last executing test programs: 4m58.603674562s ago: executing program 0 (id=4510): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e20, 0x0, @loopback, 0x7}}, 0x0, 0x0, 0x47, 0x0, "09be2271b78506e6dd938d324c415acd403a4480fd1afa34432bcdfa64d957e93efafd27ad06a6f589bb643f167cf0fcd370239aaa93f6ded3c5032c96ead0cdc68474d402ab73e482db7ec1e0a57489"}, 0xd8) bind$inet6(r0, &(0x7f0000000a00)={0xa, 0x4e20, 0x16e, @empty, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffff1, @empty, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @empty, 0x9f}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2000c190, 0x0, 0x0) 4m58.148376774s ago: executing program 0 (id=4511): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@remote}, 0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000180)={@remote, 0x2, 0x0, 0x2, 0xe364bbd2705d9f8a, 0x8, 0x8}, 0x20) close(r0) 4m57.730612522s ago: executing program 0 (id=4512): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) 4m18.623082744s ago: executing program 0 (id=4520): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x94) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)={0x11c, 0x2e, 0x1, 0x0, 0x0, "", [@nested={0x4, 0x119}, @nested={0x108, 0x11, 0x0, 0x1, [@nested={0x101, 0xcf, 0x0, 0x1, [@generic="d478b585fcf4962925eb81095dd3d92e983e841d6ef7368187237f5e91a74d57e8aaee05ec6319", @generic="8f3bec68ef62803fe98daf2de4c76a713091d7d093f16995a391c42d5dfc312e9b67f3e831135df00a399b5234733f156436b0ed25721632972efdd7a775655ff99c2abdc650ece6458a5f9db07c36adc6ebcfe60b70e5a54a83041bc8e1c08dc0afd69868eddb1e9634f84ef01b3f9c31b8c76a0e2ac9dba5adc10a3c9a2360cb2fe6e11e9efcaff1b39dd49895a112f947e4923d9b5c428a37b673f33f3ed02d225807d47efe0a590665b49bf5eaa0890c512f2a01eb6713c6b3539790dca05a2632596c591745bbbf4953c0a783a881f8cf755e6c"]}]}]}, 0x11c}], 0x1, 0x0, 0x0, 0x84}, 0x300) 4m18.222252301s ago: executing program 0 (id=4522): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0), 0x1a1201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000001340)) write$dsp(r0, &(0x7f0000000240)="ebfd59578b3b4e0d3887c9dd462ac0af", 0x10) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000000)) 4m17.806030579s ago: executing program 0 (id=4523): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, r4, 0xd1bd17c4b9ef5e5b, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x90) 3m32.25824945s ago: executing program 32 (id=4523): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, r4, 0xd1bd17c4b9ef5e5b, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x90) 14.219164481s ago: executing program 1 (id=4763): r0 = openat$selinux_policy(0xffffff9c, &(0x7f00000005c0), 0x0, 0x0) close(r0) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfff, 0x40}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x4) 12.824821512s ago: executing program 1 (id=4765): r0 = socket(0xa, 0x3, 0x3a) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0xc804) (fail_nth: 4) 11.861303573s ago: executing program 1 (id=4766): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40804}, 0x40000) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x8010) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 9.058280547s ago: executing program 1 (id=4770): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r0, 0x0) ftruncate(r0, 0xc17a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200}, 0x1c) listen(r2, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x5451, 0x0) connect$l2tp(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x1, 0xa, 0x2, 0x3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000380)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[{}], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200), 0x1, 0x2, 0x2, 0x0, r5}) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r6 = accept(r1, 0x0, 0x0) connect$unix(r6, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 7.136340748s ago: executing program 2 (id=4774): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40804}, 0x40000) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}}, 0x8010) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 6.36845537s ago: executing program 2 (id=4775): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40804}, 0x40000) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x8010) 5.246052276s ago: executing program 1 (id=4776): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a80)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, 0x0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r1, 0xf503, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'wg1\x00', 0x200}) r3 = openat$ttyS3(0xffffff9c, &(0x7f0000000300), 0x1c1a80, 0x0) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0xc004080) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000400), 0x208101, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x6) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x71}, @val={0x8}, @void}}}, 0x24}, 0x1, 0x0, 0x0, 0x30044010}, 0x800) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r5, 0x5451, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$sock_inet_SIOCRTMSG(r6, 0x890d, 0x0) write$binfmt_misc(r0, &(0x7f00000002c0), 0x1001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 4.516020855s ago: executing program 1 (id=4777): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) openat$zero(0xffffff9c, &(0x7f0000000300), 0x20402, 0x0) r2 = dup2(r1, r0) accept4$alg(r2, 0x0, 0x0, 0x80800) 3.71724372s ago: executing program 2 (id=4778): ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(0xffffffffffffffff, 0x3ba0, &(0x7f0000000000)={0x48, 0x2, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MD_CHECK_MAP(0xffffffffffffffff, 0x3ba0, &(0x7f0000000140)={0x48, 0x3, r0, 0x0, 0xffffffffffffffff, 0x9d, &(0x7f0000000080)="9181201a6be439dc2c0bb0f366e2862221b86ac5edbb908c0acad9d0220be975cccb80edead5735329db41e24c1f717be892623d94eff73dce3ba52f6ec0bbb4f3234e83e0a6fbdbf4c740beef51df8db9fd6feda9ed1e35ae9aa824458eca46cc2b7171eef3dc5f5b3782caee48a3c272810c87048690c3606e18905474ace1d2dda7b579fcc85e7c6079a9b5cb5208e66bb0049bd9f7876141799534"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setsig(r1, 0xa, 0x17) r2 = syz_open_dev$evdev(&(0x7f00000001c0), 0x5, 0x90181) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000200)={0x5, 0x80000000, 0xa, 0xfffffff5, 0x89, 0x4}) r3 = syz_open_dev$hidraw(&(0x7f0000000240), 0x517ebe90, 0x80) ioctl$HIDIOCGRAWINFO(r3, 0x80084803, &(0x7f0000000280)=""/150) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000340)={0x0, 'vcan0\x00', 0x3}, 0x18) ioctl$FIONCLEX(r3, 0x5450) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r4 = openat$vhost_vsock(0xffffff9c, &(0x7f00000003c0), 0x2, 0x0) r5 = openat$zero(0xffffff9c, &(0x7f0000000400), 0x402000, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000440), &(0x7f0000000480)={'L+', 0x9}, 0x16, 0x1) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_GETNEXTQUOTA(r5, 0xffffffff80000901, r6, &(0x7f0000000580)) r7 = openat$cgroup_ro(r5, &(0x7f0000000600)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r8 = inotify_add_watch(r7, &(0x7f0000000640)='./file0\x00', 0x80000040) inotify_rm_watch(0xffffffffffffffff, r8) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), r7) sendmsg$NL80211_CMD_JOIN_MESH(r9, &(0x7f0000000940)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000900)={&(0x7f0000000700)={0x1a0, r10, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x80000000}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x257}], @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_CONFIG={0x3c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x6}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffffd2}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x9c}, @NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0x7}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0xcb}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x6}]}, @NL80211_ATTR_HANDLE_DFS={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}], @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x2}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_TX_RATES={0xf4, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0xa0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x33, 0x2, [{0x0, 0x4}, {0x0, 0x8}, {0x5, 0x5}, {0x7}, {0x4, 0x6}, {0x3, 0x3}, {0x4, 0x1}, {0x4}, {0x4, 0x5}, {0x0, 0x8}, {0x1, 0x8}, {0x6, 0x8}, {0x4, 0x6}, {0x7}, {0x0, 0x7}, {0x4, 0x3}, {0x7, 0x7}, {0x1, 0x3}, {0x1, 0x8}, {0x2}, {0x0, 0x1}, {0x5}, {0x0, 0x7}, {0x4, 0x6}, {0x0, 0xa}, {0x2, 0x4}, {0x3, 0x16}, {0x5, 0xa}, {0x7, 0x4}, {0x0, 0x9}, {0x4, 0x9}, {0x0, 0x4}, {0x4, 0x6}, {0x5}, {0x7, 0x9}, {0x0, 0x2}, {0x3, 0x3}, {0x4, 0x8}, {0x4, 0x9}, {0x3, 0x6}, {0x3, 0x2}, {0x6, 0x1}, {0x1, 0x5}, {0x0, 0x7}, {0x7, 0x7}, {0x0, 0x8}, {0x7, 0xa}]}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x4b, 0x2, [{0x0, 0x2}, {0x7, 0x4}, {0x5, 0x9}, {0x3, 0x6}, {0x3, 0xa}, {0x1, 0x1}, {0x4, 0x5}, {0x6, 0x8}, {0x1, 0x9}, {0x1, 0x6}, {0x0, 0x2}, {0x0, 0xa}, {0x1, 0x2}, {0x4, 0xa}, {0x0, 0x8}, {0x1, 0x4}, {0x1, 0x4}, {0x5, 0x2}, {0x6, 0x5}, {0x2, 0x3}, {0x5, 0x9}, {0x6, 0x6}, {0x6, 0x9}, {0x2, 0x8}, {0x1, 0x5}, {0x0, 0x7}, {0x7, 0x2}, {0x7, 0x3}, {0x4, 0x5}, {0x6, 0x7}, {}, {0x5, 0x9}, {0x2, 0x7}, {0x0, 0x9}, {0x4, 0x1}, {0x3, 0x5}, {0x3, 0x5}, {0x4, 0x5}, {0x1, 0x4}, {0x0, 0xa}, {0x5}, {0x0, 0x2}, {0x4, 0x7}, {0x1, 0x6}, {0x3, 0xa}, {0x3, 0x2}, {0x2, 0x5}, {0x6, 0x9}, {0x3}, {0x0, 0xa}, {0x4, 0x1}, {0x1}, {0x7, 0x2}, {0x1, 0x6}, {0x2, 0x8}, {0x1, 0x8}, {0x0, 0x7}, {0x4}, {0x2, 0x1}, {0x4, 0x4}, {0x5, 0x9}, {0x5, 0xa}, {0x6, 0xa}, {0x4}, {0x7, 0x3}, {0x0, 0x8}, {0x3, 0x6}, {0x0, 0x1}, {0x2, 0x8}, {0x7, 0x7}, {0x4, 0x6}]}]}, @NL80211_BAND_60GHZ={0x14, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x580c7f769fbb9680}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x3c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xa, 0x1, [0x60, 0x4, 0x4, 0x6, 0x3, 0x12]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE_LTF={0x5}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x6c, 0x24, 0x30, 0x60, 0x48, 0x30, 0x12, 0x9, 0x1, 0x18, 0x9, 0x48, 0x24, 0x24, 0x48]}]}]}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0x4}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x3}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0xf801}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x3}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x40008c0}, 0x800) fcntl$setlease(r1, 0x400, 0x1) fsetxattr$security_evm(r7, &(0x7f0000000980), &(0x7f00000009c0)=@ng={0x4, 0x8}, 0x2, 0x2) mmap$snddsp_status(&(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x8, 0x810, r5, 0x82000000) ioctl$HIDIOCSFEATURE(r5, 0xc0404806, &(0x7f0000000a00)="aa") close(r1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r5, 0xc0485510, &(0x7f0000000c80)={0x4, 0x9, 0x9, 0xff, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) msgget(0x2, 0xa) sendmsg$NL80211_CMD_SET_KEY(r5, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x50, r10, 0x200, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x4, 0xa}}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "b3c40824b1618fa05ecd1def09"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x2400c050}, 0x40800) 3.234466265s ago: executing program 2 (id=4779): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40804}, 0x40000) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}}, 0x8010) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 618.968092ms ago: executing program 2 (id=4781): r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x70b483, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x10000000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000100), 0x8) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = dup(r4) ioctl$TIOCSIG(r5, 0x40045436, 0x0) openat$snapshot(0xffffff9c, &(0x7f0000000080), 0x40, 0x0) 0s ago: executing program 2 (id=4782): getpid() syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f00000004c0)={0x4100, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) kernel console output (not intermixed with test programs): pe=1400 audit(2889.666:29510): avc: denied { open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2633.771299][ T29] audit: type=1400 audit(2889.686:29511): avc: denied { ioctl } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2633.792461][ T29] audit: type=1400 audit(2889.706:29512): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2633.792862][ T29] audit: type=1400 audit(2889.706:29513): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2633.806608][ T29] audit: type=1400 audit(2889.706:29514): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2633.839111][ T29] audit: type=1400 audit(2889.746:29515): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2633.891882][ T29] audit: type=1400 audit(2889.786:29516): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.902259][T21906] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2639.221139][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 2639.221439][ T29] audit: type=1400 audit(2895.136:29583): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.221572][ T29] audit: type=1400 audit(2895.136:29584): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.232823][ T29] audit: type=1400 audit(2895.146:29585): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.238974][ T29] audit: type=1400 audit(2895.146:29586): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.268363][ T29] audit: type=1400 audit(2895.176:29587): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.268655][ T29] audit: type=1400 audit(2895.176:29588): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2639.268840][ T29] audit: type=1400 audit(2895.176:29589): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.268987][ T29] audit: type=1400 audit(2895.176:29590): avc: denied { open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2639.366563][ T29] audit: type=1400 audit(2895.186:29591): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.389483][ T29] audit: type=1400 audit(2895.186:29592): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.129138][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 2652.129493][ T29] audit: type=1400 audit(2908.046:29599): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.132492][ T29] audit: type=1400 audit(2908.046:29600): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.139429][ T29] audit: type=1400 audit(2908.056:29601): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.197187][ T29] audit: type=1400 audit(2908.106:29602): avc: denied { execute } for pid=21930 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2652.201403][ T29] audit: type=1400 audit(2908.116:29603): avc: denied { execute_no_trans } for pid=21930 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2652.204787][ T29] audit: type=1400 audit(2908.116:29604): avc: denied { execute } for pid=21930 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2652.221519][ T29] audit: type=1400 audit(2908.136:29605): avc: denied { execmem } for pid=21930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2652.236655][ T29] audit: type=1400 audit(2908.146:29606): avc: denied { read } for pid=21931 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2652.236988][ T29] audit: type=1400 audit(2908.146:29607): avc: denied { read open } for pid=21931 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2652.246163][ T29] audit: type=1400 audit(2908.156:29608): avc: denied { mounton } for pid=21931 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2652.395615][ T38] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2652.444383][ T38] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2652.495345][ T38] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2652.565289][ T38] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2652.934461][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2652.944198][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2652.958459][ T38] bond0 (unregistering): Released all slaves [ 2653.037973][ T38] hsr_slave_0: left promiscuous mode [ 2653.049338][ T38] hsr_slave_1: left promiscuous mode [ 2653.060823][ T38] veth1_macvtap: left promiscuous mode [ 2653.061578][ T38] veth0_macvtap: left promiscuous mode [ 2653.061843][ T38] veth1_vlan: left promiscuous mode [ 2653.062035][ T38] veth0_vlan: left promiscuous mode [ 2655.939419][T21931] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2655.961464][T21931] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2657.138151][ T29] kauditd_printk_skb: 237 callbacks suppressed [ 2657.142634][ T29] audit: type=1400 audit(2913.046:29846): avc: denied { search } for pid=22147 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2657.152245][ T29] audit: type=1400 audit(2913.066:29847): avc: denied { sys_module } for pid=21931 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2657.154758][ T29] audit: type=1400 audit(2913.066:29848): avc: denied { module_request } for pid=21931 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2657.165131][ T29] audit: type=1400 audit(2913.066:29849): avc: denied { getattr } for pid=22147 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2657.165634][ T29] audit: type=1400 audit(2913.066:29850): avc: denied { search } for pid=22147 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2657.165812][ T29] audit: type=1400 audit(2913.066:29851): avc: denied { search } for pid=22147 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2657.165981][ T29] audit: type=1400 audit(2913.066:29852): avc: denied { search } for pid=22147 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2657.189993][ T29] audit: type=1400 audit(2913.066:29853): avc: denied { getattr } for pid=22147 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2657.191663][ T29] audit: type=1400 audit(2913.086:29854): avc: denied { write } for pid=22147 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2657.193043][ T29] audit: type=1400 audit(2913.086:29855): avc: denied { open } for pid=22147 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2657.992635][T21931] hsr_slave_0: entered promiscuous mode [ 2657.995562][T21931] hsr_slave_1: entered promiscuous mode [ 2657.998583][T21931] debugfs: 'hsr0' already exists in 'hsr' [ 2657.999607][T21931] Cannot create hsr debugfs directory [ 2658.473215][T21931] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2658.484034][T21931] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2658.506420][T21931] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2658.524809][T21931] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2660.012846][T21931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2662.181904][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 2662.182400][ T29] audit: type=1400 audit(2918.096:30027): avc: denied { create } for pid=22315 comm="syz.1.4533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2662.216054][ T29] audit: type=1400 audit(2918.106:30028): avc: denied { module_request } for pid=22315 comm="syz.1.4533" kmod="net-pf-35" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2662.291181][ T29] audit: type=1400 audit(2918.206:30029): avc: denied { sys_module } for pid=21931 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2662.294672][ T29] audit: type=1400 audit(2918.206:30030): avc: denied { module_request } for pid=21931 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2662.414306][ T29] audit: type=1400 audit(2918.326:30031): avc: denied { allowed } for pid=22315 comm="syz.1.4533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2662.425769][ T29] audit: type=1400 audit(2918.336:30032): avc: denied { create } for pid=22315 comm="syz.1.4533" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2662.434648][ T29] audit: type=1400 audit(2918.346:30033): avc: denied { map } for pid=22315 comm="syz.1.4533" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=51537 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2662.446264][ T29] audit: type=1400 audit(2918.356:30034): avc: denied { read write } for pid=22315 comm="syz.1.4533" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=51537 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2662.465608][ T29] audit: type=1400 audit(2918.376:30035): avc: denied { map } for pid=22315 comm="syz.1.4533" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=51537 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2662.499780][ T29] audit: type=1400 audit(2918.416:30036): avc: denied { read write } for pid=22315 comm="syz.1.4533" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=51537 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2664.294681][T21931] veth0_vlan: entered promiscuous mode [ 2664.324040][T21931] veth1_vlan: entered promiscuous mode [ 2664.390861][T21931] veth0_macvtap: entered promiscuous mode [ 2664.396563][T21931] veth1_macvtap: entered promiscuous mode [ 2664.471922][T22018] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2664.472985][T22018] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2664.482512][T22018] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2664.492325][T22018] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2667.276681][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 2667.276973][ T29] audit: type=1400 audit(2923.186:30114): avc: denied { create } for pid=22341 comm="syz.2.4531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2667.417292][ T29] audit: type=1400 audit(2923.326:30115): avc: denied { allowed } for pid=22333 comm="syz.1.4535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2667.430702][ T29] audit: type=1400 audit(2923.336:30116): avc: denied { create } for pid=22333 comm="syz.1.4535" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2667.432922][ T29] audit: type=1400 audit(2923.336:30117): avc: denied { map } for pid=22333 comm="syz.1.4535" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=52802 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2667.433221][ T29] audit: type=1400 audit(2923.336:30118): avc: denied { read write } for pid=22333 comm="syz.1.4535" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=52802 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2667.451675][ T29] audit: type=1400 audit(2923.346:30119): avc: denied { create } for pid=22333 comm="syz.1.4535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2667.452113][ T29] audit: type=1400 audit(2923.356:30120): avc: denied { write } for pid=22333 comm="syz.1.4535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2667.452183][ T29] audit: type=1400 audit(2923.356:30121): avc: denied { nlmsg_write } for pid=22333 comm="syz.1.4535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2671.543416][ T29] audit: type=1400 audit(2927.456:30122): avc: denied { write } for pid=22352 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2671.557091][ T29] audit: type=1400 audit(2927.466:30123): avc: denied { open } for pid=22352 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2672.339622][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 2672.339989][ T29] audit: type=1400 audit(2928.256:30151): avc: denied { search } for pid=22354 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2672.340248][ T29] audit: type=1400 audit(2928.256:30152): avc: denied { read } for pid=22354 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2672.344434][ T29] audit: type=1400 audit(2928.256:30153): avc: denied { open } for pid=22354 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2672.344797][ T29] audit: type=1400 audit(2928.256:30154): avc: denied { getattr } for pid=22354 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2673.015134][ T29] audit: type=1400 audit(2928.926:30155): avc: denied { search } for pid=22355 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2673.019279][ T29] audit: type=1400 audit(2928.926:30156): avc: denied { search } for pid=22355 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2673.021457][ T29] audit: type=1400 audit(2928.926:30157): avc: denied { search } for pid=22355 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2673.023389][ T29] audit: type=1400 audit(2928.926:30158): avc: denied { getattr } for pid=22355 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2673.140739][ T29] audit: type=1400 audit(2929.056:30159): avc: denied { remove_name } for pid=22355 comm="rm" name="resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2673.142304][ T29] audit: type=1400 audit(2929.056:30160): avc: denied { unlink } for pid=22355 comm="rm" name="resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2677.781379][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 2677.781911][ T29] audit: type=1400 audit(2933.696:30241): avc: denied { search } for pid=22367 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.782189][ T29] audit: type=1400 audit(2933.696:30242): avc: denied { search } for pid=22367 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.790321][ T29] audit: type=1400 audit(2933.696:30243): avc: denied { search } for pid=22367 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.799839][ T29] audit: type=1400 audit(2933.696:30244): avc: denied { getattr } for pid=22367 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2677.802757][ T29] audit: type=1400 audit(2933.716:30245): avc: denied { search } for pid=22367 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.806260][ T29] audit: type=1400 audit(2933.716:30246): avc: denied { search } for pid=22367 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.809468][ T29] audit: type=1400 audit(2933.716:30247): avc: denied { search } for pid=22367 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.811221][ T29] audit: type=1400 audit(2933.716:30248): avc: denied { search } for pid=22367 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.812959][ T29] audit: type=1400 audit(2933.716:30249): avc: denied { remove_name search } for pid=22367 comm="rm" name="resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.838277][ T29] audit: type=1400 audit(2933.736:30250): avc: denied { unlink } for pid=22367 comm="rm" name="resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2687.082964][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 2687.083333][ T29] audit: type=1400 audit(2942.996:30297): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.097274][ T29] audit: type=1400 audit(2943.006:30298): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.130955][ T29] audit: type=1400 audit(2943.046:30299): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.142238][ T29] audit: type=1400 audit(2943.046:30300): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.142854][ T29] audit: type=1400 audit(2943.046:30301): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.156271][ T29] audit: type=1400 audit(2943.066:30302): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.178317][ T29] audit: type=1400 audit(2943.086:30303): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.178781][ T29] audit: type=1400 audit(2943.086:30304): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.228398][ T29] audit: type=1400 audit(2943.136:30305): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.232663][ T29] audit: type=1400 audit(2943.146:30306): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2690.654452][T22398] [U]  [ 2691.458381][ T9] usb 2-1: new high-speed USB device number 67 using dummy_hcd [ 2691.658984][ T9] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2691.706579][ T9] usb 2-1: New USB device found, idVendor=0bfd, idProduct=0012, bcdDevice=cc.c0 [ 2691.706938][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2691.707224][ T9] usb 2-1: Product: syz [ 2691.707285][ T9] usb 2-1: Manufacturer: syz [ 2691.707315][ T9] usb 2-1: SerialNumber: syz [ 2691.724071][ T9] usb 2-1: config 0 descriptor?? [ 2691.806736][ T9] kvaser_usb 2-1:0.0: error -ENODEV: Cannot get usb endpoint(s) [ 2692.017316][ T9] usb 2-1: USB disconnect, device number 67 [ 2692.101359][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 2692.101796][ T29] audit: type=1400 audit(2948.016:30457): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.102050][ T29] audit: type=1400 audit(2948.016:30458): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.111664][ T29] audit: type=1400 audit(2948.026:30459): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.126865][ T29] audit: type=1400 audit(2948.036:30460): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.153494][ T29] audit: type=1400 audit(2948.056:30461): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.153812][ T29] audit: type=1400 audit(2948.066:30462): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.207283][ T29] audit: type=1400 audit(2948.116:30463): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.221178][ T29] audit: type=1400 audit(2948.126:30464): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.221663][ T29] audit: type=1400 audit(2948.136:30465): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2692.244311][ T29] audit: type=1400 audit(2948.146:30466): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2698.470944][ T29] kauditd_printk_skb: 110 callbacks suppressed [ 2698.471429][ T29] audit: type=1400 audit(2954.386:30577): avc: denied { mount } for pid=22421 comm="syz.1.4548" name="/" dev="configfs" ino=77 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2698.628434][ T29] audit: type=1400 audit(2954.406:30578): avc: denied { search } for pid=22421 comm="syz.1.4548" name="/" dev="configfs" ino=77 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2698.629272][ T29] audit: type=1400 audit(2954.536:30579): avc: denied { search } for pid=22421 comm="syz.1.4548" name="/" dev="configfs" ino=77 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2698.629378][ T29] audit: type=1400 audit(2954.536:30580): avc: denied { read open } for pid=22421 comm="syz.1.4548" path="/" dev="configfs" ino=77 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2711.659469][ T29] audit: type=1400 audit(2967.566:30581): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.660031][ T29] audit: type=1400 audit(2967.576:30582): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.667372][ T29] audit: type=1400 audit(2967.576:30583): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.692638][ T29] audit: type=1400 audit(2967.606:30584): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.696915][ T29] audit: type=1400 audit(2967.606:30585): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.718595][ T29] audit: type=1400 audit(2967.626:30586): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.719101][ T29] audit: type=1400 audit(2967.636:30587): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.735458][ T29] audit: type=1400 audit(2967.646:30588): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.736081][ T29] audit: type=1400 audit(2967.646:30589): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2711.912314][ T29] audit: type=1400 audit(2967.826:30590): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2712.071484][T22447] RDS: rds_bind could not find a transport for fe80::1a, load rds_tcp or rds_rdma? [ 2712.252305][T22449] comedi: valid board names for 8255 driver are: [ 2712.252824][T22449] 8255 [ 2712.258876][T22449] comedi: valid board names for vmk80xx driver are: [ 2712.259229][T22449] vmk80xx [ 2712.259374][T22449] comedi: valid board names for usbduxsigma driver are: [ 2712.259414][T22449] usbduxsigma [ 2712.259429][T22449] comedi: valid board names for usbduxfast driver are: [ 2712.259447][T22449] usbduxfast [ 2712.259461][T22449] comedi: valid board names for usbdux driver are: [ 2712.259514][T22449] usbdux [ 2712.259534][T22449] comedi: valid board names for ni6501 driver are: [ 2712.259552][T22449] ni6501 [ 2712.259566][T22449] comedi: valid board names for dt9812 driver are: [ 2712.259581][T22449] dt9812 [ 2712.259632][T22449] comedi: valid board names for ni_labpc_cs driver are: [ 2712.259651][T22449] ni_labpc_cs [ 2712.259665][T22449] comedi: valid board names for ni_daq_700 driver are: [ 2712.259679][T22449] ni_daq_700 [ 2712.259693][T22449] comedi: valid board names for labpc_pci driver are: [ 2712.259713][T22449] labpc_pci [ 2712.259728][T22449] comedi: valid board names for adl_pci9118 driver are: [ 2712.259829][T22449] pci9118dg [ 2712.259892][T22449] pci9118hg [ 2712.259941][T22449] pci9118hr [ 2712.259958][T22449] comedi: valid board names for 8255_pci driver are: [ 2712.259973][T22449] 8255_pci [ 2712.259988][T22449] comedi: valid board names for comedi_parport driver are: [ 2712.260004][T22449] comedi_parport [ 2712.260062][T22449] comedi: valid board names for comedi_test driver are: [ 2712.260086][T22449] comedi_test [ 2712.260104][T22449] comedi: valid board names for comedi_bond driver are: [ 2712.260138][T22449] comedi_bond [ 2712.478322][T22451] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2712.480275][T22451] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2716.674775][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 2716.675278][ T29] audit: type=1400 audit(2972.586:30673): avc: denied { map } for pid=22461 comm="syz.2.4563" path="/dev/binderfs/binder0" dev="binder" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2716.679738][ T29] audit: type=1400 audit(2972.586:30674): avc: denied { read } for pid=22461 comm="syz.2.4563" path="/dev/binderfs/binder0" dev="binder" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2716.693172][ T29] audit: type=1400 audit(2972.606:30675): avc: denied { ioctl } for pid=22461 comm="syz.2.4563" path="/dev/binderfs/binder0" dev="binder" ino=6 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2716.695135][ T29] audit: type=1400 audit(2972.606:30676): avc: denied { set_context_mgr } for pid=22461 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2717.898966][ T29] audit: type=1400 audit(2973.816:30677): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2717.931755][ T29] audit: type=1400 audit(2973.846:30678): avc: denied { recv } for pid=18852 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2717.936615][ T29] audit: type=1400 audit(2973.846:30679): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2717.943104][ T29] audit: type=1400 audit(2973.846:30680): avc: denied { open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2717.947973][ T29] audit: type=1400 audit(2973.856:30681): avc: denied { ioctl } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2717.950124][ T29] audit: type=1400 audit(2973.866:30682): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2718.278720][ T42] usb 2-1: new full-speed USB device number 68 using dummy_hcd [ 2718.443173][ T42] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 10 [ 2718.443519][ T42] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has invalid maxpacket 127, setting to 64 [ 2718.443890][ T42] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 2718.444074][ T42] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2718.469926][T22466] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2718.470587][T22466] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2718.478581][ T42] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 2718.731937][ T9] usb 2-1: USB disconnect, device number 68 [ 2719.268144][ T1631] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 2719.418655][ T1631] usb 2-1: Using ep0 maxpacket: 8 [ 2719.448520][ T1631] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 2719.448929][ T1631] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 2719.449012][ T1631] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 2719.449074][ T1631] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2719.449168][ T1631] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 2719.449215][ T1631] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2719.700241][ T1631] usb 2-1: GET_CAPABILITIES returned 0 [ 2719.700610][ T1631] usbtmc 2-1:16.0: can't read capabilities [ 2719.952602][ T9] usb 2-1: USB disconnect, device number 69 [ 2724.341083][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 2724.341495][ T29] audit: type=1400 audit(2980.236:30781): avc: denied { prog_run } for pid=22521 comm="iou-wrk-22524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2724.361597][ T29] audit: type=1400 audit(2980.276:30782): avc: denied { prog_run } for pid=22521 comm="iou-wrk-22524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2724.384448][ T29] audit: type=1400 audit(2980.296:30783): avc: denied { prog_run } for pid=22521 comm="iou-wrk-22524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2724.420772][ T29] audit: type=1400 audit(2980.336:30784): avc: denied { prog_run } for pid=22521 comm="iou-wrk-22524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2724.457413][ T29] audit: type=1400 audit(2980.366:30785): avc: denied { prog_run } for pid=22521 comm="iou-wrk-22524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2724.598738][ T29] audit: type=1400 audit(2980.506:30786): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2724.609330][ T29] audit: type=1400 audit(2980.516:30787): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2724.643200][ T29] audit: type=1400 audit(2980.556:30788): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2724.643639][ T29] audit: type=1400 audit(2980.556:30789): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2724.653126][ T29] audit: type=1400 audit(2980.556:30790): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2738.967354][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 2738.968013][ T29] audit: type=1400 audit(2994.876:30827): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2738.975355][ T29] audit: type=1400 audit(2994.886:30828): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.025332][ T29] audit: type=1400 audit(2994.936:30829): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.025742][ T29] audit: type=1400 audit(2994.936:30830): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.040216][ T29] audit: type=1400 audit(2994.946:30831): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.040748][ T29] audit: type=1400 audit(2994.956:30832): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.054596][ T29] audit: type=1400 audit(2994.966:30833): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.057023][ T29] audit: type=1400 audit(2994.966:30834): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2739.133150][ T29] audit: type=1400 audit(2995.046:30835): avc: denied { prog_load } for pid=22537 comm="syz.2.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2739.136397][ T29] audit: type=1400 audit(2995.046:30836): avc: denied { bpf } for pid=22537 comm="syz.2.4574" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2739.179610][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.190592][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.191356][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.191536][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.191666][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.191768][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.191880][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.191980][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.192147][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2739.192258][T22538] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 2746.322595][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 2746.323113][ T29] audit: type=1400 audit(3002.216:30886): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.323382][ T29] audit: type=1400 audit(3002.216:30887): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.343206][ T29] audit: type=1400 audit(3002.256:30888): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.351490][ T29] audit: type=1400 audit(3002.266:30889): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.355322][ T29] audit: type=1400 audit(3002.266:30890): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2746.370914][ T29] audit: type=1400 audit(3002.286:30891): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.376168][ T29] audit: type=1400 audit(3002.286:30892): avc: denied { recv } for pid=2819 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.386109][ T29] audit: type=1400 audit(3002.296:30893): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.390593][ T29] audit: type=1400 audit(3002.296:30894): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.397031][ T29] audit: type=1400 audit(3002.306:30895): avc: denied { read write open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2751.991548][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 2751.991979][ T29] audit: type=1400 audit(3007.906:30904): avc: denied { create } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2751.992281][ T29] audit: type=1400 audit(3007.906:30905): avc: denied { write } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2752.008245][ T29] audit: type=1400 audit(3007.906:30906): avc: denied { read } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2752.011637][ T29] audit: type=1400 audit(3007.926:30907): avc: denied { module_request } for pid=22549 comm="syz.1.4579" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2752.290601][ T29] audit: type=1400 audit(3008.206:30908): avc: denied { create } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2752.311045][ T29] audit: type=1400 audit(3008.226:30909): avc: denied { create } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2752.329192][ T29] audit: type=1400 audit(3008.246:30910): avc: denied { write } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2752.330231][ T29] audit: type=1400 audit(3008.246:30911): avc: denied { read } for pid=22549 comm="syz.1.4579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2759.073347][ T29] audit: type=1400 audit(3014.986:30912): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.074518][ T29] audit: type=1400 audit(3014.986:30913): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.095095][ T29] audit: type=1400 audit(3015.006:30914): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.124688][ T29] audit: type=1400 audit(3015.036:30915): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.135554][ T29] audit: type=1400 audit(3015.046:30916): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.149217][ T29] audit: type=1400 audit(3015.056:30917): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.149632][ T29] audit: type=1400 audit(3015.066:30918): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2759.221686][ T29] audit: type=1400 audit(3015.136:30919): avc: denied { prog_load } for pid=22556 comm="syz.2.4580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2759.223913][ T29] audit: type=1400 audit(3015.136:30920): avc: denied { bpf } for pid=22556 comm="syz.2.4580" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2759.229707][ T29] audit: type=1400 audit(3015.136:30921): avc: denied { perfmon } for pid=22556 comm="syz.2.4580" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2763.373396][T22561] syz.2.4582 (22561): drop_caches: 1 [ 2764.790068][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 2764.790421][ T29] audit: type=1400 audit(3020.706:30960): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.799447][ T29] audit: type=1400 audit(3020.716:30961): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.842681][ T29] audit: type=1400 audit(3020.756:30962): avc: denied { recv } for pid=22078 comm="kworker/u8:7" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.843114][ T29] audit: type=1400 audit(3020.756:30963): avc: denied { recv } for pid=22078 comm="kworker/u8:7" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.851715][ T29] audit: type=1400 audit(3020.756:30964): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.856419][ T29] audit: type=1400 audit(3020.766:30965): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.875533][ T29] audit: type=1400 audit(3020.786:30966): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2764.876079][ T29] audit: type=1400 audit(3020.786:30967): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2765.169624][ T29] audit: type=1400 audit(3021.086:30968): avc: denied { prog_load } for pid=22568 comm="syz.2.4585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2765.189519][ T29] audit: type=1400 audit(3021.086:30969): avc: denied { bpf } for pid=22568 comm="syz.2.4585" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2767.712331][T22573] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4586'. [ 2773.438580][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 2773.438994][ T29] audit: type=1400 audit(3029.346:31000): avc: denied { create } for pid=22574 comm="syz.2.4587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2773.464299][ T29] audit: type=1400 audit(3029.376:31001): avc: denied { bind } for pid=22574 comm="syz.2.4587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2773.608544][ T29] audit: type=1400 audit(3029.516:31002): avc: denied { write } for pid=22574 comm="syz.2.4587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2773.738807][ T29] audit: type=1400 audit(3029.656:31003): avc: denied { ioctl } for pid=22574 comm="syz.2.4587" path="/dev/dri/card0" dev="devtmpfs" ino=614 ioctlcmd=0x64b4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2774.218229][ T29] audit: type=1400 audit(3030.126:31004): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2774.234864][ T29] audit: type=1400 audit(3030.146:31005): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2774.261196][ T29] audit: type=1400 audit(3030.176:31006): avc: denied { recv } for pid=22574 comm="syz.2.4587" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2774.263532][ T29] audit: type=1400 audit(3030.176:31007): avc: denied { recv } for pid=22574 comm="syz.2.4587" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2774.273501][ T29] audit: type=1400 audit(3030.186:31008): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2774.288818][ T29] audit: type=1400 audit(3030.196:31009): avc: denied { recv } for pid=22574 comm="syz.2.4587" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2778.455203][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 2778.455602][ T29] audit: type=1400 audit(3034.366:31096): avc: denied { write } for pid=22596 comm="syz.1.4592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2778.949312][ T29] audit: type=1400 audit(3034.856:31097): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2778.966840][ T29] audit: type=1400 audit(3034.876:31098): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.008845][ T29] audit: type=1400 audit(3034.906:31099): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.009378][ T29] audit: type=1400 audit(3034.906:31100): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.009724][ T29] audit: type=1400 audit(3034.906:31101): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.009939][ T29] audit: type=1400 audit(3034.916:31102): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.010155][ T29] audit: type=1400 audit(3034.926:31103): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.010246][ T29] audit: type=1400 audit(3034.926:31104): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.035857][ T29] audit: type=1400 audit(3034.946:31105): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2784.211780][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 2784.212222][ T29] audit: type=1400 audit(3040.126:31177): avc: denied { write } for pid=22614 comm="syz.2.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2784.722078][ T29] audit: type=1400 audit(3040.636:31178): avc: denied { create } for pid=22614 comm="syz.2.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2784.909640][ T29] audit: type=1400 audit(3040.826:31179): avc: denied { write } for pid=22614 comm="syz.2.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2785.112716][ T29] audit: type=1400 audit(3041.026:31180): avc: denied { module_request } for pid=22614 comm="syz.2.4597" kmod="nfnetlink-subsys-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2785.215982][ T29] audit: type=1400 audit(3041.126:31181): avc: denied { write } for pid=22614 comm="syz.2.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2785.351876][ T29] audit: type=1400 audit(3041.266:31182): avc: denied { read } for pid=22614 comm="syz.2.4597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2785.584167][ T29] audit: type=1400 audit(3041.486:31183): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2785.584651][ T29] audit: type=1400 audit(3041.486:31184): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2785.585065][ T29] audit: type=1400 audit(3041.496:31185): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2785.591654][ T29] audit: type=1400 audit(3041.496:31186): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2785.922090][T22623] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2785.934405][T22623] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2789.240593][ T29] kauditd_printk_skb: 123 callbacks suppressed [ 2789.242466][ T29] audit: type=1400 audit(3045.156:31310): avc: denied { read } for pid=22645 comm="syz.2.4606" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2789.244143][ T29] audit: type=1400 audit(3045.156:31311): avc: denied { open } for pid=22645 comm="syz.2.4606" path="net:[4026532726]" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2789.248563][ T29] audit: type=1400 audit(3045.156:31312): avc: denied { recv } for pid=22645 comm="syz.2.4606" saddr=127.0.0.1 src=4420 daddr=127.0.0.1 dest=42354 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2789.276336][ T29] audit: type=1400 audit(3045.186:31313): avc: denied { read write } for pid=22645 comm="syz.2.4606" name="userio" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2789.280129][ T29] audit: type=1400 audit(3045.186:31314): avc: denied { open } for pid=22645 comm="syz.2.4606" path="/dev/userio" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2789.288428][ T29] audit: type=1400 audit(3045.196:31315): avc: denied { setattr } for pid=22645 comm="syz.2.4606" name="userio" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2789.320424][ T29] audit: type=1400 audit(3045.236:31316): avc: denied { sys_module } for pid=22645 comm="syz.2.4606" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2789.340809][ T29] audit: type=1400 audit(3045.256:31317): avc: denied { create } for pid=22645 comm="syz.2.4606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2789.343123][ T29] audit: type=1400 audit(3045.256:31318): avc: denied { write } for pid=22645 comm="syz.2.4606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2789.345066][ T29] audit: type=1400 audit(3045.256:31319): avc: denied { read } for pid=22645 comm="syz.2.4606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2794.480396][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 2794.481823][ T29] audit: type=1400 audit(3050.396:31417): avc: denied { create } for pid=22666 comm="syz.1.4612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2794.512318][ T29] audit: type=1400 audit(3050.426:31418): avc: denied { write } for pid=22666 comm="syz.1.4612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2794.548103][ T29] audit: type=1400 audit(3050.456:31419): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.563608][ T29] audit: type=1400 audit(3050.476:31420): avc: denied { recv } for pid=2909 comm="klogd" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.568454][ T29] audit: type=1400 audit(3050.476:31421): avc: denied { write } for pid=22666 comm="syz.1.4612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2794.570381][ T29] audit: type=1400 audit(3050.486:31422): avc: denied { module_request } for pid=22666 comm="syz.1.4612" kmod="nfnetlink-subsys-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2794.591595][ T29] audit: type=1400 audit(3050.506:31423): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.592007][ T29] audit: type=1400 audit(3050.506:31424): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.596105][ T29] audit: type=1400 audit(3050.506:31425): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.623989][ T29] audit: type=1400 audit(3050.536:31426): avc: denied { recv } for pid=22666 comm="syz.1.4612" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2795.564438][T22684] FAULT_INJECTION: forcing a failure. [ 2795.564438][T22684] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.566702][T22684] CPU: 0 UID: 0 PID: 22684 Comm: syz.1.4617 Not tainted syzkaller #0 PREEMPT [ 2795.566839][T22684] Hardware name: ARM-Versatile Express [ 2795.566869][T22684] Call trace: [ 2795.566916][T22684] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2795.567042][T22684] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 2795.567066][T22684] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2795.567123][T22684] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2795.567181][T22684] r5:8547b000 r4:82918810 [ 2795.567200][T22684] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2795.567263][T22684] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 2795.567349][T22684] r8:8547b000 r7:00000000 r6:00000cc0 r5:84bcad80 r4:83002e40 [ 2795.567369][T22684] [<8052ef70>] (should_failslab) from [<8050ec74>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 2795.567503][T22684] [<8050ec28>] (kmem_cache_alloc_noprof) from [<804e5fec>] (__anon_vma_prepare+0x34/0x1b0) [ 2795.567622][T22684] r10:dfb6ddd8 r9:84bcad80 r8:82aca598 r7:85b4b0c0 r6:84bcad80 r5:84bcad80 [ 2795.567647][T22684] r4:dfb6dcb0 [ 2795.567665][T22684] [<804e5fb8>] (__anon_vma_prepare) from [<804cce18>] (__vmf_anon_prepare+0x5c/0xcc) [ 2795.567742][T22684] r10:dfb6ddd8 r9:84bcad80 r8:00000001 r7:00000000 r6:20000000 r5:84bcad80 [ 2795.567767][T22684] r4:dfb6dcb0 r3:00000215 [ 2795.567786][T22684] [<804ccdbc>] (__vmf_anon_prepare) from [<804d0964>] (handle_mm_fault+0xcac/0x14e0) [ 2795.567859][T22684] r7:00000000 r6:20000000 r5:8547b000 r4:00000215 [ 2795.567879][T22684] [<804cfcb8>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 2795.567953][T22684] r10:00000002 r9:85b4b0c0 r8:00000215 r7:20000000 r6:00000a06 r5:20000200 [ 2795.567975][T22684] r4:dfb6ddd8 [ 2795.567992][T22684] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 2795.568172][T22684] r10:0000006c r9:8547b000 r8:80234648 r7:dfb6ddd8 r6:20000200 r5:00000a06 [ 2795.568197][T22684] r4:8281d0b8 [ 2795.568216][T22684] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 2795.568281][T22684] r9:8547b000 r8:80234648 r7:dfb6ddd8 r6:20000200 r5:00000a06 r4:8281d0b8 [ 2795.568324][T22684] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 2795.568378][T22684] Exception stack(0xdfb6ddd8 to 0xdfb6de20) [ 2795.568416][T22684] ddc0: 20000200 dfb6de74 [ 2795.568458][T22684] dde0: ffffffa0 00000009 0000cadb 0001c1ff 00000000 0000006c 00000000 00000000 [ 2795.568497][T22684] de00: 0000006c dfb6deb4 00001000 dfb6de2c 00000000 81a30840 a0000013 ffffffff [ 2795.568537][T22684] r8:00000000 r7:dfb6de0c r6:ffffffff r5:a0000013 r4:81a30840 [ 2795.568557][T22684] [<80566ae4>] (cp_new_stat) from [<805673b4>] (__do_sys_newfstat+0x58/0x7c) [ 2795.568617][T22684] r6:00130918 r5:20000200 r4:00000003 [ 2795.568636][T22684] [<8056735c>] (__do_sys_newfstat) from [<805678ac>] (sys_newfstat+0x10/0x14) [ 2795.568688][T22684] r5:00000000 r4:00000000 [ 2795.568708][T22684] [<8056789c>] (sys_newfstat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2795.568757][T22684] Exception stack(0xdfb6dfa8 to 0xdfb6dff0) [ 2795.568794][T22684] dfa0: 00000000 00000000 00000003 20000200 00000000 00000000 [ 2795.568831][T22684] dfc0: 00000000 00000000 00130918 0000006c 00300000 00000000 00006364 76f7c0bc [ 2795.568866][T22684] dfe0: 76f7bec0 76f7beb0 0001928c 00132970 [ 2798.027024][T22697] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2798.988699][T22703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1548 sclass=netlink_audit_socket pid=22703 comm=syz.1.4622 [ 2799.724706][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 2799.725216][ T29] audit: type=1400 audit(3055.636:31587): avc: denied { write } for pid=22706 comm="syz.1.4624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2800.231286][ T29] audit: type=1400 audit(3056.146:31588): avc: denied { write } for pid=22706 comm="syz.1.4624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2800.741616][ T29] audit: type=1400 audit(3056.656:31589): avc: denied { create } for pid=22706 comm="syz.1.4624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2800.840423][ T29] audit: type=1400 audit(3056.756:31590): avc: denied { write } for pid=22706 comm="syz.1.4624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2800.848058][ T29] audit: type=1400 audit(3056.756:31591): avc: denied { write } for pid=22706 comm="syz.1.4624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2800.894235][ T29] audit: type=1400 audit(3056.806:31592): avc: denied { module_request } for pid=22706 comm="syz.1.4624" kmod="nfnetlink-subsys-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2801.064957][ T29] audit: type=1400 audit(3056.976:31593): avc: denied { read } for pid=22706 comm="syz.1.4624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2801.094207][ T29] audit: type=1400 audit(3057.006:31594): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2801.110304][ T29] audit: type=1400 audit(3057.026:31595): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2801.112492][ T29] audit: type=1400 audit(3057.026:31596): avc: denied { open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.381033][T22728] fuse: Bad value for 'rootmode' [ 2804.775755][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 2804.776176][ T29] audit: type=1400 audit(3060.686:31713): avc: denied { read } for pid=22729 comm="syz.1.4631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2804.792808][ T29] audit: type=1400 audit(3060.706:31714): avc: denied { read } for pid=22729 comm="syz.1.4631" dev="nsfs" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2804.794920][ T29] audit: type=1400 audit(3060.706:31715): avc: denied { open } for pid=22729 comm="syz.1.4631" path="net:[4026532707]" dev="nsfs" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2804.806494][ T29] audit: type=1400 audit(3060.716:31716): avc: denied { create } for pid=22729 comm="syz.1.4631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2804.822324][ T29] audit: type=1400 audit(3060.736:31717): avc: denied { write } for pid=22729 comm="syz.1.4631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2804.869257][ T29] audit: type=1400 audit(3060.786:31718): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.870285][ T29] audit: type=1400 audit(3060.786:31719): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2804.874251][ T29] audit: type=1400 audit(3060.786:31720): avc: denied { read write open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.887370][ T29] audit: type=1400 audit(3060.796:31721): avc: denied { ioctl } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.890862][ T29] audit: type=1400 audit(3060.796:31722): avc: denied { recv } for pid=2909 comm="klogd" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2806.091180][T22743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=22743 comm=syz.1.4635 [ 2807.212805][T22756] FAULT_INJECTION: forcing a failure. [ 2807.212805][T22756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2807.215825][T22756] CPU: 1 UID: 0 PID: 22756 Comm: syz.1.4641 Not tainted syzkaller #0 PREEMPT [ 2807.215958][T22756] Hardware name: ARM-Versatile Express [ 2807.215988][T22756] Call trace: [ 2807.216044][T22756] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2807.216164][T22756] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 2807.216187][T22756] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2807.216241][T22756] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2807.216302][T22756] r5:8547b000 r4:8294f590 [ 2807.216321][T22756] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2807.216382][T22756] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 2807.216442][T22756] r8:76f7bf30 r7:00000000 r6:00000000 r5:e8231f68 r4:00000002 [ 2807.216460][T22756] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 2807.216502][T22756] [<80986ef4>] (should_fail_usercopy) from [<8059a064>] (simple_read_from_buffer+0x80/0x13c) [ 2807.216557][T22756] [<80599fe4>] (simple_read_from_buffer) from [<8061618c>] (proc_fail_nth_read+0xb8/0x108) [ 2807.216625][T22756] r10:00000001 r9:806160d4 r8:00000002 r7:e8231f68 r6:0000000f r5:76f7bf30 [ 2807.216649][T22756] r4:8547b000 r3:e8231e9f [ 2807.216666][T22756] [<806160d4>] (proc_fail_nth_read) from [<8055f014>] (vfs_read+0x98/0x324) [ 2807.216728][T22756] r8:76f7bf30 r7:e8231f68 r6:8547b000 r5:0000000f r4:85951000 [ 2807.216746][T22756] [<8055ef7c>] (vfs_read) from [<8055fd24>] (ksys_read+0x74/0xe8) [ 2807.216811][T22756] r10:00000003 r9:8547b000 r8:8020029c r7:00000000 r6:00000000 r5:85951000 [ 2807.216831][T22756] r4:85951003 [ 2807.216849][T22756] [<8055fcb0>] (ksys_read) from [<8055fda8>] (sys_read+0x10/0x14) [ 2807.216947][T22756] r7:00000003 r6:00000004 r5:76f7bf30 r4:0000000f [ 2807.216966][T22756] [<8055fd98>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2807.217076][T22756] Exception stack(0xe8231fa8 to 0xe8231ff0) [ 2807.217115][T22756] 1fa0: 0000000f 76f7bf30 00000004 76f7bf30 0000000f 00000000 [ 2807.217149][T22756] 1fc0: 0000000f 76f7bf30 00000004 00000003 00300000 00000000 00006364 76f7c0bc [ 2807.217176][T22756] 1fe0: 00000158 76f7bed0 000d862c 0013083c [ 2809.263195][T22774] FAULT_INJECTION: forcing a failure. [ 2809.263195][T22774] name failslab, interval 1, probability 0, space 0, times 0 [ 2809.271030][T22774] CPU: 1 UID: 0 PID: 22774 Comm: syz.1.4646 Not tainted syzkaller #0 PREEMPT [ 2809.271194][T22774] Hardware name: ARM-Versatile Express [ 2809.271226][T22774] Call trace: [ 2809.271274][T22774] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2809.271396][T22774] r7:00000c40 r6:00000000 r5:60000013 r4:82252544 [ 2809.271420][T22774] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2809.271478][T22774] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2809.271539][T22774] r5:84f23c00 r4:82918810 [ 2809.271558][T22774] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2809.271623][T22774] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 2809.271703][T22774] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 2809.271739][T22774] [<8052ef70>] (should_failslab) from [<8050a4c0>] (__kmalloc_noprof+0x9c/0x568) [ 2809.271844][T22774] [<8050a424>] (__kmalloc_noprof) from [<807d3258>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 2809.271919][T22774] r10:84f23c00 r9:85704800 r8:00000000 r7:834b9a18 r6:84b896e8 r5:00001000 [ 2809.271943][T22774] r4:00000000 [ 2809.271965][T22774] [<807d321c>] (tomoyo_realpath_from_path) from [<807cf39c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 2809.272045][T22774] r10:84f23c00 r9:00000000 r8:84b896c0 r7:00008955 r6:00000004 r5:81cd65c8 [ 2809.272071][T22774] r4:84b896e8 r3:826c1240 [ 2809.272090][T22774] [<807cf2d0>] (tomoyo_path_number_perm) from [<807d3c7c>] (tomoyo_file_ioctl+0x1c/0x20) [ 2809.272161][T22774] r9:00000003 r8:84b896c0 r7:00000000 r6:00000000 r5:00008955 r4:84b896c0 [ 2809.272185][T22774] [<807d3c60>] (tomoyo_file_ioctl) from [<80780540>] (security_file_ioctl+0x64/0x1e4) [ 2809.272247][T22774] [<807804dc>] (security_file_ioctl) from [<805787d4>] (sys_ioctl+0x4c/0xba0) [ 2809.272310][T22774] r7:00000000 r6:84b896c1 r5:00000000 r4:00008955 [ 2809.272334][T22774] [<80578788>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2809.272390][T22774] Exception stack(0xea421fa8 to 0xea421ff0) [ 2809.272448][T22774] 1fa0: 00000000 00000000 00000003 00008955 00000000 00000000 [ 2809.272543][T22774] 1fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f7c0bc [ 2809.272579][T22774] 1fe0: 76f7bec0 76f7beb0 0001928c 00132970 [ 2809.272618][T22774] r10:00000036 r9:84f23c00 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 2809.272639][T22774] r4:00000000 [ 2809.305295][T22774] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2809.782879][ T29] kauditd_printk_skb: 282 callbacks suppressed [ 2809.783376][ T29] audit: type=1400 audit(3065.696:32005): avc: denied { ioctl } for pid=22785 comm="syz.1.4647" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x4111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2809.792922][ T29] audit: type=1400 audit(3065.706:32006): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.793379][ T29] audit: type=1400 audit(3065.706:32007): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.808698][ T29] audit: type=1400 audit(3065.706:32008): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.820692][ T29] audit: type=1400 audit(3065.736:32009): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.832992][ T29] audit: type=1400 audit(3065.746:32010): avc: denied { read } for pid=22785 comm="syz.1.4647" name="nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2809.852689][ T29] audit: type=1400 audit(3065.766:32011): avc: denied { read open } for pid=22785 comm="syz.1.4647" path="/dev/nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2809.865077][ T29] audit: type=1400 audit(3065.776:32012): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.865680][ T29] audit: type=1400 audit(3065.776:32013): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.942614][ T29] audit: type=1400 audit(3065.856:32014): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.831052][ T29] kauditd_printk_skb: 313 callbacks suppressed [ 2814.831421][ T29] audit: type=1400 audit(3070.746:32326): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.831651][ T29] audit: type=1400 audit(3070.746:32327): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.842870][ T29] audit: type=1400 audit(3070.756:32328): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.848231][ T29] audit: type=1400 audit(3070.756:32329): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.858363][ T29] audit: type=1400 audit(3070.766:32330): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.860421][ T29] audit: type=1400 audit(3070.776:32331): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.871753][ T29] audit: type=1400 audit(3070.786:32332): avc: denied { read write } for pid=22842 comm="syz.1.4666" dev="anon_inodefs" ino=53435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2814.881323][ T29] audit: type=1400 audit(3070.796:32333): avc: denied { read write open } for pid=22842 comm="syz.1.4666" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=53435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2814.963303][ T29] audit: type=1400 audit(3070.876:32334): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2815.010202][ T29] audit: type=1400 audit(3070.926:32335): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2817.002179][T22888] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2817.005559][T22888] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2817.069884][T22888] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2817.072128][T22888] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2817.213797][T22888] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2817.216502][T22888] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2817.228042][T22888] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2817.230788][T22888] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2817.238433][ T3788] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 2817.525889][ T3788] usb 2-1: config 1 has an invalid interface number: 7 but max is 0 [ 2817.526130][ T3788] usb 2-1: config 1 has no interface number 0 [ 2817.526526][ T3788] usb 2-1: config 1 interface 7 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 2817.526686][ T3788] usb 2-1: config 1 interface 7 altsetting 0 bulk endpoint 0xC has invalid maxpacket 1024 [ 2817.547831][ T3788] usb 2-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 2817.548252][ T3788] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2817.548296][ T3788] usb 2-1: Product: syz [ 2817.548344][ T3788] usb 2-1: Manufacturer: syz [ 2817.548383][ T3788] usb 2-1: SerialNumber: syz [ 2817.589199][T22887] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2817.604296][T22887] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2817.655165][ T3788] usb 2-1: Expected 3 endpoints, found: 2 [ 2817.861993][ T45] usb 2-1: USB disconnect, device number 70 [ 2819.150345][T22930] FAULT_INJECTION: forcing a failure. [ 2819.150345][T22930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2819.150798][T22930] CPU: 0 UID: 0 PID: 22930 Comm: syz.2.4692 Not tainted syzkaller #0 PREEMPT [ 2819.150895][T22930] Hardware name: ARM-Versatile Express [ 2819.150920][T22930] Call trace: [ 2819.150961][T22930] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2819.151294][T22930] r7:76f3cb58 r6:00000000 r5:60000013 r4:82252544 [ 2819.151388][T22930] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2819.151507][T22930] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2819.151868][T22930] r5:841b3c00 r4:8294f590 [ 2819.152093][T22930] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2819.152165][T22930] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 2819.152306][T22930] r8:b5003587 r7:76f3cb58 r6:76f3cb38 r5:eaa41f58 r4:76f3cb38 [ 2819.152330][T22930] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 2819.152398][T22930] [<80986ef4>] (should_fail_usercopy) from [<8026ad70>] (copy_siginfo_to_user+0x1c/0xa4) [ 2819.152605][T22930] [<8026ad54>] (copy_siginfo_to_user) from [<8022bb50>] (do_work_pending+0x378/0x4e8) [ 2819.153040][T22930] r9:fffffe00 r8:b5003587 r7:841b4430 r6:76f3cb38 r5:eaa41fb0 r4:841b3c00 [ 2819.153319][T22930] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 2819.153379][T22930] Exception stack(0xeaa41fb0 to 0xeaa41ff8) [ 2819.153420][T22930] 1fa0: 00000003 20000100 04000002 00000000 [ 2819.153461][T22930] 1fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f3d0bc [ 2819.153828][T22930] 1fe0: 76f3cec0 76f3ceb0 0001928c 0013296c 60000010 00000003 [ 2819.154113][T22930] r10:00000128 r9:841b3c00 r8:8020029c r7:00000128 r6:00130918 r5:00000000 [ 2819.154136][T22930] r4:00000000 [ 2819.605699][T22944] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2819.607126][T22944] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2819.839430][ T29] kauditd_printk_skb: 394 callbacks suppressed [ 2819.839803][ T29] audit: type=1400 audit(3075.756:32730): avc: denied { ioctl } for pid=22951 comm="syz.1.4699" path="socket:[53571]" dev="sockfs" ino=53571 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2819.842746][ T29] audit: type=1400 audit(3075.756:32731): avc: denied { module_request } for pid=22951 comm="syz.1.4699" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2819.856378][ T29] audit: type=1400 audit(3075.766:32732): avc: denied { create } for pid=22952 comm="syz.2.4698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2819.902002][ T29] audit: type=1400 audit(3075.816:32733): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2819.912995][ T29] audit: type=1400 audit(3075.826:32734): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2819.949891][ T29] audit: type=1400 audit(3075.866:32735): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2819.951577][ T29] audit: type=1400 audit(3075.866:32736): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2819.971856][ T29] audit: type=1400 audit(3075.886:32737): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2819.975756][ T29] audit: type=1400 audit(3075.886:32738): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2819.982496][ T29] audit: type=1400 audit(3075.886:32739): avc: denied { recv } for pid=2909 comm="klogd" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2821.630268][T22971] SELinux: Context system_u:object_r:getty_log_t:s0 is not valid (left unmapped). [ 2822.161971][T22979] FAULT_INJECTION: forcing a failure. [ 2822.161971][T22979] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2822.162922][T22979] CPU: 0 UID: 0 PID: 22979 Comm: syz.2.4707 Not tainted syzkaller #0 PREEMPT [ 2822.162992][T22979] Hardware name: ARM-Versatile Express [ 2822.163007][T22979] Call trace: [ 2822.163030][T22979] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2822.163096][T22979] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 2822.163107][T22979] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2822.163138][T22979] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2822.163168][T22979] r5:84021800 r4:8294f590 [ 2822.163177][T22979] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2822.163211][T22979] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 2822.163245][T22979] r8:76f3cf30 r7:00000000 r6:00000000 r5:eac71f68 r4:00000002 [ 2822.163255][T22979] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 2822.163278][T22979] [<80986ef4>] (should_fail_usercopy) from [<8059a064>] (simple_read_from_buffer+0x80/0x13c) [ 2822.163317][T22979] [<80599fe4>] (simple_read_from_buffer) from [<8061618c>] (proc_fail_nth_read+0xb8/0x108) [ 2822.163354][T22979] r10:00000001 r9:806160d4 r8:00000002 r7:eac71f68 r6:0000000f r5:76f3cf30 [ 2822.163367][T22979] r4:84021800 r3:eac71e9f [ 2822.163377][T22979] [<806160d4>] (proc_fail_nth_read) from [<8055f014>] (vfs_read+0x98/0x324) [ 2822.163412][T22979] r8:76f3cf30 r7:eac71f68 r6:84021800 r5:0000000f r4:84b89c00 [ 2822.163422][T22979] [<8055ef7c>] (vfs_read) from [<8055fd24>] (ksys_read+0x74/0xe8) [ 2822.163457][T22979] r10:00000003 r9:84021800 r8:8020029c r7:00000000 r6:00000000 r5:84b89c00 [ 2822.163467][T22979] r4:84b89c03 [ 2822.163476][T22979] [<8055fcb0>] (ksys_read) from [<8055fda8>] (sys_read+0x10/0x14) [ 2822.163508][T22979] r7:00000003 r6:00000004 r5:76f3cf30 r4:0000000f [ 2822.163517][T22979] [<8055fd98>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2822.163542][T22979] Exception stack(0xeac71fa8 to 0xeac71ff0) [ 2822.163562][T22979] 1fa0: 0000000f 76f3cf30 00000004 76f3cf30 0000000f 00000000 [ 2822.163580][T22979] 1fc0: 0000000f 76f3cf30 00000004 00000003 00300000 00000000 00006364 76f3d0bc [ 2822.163594][T22979] 1fe0: 00000158 76f3ced0 000d862c 0013083c [ 2824.868511][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 2824.868972][ T29] audit: type=1400 audit(3080.776:32950): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2824.884901][ T29] audit: type=1400 audit(3080.776:32949): avc: denied { unmount } for pid=21931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2824.885495][ T29] audit: type=1400 audit(3080.796:32951): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2824.924119][ T29] audit: type=1400 audit(3080.836:32952): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2824.924493][ T29] audit: type=1400 audit(3080.836:32953): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2824.981858][ T29] audit: type=1400 audit(3080.896:32954): avc: denied { recv } for pid=2905 comm="syslogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.012958][ T29] audit: type=1400 audit(3080.926:32955): avc: denied { recv } for pid=19568 comm="syz.1.3777" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.021704][ T29] audit: type=1400 audit(3080.936:32956): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.022225][ T29] audit: type=1400 audit(3080.936:32957): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.114523][ T29] audit: type=1400 audit(3081.026:32958): avc: denied { create } for pid=23000 comm="syz.2.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2830.103481][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 2830.103864][ T29] audit: type=1400 audit(3086.016:33067): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.119635][ T29] audit: type=1400 audit(3086.036:33068): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.153855][ T29] audit: type=1400 audit(3086.066:33069): avc: denied { recv } for pid=38 comm="kworker/u8:2" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.154251][ T29] audit: type=1400 audit(3086.066:33070): avc: denied { recv } for pid=38 comm="kworker/u8:2" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.172353][ T29] audit: type=1400 audit(3086.086:33071): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.175891][ T29] audit: type=1400 audit(3086.086:33072): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2830.179095][ T29] audit: type=1400 audit(3086.096:33073): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.194446][ T29] audit: type=1400 audit(3086.106:33074): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.195673][ T29] audit: type=1400 audit(3086.106:33075): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.206532][ T29] audit: type=1400 audit(3086.116:33076): avc: denied { read write open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.232998][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 2835.234704][ T29] audit: type=1400 audit(3091.146:33250): avc: denied { read write } for pid=23070 comm="syz.1.4736" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2835.240261][ T29] audit: type=1400 audit(3091.156:33251): avc: denied { read write open } for pid=23070 comm="syz.1.4736" path="/dev/vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2835.273326][ T29] audit: type=1400 audit(3091.186:33252): avc: denied { ioctl } for pid=23070 comm="syz.1.4736" path="/dev/vhost-net" dev="devtmpfs" ino=708 ioctlcmd=0xaf02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2835.308934][ T29] audit: type=1400 audit(3091.216:33253): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.312675][ T29] audit: type=1400 audit(3091.226:33254): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.362263][ T29] audit: type=1400 audit(3091.276:33255): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.364644][ T29] audit: type=1400 audit(3091.276:33256): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.368639][ T29] audit: type=1400 audit(3091.276:33257): avc: denied { open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.371668][ T29] audit: type=1400 audit(3091.276:33258): avc: denied { ioctl } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.374484][ T29] audit: type=1400 audit(3091.276:33259): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.593864][T23073] FAULT_INJECTION: forcing a failure. [ 2835.593864][T23073] name failslab, interval 1, probability 0, space 0, times 0 [ 2835.594395][T23073] CPU: 1 UID: 0 PID: 23073 Comm: syz.1.4737 Not tainted syzkaller #0 PREEMPT [ 2835.594484][T23073] Hardware name: ARM-Versatile Express [ 2835.594517][T23073] Call trace: [ 2835.594565][T23073] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2835.594912][T23073] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 2835.595000][T23073] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2835.595137][T23073] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2835.595323][T23073] r5:841b4800 r4:82918810 [ 2835.595479][T23073] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2835.595684][T23073] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 2835.595950][T23073] r8:841b4800 r7:00000000 r6:00000cc0 r5:8309f000 r4:830a7a80 [ 2835.596014][T23073] [<8052ef70>] (should_failslab) from [<8050f0bc>] (kmem_cache_alloc_lru_noprof+0x50/0x448) [ 2835.596121][T23073] [<8050f06c>] (kmem_cache_alloc_lru_noprof) from [<807590b8>] (debugfs_alloc_inode+0x24/0x28) [ 2835.596203][T23073] r10:00000000 r9:81d0d01c r8:841b4800 r7:81ccf150 r6:81cceb34 r5:8309f000 [ 2835.596342][T23073] r4:8503f198 [ 2835.596366][T23073] [<80759094>] (debugfs_alloc_inode) from [<8058592c>] (alloc_inode+0x24/0xcc) [ 2835.596724][T23073] [<80585908>] (alloc_inode) from [<805859e4>] (new_inode+0x10/0x68) [ 2835.596846][T23073] r7:81ccf150 r6:82ae0e48 r5:00008100 r4:8503f198 [ 2835.596902][T23073] [<805859d4>] (new_inode) from [<80759eb8>] (__debugfs_create_file+0xb0/0x208) [ 2835.597243][T23073] r9:81d0d01c r8:841b4800 r7:81ccf150 r6:82ae0e48 r5:00008100 r4:8503f198 [ 2835.597275][T23073] [<80759e08>] (__debugfs_create_file) from [<8075a040>] (debugfs_create_file_full+0x30/0x38) [ 2835.597462][T23073] r10:841b4800 r9:00000001 r8:00000001 r7:8193b138 r6:00000001 r5:00000001 [ 2835.597626][T23073] r4:84eed350 [ 2835.597939][T23073] [<8075a010>] (debugfs_create_file_full) from [<8098f110>] (ref_tracker_dir_debugfs+0xe4/0x188) [ 2835.598232][T23073] [<8098f02c>] (ref_tracker_dir_debugfs) from [<8158609c>] (alloc_netdev_mqs+0xc4/0x4ac) [ 2835.598337][T23073] r5:00000001 r4:84eed000 [ 2835.598357][T23073] [<81585fd8>] (alloc_netdev_mqs) from [<819396bc>] (vlan_ioctl_handler+0x3a8/0x49c) [ 2835.598426][T23073] r10:841b4800 r9:00000001 r8:8591e800 r7:84e24b00 r6:00000003 r5:00000003 [ 2835.598448][T23073] r4:00000000 [ 2835.598466][T23073] [<81939314>] (vlan_ioctl_handler) from [<81557a0c>] (sock_ioctl+0x1f8/0x600) [ 2835.598529][T23073] r9:00000003 r8:84d41600 r7:851aac80 r6:84e24b00 r5:20000800 r4:82c2c204 [ 2835.598550][T23073] [<81557814>] (sock_ioctl) from [<805788b8>] (sys_ioctl+0x130/0xba0) [ 2835.598614][T23073] r9:00000003 r8:84d41600 r7:20000800 r6:84d41601 r5:00000000 r4:00008982 [ 2835.598656][T23073] [<80578788>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2835.598712][T23073] Exception stack(0xeba09fa8 to 0xeba09ff0) [ 2835.598751][T23073] 9fa0: 00000000 00000000 00000003 00008982 20000800 00000000 [ 2835.598787][T23073] 9fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f7c0bc [ 2835.598815][T23073] 9fe0: 76f7bec0 76f7beb0 0001928c 00132970 [ 2835.598878][T23073] r10:00000036 r9:841b4800 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 2835.598901][T23073] r4:00000000 [ 2835.680997][T23073] debugfs: out of free dentries, can not create file 'netdev@84eed350' [ 2839.794352][T23094] FAULT_INJECTION: forcing a failure. [ 2839.794352][T23094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2839.794931][T23094] CPU: 1 UID: 0 PID: 23094 Comm: syz.1.4742 Not tainted syzkaller #0 PREEMPT [ 2839.795025][T23094] Hardware name: ARM-Versatile Express [ 2839.795061][T23094] Call trace: [ 2839.795112][T23094] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2839.795330][T23094] r7:00000000 r6:00000000 r5:60000113 r4:82252544 [ 2839.795464][T23094] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2839.795573][T23094] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2839.795661][T23094] r5:84f24800 r4:82918864 [ 2839.795729][T23094] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2839.795914][T23094] [<80986cb4>] (should_fail_ex) from [<8052f06c>] (should_fail_alloc_page+0x68/0x74) [ 2839.796066][T23094] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:eba81de8 [ 2839.796247][T23094] [<8052f004>] (should_fail_alloc_page) from [<804f712c>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 2839.796428][T23094] [<804f7098>] (prepare_alloc_pages.constprop.0) from [<804ff6f4>] (__alloc_frozen_pages_noprof+0xac/0x1104) [ 2839.796543][T23094] r10:eba81fb0 r9:00000000 r8:84f24800 r7:00000040 r6:00140cca r5:84f24800 [ 2839.796572][T23094] r4:00000000 r3:eba81de8 [ 2839.796624][T23094] [<804ff648>] (__alloc_frozen_pages_noprof) from [<805007c0>] (__folio_alloc_noprof+0x14/0x6c) [ 2839.796698][T23094] r10:eba81fb0 r9:8656ed00 r8:00000001 r7:00000040 r6:76f7ae84 r5:84f24800 [ 2839.796724][T23094] r4:00001255 [ 2839.796743][T23094] [<805007ac>] (__folio_alloc_noprof) from [<804d09a4>] (handle_mm_fault+0xcec/0x14e0) [ 2839.796845][T23094] r5:84f24800 r4:00001255 [ 2839.796890][T23094] [<804cfcb8>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 2839.796960][T23094] r10:00000002 r9:85b49040 r8:00000255 r7:84f24800 r6:00000a07 r5:76f7ae84 [ 2839.796983][T23094] r4:eba81fb0 [ 2839.797002][T23094] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 2839.797067][T23094] r10:00006364 r9:00000000 r8:80234128 r7:eba81fb0 r6:76f7ae84 r5:00000a07 [ 2839.797088][T23094] r4:8281d0c8 [ 2839.797107][T23094] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 2839.797151][T23094] Exception stack(0xeba81fb0 to 0xeba81ff8) [ 2839.797184][T23094] 1fa0: 200000c0 00000003 00000000 00000000 [ 2839.797217][T23094] 1fc0: 0001bcb4 200000c0 00000000 00189790 00300000 00000000 00006364 76f7c0bc [ 2839.797246][T23094] 1fe0: 00000000 76f7ae80 0001926c 0001bcc0 20000010 ffffffff [ 2839.797283][T23094] r8:826b8044 r7:84f24800 r6:ffffffff r5:20000010 r4:0001bcc0 [ 2839.867188][T23094] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 2840.245443][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 2840.246071][ T29] audit: type=1400 audit(3096.156:33358): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.288667][ T29] audit: type=1400 audit(3096.196:33359): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.289815][ T29] audit: type=1400 audit(3096.196:33360): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.319823][ T29] audit: type=1400 audit(3096.206:33361): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.320348][ T29] audit: type=1400 audit(3096.226:33362): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.320740][ T29] audit: type=1400 audit(3096.236:33363): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.320967][ T29] audit: type=1400 audit(3096.236:33364): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2840.344283][ T29] audit: type=1400 audit(3096.256:33365): avc: denied { create } for pid=23093 comm="syz.1.4742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2840.461181][ T29] audit: type=1400 audit(3096.376:33366): avc: denied { create } for pid=23096 comm="syz.2.4743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2840.481890][ T29] audit: type=1400 audit(3096.396:33367): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2845.026080][T23128] FAULT_INJECTION: forcing a failure. [ 2845.026080][T23128] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.026569][T23128] CPU: 1 UID: 0 PID: 23128 Comm: syz.2.4754 Not tainted syzkaller #0 PREEMPT [ 2845.026671][T23128] Hardware name: ARM-Versatile Express [ 2845.026705][T23128] Call trace: [ 2845.026751][T23128] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2845.027080][T23128] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 2845.027445][T23128] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2845.027537][T23128] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2845.027791][T23128] r5:83b42400 r4:82918810 [ 2845.027817][T23128] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 2845.027931][T23128] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 2845.028047][T23128] r8:83b42400 r7:00000000 r6:00000cc0 r5:8291b72c r4:830a4cc0 [ 2845.028071][T23128] [<8052ef70>] (should_failslab) from [<8050ec74>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 2845.028141][T23128] [<8050ec28>] (kmem_cache_alloc_noprof) from [<805618ac>] (alloc_empty_file+0x54/0x13c) [ 2845.028216][T23128] r10:00000142 r9:864f6000 r8:82805cc0 r7:8410d600 r6:00000002 r5:8291b72c [ 2845.028317][T23128] r4:82457898 [ 2845.028337][T23128] [<80561858>] (alloc_empty_file) from [<805741c8>] (path_openat+0x40/0x1150) [ 2845.028407][T23128] r8:ebcade58 r7:ebcade58 r6:ebcadf20 r5:83b42400 r4:ffffff9c [ 2845.028427][T23128] [<80574188>] (path_openat) from [<80575384>] (do_filp_open+0xac/0x148) [ 2845.028488][T23128] r10:00000142 r9:864f6000 r8:00000001 r7:ebcade58 r6:ebcadf20 r5:83b42400 [ 2845.028511][T23128] r4:ffffff9c [ 2845.028529][T23128] [<805752d8>] (do_filp_open) from [<8055bf54>] (do_sys_openat2+0x90/0xe0) [ 2845.028593][T23128] r9:83b42400 r8:8020029c r7:ffffff9c r6:ebcadf58 r5:864f6000 r4:00000005 [ 2845.028612][T23128] [<8055bec4>] (do_sys_openat2) from [<8055c37c>] (sys_openat+0x98/0xd4) [ 2845.028711][T23128] r7:00000142 r6:00130918 r5:20000000 r4:ffffff9c [ 2845.028843][T23128] [<8055c2e4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2845.029054][T23128] Exception stack(0xebcadfa8 to 0xebcadff0) [ 2845.029347][T23128] dfa0: 00000000 00000000 ffffff9c 20000000 00000002 00000000 [ 2845.029658][T23128] dfc0: 00000000 00000000 00130918 00000142 00300000 00000000 00006364 76f3d0bc [ 2845.029693][T23128] dfe0: 76f3cec0 76f3ceb0 0001928c 00132970 [ 2845.029721][T23128] r5:00000000 r4:00000000 [ 2845.269206][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 2845.269543][ T29] audit: type=1400 audit(3101.176:33529): avc: denied { create } for pid=23130 comm="syz.2.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2845.284905][ T29] audit: type=1400 audit(3101.196:33530): avc: denied { write } for pid=23130 comm="syz.2.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2845.814641][ T29] audit: type=1400 audit(3101.726:33531): avc: denied { create } for pid=23130 comm="syz.2.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2845.929709][ T29] audit: type=1400 audit(3101.826:33532): avc: denied { write } for pid=23130 comm="syz.2.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2846.006915][ T29] audit: type=1400 audit(3101.916:33533): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2846.010050][ T29] audit: type=1400 audit(3101.916:33534): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2846.015988][ T29] audit: type=1400 audit(3101.926:33535): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2846.023576][ T29] audit: type=1400 audit(3101.936:33536): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2846.032947][ T29] audit: type=1400 audit(3101.946:33537): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2846.044580][ T29] audit: type=1400 audit(3101.956:33538): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.288362][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 2850.290616][ T29] audit: type=1400 audit(3106.196:33658): avc: denied { read write open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2850.292043][ T29] audit: type=1400 audit(3106.196:33659): avc: denied { ioctl } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2850.465705][ T29] audit: type=1400 audit(3106.376:33660): avc: denied { read } for pid=23149 comm="syz.2.4762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2850.516290][ T29] audit: type=1400 audit(3106.426:33661): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.534748][ T29] audit: type=1400 audit(3106.446:33662): avc: denied { recv } for pid=18852 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.571446][ T29] audit: type=1400 audit(3106.486:33663): avc: denied { recv } for pid=23089 comm="syz.1.4741" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.573621][ T29] audit: type=1400 audit(3106.486:33664): avc: denied { recv } for pid=23089 comm="syz.1.4741" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.580344][ T29] audit: type=1400 audit(3106.496:33665): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.590936][ T29] audit: type=1400 audit(3106.506:33666): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2850.591390][ T29] audit: type=1400 audit(3106.506:33667): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.311898][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 2855.312280][ T29] audit: type=1400 audit(3111.226:33743): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.312518][ T29] audit: type=1400 audit(3111.226:33744): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.329991][ T29] audit: type=1400 audit(3111.236:33745): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.341065][ T29] audit: type=1400 audit(3111.256:33746): avc: denied { recv } for pid=23089 comm="syz.1.4741" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.345174][ T29] audit: type=1400 audit(3111.256:33747): avc: denied { recv } for pid=23089 comm="syz.1.4741" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.370732][ T29] audit: type=1400 audit(3111.286:33748): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.371974][ T29] audit: type=1400 audit(3111.286:33749): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2855.482276][ T29] audit: type=1400 audit(3111.396:33750): avc: denied { read write } for pid=18852 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2855.528067][ T29] audit: type=1400 audit(3111.436:33751): avc: denied { read write open } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2855.528337][ T29] audit: type=1400 audit(3111.436:33752): avc: denied { ioctl } for pid=18852 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2859.640104][T23188] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23188 comm=syz.1.4776 [ 2860.613044][ T29] kauditd_printk_skb: 110 callbacks suppressed [ 2860.617384][ T29] audit: type=1400 audit(3116.526:33863): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.631316][ T29] audit: type=1400 audit(3116.536:33864): avc: denied { recv } for pid=21931 comm="syz-executor" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.663574][ T29] audit: type=1400 audit(3116.576:33865): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.663975][ T29] audit: type=1400 audit(3116.576:33866): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.671376][ T29] audit: type=1400 audit(3116.586:33867): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.680748][ T29] audit: type=1400 audit(3116.596:33868): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=10.0.2.2 src=49456 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.691800][ T29] audit: type=1400 audit(3116.606:33869): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44494 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.692302][ T29] audit: type=1400 audit(3116.606:33870): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=44494 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2860.803496][ T29] audit: type=1400 audit(3116.716:33871): avc: denied { create } for pid=23195 comm="syz.2.4778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2860.833107][ T29] audit: type=1400 audit(3116.746:33872): avc: denied { setopt } for pid=23195 comm="syz.2.4778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2862.839255][ T38] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2862.929080][ T38] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2862.989306][ T38] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2863.069762][ T38] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2863.398923][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2863.406823][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2863.415959][ T38] bond0 (unregistering): Released all slaves [ 2863.519946][ T38] hsr_slave_0: left promiscuous mode [ 2863.526125][ T38] hsr_slave_1: left promiscuous mode [ 2863.553799][ T38] veth1_macvtap: left promiscuous mode [ 2863.554320][ T38] veth0_macvtap: left promiscuous mode [ 2863.554547][ T38] veth1_vlan: left promiscuous mode [ 2863.554695][ T38] veth0_vlan: left promiscuous mode [ 2864.541160][ T38] ------------[ cut here ]------------ [ 2864.541747][ T38] WARNING: CPU: 1 PID: 38 at net/xfrm/xfrm_state.c:3306 xfrm_state_fini+0xd4/0x15c [ 2864.543910][ T38] Modules linked in: [ 2864.544931][ T38] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2864.545451][ T38] CPU: 1 UID: 0 PID: 38 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT [ 2864.545811][ T38] Hardware name: ARM-Versatile Express [ 2864.546206][ T38] Workqueue: netns cleanup_net [ 2864.546536][ T38] Call trace: [ 2864.547677][ T38] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2864.548950][ T38] r7:822407e0 r6:8381a400 r5:00000000 r4:82252544 [ 2864.549422][ T38] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 2864.549894][ T38] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2864.550377][ T38] r5:00000000 r4:82a78d18 [ 2864.551038][ T38] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 2864.551522][ T38] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 2864.551954][ T38] r7:81820878 [ 2864.552241][ T38] [<80202800>] (panic) from [<80252948>] (get_taint+0x0/0x1c) [ 2864.552629][ T38] r3:8280c684 r2:00000001 r1:82238d44 r0:822407e0 [ 2864.552952][ T38] [<802528d0>] (check_panic_on_warn) from [<80252aac>] (__warn+0x80/0x188) [ 2864.553355][ T38] [<80252a2c>] (__warn) from [<80252d2c>] (warn_slowpath_fmt+0x178/0x1f4) [ 2864.553762][ T38] r8:00000009 r7:8242ef08 r6:df8f9dd4 r5:8381a400 r4:00000000 [ 2864.554089][ T38] [<80252bb8>] (warn_slowpath_fmt) from [<81820878>] (xfrm_state_fini+0xd4/0x15c) [ 2864.554529][ T38] r10:00000001 r9:00000001 r8:829de39c r7:829f04d0 r6:829de39c r5:84e24b00 [ 2864.554888][ T38] r4:84e24b00 [ 2864.555075][ T38] [<818207a4>] (xfrm_state_fini) from [<81812cec>] (xfrm_net_exit+0x2c/0x40) [ 2864.555539][ T38] r5:84e24b00 r4:84e24b00 [ 2864.555794][ T38] [<81812cc0>] (xfrm_net_exit) from [<81577400>] (ops_undo_list+0xe8/0x238) [ 2864.556383][ T38] r5:84e24b00 r4:df8f9e98 [ 2864.556620][ T38] [<81577318>] (ops_undo_list) from [<81579598>] (cleanup_net+0x220/0x3a0) [ 2864.557312][ T38] r10:00000000 r9:ffffffd4 r8:84e25a00 r7:829de380 r6:829de358 r5:82c2c240 [ 2864.558386][ T38] r4:84e24b20 [ 2864.558577][ T38] [<81579378>] (cleanup_net) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2864.559262][ T38] r10:8300f470 r9:8301c815 r8:8381a400 r7:8300e600 r6:8301c800 r5:829de370 [ 2864.559674][ T38] r4:8332a880 [ 2864.559854][ T38] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2864.560302][ T38] r10:61c88647 r9:8381a400 r8:8332a8ac r7:82804d40 r6:8300e600 r5:8300e620 [ 2864.560752][ T38] r4:8332a880 [ 2864.560971][ T38] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2864.561412][ T38] r10:00000000 r9:8332a880 r8:80278fec r7:df8e1e60 r6:8332ab80 r5:8381a400 [ 2864.561856][ T38] r4:00000001 [ 2864.562038][ T38] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2864.562421][ T38] Exception stack(0xdf8f9fb0 to 0xdf8f9ff8) [ 2864.562706][ T38] 9fa0: 00000000 00000000 00000000 00000000 [ 2864.563096][ T38] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2864.563762][ T38] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2864.564096][ T38] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2864.564499][ T38] r4:8333b180 [ 2864.566920][ T38] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:30:46 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82252544 R02=00000001 R03=81a61310 R04=00000006 R05=828f7e48 R06=00000000 R07=828f7e40 R08=841b1800 R09=00000028 R10=828f7e48 R11=df801eb4 R12=df801eb8 R13=df801ea8 R14=8033dd04 R15=81a61320 PSR=200b0193 --C- A S svc32 s00=74736f68 s01=656d616e d00=656d616e74736f68 s02=00000000 s03=00000000 d01=0000000000000000 s04=00f10000 s05=00f10000 d02=00f1000000f10000 s06=00000000 s07=00000000 d03=0000000000000000 s08=c0300001 s09=00000000 d04=00000000c0300001 s10=00000000 s11=00000000 d05=0000000000000000 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84072040 R01=0000003c R02=ead9b000 R03=ead9b018 R04=82abc137 R05=84072040 R06=80a8efac R07=82abc159 R08=82827128 R09=00000000 R10=00002e75 R11=df8f9aa0 R12=00000002 R13=df8f9a94 R14=82959484 R15=80a8efbc PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000