][ T6795] r4:85962400 r3:dfd29e9f [ 574.052512][ T6795] [<80624b04>] (proc_fail_nth_read) from [<8056a650>] (vfs_read+0x98/0x324) [ 574.052633][ T6795] r8:76f40f30 r7:dfd29f68 r6:85962400 r5:0000000f r4:858410c0 [ 574.052770][ T6795] [<8056a5b8>] (vfs_read) from [<8056b360>] (ksys_read+0x74/0xe8) [ 574.052849][ T6795] r10:00000003 r9:85962400 r8:8020029c r7:00000000 r6:00000000 r5:858410c0 [ 574.052873][ T6795] r4:858410c3 [ 574.052893][ T6795] [<8056b2ec>] (ksys_read) from [<8056b3e4>] (sys_read+0x10/0x14) [ 574.052962][ T6795] r7:00000003 r6:00000004 r5:76f40f30 r4:0000000f [ 574.052988][ T6795] [<8056b3d4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 574.053047][ T6795] Exception stack(0xdfd29fa8 to 0xdfd29ff0) [ 574.053117][ T6795] 9fa0: 0000000f 76f40f30 00000004 76f40f30 0000000f 00000000 [ 574.053169][ T6795] 9fc0: 0000000f 76f40f30 00000004 00000003 00310000 00000000 00006364 76f410bc [ 574.053208][ T6795] 9fe0: 00000158 76f40ed0 000d801c 0013022c [ 574.211772][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 574.212157][ T29] audit: type=1400 audit(574.110:9994): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 574.299430][ T29] audit: type=1400 audit(574.220:9995): avc: denied { write } for pid=6797 comm="syz.1.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 574.365165][ T29] audit: type=1400 audit(574.290:9996): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.368669][ T29] audit: type=1400 audit(574.290:9997): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.388973][ T29] audit: type=1400 audit(574.310:9998): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.736141][ T29] audit: type=1400 audit(574.660:9999): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.747232][ T29] audit: type=1400 audit(574.670:10000): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.761822][ T29] audit: type=1400 audit(574.680:10001): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.809246][ T29] audit: type=1400 audit(574.730:10002): avc: denied { create } for pid=6797 comm="syz.1.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 574.834001][ T29] audit: type=1400 audit(574.740:10003): avc: denied { write } for pid=6797 comm="syz.1.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 578.760076][ T6830] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6830 comm=syz.1.957 [ 579.348316][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 579.349876][ T29] audit: type=1400 audit(579.270:10108): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 579.417585][ T29] audit: type=1400 audit(579.340:10109): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.419889][ T29] audit: type=1400 audit(579.340:10110): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.433131][ T29] audit: type=1400 audit(579.350:10111): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.686397][ T29] audit: type=1400 audit(579.610:10112): avc: denied { read } for pid=6838 comm="syz.1.958" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.688629][ T29] audit: type=1400 audit(579.610:10113): avc: denied { read open } for pid=6838 comm="syz.1.958" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.697891][ T29] audit: type=1400 audit(579.620:10114): avc: denied { ioctl } for pid=6838 comm="syz.1.958" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x1278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.837127][ T29] audit: type=1400 audit(579.760:10115): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.840905][ T29] audit: type=1400 audit(579.760:10116): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.856592][ T29] audit: type=1400 audit(579.780:10117): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.464083][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 584.470510][ T29] audit: type=1400 audit(584.390:10174): avc: denied { read write } for pid=6863 comm="syz.1.966" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.477317][ T29] audit: type=1400 audit(584.400:10175): avc: denied { read write open } for pid=6863 comm="syz.1.966" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.497512][ T29] audit: type=1400 audit(584.420:10176): avc: denied { mounton } for pid=6863 comm="syz.1.966" path="/504/file0" dev="tmpfs" ino=2690 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 584.533089][ T29] audit: type=1400 audit(584.450:10177): avc: denied { mount } for pid=6863 comm="syz.1.966" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 584.549626][ T29] audit: type=1400 audit(584.470:10178): avc: denied { write } for pid=6859 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 585.066349][ T29] audit: type=1400 audit(584.990:10179): avc: denied { write } for pid=6859 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 585.068966][ T29] audit: type=1400 audit(584.990:10180): avc: denied { create } for pid=6863 comm="syz.1.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 585.078146][ T29] audit: type=1400 audit(585.000:10181): avc: denied { write } for pid=6863 comm="syz.1.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 585.086661][ T29] audit: type=1400 audit(585.010:10182): avc: denied { module_request } for pid=6863 comm="syz.1.966" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 585.346360][ T29] audit: type=1400 audit(585.270:10183): avc: denied { read } for pid=6863 comm="syz.1.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 586.115735][ T6877] veth1_to_bond: mtu less than device minimum [ 589.513344][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 589.514696][ T29] audit: type=1400 audit(589.430:10319): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.517904][ T29] audit: type=1400 audit(589.440:10320): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.521739][ T29] audit: type=1400 audit(589.440:10321): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.815253][ T29] audit: type=1400 audit(589.730:10322): avc: denied { read write } for pid=6907 comm="syz.0.976" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.818074][ T29] audit: type=1400 audit(589.740:10323): avc: denied { read write open } for pid=6907 comm="syz.0.976" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.851565][ T29] audit: type=1400 audit(589.760:10324): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 589.931595][ T29] audit: type=1400 audit(589.850:10325): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.939498][ T29] audit: type=1400 audit(589.860:10326): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.946412][ T29] audit: type=1400 audit(589.870:10327): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.965868][ T29] audit: type=1400 audit(589.880:10328): avc: denied { read write } for pid=6907 comm="syz.0.976" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.671424][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 594.673547][ T29] audit: type=1400 audit(594.580:10527): avc: denied { read } for pid=6943 comm="syz.0.981" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.676429][ T29] audit: type=1400 audit(594.590:10528): avc: denied { read open } for pid=6943 comm="syz.0.981" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.700156][ T29] audit: type=1400 audit(594.620:10529): avc: denied { ioctl } for pid=6943 comm="syz.0.981" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x5410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.807974][ T29] audit: type=1400 audit(594.730:10530): avc: denied { read write } for pid=6943 comm="syz.0.981" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.834346][ T29] audit: type=1400 audit(594.760:10531): avc: denied { read write open } for pid=6943 comm="syz.0.981" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.857851][ T29] audit: type=1400 audit(594.780:10532): avc: denied { mounton } for pid=6943 comm="syz.0.981" path="/465/file0" dev="tmpfs" ino=2494 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 594.898057][ T29] audit: type=1400 audit(594.820:10533): avc: denied { mount } for pid=6943 comm="syz.0.981" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 594.939882][ T29] audit: type=1400 audit(594.860:10534): avc: denied { remount } for pid=6943 comm="syz.0.981" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 595.745266][ T29] audit: type=1400 audit(595.670:10535): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.753568][ T29] audit: type=1400 audit(595.670:10536): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 597.213626][ T3706] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 597.734999][ T3706] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 597.735381][ T3706] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 597.741829][ T3706] usb 1-1: Product: syz [ 597.742216][ T3706] usb 1-1: Manufacturer: syz [ 597.751542][ T3706] usb 1-1: SerialNumber: syz [ 604.388825][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 604.389998][ T29] audit: type=1400 audit(604.310:10612): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.397758][ T29] audit: type=1400 audit(604.320:10613): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.417206][ T29] audit: type=1400 audit(604.340:10614): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.640600][ T29] audit: type=1400 audit(604.560:10615): avc: denied { create } for pid=6973 comm="syz.1.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 604.650913][ T29] audit: type=1400 audit(604.570:10616): avc: denied { module_request } for pid=6973 comm="syz.1.988" kmod="net-pf-42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 605.010037][ T29] audit: type=1400 audit(604.930:10617): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.020369][ T29] audit: type=1400 audit(604.940:10618): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.027810][ T29] audit: type=1400 audit(604.950:10619): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.246747][ T29] audit: type=1400 audit(605.170:10620): avc: denied { create } for pid=6976 comm="syz.1.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 605.258029][ T29] audit: type=1400 audit(605.180:10621): avc: denied { execmem } for pid=6976 comm="syz.1.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 606.837476][ T44] usb 1-1: USB disconnect, device number 4 [ 608.323277][ T3706] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 608.593273][ T3706] usb 1-1: Using ep0 maxpacket: 8 [ 608.658546][ T3706] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 56832, setting to 1024 [ 608.658946][ T3706] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 608.659185][ T3706] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 608.659345][ T3706] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 608.659471][ T3706] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 608.659534][ T3706] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 609.070593][ T3706] usb 1-1: usb_control_msg returned -32 [ 609.071477][ T3706] usbtmc 1-1:16.0: can't read capabilities [ 615.519429][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 615.519898][ T29] audit: type=1400 audit(615.440:10659): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.524581][ T29] audit: type=1400 audit(615.450:10660): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.544189][ T29] audit: type=1400 audit(615.460:10661): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.777127][ T29] audit: type=1400 audit(615.700:10662): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.779453][ T29] audit: type=1400 audit(615.700:10663): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.781620][ T29] audit: type=1400 audit(615.700:10664): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.917297][ T29] audit: type=1400 audit(615.840:10665): avc: denied { write } for pid=7004 comm="syz.1.993" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 615.919274][ T29] audit: type=1400 audit(615.840:10666): avc: denied { write open } for pid=7004 comm="syz.1.993" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 615.926301][ T29] audit: type=1400 audit(615.850:10667): avc: denied { ioctl } for pid=7004 comm="syz.1.993" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 616.087615][ T29] audit: type=1400 audit(616.010:10668): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.629999][ T3699] usb 1-1: USB disconnect, device number 5 [ 622.818653][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 622.819793][ T29] audit: type=1400 audit(622.740:10686): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.844254][ T29] audit: type=1400 audit(622.770:10687): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.847255][ T29] audit: type=1400 audit(622.770:10688): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.094390][ T29] audit: type=1400 audit(623.020:10689): avc: denied { execmem } for pid=7027 comm="syz.0.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 624.748362][ T29] audit: type=1400 audit(624.670:10690): avc: denied { read write } for pid=7027 comm="syz.0.997" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.754577][ T29] audit: type=1400 audit(624.680:10691): avc: denied { read write open } for pid=7027 comm="syz.0.997" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.868734][ T29] audit: type=1400 audit(624.790:10692): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.871505][ T29] audit: type=1400 audit(624.790:10693): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.893525][ T29] audit: type=1400 audit(624.810:10694): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.935321][ T29] audit: type=1400 audit(624.860:10695): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 625.641593][ T7031] netlink: 8 bytes leftover after parsing attributes in process `syz.0.999'. [ 628.054177][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 628.060021][ T29] audit: type=1400 audit(627.940:10764): avc: denied { setopt } for pid=7039 comm="syz.0.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 628.108282][ T29] audit: type=1400 audit(628.030:10765): avc: denied { module_request } for pid=7039 comm="syz.0.1001" kmod="crypto-cbc-twofish-3way-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 628.158994][ T29] audit: type=1400 audit(628.080:10766): avc: denied { module_request } for pid=7039 comm="syz.0.1001" kmod="fs-ufs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 629.003704][ T29] audit: type=1400 audit(628.920:10767): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.005678][ T29] audit: type=1400 audit(628.920:10768): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.019294][ T29] audit: type=1400 audit(628.940:10769): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.267638][ T29] audit: type=1400 audit(629.190:10770): avc: denied { create } for pid=7054 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 629.296676][ T29] audit: type=1400 audit(629.220:10771): avc: denied { write } for pid=7054 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 629.316503][ T29] audit: type=1400 audit(629.240:10772): avc: denied { read } for pid=7054 comm="syz.1.1003" path="socket:[13163]" dev="sockfs" ino=13163 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 629.328791][ T29] audit: type=1400 audit(629.240:10773): avc: denied { read } for pid=7054 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 633.333265][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 633.333784][ T29] audit: type=1400 audit(633.250:10830): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.403344][ T29] audit: type=1400 audit(633.320:10831): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.409059][ T29] audit: type=1400 audit(633.330:10832): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.004572][ T29] audit: type=1400 audit(633.930:10833): avc: denied { prog_load } for pid=7071 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 634.009673][ T29] audit: type=1400 audit(633.930:10834): avc: denied { bpf } for pid=7071 comm="syz.1.1010" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 634.033627][ T29] audit: type=1400 audit(633.950:10835): avc: denied { create } for pid=7071 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 634.055356][ T29] audit: type=1400 audit(633.980:10836): avc: denied { create } for pid=7071 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 634.063057][ T29] audit: type=1400 audit(633.980:10837): avc: denied { bind } for pid=7071 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 634.120574][ T29] audit: type=1400 audit(634.040:10838): avc: denied { module_request } for pid=7071 comm="syz.1.1010" kmod="crypto-cbc-camellia-asm" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 634.593499][ T29] audit: type=1400 audit(634.510:10839): avc: denied { setopt } for pid=7071 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 638.349138][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 638.350316][ T29] audit: type=1400 audit(638.270:10855): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.362972][ T29] audit: type=1400 audit(638.270:10856): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.414850][ T29] audit: type=1400 audit(638.330:10857): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.909115][ T29] audit: type=1400 audit(638.830:10858): avc: denied { create } for pid=7085 comm="syz.1.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 638.948524][ T29] audit: type=1400 audit(638.870:10859): avc: denied { connect } for pid=7085 comm="syz.1.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 639.005461][ T29] audit: type=1400 audit(638.930:10860): avc: denied { setopt } for pid=7085 comm="syz.1.1012" laddr=fe80::13 lport=30261 faddr=fe80::aa fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 639.026455][ T29] audit: type=1400 audit(638.950:10861): avc: denied { write } for pid=7085 comm="syz.1.1012" laddr=fe80::13 lport=30261 faddr=fe80::aa fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 639.254510][ T29] audit: type=1400 audit(639.180:10862): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.262869][ T29] audit: type=1400 audit(639.180:10863): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.265391][ T29] audit: type=1400 audit(639.180:10864): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.782368][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 643.784745][ T29] audit: type=1400 audit(643.700:10897): avc: denied { accept } for pid=7099 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 643.837860][ T29] audit: type=1400 audit(643.760:10898): avc: denied { read } for pid=7099 comm="syz.1.1018" path="socket:[13637]" dev="sockfs" ino=13637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 643.845440][ T29] audit: type=1400 audit(643.760:10899): avc: denied { read } for pid=7099 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.030714][ T29] audit: type=1400 audit(643.950:10900): avc: denied { read } for pid=7099 comm="syz.1.1018" path="socket:[13637]" dev="sockfs" ino=13637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.055758][ T29] audit: type=1400 audit(643.980:10901): avc: denied { read } for pid=7099 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.067642][ T29] audit: type=1400 audit(643.990:10902): avc: denied { read } for pid=7099 comm="syz.1.1018" path="socket:[13637]" dev="sockfs" ino=13637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.104186][ T29] audit: type=1400 audit(644.030:10903): avc: denied { read } for pid=7099 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.189021][ T29] audit: type=1400 audit(644.110:10904): avc: denied { read } for pid=7099 comm="syz.1.1018" path="socket:[13637]" dev="sockfs" ino=13637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.225181][ T29] audit: type=1400 audit(644.150:10905): avc: denied { read } for pid=7099 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 644.263355][ T29] audit: type=1400 audit(644.170:10906): avc: denied { read } for pid=7099 comm="syz.1.1018" path="socket:[13637]" dev="sockfs" ino=13637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 650.118099][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 650.119080][ T29] audit: type=1400 audit(650.040:10972): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 650.154025][ T29] audit: type=1400 audit(650.050:10973): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 650.162337][ T29] audit: type=1400 audit(650.080:10974): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 650.516157][ T29] audit: type=1400 audit(650.440:10975): avc: denied { create } for pid=7103 comm="syz.0.1019" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 650.547279][ T29] audit: type=1400 audit(650.460:10976): avc: denied { ioctl } for pid=7103 comm="syz.0.1019" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13233 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 653.110698][ T29] audit: type=1400 audit(653.030:10977): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.116762][ T29] audit: type=1400 audit(653.040:10978): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.118808][ T29] audit: type=1400 audit(653.040:10979): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.386243][ T29] audit: type=1400 audit(653.310:10980): avc: denied { read write } for pid=7105 comm="syz.0.1020" name="mouse0" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 653.387999][ T29] audit: type=1400 audit(653.310:10981): avc: denied { read write open } for pid=7105 comm="syz.0.1020" path="/dev/input/mouse0" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 655.918515][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 655.920937][ T29] audit: type=1400 audit(655.800:10998): avc: denied { create } for pid=7115 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 655.921171][ T29] audit: type=1400 audit(655.810:10999): avc: denied { write } for pid=7115 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 655.921284][ T29] audit: type=1400 audit(655.820:11000): avc: denied { nlmsg_write } for pid=7115 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 655.921323][ T29] audit: type=1400 audit(655.820:11001): avc: denied { create } for pid=7115 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 655.921346][ T29] audit: type=1400 audit(655.830:11002): avc: denied { write } for pid=7115 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 655.921407][ T29] audit: type=1400 audit(655.840:11003): avc: denied { nlmsg_write } for pid=7115 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 663.351006][ T29] audit: type=1400 audit(663.270:11004): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.365487][ T29] audit: type=1400 audit(663.290:11005): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.369839][ T29] audit: type=1400 audit(663.290:11006): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.717014][ T29] audit: type=1400 audit(663.640:11007): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.720376][ T29] audit: type=1400 audit(663.640:11008): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.724129][ T29] audit: type=1400 audit(663.650:11009): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.005347][ T29] audit: type=1400 audit(663.930:11010): avc: denied { read } for pid=7123 comm="syz.1.1027" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 664.009094][ T29] audit: type=1400 audit(663.930:11011): avc: denied { read open } for pid=7123 comm="syz.1.1027" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 664.039080][ T29] audit: type=1400 audit(663.960:11012): avc: denied { ioctl } for pid=7123 comm="syz.1.1027" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 664.281058][ T29] audit: type=1400 audit(664.200:11013): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.683071][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 668.687105][ T29] audit: type=1400 audit(668.580:11065): avc: denied { accept } for pid=7144 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.687342][ T29] audit: type=1400 audit(668.580:11066): avc: denied { read } for pid=7144 comm="syz.1.1032" path="socket:[13720]" dev="sockfs" ino=13720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.687596][ T29] audit: type=1400 audit(668.580:11067): avc: denied { read } for pid=7144 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.687740][ T29] audit: type=1400 audit(668.590:11068): avc: denied { read } for pid=7144 comm="syz.1.1032" path="socket:[13720]" dev="sockfs" ino=13720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.687847][ T29] audit: type=1400 audit(668.590:11069): avc: denied { read } for pid=7144 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.687948][ T29] audit: type=1400 audit(668.590:11070): avc: denied { read } for pid=7144 comm="syz.1.1032" path="socket:[13720]" dev="sockfs" ino=13720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.725749][ T29] audit: type=1400 audit(668.650:11071): avc: denied { read } for pid=7144 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.751918][ T29] audit: type=1400 audit(668.670:11072): avc: denied { read } for pid=7144 comm="syz.1.1032" path="socket:[13720]" dev="sockfs" ino=13720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.756905][ T29] audit: type=1400 audit(668.680:11073): avc: denied { read } for pid=7144 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 668.790002][ T29] audit: type=1400 audit(668.710:11074): avc: denied { read } for pid=7144 comm="syz.1.1032" path="socket:[13720]" dev="sockfs" ino=13720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 673.818696][ T29] kauditd_printk_skb: 206 callbacks suppressed [ 673.823900][ T29] audit: type=1400 audit(673.740:11281): avc: denied { read append } for pid=7156 comm="syz.0.1037" name="audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 673.830351][ T29] audit: type=1400 audit(673.750:11282): avc: denied { read open } for pid=7156 comm="syz.0.1037" path="/dev/audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 674.118615][ T29] audit: type=1400 audit(674.040:11283): avc: denied { create } for pid=7156 comm="syz.0.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.121905][ T29] audit: type=1400 audit(674.040:11284): avc: denied { ioctl } for pid=7156 comm="syz.0.1037" path="socket:[13275]" dev="sockfs" ino=13275 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.234848][ T29] audit: type=1400 audit(674.160:11285): avc: denied { create } for pid=7156 comm="syz.0.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.248060][ T29] audit: type=1400 audit(674.170:11286): avc: denied { create } for pid=7156 comm="syz.0.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 674.297651][ T29] audit: type=1400 audit(674.220:11287): avc: denied { ioctl } for pid=7156 comm="syz.0.1037" path="socket:[13277]" dev="sockfs" ino=13277 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 674.396170][ T29] audit: type=1400 audit(674.320:11288): avc: denied { bind } for pid=7156 comm="syz.0.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.408175][ T7158] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1037'. [ 675.219991][ T29] audit: type=1400 audit(675.140:11289): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 675.315451][ T29] audit: type=1400 audit(675.240:11290): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 679.524736][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 679.549371][ T29] audit: type=1400 audit(679.450:11301): avc: denied { create } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 679.560370][ T29] audit: type=1400 audit(679.480:11302): avc: denied { create } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 679.617537][ T29] audit: type=1400 audit(679.540:11303): avc: denied { create } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 679.663719][ T29] audit: type=1400 audit(679.590:11304): avc: denied { create } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 679.666716][ T29] audit: type=1400 audit(679.590:11305): avc: denied { write } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 679.683206][ T29] audit: type=1400 audit(679.590:11306): avc: denied { module_request } for pid=7175 comm="syz.0.1040" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 680.157010][ T29] audit: type=1400 audit(680.080:11307): avc: denied { create } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 680.160943][ T29] audit: type=1400 audit(680.080:11308): avc: denied { ioctl } for pid=7175 comm="syz.0.1040" path="socket:[13769]" dev="sockfs" ino=13769 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 680.168071][ T29] audit: type=1400 audit(680.090:11309): avc: denied { module_request } for pid=7175 comm="syz.0.1040" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 680.281742][ T29] audit: type=1400 audit(680.200:11310): avc: denied { read } for pid=7175 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 681.390096][ T7182] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1041'. [ 684.678117][ T29] kauditd_printk_skb: 88 callbacks suppressed [ 684.683094][ T29] audit: type=1400 audit(684.600:11399): avc: denied { read } for pid=7199 comm="syz.1.1049" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.685832][ T29] audit: type=1400 audit(684.610:11400): avc: denied { read open } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.784227][ T29] audit: type=1400 audit(684.670:11401): avc: denied { ioctl } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.787311][ T29] audit: type=1400 audit(684.710:11402): avc: denied { read open } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.848177][ T29] audit: type=1400 audit(684.770:11403): avc: denied { module_request } for pid=7198 comm="syz.0.1048" kmod="fs-msdos" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 684.867606][ T29] audit: type=1400 audit(684.790:11404): avc: denied { read } for pid=7199 comm="syz.1.1049" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.895503][ T29] audit: type=1400 audit(684.820:11405): avc: denied { read open } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.027664][ T29] audit: type=1400 audit(684.950:11406): avc: denied { ioctl } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.114613][ T29] audit: type=1400 audit(685.020:11407): avc: denied { ioctl } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.121312][ T29] audit: type=1400 audit(685.040:11408): avc: denied { ioctl } for pid=7199 comm="syz.1.1049" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 686.894180][ T7209] syzkaller0: entered promiscuous mode [ 686.894487][ T7209] syzkaller0: entered allmulticast mode [ 690.223942][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 690.224368][ T29] audit: type=1400 audit(690.130:11441): avc: denied { read write } for pid=7218 comm="syz.0.1053" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 690.224603][ T29] audit: type=1400 audit(690.130:11442): avc: denied { read write open } for pid=7218 comm="syz.0.1053" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 690.224806][ T29] audit: type=1400 audit(690.140:11443): avc: denied { mounton } for pid=7218 comm="syz.0.1053" path="/492/file0" dev="tmpfs" ino=2630 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 690.246257][ T29] audit: type=1400 audit(690.170:11444): avc: denied { mount } for pid=7218 comm="syz.0.1053" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 690.727069][ T29] audit: type=1400 audit(690.650:11445): avc: denied { prog_load } for pid=7204 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 690.731885][ T29] audit: type=1400 audit(690.650:11446): avc: denied { bpf } for pid=7204 comm="syz.1.1050" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 690.869632][ T29] audit: type=1400 audit(690.790:11447): avc: denied { read } for pid=7218 comm="syz.0.1053" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 690.877397][ T29] audit: type=1400 audit(690.800:11448): avc: denied { read open } for pid=7218 comm="syz.0.1053" path="/492/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 690.914569][ T29] audit: type=1400 audit(690.840:11449): avc: denied { perfmon } for pid=7204 comm="syz.1.1050" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 690.929689][ T29] audit: type=1400 audit(690.850:11450): avc: denied { perfmon } for pid=7204 comm="syz.1.1050" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 690.941712][ T7222] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 690.944460][ T7222] block device autoloading is deprecated and will be removed. [ 691.161241][ T7219] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1050'. [ 691.174058][ T7219] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1050'. [ 692.208032][ T7219] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1050'. [ 692.223385][ T7219] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1050'. [ 695.822123][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 695.822842][ T29] audit: type=1400 audit(695.740:11486): avc: denied { read write } for pid=7238 comm="syz.0.1057" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 695.839121][ T29] audit: type=1400 audit(695.760:11487): avc: denied { read write open } for pid=7238 comm="syz.0.1057" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 695.866074][ T29] audit: type=1400 audit(695.790:11488): avc: denied { ioctl } for pid=7238 comm="syz.0.1057" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 695.885344][ T29] audit: type=1400 audit(695.810:11489): avc: denied { set_context_mgr } for pid=7238 comm="syz.0.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 695.902926][ T29] audit: type=1400 audit(695.820:11490): avc: denied { read } for pid=7238 comm="syz.0.1057" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 695.917786][ T29] audit: type=1400 audit(695.840:11491): avc: denied { read open } for pid=7238 comm="syz.0.1057" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 695.954701][ T29] audit: type=1400 audit(695.870:11492): avc: denied { ioctl } for pid=7238 comm="syz.0.1057" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 696.000539][ T29] audit: type=1400 audit(695.920:11493): avc: denied { read } for pid=7238 comm="syz.0.1057" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 696.019445][ T29] audit: type=1400 audit(695.940:11494): avc: denied { read open } for pid=7238 comm="syz.0.1057" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 696.043666][ T29] audit: type=1400 audit(695.960:11495): avc: denied { map } for pid=7238 comm="syz.0.1057" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 697.814703][ T7243] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1058'. [ 701.269439][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 701.271445][ T29] audit: type=1400 audit(701.190:11518): avc: denied { execmem } for pid=7251 comm="syz.0.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 704.833070][ T29] audit: type=1400 audit(704.750:11519): avc: denied { create } for pid=7251 comm="syz.0.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 704.882131][ T7207] Process accounting resumed [ 705.093295][ T29] audit: type=1400 audit(705.010:11520): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.093691][ T29] audit: type=1400 audit(705.010:11521): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.095743][ T29] audit: type=1400 audit(705.020:11522): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.126524][ T29] audit: type=1400 audit(705.050:11523): avc: denied { bind } for pid=7251 comm="syz.0.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 705.204172][ T29] audit: type=1400 audit(705.070:11524): avc: denied { module_request } for pid=7251 comm="syz.0.1060" kmod="crypto-rfc4106-gcm-aesni" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 705.543944][ T29] audit: type=1400 audit(705.470:11525): avc: denied { module_request } for pid=7251 comm="syz.0.1060" kmod="crypto-rfc4106-gcm-aesni-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 705.826668][ T29] audit: type=1400 audit(705.750:11526): avc: denied { setopt } for pid=7251 comm="syz.0.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 706.658588][ T29] audit: type=1400 audit(706.580:11527): avc: denied { accept } for pid=7251 comm="syz.0.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 706.883945][ T29] audit: type=1400 audit(706.810:11528): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 706.895361][ T29] audit: type=1400 audit(706.820:11529): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 706.903937][ T29] audit: type=1400 audit(706.830:11530): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 707.278450][ T29] audit: type=1400 audit(707.200:11531): avc: denied { read } for pid=7278 comm="syz.0.1062" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 707.296370][ T29] audit: type=1400 audit(707.220:11532): avc: denied { read open } for pid=7278 comm="syz.0.1062" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 707.306817][ T29] audit: type=1400 audit(707.230:11533): avc: denied { create } for pid=7278 comm="syz.0.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 707.334509][ T29] audit: type=1400 audit(707.260:11534): avc: denied { getopt } for pid=7278 comm="syz.0.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 707.516453][ T29] audit: type=1400 audit(707.440:11535): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 707.518295][ T29] audit: type=1400 audit(707.440:11536): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.192689][ T7286] syzkaller0: entered promiscuous mode [ 708.192906][ T7286] syzkaller0: entered allmulticast mode [ 711.813163][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 711.816607][ T29] audit: type=1400 audit(711.700:11615): avc: denied { allowed } for pid=7302 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 711.818805][ T29] audit: type=1400 audit(711.700:11616): avc: denied { create } for pid=7302 comm="syz.1.1070" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 711.820858][ T29] audit: type=1400 audit(711.740:11617): avc: denied { map } for pid=7302 comm="syz.1.1070" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 711.859407][ T29] audit: type=1400 audit(711.780:11618): avc: denied { read write } for pid=7302 comm="syz.1.1070" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 711.870349][ T29] audit: type=1400 audit(711.790:11619): avc: denied { map } for pid=7302 comm="syz.1.1070" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 711.897654][ T29] audit: type=1400 audit(711.820:11620): avc: denied { read write } for pid=7302 comm="syz.1.1070" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 711.974520][ T29] audit: type=1400 audit(711.900:11621): avc: denied { execute } for pid=7302 comm="syz.1.1070" path="/567/cpu.stat" dev="tmpfs" ino=3019 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 718.293770][ T29] audit: type=1400 audit(718.220:11622): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.298194][ T29] audit: type=1400 audit(718.220:11623): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.313156][ T29] audit: type=1400 audit(718.230:11624): avc: denied { recv } for pid=5954 comm="syz.0.705" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.376734][ T29] audit: type=1400 audit(718.250:11625): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.377257][ T29] audit: type=1400 audit(718.260:11626): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.381103][ T29] audit: type=1400 audit(718.280:11627): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.381457][ T29] audit: type=1400 audit(718.290:11628): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.439137][ T29] audit: type=1400 audit(718.360:11629): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.439564][ T29] audit: type=1400 audit(718.360:11630): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.496170][ T29] audit: type=1400 audit(718.420:11631): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 721.633446][ T7157] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 721.823137][ T7157] usb 1-1: Using ep0 maxpacket: 8 [ 721.978725][ T7157] usb 1-1: config 0 has an invalid interface number: 55 but max is 0 [ 721.979177][ T7157] usb 1-1: config 0 has no interface number 0 [ 721.981945][ T7157] usb 1-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 721.983373][ T7157] usb 1-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 721.983749][ T7157] usb 1-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 721.983849][ T7157] usb 1-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 721.983945][ T7157] usb 1-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 721.983984][ T7157] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 721.998206][ T7157] usb 1-1: config 0 descriptor?? [ 722.119199][ T7157] ldusb 1-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 722.358047][ T7157] usb 1-1: USB disconnect, device number 6 [ 722.374073][ T7157] ldusb 1-1:0.55: LD USB Device #0 now disconnected [ 723.465445][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 723.469004][ T29] audit: type=1400 audit(723.390:11801): avc: denied { prog_load } for pid=7341 comm="syz.1.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 723.470526][ T29] audit: type=1400 audit(723.390:11802): avc: denied { bpf } for pid=7341 comm="syz.1.1080" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 723.476547][ T29] audit: type=1400 audit(723.400:11803): avc: denied { perfmon } for pid=7341 comm="syz.1.1080" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 723.486360][ T29] audit: type=1400 audit(723.410:11804): avc: denied { write } for pid=7341 comm="syz.1.1080" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.495323][ T29] audit: type=1400 audit(723.410:11805): avc: denied { write open } for pid=7341 comm="syz.1.1080" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.500751][ T29] audit: type=1400 audit(723.420:11806): avc: denied { ioctl } for pid=7341 comm="syz.1.1080" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.506675][ T29] audit: type=1400 audit(723.430:11807): avc: denied { read } for pid=7340 comm="syz.0.1081" name="comedi4" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.510941][ T29] audit: type=1400 audit(723.430:11808): avc: denied { read open } for pid=7340 comm="syz.0.1081" path="/dev/comedi4" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.531277][ T29] audit: type=1400 audit(723.450:11809): avc: denied { create } for pid=7341 comm="syz.1.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 723.540810][ T29] audit: type=1400 audit(723.460:11810): avc: denied { ioctl } for pid=7341 comm="syz.1.1080" path="socket:[14416]" dev="sockfs" ino=14416 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 726.218005][ T7358] cgroup: Setting release_agent not allowed [ 728.768400][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 728.775212][ T29] audit: type=1400 audit(728.690:11975): avc: denied { allowed } for pid=7366 comm="syz.0.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 728.914092][ T29] audit: type=1400 audit(728.840:11976): avc: denied { sqpoll } for pid=7366 comm="syz.0.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 728.918738][ T29] audit: type=1400 audit(728.840:11977): avc: denied { read write } for pid=7365 comm="syz.1.1089" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.943021][ T29] audit: type=1400 audit(728.860:11978): avc: denied { create } for pid=7366 comm="syz.0.1090" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 728.943427][ T29] audit: type=1400 audit(728.860:11980): avc: denied { map } for pid=7366 comm="syz.0.1090" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 728.943523][ T29] audit: type=1400 audit(728.860:11979): avc: denied { read write open } for pid=7365 comm="syz.1.1089" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.943585][ T29] audit: type=1400 audit(728.860:11981): avc: denied { read write } for pid=7366 comm="syz.0.1090" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 728.943636][ T29] audit: type=1400 audit(728.860:11982): avc: denied { ioctl } for pid=7365 comm="syz.1.1089" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.980655][ T29] audit: type=1400 audit(728.890:11983): avc: denied { ioctl } for pid=7365 comm="syz.1.1089" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.981051][ T29] audit: type=1400 audit(728.890:11984): avc: denied { ioctl } for pid=7365 comm="syz.1.1089" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 729.240770][ T7157] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 729.503910][ T7157] usb 2-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 729.504309][ T7157] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 729.674250][ T7157] usb 2-1: config 0 descriptor?? [ 730.054143][ T7157] udl 2-1:0.0: [drm] Unrecognized vendor firmware descriptor [ 730.266577][ T7157] [drm:udl_init] *ERROR* Selecting channel failed [ 730.342119][ T7157] [drm] Initialized udl 0.0.1 for 2-1:0.0 on minor 3 [ 730.369900][ T7157] [drm] Initialized udl on minor 3 [ 730.401280][ T7157] udl 2-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 730.419528][ T7157] udl 2-1:0.0: [drm] Cannot find any crtc or sizes [ 730.454571][ T7157] usb 2-1: USB disconnect, device number 2 [ 730.456885][ T3700] udl 2-1:0.0: [drm] Cannot find any crtc or sizes [ 733.898239][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 733.899362][ T29] audit: type=1400 audit(733.810:12083): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.901353][ T29] audit: type=1400 audit(733.820:12084): avc: denied { recv } for pid=6593 comm="kworker/u8:0" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.941293][ T29] audit: type=1400 audit(733.860:12085): avc: denied { recv } for pid=7381 comm="syz.0.1091" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.944849][ T29] audit: type=1400 audit(733.860:12086): avc: denied { recv } for pid=7381 comm="syz.0.1091" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.956074][ T29] audit: type=1400 audit(733.880:12087): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.969921][ T29] audit: type=1400 audit(733.890:12088): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.987125][ T29] audit: type=1400 audit(733.890:12089): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.990244][ T29] audit: type=1400 audit(733.900:12090): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 733.994651][ T29] audit: type=1400 audit(733.910:12091): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 734.065331][ T29] audit: type=1400 audit(733.960:12092): avc: denied { ioctl } for pid=7381 comm="syz.0.1091" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x545c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 739.033951][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 739.038226][ T29] audit: type=1400 audit(738.950:12264): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.040523][ T29] audit: type=1400 audit(738.950:12265): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.044192][ T29] audit: type=1400 audit(738.970:12266): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.065647][ T29] audit: type=1400 audit(738.990:12267): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.071529][ T29] audit: type=1400 audit(738.990:12268): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.098901][ T29] audit: type=1400 audit(739.020:12269): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.101277][ T29] audit: type=1400 audit(739.020:12270): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.114015][ T29] audit: type=1400 audit(739.040:12271): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.116216][ T29] audit: type=1400 audit(739.040:12272): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 739.121123][ T29] audit: type=1400 audit(739.040:12273): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.044665][ T29] kauditd_printk_skb: 1182 callbacks suppressed [ 744.047928][ T29] audit: type=1400 audit(743.970:13456): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.052007][ T29] audit: type=1400 audit(743.970:13457): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.067942][ T29] audit: type=1400 audit(743.990:13458): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.083435][ T29] audit: type=1400 audit(744.000:13459): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.090081][ T29] audit: type=1400 audit(744.010:13460): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.099872][ T29] audit: type=1400 audit(744.020:13461): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.106599][ T29] audit: type=1400 audit(744.030:13462): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.120628][ T29] audit: type=1400 audit(744.040:13463): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.128591][ T29] audit: type=1400 audit(744.050:13464): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 744.155454][ T29] audit: type=1400 audit(744.060:13465): avc: denied { override_creds } for pid=7425 comm="syz.1.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 749.279203][ T29] kauditd_printk_skb: 752 callbacks suppressed [ 749.280824][ T29] audit: type=1400 audit(749.200:14218): avc: denied { recv } for pid=3047 comm="kworker/1:4" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 749.893983][ T29] audit: type=1400 audit(749.810:14219): avc: denied { recv } for pid=3699 comm="kworker/0:5" saddr=::1 src=20001 daddr=::1 dest=20003 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 750.318499][ T29] audit: type=1400 audit(750.240:14220): avc: denied { recv } for pid=23 comm="kworker/1:0" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 751.359937][ T29] audit: type=1400 audit(751.280:14221): avc: denied { recv } for pid=5770 comm="kworker/1:6" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 752.399494][ T29] audit: type=1400 audit(752.320:14222): avc: denied { recv } for pid=5770 comm="kworker/1:6" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 752.697061][ T29] audit: type=1400 audit(752.610:14223): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 752.709543][ T29] audit: type=1400 audit(752.630:14224): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 752.745080][ T29] audit: type=1400 audit(752.660:14225): avc: denied { recv } for pid=2908 comm="klogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 752.747423][ T29] audit: type=1400 audit(752.660:14226): avc: denied { recv } for pid=2908 comm="klogd" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 752.787950][ T29] audit: type=1400 audit(752.710:14227): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 753.602316][ T7434] netlink: 'syz.0.1109': attribute type 10 has an invalid length. [ 753.605248][ T7434] netlink: 2 bytes leftover after parsing attributes in process `syz.0.1109'. [ 753.615950][ T7434] nlmon0: entered promiscuous mode [ 754.471026][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 754.472223][ T29] audit: type=1400 audit(754.390:14250): avc: denied { read } for pid=7435 comm="syz.0.1110" name="comedi4" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.559621][ T29] audit: type=1400 audit(754.480:14251): avc: denied { read open } for pid=7435 comm="syz.0.1110" path="/dev/comedi4" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.578689][ T29] audit: type=1400 audit(754.500:14252): avc: denied { ioctl } for pid=7435 comm="syz.0.1110" path="/dev/comedi4" dev="devtmpfs" ino=715 ioctlcmd=0x640a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.624459][ T29] audit: type=1400 audit(754.550:14253): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 754.631771][ T29] audit: type=1400 audit(754.550:14254): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 754.647111][ T29] audit: type=1400 audit(754.560:14255): avc: denied { recv } for pid=3706 comm="kworker/1:5" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 754.666168][ T29] audit: type=1400 audit(754.580:14256): avc: denied { recv } for pid=5954 comm="syz.0.705" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 754.671614][ T29] audit: type=1400 audit(754.590:14257): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 754.702783][ T29] audit: type=1400 audit(754.620:14258): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 754.714634][ T29] audit: type=1400 audit(754.640:14259): avc: denied { recv } for pid=3097 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 756.935184][ T7443] netlink: 104 bytes leftover after parsing attributes in process `syz.0.1112'. [ 758.444468][ T7447] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1114'. [ 758.445015][ T7447] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1114'. [ 759.918486][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 759.918928][ T29] audit: type=1400 audit(759.840:14340): avc: denied { recv } for pid=23 comm="kworker/1:0" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 760.956276][ T29] audit: type=1400 audit(760.880:14341): avc: denied { recv } for pid=5770 comm="kworker/1:6" saddr=::1 src=20001 daddr=::1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 761.341424][ T29] audit: type=1400 audit(761.260:14342): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 761.341703][ T29] audit: type=1400 audit(761.260:14343): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 761.354550][ T29] audit: type=1400 audit(761.280:14344): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 761.374019][ T29] audit: type=1400 audit(761.290:14345): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 761.374313][ T29] audit: type=1400 audit(761.290:14346): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.374437][ T29] audit: type=1400 audit(761.290:14347): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.374477][ T29] audit: type=1400 audit(761.300:14348): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.379271][ T29] audit: type=1400 audit(761.300:14349): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.263335][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 771.267319][ T29] audit: type=1400 audit(771.180:14376): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.267909][ T29] audit: type=1400 audit(771.180:14377): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.268015][ T29] audit: type=1400 audit(771.190:14378): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.275143][ T29] audit: type=1400 audit(771.200:14379): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.285615][ T29] audit: type=1400 audit(771.210:14380): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.289970][ T29] audit: type=1400 audit(771.210:14381): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.300895][ T29] audit: type=1400 audit(771.220:14382): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.303921][ T29] audit: type=1400 audit(771.230:14383): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 771.377955][ T29] audit: type=1400 audit(771.290:14384): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 771.379118][ T29] audit: type=1400 audit(771.300:14385): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.221601][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 780.223088][ T29] audit: type=1400 audit(780.130:14446): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.225934][ T29] audit: type=1400 audit(780.130:14447): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.228262][ T29] audit: type=1400 audit(780.140:14448): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.269770][ T29] audit: type=1400 audit(780.190:14449): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.298028][ T29] audit: type=1400 audit(780.220:14450): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.334216][ T29] audit: type=1400 audit(780.250:14451): avc: denied { recv } for pid=7466 comm="syz.1.1121" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.336603][ T29] audit: type=1400 audit(780.250:14452): avc: denied { recv } for pid=7466 comm="syz.1.1121" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.353207][ T29] audit: type=1400 audit(780.270:14453): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.357761][ T29] audit: type=1400 audit(780.280:14454): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 780.425970][ T29] audit: type=1400 audit(780.350:14455): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.733243][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 785.736666][ T29] audit: type=1400 audit(785.650:14529): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.783692][ T29] audit: type=1400 audit(785.690:14530): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.784114][ T29] audit: type=1400 audit(785.700:14531): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.784204][ T29] audit: type=1400 audit(785.700:14532): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=57812 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.791019][ T29] audit: type=1400 audit(785.710:14533): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.794831][ T29] audit: type=1400 audit(785.720:14534): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.797800][ T29] audit: type=1400 audit(785.720:14535): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.833042][ T29] audit: type=1400 audit(785.750:14536): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57812 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.881612][ T29] audit: type=1400 audit(785.800:14537): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.883549][ T29] audit: type=1400 audit(785.800:14538): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=10.0.2.2 src=38650 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 785.954201][ T7505] 8<--- cut here --- [ 785.954818][ T7505] Unable to handle kernel paging request at virtual address fee04f2c when write [ 785.955402][ T7505] [fee04f2c] *pgd=80000080007003, *pmd=00000000 [ 785.970154][ T7505] Internal error: Oops: a06 [#1] SMP ARM [ 785.971371][ T7505] Modules linked in: [ 785.971657][ T7505] CPU: 0 UID: 0 PID: 7505 Comm: syz.1.1128 Not tainted syzkaller #0 PREEMPT [ 785.971892][ T7505] Hardware name: ARM-Versatile Express [ 785.972044][ T7505] PC is at subdev_8255_io+0x60/0x6c [ 785.972320][ T7505] LR is at subdev_8255_io+0x4c/0x6c [ 785.972506][ T7505] pc : [<81415c6c>] lr : [<81415c58>] psr: 60000013 [ 785.972827][ T7505] sp : dfaf5cb0 ip : dfaf5cb0 fp : dfaf5ccc [ 785.973082][ T7505] r10: 00000001 r9 : 00000084 r8 : dfaf5d9c [ 785.973271][ T7505] r7 : 00004f29 r6 : 0000009b r5 : 846930c0 r4 : 00004f2c [ 785.973477][ T7505] r3 : 0000009b r2 : fee04f2c r1 : 00000001 r0 : 846930c0 [ 785.973786][ T7505] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 785.974040][ T7505] Control: 30c5387d Table: 89715680 DAC: fffffffd [ 785.974238][ T7505] Register r0 information: slab kmalloc-192 start 846930c0 pointer offset 0 size 192 [ 785.974956][ T7505] Register r1 information: non-paged memory [ 785.975269][ T7505] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 785.975629][ T7505] Register r3 information: non-paged memory [ 785.975794][ T7505] Register r4 information: non-paged memory [ 785.975992][ T7505] Register r5 information: slab kmalloc-192 start 846930c0 pointer offset 0 size 192 [ 785.976336][ T7505] Register r6 information: non-paged memory [ 785.976488][ T7505] Register r7 information: non-paged memory [ 785.976644][ T7505] Register r8 information: 2-page vmalloc region starting at 0xdfaf4000 allocated at kernel_clone+0xac/0x3ec [ 785.977019][ T7505] Register r9 information: non-paged memory [ 785.977181][ T7505] Register r10 information: non-paged memory [ 785.977355][ T7505] Register r11 information: 2-page vmalloc region starting at 0xdfaf4000 allocated at kernel_clone+0xac/0x3ec [ 785.977609][ T7505] Register r12 information: 2-page vmalloc region starting at 0xdfaf4000 allocated at kernel_clone+0xac/0x3ec [ 785.977902][ T7505] Process syz.1.1128 (pid: 7505, stack limit = 0xdfaf4000) [ 785.978083][ T7505] Stack: (0xdfaf5cb0 to 0xdfaf6000) [ 785.978229][ T7505] 5ca0: 81415c0c 846930c0 00004f29 00004f29 [ 785.978492][ T7505] 5cc0: dfaf5cec dfaf5cd0 81415944 81415c18 00004f29 80514fcc 851fe000 851fe000 [ 785.978711][ T7505] 5ce0: dfaf5d0c dfaf5cf0 81415d04 814158f8 846930c0 00000000 851fe000 00004f29 [ 785.978918][ T7505] 5d00: dfaf5d4c dfaf5d10 81415eb0 81415c84 0000005f 84419f00 828217b0 00000000 [ 785.979125][ T7505] 5d20: 00000000 829d46a0 846930c0 84693104 dfaf5d88 846930c0 00000000 82b28ad8 [ 785.979333][ T7505] 5d40: dfaf5d84 dfaf5d50 814049e0 81415e48 846930f0 00000000 dfaf5d74 20000680 [ 785.979545][ T7505] 5d60: 846930c0 b5403587 846930f0 83956c00 40946400 00000003 dfaf5e44 dfaf5d88 [ 785.979760][ T7505] 5d80: 81400338 814048e4 35353238 00000000 00000000 00000000 00000000 00004f29 [ 785.979968][ T7505] 5da0: 00000005 00000003 00000009 00000001 0000000b 00000012 00000002 00000081 [ 785.980241][ T7505] 5dc0: fffffffc 00000002 fffffffe 00000009 00001887 00000061 00000002 00000008 [ 785.980445][ T7505] 5de0: 00400009 00000009 00000005 00000099 000000c0 00000400 ffffffff 00008001 [ 785.980655][ T7505] 5e00: 02000e69 00000006 00080008 00000004 00000000 ffff0000 00000000 c7ca283c [ 785.980866][ T7505] 5e20: 00000000 85ebba80 846930c0 20000680 846930f0 83956c00 dfaf5f14 dfaf5e48 [ 785.981074][ T7505] 5e40: 8140132c 81400244 00000000 00000000 00000000 dfaf5e54 dfaf5e54 c7ca283c [ 785.981277][ T7505] 5e60: 00000000 00000000 824a35ec 0000005f 841ab018 00000064 842e8e1c 83956c00 [ 785.981488][ T7505] 5e80: dfaf5ee4 dfaf5e90 807b7f80 807ae4a4 00000064 00000001 00000000 dfaf5eac [ 785.981692][ T7505] 5ea0: 85d18c10 83426e58 00006400 0000000b dfaf5ea0 00000000 dfaf5d40 c7ca283c [ 785.981941][ T7505] 5ec0: 85ebba80 40946400 20000680 20000680 85ebba80 00000006 dfaf5ef4 dfaf5ee8 [ 785.982176][ T7505] 5ee0: 807b80a0 c7ca283c dfaf5f14 40946400 00000000 85ebba81 20000680 85ebba80 [ 785.982556][ T7505] 5f00: 00000006 83956c00 dfaf5fa4 dfaf5f18 80585608 81400d7c ecac8b10 83956c00 [ 785.982836][ T7505] 5f20: dfaf5f3c dfaf5f30 81aaf9ac 81aaf87c dfaf5f54 dfaf5f40 8025bcbc 8028e0c4 [ 785.983155][ T7505] 5f40: dfaf5fb0 40000000 dfaf5f84 dfaf5f58 80221a38 8025bc78 00000000 8281d17c [ 785.983402][ T7505] 5f60: dfaf5fb0 0014c8c0 ecac8b10 8022198c 00000000 c7ca283c dfaf5fac 00000000 [ 785.983654][ T7505] 5f80: 00000000 00326310 00000036 8020029c 83956c00 00000036 00000000 dfaf5fa8 [ 785.983890][ T7505] 5fa0: 80200060 805854e4 00000000 00000000 00000006 40946400 20000680 00000000 [ 785.984126][ T7505] 5fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76f690bc [ 785.984377][ T7505] 5fe0: 76f68ec0 76f68eb0 000192bc 00132360 60000010 00000006 00000000 00000000 [ 785.984607][ T7505] Call trace: [ 785.984740][ T7505] [<81415c0c>] (subdev_8255_io) from [<81415944>] (subdev_8255_do_config+0x58/0x60) [ 785.984984][ T7505] r7:00004f29 r6:00004f29 r5:846930c0 r4:81415c0c [ 785.985140][ T7505] [<814158ec>] (subdev_8255_do_config) from [<81415d04>] (subdev_8255_io_init+0x8c/0x9c) [ 785.985376][ T7505] r4:851fe000 [ 785.985473][ T7505] [<81415c78>] (subdev_8255_io_init) from [<81415eb0>] (dev_8255_attach+0x74/0x120) [ 785.985727][ T7505] r7:00004f29 r6:851fe000 r5:00000000 r4:846930c0 [ 785.985883][ T7505] [<81415e3c>] (dev_8255_attach) from [<814049e0>] (comedi_device_attach+0x108/0x250) [ 785.986165][ T7505] r10:82b28ad8 r9:00000000 r8:846930c0 r7:dfaf5d88 r6:84693104 r5:846930c0 [ 785.986384][ T7505] r4:829d46a0 [ 785.986476][ T7505] [<814048d8>] (comedi_device_attach) from [<81400338>] (do_devconfig_ioctl+0x100/0x220) [ 785.986722][ T7505] r10:00000003 r9:40946400 r8:83956c00 r7:846930f0 r6:b5403587 r5:846930c0 [ 785.986917][ T7505] r4:20000680 [ 785.987009][ T7505] [<81400238>] (do_devconfig_ioctl) from [<8140132c>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 785.987251][ T7505] r8:83956c00 r7:846930f0 r6:20000680 r5:846930c0 r4:85ebba80 [ 785.987470][ T7505] [<81400d70>] (comedi_unlocked_ioctl) from [<80585608>] (sys_ioctl+0x130/0xba0) [ 785.987770][ T7505] r10:83956c00 r9:00000006 r8:85ebba80 r7:20000680 r6:85ebba81 r5:00000000 [ 785.987968][ T7505] r4:40946400 [ 785.988064][ T7505] [<805854d8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 785.988337][ T7505] Exception stack(0xdfaf5fa8 to 0xdfaf5ff0) [ 785.988486][ T7505] 5fa0: 00000000 00000000 00000006 40946400 20000680 00000000 [ 785.988685][ T7505] 5fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76f690bc [ 785.988937][ T7505] 5fe0: 76f68ec0 76f68eb0 000192bc 00132360 [ 785.989089][ T7505] r10:00000036 r9:83956c00 r8:8020029c r7:00000036 r6:00326310 r5:00000000 [ 785.989285][ T7505] r4:00000000 [ 785.989565][ T7505] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 785.990908][ T7505] ---[ end trace 0000000000000000 ]--- [ 785.994490][ T7505] Kernel panic - not syncing: Fatal exception [ 785.996559][ T7505] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:51:05 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=822958fc R02=00000001 R03=81ab01e0 R04=00000006 R05=828f7f88 R06=00000000 R07=828f7f80 R08=83956c00 R09=00000028 R10=828f7f88 R11=df801eb4 R12=df801eb8 R13=df801ea8 R14=80340cc8 R15=81ab01f0 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=ffffffff R02=00000002 R03=0000003a R04=76ed1b30 R05=ffffffff R06=7eb7b6a1 R07=ffffffff R08=7eb7b81f R09=00000001 R10=00000001 R11=00000003 R12=7eb7b826 R13=7eb7b6f8 R14=76e28d50 R15=76e65ca0 PSR=60070010 -ZC- A S usr32 s00=70207265 s01=696d7265 d00=696d726570207265 s02=73616c63 s03=65703d73 d01=65703d7373616c63 s04=74786574 s05=7379733d d02=7379733d74786574 s06=5f6d6574 s07=626f3a75 d03=626f3a755f6d6574 s08=7463656a s09=643a725f d04=643a725f7463656a s10=63697665 s11=20745f65 d05=20745f6563697665 s12=616c6374 s13=623d7373 d06=623d7373616c6374 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000