last executing test programs: 39.527643146s ago: executing program 1 (id=7151): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x7, {0x1, 0xff, 0x1}, 0xfe}, 0x18) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, 0x0, 0x0) sendto$llc(r0, 0x0, 0x0, 0x10000001, &(0x7f0000000400)={0x1a, 0x20, 0x5, 0x7, 0x7, 0x1, @random="886e8987e309"}, 0x10) 38.946010735s ago: executing program 1 (id=7152): r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000080)={0x0, 0x0, 0xc}) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000480)=0x8, 0x4) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x400, 0x70bd29, 0x25dfdbfc, {0x0, 0x1}, [""]}, 0x18}}, 0x4014) fcntl$setpipe(r1, 0x407, 0x2) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000005c0)={0xb, 0x0, 0x5, 0x9, 0x8, 0x8000}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f0000000600)) r3 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000640), 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_FLUSH(r3, &(0x7f0000000840)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)={0xdc, r4, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x456e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x326}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x66}]}, @TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x800}, 0x82) recvmsg$inet_nvme(r3, &(0x7f0000002080)={&(0x7f0000000880)=@x25, 0x80, &(0x7f0000001000)=[{&(0x7f0000000900)=""/8, 0x8}, {&(0x7f0000000940)=""/246, 0xf6}, {&(0x7f0000000a40)=""/228, 0xe4}, {&(0x7f0000000b40)=""/137, 0x89}, {&(0x7f0000000c00)=""/161, 0xa1}, {&(0x7f0000000cc0)=""/130, 0x82}, {&(0x7f0000000d80)=""/162, 0xa2}, {&(0x7f0000000e40)=""/180, 0xb4}, {&(0x7f0000000f00)=""/203, 0xcb}], 0x9, &(0x7f0000001080)=""/4096, 0x1000}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000020c0)=0x10000, 0x4) r6 = openat$vhost_vsock(0xffffff9c, &(0x7f0000002100), 0x2, 0x0) ioctl$IOMMU_TEST_OP_MD_CHECK_REFS(r3, 0x3ba0, &(0x7f0000002180)={0x48, 0x4, 0x0, 0x0, 0x2c, &(0x7f0000002140)="60fe67ab3342820714546d5b045e4b4662076839365df2bb5b2b0388d8039ab4a6348e3f8a845ea6ce7d1056", 0xffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000002200)={{{@in=@private, @in=@private}}, {{@in6=@private0}, 0x0, @in6=@empty}}, &(0x7f0000002300)=0xe8) recvfrom(r3, &(0x7f0000002340)=""/4096, 0x1000, 0x40000000, &(0x7f0000003340)=@ieee802154={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x80) openat$cgroup_subtree(r3, &(0x7f00000033c0), 0x2, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000003400)=""/224) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003540), r3) sendmsg$NL80211_CMD_DEL_PMK(r3, &(0x7f0000003600)={&(0x7f0000003500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000035c0)={&(0x7f0000003580)={0x2c, r7, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x3d}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x4000000) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000003640), &(0x7f0000003680)={'L-', 0x400}, 0x16, 0x1) ioctl$FITHAW(r2, 0xc0045878) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f00000036c0)=0xfffffffffffffffe, 0x4) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000003700)=0x4) ioctl$SIOCGETVIFCNT(r3, 0x89e0, &(0x7f0000003740)={0xffffffffffffffff}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 38.129279469s ago: executing program 1 (id=7153): r0 = socket(0xa, 0x5, 0x6) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[], 0x33fe0}}, 0x10) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x7988}, 0x1, 0x0, 0x0, 0x4000891}, 0x4000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r3, 0x7, {0x0, 0xff, 0x1}}, 0x18) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@getqdisc={0x24, 0x26, 0x300, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xffff, 0xe}, {0x3, 0x1}, {0x9, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x10020002}, 0x40) sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, 0x0, 0x100, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8011}, 0x0) openat$mixer(0xffffff9c, &(0x7f0000000080), 0x400, 0x0) ioctl$IOMMU_TEST_OP_ADD_RESERVED(r1, 0x3ba0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) timer_create(0x1, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 36.426066072s ago: executing program 1 (id=7154): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="014b00004000000000f70100000004"], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xc8, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x1}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x88}, 0x20040800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9f, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0xa0, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000480)={'ip6tnl0\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x29, 0x2, 0xfe, 0x1, 0x0, @mcast2, @mcast1, 0x700, 0x8, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'batadv_slave_0\x00', 0x0}) r5 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000380)={0x1d, r6, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x11) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xe8, r1, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x3b}, @ETHTOOL_A_EEE_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40048c0}, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe2(&(0x7f0000001680)={0xffffffffffffffff}, 0x0) dup2(r7, r8) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004051) 36.058652237s ago: executing program 1 (id=7155): r0 = socket(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f00000003c0), 0x2001, 0x0) close_range(r1, r1, 0x2) openat$mixer(0xffffff9c, &(0x7f0000000080), 0x62041, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000000c0)) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x840}, 0x20000840) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x400c084) close_range(r0, r0, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={&(0x7f0000000140)="a5dbf756dc744658b922a6e45d2966540b039fada9030130cfc1cfeb6ebe06d592d6ad1abd41602e04e2fbd05dc6ee962580540c43661d0afc9a2a1673c6c656978a1a24d5fdac6cf71c2a9853fbc6b6161e57110c171898d5b78209858ee8581c06debf4fede9e744a40dbe29d9092e56fe2b98de6b", &(0x7f0000000240)="74f3397f31ecac7eb0685b7f0045090629fc877fc5904dda23f6638836eddb4ef8331a8dcbdd2cedb2a709ac2f9edd03a6a3adf0737848355ac921099b6c29ebc8c86a04185b47e9110366ce649ec71b7e861691742bf16e3968d7004c835b435f79abc66e7007ae96717185835e06fdbbefa40d56f7e420751d0f44115a6a512d772d4da959657467591edea211b6a36ae54cf5e4f650d9b6524bc5edf25cf7fee93d29b1e0becf2e119ad850b4e318e937096baf802cee186edc12a59582276500e1ffcee52905c238"}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x80) close_range(r2, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4004044) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 33.270690651s ago: executing program 1 (id=7156): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x7, {0x1, 0xff, 0x1}, 0xfe}, 0x18) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, 0x0, 0x0) sendto$llc(r0, 0x0, 0x0, 0x10000001, &(0x7f0000000400)={0x1a, 0x20, 0x5, 0x7, 0x7, 0x1, @random="886e8987e309"}, 0x10) 2.901084547s ago: executing program 0 (id=7176): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x42}}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x48}}, 0x400400c0) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd2b, 0x2, {0x0, 0x0, 0x0, r6, {0x0, 0x2}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flow={{0x9}, {0x14, 0x2, [@TCA_FLOW_ADDEND={0x8, 0x5, 0x2}, @TCA_FLOW_KEYS={0x8, 0x1, 0x1e3a9}]}}]}, 0x44}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYRES32=0x0], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) 2.090018461s ago: executing program 0 (id=7177): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x8, 0x6, &(0x7f0000006680)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) fstat(r0, &(0x7f0000000180)) 1.468443882s ago: executing program 0 (id=7178): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1e}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0xc, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x80) dup3(r0, r1, 0x80000) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x10022, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x25dfdbfe, {0x2, 0x20, 0x10, 0x0, 0xfd, 0x4, 0xfe, 0x2, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x20004090) 893.64805ms ago: executing program 0 (id=7179): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/slabinfo\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000f40)=""/171, 0xab, 0x27) 370.065635ms ago: executing program 0 (id=7180): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0xd0f, 0x70bd29, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffe0, 0xa}, {0x1, 0x10}}}, 0x24}, 0x1, 0x0, 0x0, 0x55}, 0x4000) 0s ago: executing program 0 (id=7181): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x401, 0x10000, 0x4, 0x5, 0xcc7, 0x8, 0x7, 0xa, 0x100, 0x2, 0x1, 0x1, 0x1, 0x6, 0x101, 0x0, 0x1a449, 0x48b3, 0x40000003, 0x89, 0xcaa7, 0x0, 0x20001e5a, 0xb, 0xe69, 0x3c, 0x2000008, 0x6, 0x0, 0xfffffff8]}) kernel console output (not intermixed with test programs): permissive=1 [ 5533.846149][ T29] audit: type=1400 audit(1546423824.879:96795): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5533.867506][ T29] audit: type=1400 audit(1546423824.909:96796): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5533.897711][ T29] audit: type=1400 audit(1546423824.939:96797): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5533.916893][ T29] audit: type=1400 audit(1546423824.959:96798): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5533.947482][ T29] audit: type=1400 audit(1546423824.989:96799): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5533.971778][ T29] audit: type=1400 audit(1546423825.009:96800): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5534.004515][ T29] audit: type=1400 audit(1546423825.049:96801): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5534.038215][ T29] audit: type=1400 audit(1546423825.079:96802): avc: denied { write } for pid=30760 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5539.123707][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 5539.124094][ T29] audit: type=1400 audit(1546423830.169:96904): avc: denied { write } for pid=30782 comm="syz.0.6871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5539.631901][ T29] audit: type=1400 audit(1546423830.679:96905): avc: denied { create } for pid=30782 comm="syz.0.6871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5539.768990][ T29] audit: type=1400 audit(1546423830.809:96906): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5539.776161][ T29] audit: type=1400 audit(1546423830.819:96907): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5539.803726][ T29] audit: type=1400 audit(1546423830.839:96908): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5540.056401][ T29] audit: type=1400 audit(1546423831.099:96909): avc: denied { read } for pid=30787 comm="syz.1.6872" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5540.070124][ T29] audit: type=1400 audit(1546423831.099:96910): avc: denied { read open } for pid=30787 comm="syz.1.6872" path="net:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5540.076895][ T29] audit: type=1400 audit(1546423831.119:96911): avc: denied { create } for pid=30787 comm="syz.1.6872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5540.092001][ T29] audit: type=1400 audit(1546423831.139:96912): avc: denied { write } for pid=30787 comm="syz.1.6872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5540.114047][ T29] audit: type=1400 audit(1546423831.149:96913): avc: denied { read } for pid=30787 comm="syz.1.6872" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5544.146926][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 5544.155391][ T29] audit: type=1400 audit(1546423835.189:96968): avc: denied { read } for pid=30804 comm="syz.0.6877" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5544.170494][ T29] audit: type=1400 audit(1546423835.209:96969): avc: denied { read open } for pid=30804 comm="syz.0.6877" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5544.196840][ T29] audit: type=1400 audit(1546423835.239:96970): avc: denied { create } for pid=30804 comm="syz.0.6877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5544.235281][ T29] audit: type=1400 audit(1546423835.279:96971): avc: denied { write } for pid=30804 comm="syz.0.6877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5544.238938][ T29] audit: type=1400 audit(1546423835.279:96972): avc: denied { read } for pid=30804 comm="syz.0.6877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5544.242383][ T29] audit: type=1400 audit(1546423835.279:96973): avc: denied { read } for pid=30804 comm="syz.0.6877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5544.276701][ T29] audit: type=1400 audit(1546423835.319:96974): avc: denied { write } for pid=30804 comm="syz.0.6877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5544.286472][ T29] audit: type=1400 audit(1546423835.329:96975): avc: denied { module_request } for pid=30804 comm="syz.0.6877" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5544.687988][ T29] audit: type=1400 audit(1546423835.729:96976): avc: denied { read } for pid=30804 comm="syz.0.6877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5544.719226][ T29] audit: type=1400 audit(1546423835.759:96977): avc: denied { ioctl } for pid=30804 comm="syz.0.6877" path="socket:[76361]" dev="sockfs" ino=76361 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5549.167864][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 5549.168257][ T29] audit: type=1400 audit(1546423840.209:97174): avc: denied { read } for pid=30828 comm="syz.0.6880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5549.549251][ T29] audit: type=1400 audit(1546423840.589:97175): avc: denied { create } for pid=30827 comm="syz.1.6879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5550.743957][ T29] audit: type=1400 audit(1546423841.789:97176): avc: denied { read } for pid=30834 comm="syz.0.6881" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5550.747119][ T29] audit: type=1400 audit(1546423841.789:97177): avc: denied { read open } for pid=30834 comm="syz.0.6881" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5550.751411][ T29] audit: type=1400 audit(1546423841.789:97178): avc: denied { create } for pid=30834 comm="syz.0.6881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5550.863666][ T29] audit: type=1400 audit(1546423841.899:97179): avc: denied { module_request } for pid=30834 comm="syz.0.6881" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5551.040357][ T29] audit: type=1400 audit(1546423842.079:97180): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5551.054132][ T29] audit: type=1400 audit(1546423842.099:97181): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5551.071328][ T29] audit: type=1400 audit(1546423842.119:97182): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5551.390225][ T29] audit: type=1400 audit(1546423842.429:97183): avc: denied { create } for pid=30834 comm="syz.0.6881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5554.225100][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 5554.230016][ T29] audit: type=1400 audit(1546423845.269:97223): avc: denied { getopt } for pid=30849 comm="syz.0.6884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5554.415560][ T29] audit: type=1400 audit(1546423845.459:97224): avc: denied { create } for pid=30852 comm="syz.1.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5554.436702][ T29] audit: type=1400 audit(1546423845.479:97225): avc: denied { read } for pid=30852 comm="syz.1.6885" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5554.448157][ T29] audit: type=1400 audit(1546423845.489:97226): avc: denied { read open } for pid=30852 comm="syz.1.6885" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5554.463352][ T29] audit: type=1400 audit(1546423845.509:97227): avc: denied { ioctl } for pid=30852 comm="syz.1.6885" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x5403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5554.476354][ T29] audit: type=1400 audit(1546423845.519:97228): avc: denied { create } for pid=30852 comm="syz.1.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5554.494923][ T29] audit: type=1400 audit(1546423845.539:97229): avc: denied { write } for pid=30852 comm="syz.1.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5554.507499][ T29] audit: type=1400 audit(1546423845.549:97230): avc: denied { read } for pid=30852 comm="syz.1.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5555.030527][ T29] audit: type=1400 audit(1546423846.069:97231): avc: denied { read } for pid=30852 comm="syz.1.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5555.035626][ T29] audit: type=1400 audit(1546423846.079:97232): avc: denied { read } for pid=30852 comm="syz.1.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5559.598188][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 5559.598954][ T29] audit: type=1400 audit(1546423850.639:97291): avc: denied { write } for pid=30872 comm="syz.0.6890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5560.327998][ T29] audit: type=1400 audit(1546423851.369:97292): avc: denied { create } for pid=30876 comm="syz.0.6891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5560.347003][ T29] audit: type=1400 audit(1546423851.389:97293): avc: denied { read } for pid=30876 comm="syz.0.6891" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5560.364368][ T29] audit: type=1400 audit(1546423851.409:97294): avc: denied { read open } for pid=30876 comm="syz.0.6891" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5560.369147][ T29] audit: type=1400 audit(1546423851.409:97295): avc: denied { ioctl } for pid=30876 comm="syz.0.6891" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x5403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5560.382314][ T29] audit: type=1400 audit(1546423851.429:97296): avc: denied { create } for pid=30876 comm="syz.0.6891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5560.395745][ T29] audit: type=1400 audit(1546423851.439:97297): avc: denied { write } for pid=30876 comm="syz.0.6891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5560.405142][ T29] audit: type=1400 audit(1546423851.449:97298): avc: denied { read } for pid=30876 comm="syz.0.6891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5560.806460][ T29] audit: type=1400 audit(1546423851.849:97299): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5560.823246][ T29] audit: type=1400 audit(1546423851.869:97300): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5564.615235][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 5564.615815][ T29] audit: type=1400 audit(1546423855.659:97392): avc: denied { ioctl } for pid=30897 comm="syz.0.6900" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5564.621854][ T29] audit: type=1400 audit(1546423855.659:97393): avc: denied { bind } for pid=30897 comm="syz.0.6900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5564.632497][ T29] audit: type=1400 audit(1546423855.679:97394): avc: denied { setattr } for pid=30897 comm="syz.0.6900" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5564.634833][ T29] audit: type=1400 audit(1546423855.679:97395): avc: denied { write } for pid=30893 comm="syz.1.6898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5564.646217][ T29] audit: type=1400 audit(1546423855.689:97396): avc: denied { read } for pid=30897 comm="syz.0.6900" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5564.649232][ T29] audit: type=1400 audit(1546423855.689:97397): avc: denied { read open } for pid=30897 comm="syz.0.6900" path="/dev/dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5564.715577][ T29] audit: type=1400 audit(1546423855.759:97398): avc: denied { create } for pid=30893 comm="syz.1.6898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5564.946573][ T29] audit: type=1400 audit(1546423855.989:97399): avc: denied { create } for pid=30900 comm="syz.0.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5564.964768][ T29] audit: type=1400 audit(1546423856.009:97400): avc: denied { ioctl } for pid=30900 comm="syz.0.6901" path="socket:[77476]" dev="sockfs" ino=77476 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5564.980766][ T29] audit: type=1400 audit(1546423856.029:97401): avc: denied { write } for pid=30900 comm="syz.0.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5569.621403][ T29] kauditd_printk_skb: 136 callbacks suppressed [ 5569.621816][ T29] audit: type=1400 audit(1546423860.659:97538): avc: denied { module_request } for pid=30928 comm="syz.1.6911" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5569.699189][ T29] audit: type=1400 audit(1546423860.739:97539): avc: denied { create } for pid=30930 comm="syz.0.6912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5569.780051][ T29] audit: type=1400 audit(1546423860.789:97540): avc: denied { create } for pid=30930 comm="syz.0.6912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5569.914182][ T29] audit: type=1400 audit(1546423860.959:97541): avc: denied { read } for pid=30928 comm="syz.1.6911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5569.937534][ T29] audit: type=1400 audit(1546423860.979:97542): avc: denied { create } for pid=30928 comm="syz.1.6911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5570.029903][ T29] audit: type=1400 audit(1546423860.999:97543): avc: denied { ioctl } for pid=30928 comm="syz.1.6911" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5570.030160][ T29] audit: type=1400 audit(1546423860.999:97544): avc: denied { bind } for pid=30928 comm="syz.1.6911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5570.030306][ T29] audit: type=1400 audit(1546423861.009:97545): avc: denied { setattr } for pid=30928 comm="syz.1.6911" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5570.030385][ T29] audit: type=1400 audit(1546423861.019:97546): avc: denied { read } for pid=30928 comm="syz.1.6911" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5570.030416][ T29] audit: type=1400 audit(1546423861.019:97547): avc: denied { read open } for pid=30928 comm="syz.1.6911" path="/dev/dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5574.714040][ T29] kauditd_printk_skb: 115 callbacks suppressed [ 5574.720454][ T29] audit: type=1400 audit(1546423865.759:97663): avc: denied { create } for pid=30958 comm="syz.1.6920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5574.737190][ T29] audit: type=1400 audit(1546423865.779:97664): avc: denied { write } for pid=30958 comm="syz.1.6920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5574.769079][ T29] audit: type=1400 audit(1546423865.809:97665): avc: denied { write } for pid=30958 comm="syz.1.6920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5574.845941][ T29] audit: type=1400 audit(1546423865.889:97666): avc: denied { create } for pid=30960 comm="syz.0.6921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5574.857626][ T29] audit: type=1400 audit(1546423865.899:97667): avc: denied { bind } for pid=30960 comm="syz.0.6921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5574.882126][ T29] audit: type=1400 audit(1546423865.929:97668): avc: denied { write } for pid=30960 comm="syz.0.6921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5574.888908][ T29] audit: type=1400 audit(1546423865.929:97669): avc: denied { write } for pid=30960 comm="syz.0.6921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5574.898728][ T29] audit: type=1400 audit(1546423865.939:97670): avc: denied { write } for pid=30960 comm="syz.0.6921" path="socket:[77571]" dev="sockfs" ino=77571 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5574.915954][ T29] audit: type=1400 audit(1546423865.959:97671): avc: denied { write } for pid=30960 comm="syz.0.6921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5574.930851][ T29] audit: type=1400 audit(1546423865.969:97672): avc: denied { getopt } for pid=30960 comm="syz.0.6921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5579.965429][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 5579.966227][ T29] audit: type=1400 audit(1546423870.959:97773): avc: denied { read write } for pid=30984 comm="syz.1.6928" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5579.966586][ T29] audit: type=1400 audit(1546423870.969:97774): avc: denied { read write open } for pid=30984 comm="syz.1.6928" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5579.966908][ T29] audit: type=1400 audit(1546423870.979:97775): avc: denied { create } for pid=30985 comm="syz.0.6929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5579.981069][ T29] audit: type=1400 audit(1546423871.029:97776): avc: denied { write } for pid=30985 comm="syz.0.6929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5580.030502][ T29] audit: type=1400 audit(1546423871.069:97777): avc: denied { ioctl } for pid=30985 comm="syz.0.6929" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5580.055185][ T29] audit: type=1400 audit(1546423871.099:97778): avc: denied { bind } for pid=30985 comm="syz.0.6929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5580.085124][ T29] audit: type=1400 audit(1546423871.119:97779): avc: denied { setattr } for pid=30985 comm="syz.0.6929" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5580.085466][ T29] audit: type=1400 audit(1546423871.129:97780): avc: denied { read } for pid=30985 comm="syz.0.6929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5580.118612][ T29] audit: type=1400 audit(1546423871.159:97781): avc: denied { read } for pid=30985 comm="syz.0.6929" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5580.135471][ T29] audit: type=1400 audit(1546423871.179:97782): avc: denied { read open } for pid=30985 comm="syz.0.6929" path="/dev/dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5585.142807][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 5585.144048][ T29] audit: type=1400 audit(1546423876.189:97902): avc: denied { create } for pid=31014 comm="syz.1.6940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5585.167390][ T29] audit: type=1400 audit(1546423876.209:97903): avc: denied { read } for pid=31014 comm="syz.1.6940" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5585.182606][ T29] audit: type=1400 audit(1546423876.229:97904): avc: denied { read open } for pid=31014 comm="syz.1.6940" path="/dev/snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5585.256287][ T29] audit: type=1400 audit(1546423876.299:97905): avc: denied { create } for pid=31014 comm="syz.1.6940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5585.269902][ T29] audit: type=1400 audit(1546423876.309:97906): avc: denied { write } for pid=31014 comm="syz.1.6940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5585.277637][ T29] audit: type=1400 audit(1546423876.319:97907): avc: denied { module_request } for pid=31014 comm="syz.1.6940" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5585.422670][ T29] audit: type=1400 audit(1546423876.469:97908): avc: denied { read } for pid=31014 comm="syz.1.6940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5585.452366][ T29] audit: type=1400 audit(1546423876.499:97909): avc: denied { create } for pid=31014 comm="syz.1.6940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5585.464552][ T29] audit: type=1400 audit(1546423876.499:97910): avc: denied { write } for pid=31014 comm="syz.1.6940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5585.483846][ T29] audit: type=1400 audit(1546423876.529:97911): avc: denied { ioctl } for pid=31014 comm="syz.1.6940" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5590.988373][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 5590.988779][ T29] audit: type=1400 audit(1546423882.029:98011): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5591.017298][ T29] audit: type=1400 audit(1546423882.059:98012): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5591.058465][ T29] audit: type=1400 audit(1546423882.099:98013): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5591.196468][ T29] audit: type=1400 audit(1546423882.229:98014): avc: denied { create } for pid=31038 comm="syz.0.6949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5591.196784][ T29] audit: type=1400 audit(1546423882.239:98015): avc: denied { ioctl } for pid=31038 comm="syz.0.6949" path="socket:[77701]" dev="sockfs" ino=77701 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5591.280423][ T29] audit: type=1400 audit(1546423882.269:98016): avc: denied { bind } for pid=31038 comm="syz.0.6949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5591.280698][ T29] audit: type=1400 audit(1546423882.279:98017): avc: denied { write } for pid=31038 comm="syz.0.6949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5591.280891][ T29] audit: type=1400 audit(1546423882.289:98018): avc: denied { create } for pid=31039 comm="syz.1.6948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5591.280974][ T29] audit: type=1400 audit(1546423882.289:98019): avc: denied { write } for pid=31038 comm="syz.0.6949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5591.281017][ T29] audit: type=1400 audit(1546423882.289:98020): avc: denied { write } for pid=31038 comm="syz.0.6949" path="socket:[77701]" dev="sockfs" ino=77701 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.015600][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 5596.015923][ T29] audit: type=1400 audit(1546423887.059:98126): avc: denied { create } for pid=31062 comm="syz.0.6958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5596.255106][ T29] audit: type=1400 audit(1546423887.299:98127): avc: denied { write } for pid=31062 comm="syz.0.6958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5596.347743][ T29] audit: type=1400 audit(1546423887.389:98128): avc: denied { create } for pid=31064 comm="syz.1.6959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.373439][ T29] audit: type=1400 audit(1546423887.419:98129): avc: denied { ioctl } for pid=31064 comm="syz.1.6959" path="socket:[76736]" dev="sockfs" ino=76736 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.427856][ T29] audit: type=1400 audit(1546423887.449:98130): avc: denied { bind } for pid=31064 comm="syz.1.6959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.435079][ T29] audit: type=1400 audit(1546423887.479:98131): avc: denied { write } for pid=31064 comm="syz.1.6959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.445343][ T29] audit: type=1400 audit(1546423887.489:98132): avc: denied { write } for pid=31064 comm="syz.1.6959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.465196][ T29] audit: type=1400 audit(1546423887.509:98133): avc: denied { write } for pid=31064 comm="syz.1.6959" path="socket:[76736]" dev="sockfs" ino=76736 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.506824][ T29] audit: type=1400 audit(1546423887.509:98134): avc: denied { write } for pid=31064 comm="syz.1.6959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5596.508966][ T29] audit: type=1400 audit(1546423887.549:98135): avc: denied { getopt } for pid=31064 comm="syz.1.6959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5601.576096][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 5601.577444][ T29] audit: type=1400 audit(1546423892.619:98237): avc: denied { create } for pid=31080 comm="syz.0.6966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5601.583678][ T29] audit: type=1400 audit(1546423892.629:98238): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5601.589159][ T29] audit: type=1400 audit(1546423892.629:98239): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5601.603649][ T29] audit: type=1400 audit(1546423892.649:98240): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5601.965564][ T29] audit: type=1400 audit(1546423893.009:98241): avc: denied { create } for pid=31090 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5601.988131][ T29] audit: type=1400 audit(1546423893.029:98242): avc: denied { ioctl } for pid=31090 comm="syz.1.6967" path="socket:[77766]" dev="sockfs" ino=77766 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5602.030445][ T29] audit: type=1400 audit(1546423893.069:98243): avc: denied { bind } for pid=31090 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5602.044259][ T29] audit: type=1400 audit(1546423893.089:98244): avc: denied { write } for pid=31090 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5602.196393][ T29] audit: type=1400 audit(1546423893.239:98245): avc: denied { nlmsg_tty_audit } for pid=31092 comm="syz.0.6968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5602.256322][ T29] audit: type=1400 audit(1546423893.299:98246): avc: denied { create } for pid=31092 comm="syz.0.6968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5606.588850][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 5606.589108][ T29] audit: type=1400 audit(1546423897.629:98305): avc: denied { read write } for pid=31112 comm="syz.0.6974" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5606.605268][ T29] audit: type=1400 audit(1546423897.649:98306): avc: denied { read write open } for pid=31112 comm="syz.0.6974" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5606.620806][ T29] audit: type=1400 audit(1546423897.659:98307): avc: denied { write } for pid=31108 comm="syz.1.6972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5606.644594][ T29] audit: type=1400 audit(1546423897.689:98308): avc: denied { setattr } for pid=31112 comm="syz.0.6974" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5606.707660][ T29] audit: type=1400 audit(1546423897.749:98309): avc: denied { write } for pid=31108 comm="syz.1.6972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5606.956064][ T29] audit: type=1400 audit(1546423897.999:98310): avc: denied { create } for pid=31115 comm="syz.0.6975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5606.967954][ T29] audit: type=1400 audit(1546423898.009:98311): avc: denied { ioctl } for pid=31115 comm="syz.0.6975" path="socket:[77810]" dev="sockfs" ino=77810 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5607.000554][ T29] audit: type=1400 audit(1546423898.019:98312): avc: denied { bind } for pid=31115 comm="syz.0.6975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5607.001096][ T29] audit: type=1400 audit(1546423898.029:98313): avc: denied { write } for pid=31115 comm="syz.0.6975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5607.001315][ T29] audit: type=1400 audit(1546423898.039:98314): avc: denied { write } for pid=31115 comm="syz.0.6975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5611.819000][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 5611.819286][ T29] audit: type=1400 audit(1546423902.859:98377): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5611.841147][ T29] audit: type=1400 audit(1546423902.889:98378): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5611.844304][ T29] audit: type=1400 audit(1546423902.889:98379): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5612.124018][ T29] audit: type=1400 audit(1546423903.169:98380): avc: denied { write } for pid=31137 comm="syz.0.6981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5612.141623][ T29] audit: type=1400 audit(1546423903.189:98381): avc: denied { write } for pid=31137 comm="syz.0.6981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5612.166693][ T29] audit: type=1400 audit(1546423903.209:98382): avc: denied { write } for pid=31137 comm="syz.0.6981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5612.217002][ T29] audit: type=1400 audit(1546423903.259:98383): avc: denied { read write } for pid=31140 comm="syz.1.6982" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:iptables_exec_t:s0" [ 5612.218838][ T29] audit: type=1400 audit(1546423903.259:98384): avc: denied { write } for pid=31137 comm="syz.0.6981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5612.240167][ T29] audit: type=1400 audit(1546423903.279:98385): avc: denied { write } for pid=31137 comm="syz.0.6981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5612.276900][ T29] audit: type=1400 audit(1546423903.319:98386): avc: denied { read write open } for pid=31140 comm="syz.1.6982" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:iptables_exec_t:s0" [ 5616.983488][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 5616.984575][ T29] audit: type=1400 audit(1546423908.029:98485): avc: denied { write } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5617.682747][ T29] audit: type=1400 audit(1546423908.729:98486): avc: denied { write } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5617.755118][ T29] audit: type=1400 audit(1546423908.799:98487): avc: denied { write } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5617.775279][ T29] audit: type=1400 audit(1546423908.819:98488): avc: denied { write } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5617.809021][ T29] audit: type=1400 audit(1546423908.849:98489): avc: denied { write } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5617.887118][ T29] audit: type=1400 audit(1546423908.929:98490): avc: denied { create } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5618.036120][ T29] audit: type=1400 audit(1546423909.079:98491): avc: denied { write } for pid=31156 comm="syz.1.6988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5618.980516][ T29] audit: type=1400 audit(1546423910.019:98492): avc: denied { nlmsg_tty_audit } for pid=31161 comm="syz.0.6990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5619.016739][ T29] audit: type=1400 audit(1546423910.059:98493): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5619.024858][ T29] audit: type=1400 audit(1546423910.069:98494): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5622.246261][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 5622.248701][ T29] audit: type=1400 audit(1546423913.289:98531): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5622.274227][ T29] audit: type=1400 audit(1546423913.319:98532): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5622.278590][ T29] audit: type=1400 audit(1546423913.319:98533): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5622.567797][ T29] audit: type=1400 audit(1546423913.609:98534): avc: denied { nlmsg_tty_audit } for pid=31176 comm="syz.1.6996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5622.618820][ T29] audit: type=1400 audit(1546423913.659:98535): avc: denied { create } for pid=31176 comm="syz.1.6996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5622.638232][ T29] audit: type=1400 audit(1546423913.679:98536): avc: denied { write } for pid=31176 comm="syz.1.6996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5622.651123][ T29] audit: type=1400 audit(1546423913.689:98537): avc: denied { module_request } for pid=31176 comm="syz.1.6996" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5623.138806][ T29] audit: type=1400 audit(1546423914.179:98538): avc: denied { read } for pid=31176 comm="syz.1.6996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5623.250677][ T29] audit: type=1400 audit(1546423914.249:98539): avc: denied { read write } for pid=31176 comm="syz.1.6996" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5623.251281][ T29] audit: type=1400 audit(1546423914.259:98540): avc: denied { read write open } for pid=31176 comm="syz.1.6996" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5627.536963][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 5627.537407][ T29] audit: type=1400 audit(1546423918.579:98563): avc: denied { create } for pid=31191 comm="syz.0.7001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5627.580419][ T29] audit: type=1400 audit(1546423918.609:98564): avc: denied { ioctl } for pid=31191 comm="syz.0.7001" path="socket:[77950]" dev="sockfs" ino=77950 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5627.590267][ T29] audit: type=1400 audit(1546423918.629:98565): avc: denied { bind } for pid=31191 comm="syz.0.7001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5627.620324][ T29] audit: type=1400 audit(1546423918.659:98566): avc: denied { write } for pid=31191 comm="syz.0.7001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5627.643916][ T29] audit: type=1400 audit(1546423918.689:98567): avc: denied { write } for pid=31191 comm="syz.0.7001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5629.007984][ T29] audit: type=1400 audit(1546423920.049:98568): avc: denied { nlmsg_tty_audit } for pid=31193 comm="syz.0.7002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5629.060867][ T29] audit: type=1400 audit(1546423920.079:98569): avc: denied { create } for pid=31193 comm="syz.0.7002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5629.064347][ T29] audit: type=1400 audit(1546423920.109:98570): avc: denied { write } for pid=31193 comm="syz.0.7002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5629.087154][ T29] audit: type=1400 audit(1546423920.129:98571): avc: denied { module_request } for pid=31193 comm="syz.0.7002" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5629.465432][ T29] audit: type=1400 audit(1546423920.509:98572): avc: denied { read } for pid=31193 comm="syz.0.7002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5632.756228][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 5632.762149][ T29] audit: type=1400 audit(1546423923.799:98619): avc: denied { read } for pid=31208 comm="syz.1.7007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5632.835455][ T29] audit: type=1400 audit(1546423923.879:98620): avc: denied { read write } for pid=31208 comm="syz.1.7007" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5632.851692][ T29] audit: type=1400 audit(1546423923.889:98621): avc: denied { read write open } for pid=31208 comm="syz.1.7007" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5632.867008][ T29] audit: type=1400 audit(1546423923.909:98622): avc: denied { create } for pid=31208 comm="syz.1.7007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5632.882232][ T29] audit: type=1400 audit(1546423923.929:98623): avc: denied { write } for pid=31208 comm="syz.1.7007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5632.885683][ T29] audit: type=1400 audit(1546423923.929:98624): avc: denied { module_request } for pid=31208 comm="syz.1.7007" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5632.974698][ T29] audit: type=1400 audit(1546423924.019:98625): avc: denied { create } for pid=31211 comm="syz.0.7008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5632.991458][ T29] audit: type=1400 audit(1546423924.039:98626): avc: denied { bind } for pid=31211 comm="syz.0.7008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5633.010909][ T29] audit: type=1400 audit(1546423924.059:98627): avc: denied { write } for pid=31211 comm="syz.0.7008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5633.028567][ T29] audit: type=1400 audit(1546423924.069:98628): avc: denied { write } for pid=31211 comm="syz.0.7008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.861562][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 5637.861911][ T29] audit: type=1400 audit(1546423928.909:98690): avc: denied { create } for pid=31235 comm="syz.1.7015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5637.883868][ T29] audit: type=1400 audit(1546423928.929:98691): avc: denied { create } for pid=31238 comm="syz.0.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.893002][ T29] audit: type=1400 audit(1546423928.939:98692): avc: denied { ioctl } for pid=31238 comm="syz.0.7016" path="socket:[78010]" dev="sockfs" ino=78010 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.901674][ T29] audit: type=1400 audit(1546423928.949:98693): avc: denied { write } for pid=31235 comm="syz.1.7015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5637.950271][ T29] audit: type=1400 audit(1546423928.979:98694): avc: denied { bind } for pid=31238 comm="syz.0.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.950892][ T29] audit: type=1400 audit(1546423928.989:98695): avc: denied { write } for pid=31238 comm="syz.0.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.951343][ T29] audit: type=1400 audit(1546423928.989:98696): avc: denied { write } for pid=31238 comm="syz.0.7016" path="socket:[78010]" dev="sockfs" ino=78010 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.967183][ T29] audit: type=1400 audit(1546423929.009:98697): avc: denied { write } for pid=31238 comm="syz.0.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5637.967738][ T29] audit: type=1400 audit(1546423929.009:98698): avc: denied { write } for pid=31238 comm="syz.0.7016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5638.404923][ T29] audit: type=1400 audit(1546423929.449:98699): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5643.155844][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 5643.157039][ T29] audit: type=1400 audit(1546423934.199:98767): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.200912][ T29] audit: type=1400 audit(1546423934.239:98768): avc: denied { create } for pid=31261 comm="syz.0.7021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5643.220674][ T29] audit: type=1400 audit(1546423934.259:98769): avc: denied { write } for pid=31261 comm="syz.0.7021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5643.277838][ T29] audit: type=1400 audit(1546423934.319:98770): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.368483][ T29] audit: type=1400 audit(1546423934.409:98771): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.390927][ T29] audit: type=1400 audit(1546423934.439:98772): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.423939][ T29] audit: type=1400 audit(1546423934.469:98773): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.474367][ T29] audit: type=1400 audit(1546423934.519:98774): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.490185][ T29] audit: type=1400 audit(1546423934.529:98775): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5643.526950][ T29] audit: type=1400 audit(1546423934.569:98776): avc: denied { write } for pid=31263 comm="syz.1.7022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5648.201516][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 5648.202620][ T29] audit: type=1400 audit(1546423939.249:98837): avc: denied { read } for pid=31280 comm="syz.1.7026" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5648.210475][ T29] audit: type=1400 audit(1546423939.249:98838): avc: denied { read open } for pid=31280 comm="syz.1.7026" path="net:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5648.222636][ T29] audit: type=1400 audit(1546423939.269:98839): avc: denied { read } for pid=31280 comm="syz.1.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5648.232560][ T29] audit: type=1400 audit(1546423939.279:98840): avc: denied { create } for pid=31280 comm="syz.1.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5648.264212][ T29] audit: type=1400 audit(1546423939.309:98841): avc: denied { create } for pid=31280 comm="syz.1.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5648.270992][ T29] audit: type=1400 audit(1546423939.319:98842): avc: denied { write } for pid=31280 comm="syz.1.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5648.277342][ T29] audit: type=1400 audit(1546423939.319:98843): avc: denied { module_request } for pid=31280 comm="syz.1.7026" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5648.533889][ T29] audit: type=1400 audit(1546423939.579:98844): avc: denied { read } for pid=31280 comm="syz.1.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5648.556075][ T29] audit: type=1400 audit(1546423939.599:98845): avc: denied { ioctl } for pid=31280 comm="syz.1.7026" path="socket:[78048]" dev="sockfs" ino=78048 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5648.560687][ T29] audit: type=1400 audit(1546423939.599:98846): avc: denied { module_request } for pid=31280 comm="syz.1.7026" kmod="netdev-wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5653.213095][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 5653.213488][ T29] audit: type=1400 audit(1546423944.259:98901): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.320219][ T29] audit: type=1400 audit(1546423944.359:98902): avc: denied { create } for pid=31306 comm="syz.1.7033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.326302][ T29] audit: type=1400 audit(1546423944.369:98903): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.369206][ T29] audit: type=1400 audit(1546423944.409:98904): avc: denied { write } for pid=31306 comm="syz.1.7033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.446148][ T29] audit: type=1400 audit(1546423944.489:98905): avc: denied { write } for pid=31306 comm="syz.1.7033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.448573][ T29] audit: type=1400 audit(1546423944.489:98906): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.526390][ T29] audit: type=1400 audit(1546423944.569:98907): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.568424][ T29] audit: type=1400 audit(1546423944.609:98908): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.624105][ T29] audit: type=1400 audit(1546423944.669:98909): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5653.666196][ T29] audit: type=1400 audit(1546423944.709:98910): avc: denied { write } for pid=31297 comm="syz.0.7030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5658.375555][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 5658.376058][ T29] audit: type=1400 audit(1546423949.419:98990): avc: denied { write } for pid=31322 comm="syz.1.7038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5658.480142][ T29] audit: type=1400 audit(1546423949.519:98991): avc: denied { write } for pid=31322 comm="syz.1.7038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5658.484586][ T29] audit: type=1400 audit(1546423949.529:98992): avc: denied { read } for pid=31324 comm="syz.0.7039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5658.575818][ T29] audit: type=1400 audit(1546423949.549:98993): avc: denied { read } for pid=31324 comm="syz.0.7039" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5658.576355][ T29] audit: type=1400 audit(1546423949.569:98994): avc: denied { read open } for pid=31324 comm="syz.0.7039" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5658.576470][ T29] audit: type=1400 audit(1546423949.569:98995): avc: denied { create } for pid=31324 comm="syz.0.7039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5658.576529][ T29] audit: type=1400 audit(1546423949.599:98996): avc: denied { write } for pid=31322 comm="syz.1.7038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5658.576629][ T29] audit: type=1400 audit(1546423949.609:98997): avc: denied { create } for pid=31324 comm="syz.0.7039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5658.733331][ T29] audit: type=1400 audit(1546423949.779:98998): avc: denied { write } for pid=31322 comm="syz.1.7038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5658.792138][ T29] audit: type=1400 audit(1546423949.839:98999): avc: denied { write } for pid=31322 comm="syz.1.7038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5663.477053][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 5663.478170][ T29] audit: type=1400 audit(1546423954.519:99095): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5663.509041][ T29] audit: type=1400 audit(1546423954.549:99096): avc: denied { write } for pid=31350 comm="syz.0.7048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5663.574745][ T29] audit: type=1400 audit(1546423954.619:99097): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5663.587099][ T29] audit: type=1400 audit(1546423954.629:99098): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5663.893687][ T29] audit: type=1400 audit(1546423954.939:99099): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5663.949989][ T29] audit: type=1400 audit(1546423954.989:99100): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5663.996800][ T29] audit: type=1400 audit(1546423955.039:99101): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5664.020744][ T29] audit: type=1400 audit(1546423955.059:99102): avc: denied { write } for pid=31342 comm="syz.1.7045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5664.201357][ T29] audit: type=1400 audit(1546423955.249:99103): avc: denied { create } for pid=31354 comm="syz.0.7049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5664.217186][ T29] audit: type=1400 audit(1546423955.259:99104): avc: denied { create } for pid=31354 comm="syz.0.7049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5668.669011][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 5668.670660][ T29] audit: type=1400 audit(1546423959.709:99153): avc: denied { write } for pid=31374 comm="syz.0.7056" path="socket:[79193]" dev="sockfs" ino=79193 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5668.678890][ T29] audit: type=1400 audit(1546423959.719:99154): avc: denied { write } for pid=31374 comm="syz.0.7056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5669.167318][ T29] audit: type=1400 audit(1546423960.209:99155): avc: denied { getopt } for pid=31374 comm="syz.0.7056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5669.387483][ T29] audit: type=1400 audit(1546423960.419:99156): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5669.394871][ T29] audit: type=1400 audit(1546423960.439:99157): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5669.416361][ T29] audit: type=1400 audit(1546423960.459:99158): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5669.550353][ T29] audit: type=1400 audit(1546423960.589:99159): avc: denied { create } for pid=31377 comm="syz.0.7057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5669.557877][ T29] audit: type=1400 audit(1546423960.599:99160): avc: denied { ioctl } for pid=31377 comm="syz.0.7057" path="socket:[78169]" dev="sockfs" ino=78169 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5669.590322][ T29] audit: type=1400 audit(1546423960.629:99161): avc: denied { module_request } for pid=31377 comm="syz.0.7057" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5669.685625][ T29] audit: type=1400 audit(1546423960.729:99162): avc: denied { create } for pid=31379 comm="syz.1.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.114189][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 5674.120315][ T29] audit: type=1400 audit(1546423965.159:99216): avc: denied { write } for pid=31399 comm="syz.1.7064" path="socket:[79230]" dev="sockfs" ino=79230 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.125647][ T29] audit: type=1400 audit(1546423965.169:99217): avc: denied { write } for pid=31399 comm="syz.1.7064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.613707][ T29] audit: type=1400 audit(1546423965.659:99218): avc: denied { getopt } for pid=31399 comm="syz.1.7064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.683923][ T29] audit: type=1400 audit(1546423965.729:99219): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5674.686818][ T29] audit: type=1400 audit(1546423965.729:99220): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5674.709173][ T29] audit: type=1400 audit(1546423965.749:99221): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5674.805796][ T29] audit: type=1400 audit(1546423965.849:99222): avc: denied { create } for pid=31402 comm="syz.0.7065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.823246][ T29] audit: type=1400 audit(1546423965.869:99223): avc: denied { ioctl } for pid=31402 comm="syz.0.7065" path="socket:[79239]" dev="sockfs" ino=79239 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.880905][ T29] audit: type=1400 audit(1546423965.889:99224): avc: denied { bind } for pid=31402 comm="syz.0.7065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5674.881297][ T29] audit: type=1400 audit(1546423965.899:99225): avc: denied { write } for pid=31402 comm="syz.0.7065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5679.187589][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 5679.191019][ T29] audit: type=1400 audit(1546423970.229:99268): avc: denied { write } for pid=31419 comm="syz.1.7071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5679.418631][ T29] audit: type=1400 audit(1546423970.459:99269): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5679.458815][ T29] audit: type=1400 audit(1546423970.499:99270): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5679.461935][ T29] audit: type=1400 audit(1546423970.509:99271): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5679.655969][ T29] audit: type=1400 audit(1546423970.699:99272): avc: denied { create } for pid=31423 comm="syz.1.7072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5679.677960][ T29] audit: type=1400 audit(1546423970.719:99273): avc: denied { ioctl } for pid=31423 comm="syz.1.7072" path="socket:[78231]" dev="sockfs" ino=78231 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5679.684603][ T29] audit: type=1400 audit(1546423970.729:99274): avc: denied { bind } for pid=31423 comm="syz.1.7072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5679.719875][ T29] audit: type=1400 audit(1546423970.759:99275): avc: denied { write } for pid=31423 comm="syz.1.7072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5679.728295][ T29] audit: type=1400 audit(1546423970.769:99276): avc: denied { write } for pid=31423 comm="syz.1.7072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5679.887913][ T29] audit: type=1400 audit(1546423970.929:99277): avc: denied { create } for pid=31425 comm="syz.0.7073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5684.519788][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 5684.520395][ T29] audit: type=1400 audit(1546423975.559:99343): avc: denied { read } for pid=31444 comm="syz.0.7080" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5684.539290][ T29] audit: type=1400 audit(1546423975.579:99344): avc: denied { read open } for pid=31444 comm="syz.0.7080" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5684.564299][ T29] audit: type=1400 audit(1546423975.609:99345): avc: denied { create } for pid=31444 comm="syz.0.7080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5684.625590][ T29] audit: type=1400 audit(1546423975.669:99346): avc: denied { write } for pid=31444 comm="syz.0.7080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5684.633285][T31445] FAULT_INJECTION: forcing a failure. [ 5684.633285][T31445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5684.638646][T31445] CPU: 1 UID: 0 PID: 31445 Comm: syz.0.7080 Tainted: G L syzkaller #0 PREEMPT [ 5684.638786][T31445] Tainted: [L]=SOFTLOCKUP [ 5684.638812][T31445] Hardware name: ARM-Versatile Express [ 5684.638836][T31445] Call trace: [ 5684.638878][T31445] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 5684.638996][T31445] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 5684.639018][T31445] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 5684.639100][T31445] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 5684.639156][T31445] r7:00000000 r6:00000000 r5:83ec6000 r4:8294f690 [ 5684.639172][T31445] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 5684.639232][T31445] [<8099a780>] (should_fail_ex) from [<8099a9b8>] (should_fail+0x14/0x18) [ 5684.639297][T31445] r8:76f3ff08 r7:00000000 r6:00000000 r5:ee331f68 r4:00000002 [ 5684.639316][T31445] [<8099a9a4>] (should_fail) from [<8099a9d8>] (should_fail_usercopy+0x1c/0x20) [ 5684.639364][T31445] [<8099a9bc>] (should_fail_usercopy) from [<805a3808>] (simple_read_from_buffer+0x80/0x140) [ 5684.639419][T31445] [<805a3788>] (simple_read_from_buffer) from [<8062235c>] (proc_fail_nth_read+0xb8/0x108) [ 5684.639550][T31445] r10:806222a4 r9:00000001 r8:00000002 r7:ee331f68 r6:0000000f r5:76f3ff08 [ 5684.639578][T31445] r4:83ec6000 r3:ee331e9f [ 5684.639598][T31445] [<806222a4>] (proc_fail_nth_read) from [<80566c28>] (vfs_read+0xc0/0x328) [ 5684.639685][T31445] r8:83ec6000 r7:ee331f68 r6:76f3ff08 r5:908686c0 r4:0000000f [ 5684.639704][T31445] [<80566b68>] (vfs_read) from [<805678b4>] (ksys_read+0x74/0xec) [ 5684.639852][T31445] r10:00000003 r9:83ec6000 r8:8020029c r7:00000000 r6:00000000 r5:908686c0 [ 5684.639882][T31445] r4:908686c3 [ 5684.639900][T31445] [<80567840>] (ksys_read) from [<8056793c>] (sys_read+0x10/0x14) [ 5684.639974][T31445] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 5684.639993][T31445] [<8056792c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5684.640047][T31445] Exception stack(0xee331fa8 to 0xee331ff0) [ 5684.640090][T31445] 1fa0: 00000000 00000000 00000005 76f3ff08 0000000f 00000000 [ 5684.640129][T31445] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f400dc [ 5684.640162][T31445] 1fe0: 76f3fe58 76f3fe44 0010af14 00111af8 [ 5685.011604][ T29] audit: type=1400 audit(1546423976.039:99347): avc: denied { nlmsg_tty_audit } for pid=31446 comm="syz.0.7081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5685.049318][ T29] audit: type=1400 audit(1546423976.089:99348): avc: denied { create } for pid=31446 comm="syz.0.7081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5685.081116][ T29] audit: type=1400 audit(1546423976.109:99349): avc: denied { write } for pid=31446 comm="syz.0.7081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5685.085483][ T29] audit: type=1400 audit(1546423976.129:99350): avc: denied { module_request } for pid=31446 comm="syz.0.7081" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5685.355134][ T29] audit: type=1400 audit(1546423976.399:99351): avc: denied { read } for pid=31446 comm="syz.0.7081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5685.382772][ T29] audit: type=1400 audit(1546423976.429:99352): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5689.720155][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 5689.724820][ T29] audit: type=1400 audit(1546423980.759:99427): avc: denied { create } for pid=31469 comm="syz.0.7091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5689.746335][ T29] audit: type=1400 audit(1546423980.789:99428): avc: denied { ioctl } for pid=31469 comm="syz.0.7091" path="socket:[79331]" dev="sockfs" ino=79331 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5689.763713][ T29] audit: type=1400 audit(1546423980.799:99429): avc: denied { bind } for pid=31469 comm="syz.0.7091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5689.778098][ T29] audit: type=1400 audit(1546423980.819:99430): avc: denied { write } for pid=31469 comm="syz.0.7091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5689.788908][ T29] audit: type=1400 audit(1546423980.829:99431): avc: denied { write } for pid=31469 comm="syz.0.7091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5689.926132][ T29] audit: type=1400 audit(1546423980.969:99432): avc: denied { read } for pid=31470 comm="syz.1.7090" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5689.938400][ T29] audit: type=1400 audit(1546423980.969:99433): avc: denied { read open } for pid=31470 comm="syz.1.7090" path="net:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5689.948631][ T29] audit: type=1400 audit(1546423980.989:99434): avc: denied { create } for pid=31470 comm="syz.1.7090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5689.988023][ T29] audit: type=1400 audit(1546423981.019:99435): avc: denied { write } for pid=31470 comm="syz.1.7090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5689.988450][ T29] audit: type=1400 audit(1546423981.029:99436): avc: denied { write } for pid=31470 comm="syz.1.7090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5694.759468][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 5694.760316][ T29] audit: type=1400 audit(1546423985.799:99500): avc: denied { create } for pid=31496 comm="syz.0.7099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.770938][ T29] audit: type=1400 audit(1546423985.809:99501): avc: denied { bind } for pid=31496 comm="syz.0.7099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.778226][ T29] audit: type=1400 audit(1546423985.819:99502): avc: denied { write } for pid=31496 comm="syz.0.7099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.785067][ T29] audit: type=1400 audit(1546423985.829:99503): avc: denied { write } for pid=31496 comm="syz.0.7099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.928336][ T29] audit: type=1400 audit(1546423985.969:99504): avc: denied { create } for pid=31498 comm="syz.0.7100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.947401][ T29] audit: type=1400 audit(1546423985.989:99505): avc: denied { ioctl } for pid=31498 comm="syz.0.7100" path="socket:[79374]" dev="sockfs" ino=79374 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.960802][ T29] audit: type=1400 audit(1546423985.999:99506): avc: denied { bind } for pid=31498 comm="syz.0.7100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5694.976633][ T29] audit: type=1400 audit(1546423986.009:99507): avc: denied { write } for pid=31498 comm="syz.0.7100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5695.247820][ T29] audit: type=1400 audit(1546423986.289:99508): avc: denied { create } for pid=31500 comm="syz.0.7101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5695.272527][ T29] audit: type=1400 audit(1546423986.319:99509): avc: denied { read } for pid=31500 comm="syz.0.7101" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5699.907104][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 5699.907293][ T29] audit: type=1400 audit(1546423990.949:99582): avc: denied { read } for pid=31518 comm="syz.1.7108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5699.917797][ T29] audit: type=1400 audit(1546423990.959:99583): avc: denied { create } for pid=31518 comm="syz.1.7108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5699.928877][ T29] audit: type=1400 audit(1546423990.969:99584): avc: denied { ioctl } for pid=31518 comm="syz.1.7108" path="socket:[79406]" dev="sockfs" ino=79406 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5699.945590][ T29] audit: type=1400 audit(1546423990.989:99585): avc: denied { module_request } for pid=31518 comm="syz.1.7108" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5700.156167][ T29] audit: type=1400 audit(1546423991.199:99586): avc: denied { sys_module } for pid=31518 comm="syz.1.7108" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5700.161849][ T29] audit: type=1400 audit(1546423991.209:99587): avc: denied { module_request } for pid=31518 comm="syz.1.7108" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5700.358755][ T29] audit: type=1400 audit(1546423991.399:99588): avc: denied { write } for pid=31518 comm="syz.1.7108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5700.437633][ T29] audit: type=1400 audit(1546423991.479:99589): avc: denied { create } for pid=31524 comm="syz.0.7109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5700.446360][ T29] audit: type=1400 audit(1546423991.489:99590): avc: denied { ioctl } for pid=31524 comm="syz.0.7109" path="socket:[79415]" dev="sockfs" ino=79415 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5700.457585][ T29] audit: type=1400 audit(1546423991.499:99591): avc: denied { bind } for pid=31524 comm="syz.0.7109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5704.930630][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 5704.932240][ T29] audit: type=1400 audit(1546423995.969:99642): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5704.934427][ T29] audit: type=1400 audit(1546423995.979:99643): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5704.936797][ T29] audit: type=1400 audit(1546423995.979:99644): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5705.418705][ T29] audit: type=1400 audit(1546423996.459:99645): avc: denied { read } for pid=31539 comm="syz.0.7114" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5705.454568][ T29] audit: type=1400 audit(1546423996.499:99646): avc: denied { read open } for pid=31539 comm="syz.0.7114" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5705.495943][ T29] audit: type=1400 audit(1546423996.519:99647): avc: denied { create } for pid=31539 comm="syz.0.7114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5705.728550][ T29] audit: type=1400 audit(1546423996.729:99648): avc: denied { map } for pid=31539 comm="syz.0.7114" path="socket:[79426]" dev="sockfs" ino=79426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 5706.130663][ T29] audit: type=1400 audit(1546423997.179:99649): avc: denied { create } for pid=31544 comm="syz.1.7115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5706.137145][ T29] audit: type=1400 audit(1546423997.179:99650): avc: denied { ioctl } for pid=31544 comm="syz.1.7115" path="socket:[78429]" dev="sockfs" ino=78429 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5706.163293][ T29] audit: type=1400 audit(1546423997.209:99651): avc: denied { bind } for pid=31544 comm="syz.1.7115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5710.074935][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 5710.075330][ T29] audit: type=1400 audit(1546424001.119:99679): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5710.158898][ T29] audit: type=1400 audit(1546424001.199:99680): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5710.255153][ T29] audit: type=1400 audit(1546424001.299:99681): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5710.441884][ T29] audit: type=1400 audit(1546424001.489:99682): avc: denied { read write } for pid=31557 comm="syz.0.7119" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5710.444701][ T29] audit: type=1400 audit(1546424001.489:99683): avc: denied { read write open } for pid=31557 comm="syz.0.7119" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5710.485157][ T29] audit: type=1400 audit(1546424001.529:99684): avc: denied { create } for pid=31557 comm="syz.0.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5710.531946][ T29] audit: type=1400 audit(1546424001.579:99685): avc: denied { create } for pid=31557 comm="syz.0.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5710.580184][ T29] audit: type=1400 audit(1546424001.619:99686): avc: denied { write } for pid=31557 comm="syz.0.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5710.612905][ T29] audit: type=1400 audit(1546424001.659:99687): avc: denied { read } for pid=31557 comm="syz.0.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5710.640714][ T29] audit: type=1400 audit(1546424001.679:99688): avc: denied { read } for pid=31557 comm="syz.0.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5715.231715][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 5715.232797][ T29] audit: type=1400 audit(1546424006.279:99759): avc: denied { write } for pid=31571 comm="syz.1.7124" path="socket:[79459]" dev="sockfs" ino=79459 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5715.242210][ T29] audit: type=1400 audit(1546424006.289:99760): avc: denied { write } for pid=31571 comm="syz.1.7124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5715.274210][ T29] audit: type=1400 audit(1546424006.319:99761): avc: denied { ioctl } for pid=31569 comm="syz.0.7123" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x4b63 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5715.315338][ T29] audit: type=1400 audit(1546424006.359:99762): avc: denied { ioctl } for pid=31569 comm="syz.0.7123" path="/dev/input/event0" dev="devtmpfs" ino=707 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5715.625594][ T29] audit: type=1400 audit(1546424006.669:99763): avc: denied { write } for pid=31571 comm="syz.1.7124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5715.679068][ T29] audit: type=1400 audit(1546424006.719:99764): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5715.685568][ T29] audit: type=1400 audit(1546424006.719:99765): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5715.687689][ T29] audit: type=1400 audit(1546424006.719:99766): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5715.849019][ T29] audit: type=1400 audit(1546424006.889:99767): avc: denied { create } for pid=31577 comm="syz.1.7125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5715.863743][ T29] audit: type=1400 audit(1546424006.909:99768): avc: denied { write } for pid=31577 comm="syz.1.7125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5718.705595][T31593] FAULT_INJECTION: forcing a failure. [ 5718.705595][T31593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5718.748768][T31593] CPU: 0 UID: 0 PID: 31593 Comm: syz.1.7130 Tainted: G L syzkaller #0 PREEMPT [ 5718.748971][T31593] Tainted: [L]=SOFTLOCKUP [ 5718.748995][T31593] Hardware name: ARM-Versatile Express [ 5718.749022][T31593] Call trace: [ 5718.749158][T31593] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 5718.749290][T31593] r7:60000113 r6:60000113 r5:822a20bc r4:00000000 [ 5718.749314][T31593] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 5718.749406][T31593] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 5718.749536][T31593] r7:00000000 r6:00000000 r5:86a30c00 r4:8294f690 [ 5718.749560][T31593] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 5718.749627][T31593] [<8099a780>] (should_fail_ex) from [<8099a9b8>] (should_fail+0x14/0x18) [ 5718.749702][T31593] r8:76f46f08 r7:00000000 r6:00000000 r5:df9a9f68 r4:00000002 [ 5718.749726][T31593] [<8099a9a4>] (should_fail) from [<8099a9d8>] (should_fail_usercopy+0x1c/0x20) [ 5718.749786][T31593] [<8099a9bc>] (should_fail_usercopy) from [<805a3808>] (simple_read_from_buffer+0x80/0x140) [ 5718.749936][T31593] [<805a3788>] (simple_read_from_buffer) from [<8062235c>] (proc_fail_nth_read+0xb8/0x108) [ 5718.750013][T31593] r10:806222a4 r9:00000001 r8:00000002 r7:df9a9f68 r6:0000000f r5:76f46f08 [ 5718.750041][T31593] r4:86a30c00 r3:df9a9e9f [ 5718.750061][T31593] [<806222a4>] (proc_fail_nth_read) from [<80566c28>] (vfs_read+0xc0/0x328) [ 5718.750211][T31593] r8:86a30c00 r7:df9a9f68 r6:76f46f08 r5:908689c0 r4:0000000f [ 5718.750236][T31593] [<80566b68>] (vfs_read) from [<805678b4>] (ksys_read+0x74/0xec) [ 5718.750317][T31593] r10:00000003 r9:86a30c00 r8:8020029c r7:00000000 r6:00000000 r5:908689c0 [ 5718.750345][T31593] r4:908689c3 [ 5718.750364][T31593] [<80567840>] (ksys_read) from [<8056793c>] (sys_read+0x10/0x14) [ 5718.750531][T31593] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 5718.750556][T31593] [<8056792c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5718.750614][T31593] Exception stack(0xdf9a9fa8 to 0xdf9a9ff0) [ 5718.750660][T31593] 9fa0: 00000000 00000000 00000004 76f46f08 0000000f 00000000 [ 5718.750700][T31593] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f470dc [ 5718.750734][T31593] 9fe0: 76f46e58 76f46e44 0010af14 00111af8 [ 5720.446842][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 5720.447310][ T29] audit: type=1400 audit(1546424011.489:99866): avc: denied { nlmsg_tty_audit } for pid=31601 comm="syz.1.7134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5720.544104][ T29] audit: type=1400 audit(1546424011.589:99867): avc: denied { create } for pid=31601 comm="syz.1.7134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5720.582655][ T29] audit: type=1400 audit(1546424011.629:99868): avc: denied { write } for pid=31601 comm="syz.1.7134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5720.601330][ T29] audit: type=1400 audit(1546424011.639:99869): avc: denied { module_request } for pid=31601 comm="syz.1.7134" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5720.607101][ T29] audit: type=1400 audit(1546424011.649:99870): avc: denied { create } for pid=31603 comm="syz.0.7135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5720.623939][ T29] audit: type=1400 audit(1546424011.669:99871): avc: denied { ioctl } for pid=31603 comm="syz.0.7135" path="socket:[79507]" dev="sockfs" ino=79507 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5720.642551][ T29] audit: type=1400 audit(1546424011.679:99872): avc: denied { bind } for pid=31603 comm="syz.0.7135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5720.684035][ T29] audit: type=1400 audit(1546424011.729:99873): avc: denied { write } for pid=31603 comm="syz.0.7135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5720.733646][ T29] audit: type=1400 audit(1546424011.779:99874): avc: denied { write } for pid=31603 comm="syz.0.7135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5721.062973][ T29] audit: type=1400 audit(1546424012.109:99875): avc: denied { read } for pid=31601 comm="syz.1.7134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5721.981049][T31613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31613 comm=syz.1.7137 [ 5725.296599][T31629] netlink: 36 bytes leftover after parsing attributes in process `syz.0.7143'. [ 5725.567967][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 5725.568350][ T29] audit: type=1400 audit(1546424016.609:99954): avc: denied { read write } for pid=26609 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5725.574247][ T29] audit: type=1400 audit(1546424016.619:99955): avc: denied { read write open } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5725.591537][ T29] audit: type=1400 audit(1546424016.639:99956): avc: denied { ioctl } for pid=26609 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5725.898288][ T29] audit: type=1400 audit(1546424016.939:99957): avc: denied { write } for pid=31628 comm="syz.0.7143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5726.086187][ T29] audit: type=1400 audit(1546424017.129:99958): avc: denied { sys_module } for pid=31628 comm="syz.0.7143" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5726.086750][ T29] audit: type=1400 audit(1546424017.129:99959): avc: denied { module_request } for pid=31628 comm="syz.0.7143" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5726.136910][ T29] audit: type=1400 audit(1546424017.179:99960): avc: denied { create } for pid=31632 comm="syz.1.7144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5726.192786][ T29] audit: type=1400 audit(1546424017.239:99961): avc: denied { read } for pid=31632 comm="syz.1.7144" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5726.197166][ T29] audit: type=1400 audit(1546424017.239:99962): avc: denied { read open } for pid=31632 comm="syz.1.7144" path="/dev/snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5726.296504][ T29] audit: type=1400 audit(1546424017.339:99963): avc: denied { create } for pid=31632 comm="syz.1.7144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5727.496366][T31641] Invalid ELF header type: 2 != 1 [ 5728.891471][T25726] usb 1-1: new low-speed USB device number 76 using dummy_hcd [ 5728.947405][T31654] FAULT_INJECTION: forcing a failure. [ 5728.947405][T31654] name failslab, interval 1, probability 0, space 0, times 0 [ 5728.954351][T31654] CPU: 1 UID: 0 PID: 31654 Comm: syz.1.7150 Tainted: G L syzkaller #0 PREEMPT [ 5728.954493][T31654] Tainted: [L]=SOFTLOCKUP [ 5728.954511][T31654] Hardware name: ARM-Versatile Express [ 5728.954532][T31654] Call trace: [ 5728.954568][T31654] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 5728.954681][T31654] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 5728.954715][T31654] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 5728.954774][T31654] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 5728.954843][T31654] r7:00000820 r6:00000000 r5:86a30c00 r4:82918a10 [ 5728.954862][T31654] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 5728.954920][T31654] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 5728.954985][T31654] r8:86a30c00 r7:00000820 r6:00000000 r5:00000017 r4:83001240 [ 5728.955006][T31654] [<805370e0>] (should_failslab) from [<805167e8>] (__kmalloc_node_track_caller_noprof+0xa8/0x58c) [ 5728.955110][T31654] [<80516740>] (__kmalloc_node_track_caller_noprof) from [<804a9c38>] (kmemdup_noprof+0x28/0x44) [ 5728.955190][T31654] r10:00000089 r9:85c44004 r8:e0105cb0 r7:84fa2000 r6:84e24b18 r5:e0105ca8 [ 5728.955212][T31654] r4:00000017 [ 5728.955229][T31654] [<804a9c10>] (kmemdup_noprof) from [<807bec9c>] (sidtab_sid2str_get+0x54/0xa4) [ 5728.955299][T31654] r7:84fa2000 r6:e0105cb0 r5:e0105ca8 r4:832270c0 [ 5728.955320][T31654] [<807bec48>] (sidtab_sid2str_get) from [<807c62a0>] (sidtab_entry_to_string+0x34/0x94) [ 5728.955387][T31654] r7:84fa2000 r6:832270c0 r5:e0105ca8 r4:0000005f [ 5728.955407][T31654] [<807c626c>] (sidtab_entry_to_string) from [<807c6418>] (security_sid_to_context_core+0x118/0x17c) [ 5728.955479][T31654] r9:0000005f r8:84fa2000 r7:85c44004 r6:e0105cb0 r5:e0105ca8 r4:0000005f [ 5728.955500][T31654] [<807c6300>] (security_sid_to_context_core) from [<807c9370>] (security_sid_to_context+0x1c/0x24) [ 5728.955568][T31654] r8:86a30c00 r7:807aa0dc r6:e0105ea4 r5:8524f7a8 r4:e0105d38 [ 5728.955586][T31654] [<807c9354>] (security_sid_to_context) from [<807aa15c>] (avc_audit_post_callback+0x80/0x2f4) [ 5728.955648][T31654] [<807aa0dc>] (avc_audit_post_callback) from [<807d191c>] (common_lsm_audit+0x104/0x148) [ 5728.955738][T31654] r10:00000089 r9:0000005f r8:807a9360 r7:807aa0dc r6:e0105ea4 r5:8524f7a8 [ 5728.955761][T31654] r4:86a313f0 [ 5728.955778][T31654] [<807d1818>] (common_lsm_audit) from [<807aa5e8>] (slow_avc_audit+0xbc/0x114) [ 5728.955844][T31654] r8:00000000 r7:00000001 r6:00000000 r5:0000005f r4:0000005f [ 5728.955864][T31654] [<807aa52c>] (slow_avc_audit) from [<807aaa18>] (avc_has_extended_perms+0x284/0x5e8) [ 5728.955926][T31654] r5:00000012 r4:0000005f [ 5728.955943][T31654] [<807aa794>] (avc_has_extended_perms) from [<807b4124>] (ioctl_has_perm.constprop.0+0xe4/0x15c) [ 5728.956018][T31654] r10:853bc36c r9:00000089 r8:8590b480 r7:0000005f r6:e0105ea4 r5:824b15ec [ 5728.956064][T31654] r4:000000fa [ 5728.956086][T31654] [<807b4040>] (ioctl_has_perm.constprop.0) from [<807b4254>] (selinux_file_ioctl+0xb8/0x130) [ 5728.956162][T31654] r10:86a30c00 r9:00000003 r8:90868d80 r7:20003fc0 r6:20003fc0 r5:000089fa [ 5728.956182][T31654] r4:90868d80 [ 5728.956199][T31654] [<807b419c>] (selinux_file_ioctl) from [<8078ccfc>] (security_file_ioctl+0xac/0x1d4) [ 5728.956257][T31654] [<8078cc50>] (security_file_ioctl) from [<80581fac>] (sys_ioctl+0x4c/0xb58) [ 5728.956325][T31654] r7:20003fc0 r6:000089fa r5:90868d81 r4:00000000 [ 5728.956344][T31654] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5728.956385][T31654] Exception stack(0xe0105fa8 to 0xe0105ff0) [ 5728.956406][T31654] 5fa0: 00000000 00000000 00000003 000089fa 20003fc0 00000000 [ 5728.956444][T31654] 5fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f470dc [ 5728.956479][T31654] 5fe0: 76f46e88 76f46e78 00018734 0012fc20 [ 5728.956523][T31654] r10:00000036 r9:86a30c00 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 5728.956544][T31654] r4:00000000 [ 5729.111445][T25726] usb 1-1: Invalid ep0 maxpacket: 32 [ 5729.240483][T25726] usb 1-1: new low-speed USB device number 77 using dummy_hcd [ 5729.470470][T25726] usb 1-1: Invalid ep0 maxpacket: 32 [ 5729.472112][T25726] usb usb1-port1: attempt power cycle [ 5729.810967][T25726] usb 1-1: new low-speed USB device number 78 using dummy_hcd [ 5729.856342][T25726] usb 1-1: Invalid ep0 maxpacket: 32 [ 5729.980696][T25726] usb 1-1: new low-speed USB device number 79 using dummy_hcd [ 5730.042988][T25726] usb 1-1: Invalid ep0 maxpacket: 32 [ 5730.043920][T25726] usb usb1-port1: unable to enumerate USB device [ 5730.666302][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 5730.667289][ T29] audit: type=1400 audit(1546424021.709:100068): avc: denied { module_request } for pid=31660 comm="syz.1.7153" kmod="net-pf-10-proto-6-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5731.022264][ T29] audit: type=1400 audit(1546424022.069:100069): avc: denied { module_request } for pid=31660 comm="syz.1.7153" kmod="net-pf-10-proto-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5731.234201][ T29] audit: type=1400 audit(1546424022.279:100070): avc: denied { create } for pid=31660 comm="syz.1.7153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5731.245494][ T29] audit: type=1400 audit(1546424022.289:100071): avc: denied { ioctl } for pid=31660 comm="syz.1.7153" path="socket:[79596]" dev="sockfs" ino=79596 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5731.270847][ T29] audit: type=1400 audit(1546424022.309:100072): avc: denied { bind } for pid=31660 comm="syz.1.7153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5731.296290][ T29] audit: type=1400 audit(1546424022.339:100073): avc: denied { write } for pid=31660 comm="syz.1.7153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5731.337046][ T29] audit: type=1400 audit(1546424022.379:100074): avc: denied { write } for pid=31660 comm="syz.1.7153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5731.850533][ T29] audit: type=1400 audit(1546424022.889:100075): avc: denied { read append } for pid=31660 comm="syz.1.7153" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:iptables_exec_t:s0" [ 5731.850909][ T29] audit: type=1400 audit(1546424022.889:100076): avc: denied { read open } for pid=31660 comm="syz.1.7153" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:iptables_exec_t:s0" [ 5731.896339][ T29] audit: type=1400 audit(1546424022.919:100077): avc: denied { ioctl } for pid=31660 comm="syz.1.7153" path="socket:[79596]" dev="sockfs" ino=79596 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5735.667247][T28188] syz_tun (unregistering): left allmulticast mode [ 5735.698680][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 5735.699065][ T29] audit: type=1400 audit(1546424026.739:100200): avc: denied { execute } for pid=31672 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5735.722046][ T29] audit: type=1400 audit(1546424026.769:100201): avc: denied { execute_no_trans } for pid=31672 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5735.740956][ T29] audit: type=1400 audit(1546424026.779:100202): avc: denied { execute } for pid=31672 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5735.784400][ T29] audit: type=1400 audit(1546424026.829:100203): avc: denied { execmem } for pid=31672 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5735.828535][ T29] audit: type=1400 audit(1546424026.869:100204): avc: denied { read } for pid=31675 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5735.836341][ T29] audit: type=1400 audit(1546424026.879:100205): avc: denied { read open } for pid=31675 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5735.853960][ T29] audit: type=1400 audit(1546424026.899:100206): avc: denied { mounton } for pid=31675 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5735.903166][T30822] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5735.933292][ T29] audit: type=1400 audit(1546424026.979:100207): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5735.965796][T30822] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5736.023322][T30822] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5736.138208][T30822] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5736.187713][ T29] audit: type=1400 audit(1546424027.229:100208): avc: denied { sys_module } for pid=31675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5736.191103][ T29] audit: type=1400 audit(1546424027.239:100209): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5736.519567][T30822] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5736.533262][T30822] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5736.538532][T30822] bond0 (unregistering): Released all slaves [ 5736.646187][T30822] hsr_slave_0: left promiscuous mode [ 5736.649153][T30822] hsr_slave_1: left promiscuous mode [ 5736.673027][T30822] veth1_macvtap: left promiscuous mode [ 5736.674325][T30822] veth0_macvtap: left promiscuous mode [ 5736.675846][T30822] veth1_vlan: left promiscuous mode [ 5736.676854][T30822] veth0_vlan: left promiscuous mode [ 5740.754882][ T29] kauditd_printk_skb: 194 callbacks suppressed [ 5740.755339][ T29] audit: type=1400 audit(1546424031.799:100404): avc: denied { sys_module } for pid=31675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5740.763868][ T29] audit: type=1400 audit(1546424031.809:100405): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5740.980443][ T29] audit: type=1400 audit(1546424032.019:100406): avc: denied { write } for pid=31774 comm="syz.0.7160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5741.074384][ T29] audit: type=1400 audit(1546424032.119:100407): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5741.436155][ T29] audit: type=1400 audit(1546424032.479:100408): avc: denied { sys_module } for pid=31675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5741.446218][ T29] audit: type=1400 audit(1546424032.489:100409): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5741.506441][ T29] audit: type=1400 audit(1546424032.549:100410): avc: denied { read } for pid=31774 comm="syz.0.7160" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5741.534626][ T29] audit: type=1400 audit(1546424032.579:100411): avc: denied { read open } for pid=31774 comm="syz.0.7160" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5741.549459][ T29] audit: type=1400 audit(1546424032.589:100412): avc: denied { create } for pid=31774 comm="syz.0.7160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5741.604583][ T29] audit: type=1400 audit(1546424032.649:100413): avc: denied { write } for pid=31774 comm="syz.0.7160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5741.953565][T31675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5741.973789][T31675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5745.619060][T31675] hsr_slave_0: entered promiscuous mode [ 5745.641701][T31675] hsr_slave_1: entered promiscuous mode [ 5745.642984][T31675] debugfs: 'hsr0' already exists in 'hsr' [ 5745.650601][T31675] Cannot create hsr debugfs directory [ 5745.772847][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 5745.773769][ T29] audit: type=1400 audit(1546424036.819:100627): avc: denied { write } for pid=31884 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5745.776816][ T29] audit: type=1400 audit(1546424036.819:100628): avc: denied { write open } for pid=31884 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5745.791285][ T29] audit: type=1400 audit(1546424036.839:100629): avc: denied { search } for pid=31884 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5745.792476][ T29] audit: type=1400 audit(1546424036.839:100630): avc: denied { search } for pid=31884 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5745.793514][ T29] audit: type=1400 audit(1546424036.839:100631): avc: denied { search } for pid=31884 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5745.794500][ T29] audit: type=1400 audit(1546424036.839:100632): avc: denied { search } for pid=31884 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5745.798209][ T29] audit: type=1400 audit(1546424036.839:100633): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5745.864214][ T29] audit: type=1400 audit(1546424036.909:100634): avc: denied { search } for pid=31919 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5745.866684][ T29] audit: type=1400 audit(1546424036.909:100635): avc: denied { search } for pid=31919 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5745.869991][ T29] audit: type=1400 audit(1546424036.909:100636): avc: denied { search } for pid=31919 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5747.317613][T31675] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 5747.349060][T31675] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 5747.373102][T31675] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 5747.393743][T31675] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 5749.803884][T32028] netlink: 'syz.0.7166': attribute type 10 has an invalid length. [ 5750.833655][T31675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5750.949182][ T29] kauditd_printk_skb: 377 callbacks suppressed [ 5750.949928][ T29] audit: type=1400 audit(1546424041.989:101014): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5751.063018][ T29] audit: type=1400 audit(1546424042.109:101015): avc: denied { search } for pid=32032 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5751.068602][ T29] audit: type=1400 audit(1546424042.109:101016): avc: denied { read } for pid=32032 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5751.074184][ T29] audit: type=1400 audit(1546424042.119:101017): avc: denied { read open } for pid=32032 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5751.084615][ T29] audit: type=1400 audit(1546424042.129:101018): avc: denied { search } for pid=32032 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5751.088259][ T29] audit: type=1400 audit(1546424042.129:101019): avc: denied { search } for pid=32032 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5751.091215][ T29] audit: type=1400 audit(1546424042.139:101020): avc: denied { search } for pid=32032 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5751.095873][ T29] audit: type=1400 audit(1546424042.139:101021): avc: denied { read } for pid=32032 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=180 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5751.110819][ T29] audit: type=1400 audit(1546424042.159:101022): avc: denied { read open } for pid=32032 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=180 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5751.118414][ T29] audit: type=1400 audit(1546424042.159:101023): avc: denied { getattr } for pid=32032 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5752.472407][T25726] usb 1-1: new high-speed USB device number 80 using dummy_hcd [ 5752.650483][T25726] usb 1-1: Using ep0 maxpacket: 8 [ 5752.710541][T25726] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 5752.711227][T25726] usb 1-1: too many endpoints for config 168 interface 0 altsetting 188: 100, using maximum allowed: 30 [ 5752.711636][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 5752.711838][T25726] usb 1-1: config 168 interface 0 altsetting 188 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 5752.712023][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 5752.712209][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 5752.712385][T25726] usb 1-1: config 168 interface 0 altsetting 188 has 2 endpoint descriptors, different from the interface descriptor's value: 100 [ 5752.712568][T25726] usb 1-1: config 168 interface 0 has no altsetting 0 [ 5752.770835][T25726] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 5752.772051][T25726] usb 1-1: too many endpoints for config 168 interface 0 altsetting 188: 100, using maximum allowed: 30 [ 5752.780818][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 5752.781268][T25726] usb 1-1: config 168 interface 0 altsetting 188 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 5752.781485][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 5752.781672][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 5752.781855][T25726] usb 1-1: config 168 interface 0 altsetting 188 has 2 endpoint descriptors, different from the interface descriptor's value: 100 [ 5752.782031][T25726] usb 1-1: config 168 interface 0 has no altsetting 0 [ 5752.846020][T25726] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 5752.847300][T25726] usb 1-1: too many endpoints for config 168 interface 0 altsetting 188: 100, using maximum allowed: 30 [ 5752.848639][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 5752.850382][T25726] usb 1-1: config 168 interface 0 altsetting 188 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 5752.851612][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 5752.852811][T25726] usb 1-1: config 168 interface 0 altsetting 188 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 5752.854011][T25726] usb 1-1: config 168 interface 0 altsetting 188 has 2 endpoint descriptors, different from the interface descriptor's value: 100 [ 5752.855313][T25726] usb 1-1: config 168 interface 0 has no altsetting 0 [ 5753.006151][T25726] usb 1-1: string descriptor 0 read error: -22 [ 5753.007525][T25726] usb 1-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e [ 5753.008820][T25726] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 5753.131098][T25726] adutux 1-1:168.0: ADU100 now attached to /dev/usb/adutux0 [ 5753.325627][T29088] usb 1-1: USB disconnect, device number 80 [ 5756.075971][ T29] kauditd_printk_skb: 248 callbacks suppressed [ 5756.076236][ T29] audit: type=1400 audit(1546424047.119:101272): avc: denied { search } for pid=32075 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5756.083178][ T29] audit: type=1400 audit(1546424047.129:101273): avc: denied { search } for pid=32075 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5756.084148][ T29] audit: type=1400 audit(1546424047.129:101274): avc: denied { search } for pid=32075 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5756.191333][ T29] audit: type=1400 audit(1546424047.239:101275): avc: denied { search } for pid=32044 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5756.324120][ T29] audit: type=1400 audit(1546424047.369:101276): avc: denied { sys_module } for pid=32068 comm="syz.0.7171" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5756.338526][ T29] audit: type=1400 audit(1546424047.379:101277): avc: denied { module_request } for pid=32068 comm="syz.0.7171" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5756.357940][ T29] audit: type=1400 audit(1546424047.399:101278): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5756.788289][ T29] audit: type=1400 audit(1546424047.829:101279): avc: denied { write } for pid=32077 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5756.815875][ T29] audit: type=1400 audit(1546424047.859:101280): avc: denied { write open } for pid=32077 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5756.861583][ T29] audit: type=1400 audit(1546424047.899:101281): avc: denied { search } for pid=32077 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5761.118334][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 5761.118822][ T29] audit: type=1400 audit(1546424052.159:101464): avc: denied { sys_module } for pid=31675 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5761.151775][ T29] audit: type=1400 audit(1546424052.199:101465): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5761.598363][ T29] audit: type=1400 audit(1546424052.639:101466): avc: denied { create } for pid=32096 comm="syz.0.7173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5761.776261][ T29] audit: type=1400 audit(1546424052.819:101467): avc: denied { create } for pid=32096 comm="syz.0.7173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5761.780259][ T29] audit: type=1400 audit(1546424052.819:101468): avc: denied { write } for pid=32096 comm="syz.0.7173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5761.850249][ T29] audit: type=1400 audit(1546424052.889:101469): avc: denied { module_request } for pid=32096 comm="syz.0.7173" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5762.082541][ T29] audit: type=1400 audit(1546424053.119:101470): avc: denied { write } for pid=32094 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5762.111466][ T29] audit: type=1400 audit(1546424053.149:101471): avc: denied { write open } for pid=32094 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5762.180891][ T29] audit: type=1400 audit(1546424053.219:101472): avc: denied { search } for pid=32094 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5762.181399][ T29] audit: type=1400 audit(1546424053.219:101473): avc: denied { search } for pid=32094 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5766.136136][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 5766.137362][ T29] audit: type=1400 audit(1546424057.179:101666): avc: denied { read } for pid=32120 comm="syz.0.7176" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5766.158281][ T29] audit: type=1400 audit(1546424057.189:101667): avc: denied { read open } for pid=32120 comm="syz.0.7176" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5766.176710][ T29] audit: type=1400 audit(1546424057.219:101668): avc: denied { ioctl } for pid=32120 comm="syz.0.7176" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5766.733595][ T29] audit: type=1400 audit(1546424057.779:101669): avc: denied { module_request } for pid=31675 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5766.751418][ T29] audit: type=1400 audit(1546424057.789:101670): avc: denied { write } for pid=32123 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5766.763981][ T29] audit: type=1400 audit(1546424057.809:101671): avc: denied { write open } for pid=32123 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5766.823355][ T29] audit: type=1400 audit(1546424057.869:101672): avc: denied { search } for pid=32123 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5766.831234][ T29] audit: type=1400 audit(1546424057.869:101673): avc: denied { search } for pid=32123 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5766.831686][ T29] audit: type=1400 audit(1546424057.869:101674): avc: denied { search } for pid=32123 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5766.831770][ T29] audit: type=1400 audit(1546424057.869:101675): avc: denied { search } for pid=32123 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5768.915181][T32148] 8<--- cut here --- [ 5768.920040][T32148] Unable to handle kernel paging request at virtual address fee04f27 when write [ 5768.930286][T32148] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 5768.939859][T32148] Internal error: Oops: a06 [#1] SMP ARM [ 5768.941705][T32148] Modules linked in: [ 5768.942156][T32148] CPU: 1 UID: 0 PID: 32148 Comm: syz.0.7181 Tainted: G L syzkaller #0 PREEMPT [ 5768.942563][T32148] Tainted: [L]=SOFTLOCKUP [ 5768.942754][T32148] Hardware name: ARM-Versatile Express [ 5768.943003][T32148] PC is at parport_attach+0x174/0x1d0 [ 5768.943329][T32148] LR is at parport_attach+0x164/0x1d0 [ 5768.943594][T32148] pc : [<814013b4>] lr : [<814013a4>] psr: 60000013 [ 5768.943893][T32148] sp : df9bdd30 ip : df9bdd30 fp : df9bdd54 [ 5768.944234][T32148] r10: 82b29b30 r9 : 00000003 r8 : 84493cc0 [ 5768.944541][T32148] r7 : df9bdd90 r6 : 84493cc0 r5 : 00000000 r4 : 00000000 [ 5768.944869][T32148] r3 : fee04f27 r2 : 81e24f44 r1 : 00000001 r0 : 81401024 [ 5768.946520][T32148] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 5768.946959][T32148] Control: 30c5387d Table: 85c03d40 DAC: 00000000 [ 5768.947337][T32148] Register r0 information: non-slab/vmalloc memory [ 5768.948156][T32148] Register r1 information: non-paged memory [ 5768.948492][T32148] Register r2 information: non-slab/vmalloc memory [ 5768.948945][T32148] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 5768.950277][T32148] Register r4 information: NULL pointer [ 5768.950667][T32148] Register r5 information: NULL pointer [ 5768.951002][T32148] Register r6 information: slab kmalloc-192 start 84493cc0 pointer offset 0 size 192 [ 5768.952013][T32148] Register r7 information: 2-page vmalloc region starting at 0xdf9bc000 allocated at kernel_clone+0xac/0x3f4 [ 5768.952564][T32148] Register r8 information: slab kmalloc-192 start 84493cc0 pointer offset 0 size 192 [ 5768.953130][T32148] Register r9 information: non-paged memory [ 5768.953474][T32148] Register r10 information: non-slab/vmalloc memory [ 5768.953784][T32148] Register r11 information: 2-page vmalloc region starting at 0xdf9bc000 allocated at kernel_clone+0xac/0x3f4 [ 5768.954243][T32148] Register r12 information: 2-page vmalloc region starting at 0xdf9bc000 allocated at kernel_clone+0xac/0x3f4 [ 5768.954749][T32148] Process syz.0.7181 (pid: 32148, stack limit = 0xdf9bc000) [ 5768.955126][T32148] Stack: (0xdf9bdd30 to 0xdf9be000) [ 5768.955393][T32148] dd20: 8243d118 84493cc0 df9bdd58 829d4280 [ 5768.955757][T32148] dd40: 81e25404 00000000 df9bdd8c df9bdd58 813fcfe0 8140124c 40946400 00000000 [ 5768.956112][T32148] dd60: df9bdd7c 200000c0 84493cc0 b5403587 40946400 8320e000 00000003 84493cf0 [ 5768.956503][T32148] dd80: df9bde4c df9bdd90 813f8918 813fcee0 656d6f63 705f6964 6f707261 00007472 [ 5768.957099][T32148] dda0: 00000000 00004f27 00000401 00010000 00000004 00000005 00000cc7 00000008 [ 5768.957488][T32148] ddc0: 00000007 0000000a 00000100 00000002 00000001 00000001 00000001 00000006 [ 5768.957816][T32148] dde0: 00000101 00000000 0001a449 000048b3 40000003 00000089 0000caa7 00000000 [ 5768.958144][T32148] de00: 20001e5a 0000000b 00000e69 0000003c 02000008 00000006 00000000 fffffff8 [ 5768.958509][T32148] de20: 00000000 14e0711b 00000000 84c6c300 84493cc0 200000c0 40946400 8320e000 [ 5768.959151][T32148] de40: df9bdf14 df9bde50 813f9498 813f8850 df9bde4c 14e0711b 00000000 00000000 [ 5768.959502][T32148] de60: 824b15ec df9bdea4 0000005f 841baa30 00000064 8458636c df9bdee4 df9bde88 [ 5768.960431][T32148] de80: 807b4124 807aa7a0 00000064 00000001 00000000 df9bdea4 865b7550 834dd3b8 [ 5768.961127][T32148] dea0: 00006400 0000000b df9bde98 00000000 df9bdd38 14e0711b 00000000 84c6c300 [ 5768.961553][T32148] dec0: 40946400 200000c0 200000c0 84c6c300 00000003 8320e000 df9bdef4 df9bdee8 [ 5768.961967][T32148] dee0: 807b4254 14e0711b df9bdf14 00000000 84c6c301 40946400 200000c0 84c6c300 [ 5768.962351][T32148] df00: 00000003 8320e000 df9bdfa4 df9bdf18 805821a4 813f93a0 ecac8b10 8320e000 [ 5768.962766][T32148] df20: df9bdf3c df9bdf30 81aa6e78 81aa6d48 df9bdf54 df9bdf40 8025ba7c 8028ef68 [ 5768.963149][T32148] df40: df9bdfb0 40000000 df9bdf84 df9bdf58 80221a54 8025ba38 00000000 8281cf7c [ 5768.963560][T32148] df60: df9bdfb0 0013ddc0 ecac8b10 802219a8 00000000 14e0711b df9bdfac 00000000 [ 5768.963982][T32148] df80: 00000000 00346310 00000036 8020029c 8320e000 00000036 00000000 df9bdfa8 [ 5768.964382][T32148] dfa0: 80200060 80581f6c 00000000 00000000 00000003 40946400 200000c0 00000000 [ 5768.964755][T32148] dfc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f400dc [ 5768.965138][T32148] dfe0: 76f3fe88 76f3fe78 00018734 0012fc20 60000010 00000003 00000000 00000000 [ 5768.965550][T32148] Call trace: [ 5768.965792][T32148] [<81401240>] (parport_attach) from [<813fcfe0>] (comedi_device_attach+0x10c/0x248) [ 5768.966279][T32148] r6:00000000 r5:81e25404 r4:829d4280 [ 5768.966569][T32148] [<813fced4>] (comedi_device_attach) from [<813f8918>] (do_devconfig_ioctl+0xd4/0x21c) [ 5768.967020][T32148] r10:84493cf0 r9:00000003 r8:8320e000 r7:40946400 r6:b5403587 r5:84493cc0 [ 5768.967406][T32148] r4:200000c0 [ 5768.967573][T32148] [<813f8844>] (do_devconfig_ioctl) from [<813f9498>] (comedi_unlocked_ioctl+0x104/0x1c80) [ 5768.968012][T32148] r8:8320e000 r7:40946400 r6:200000c0 r5:84493cc0 r4:84c6c300 [ 5768.968354][T32148] [<813f9394>] (comedi_unlocked_ioctl) from [<805821a4>] (sys_ioctl+0x244/0xb58) [ 5768.968810][T32148] r10:8320e000 r9:00000003 r8:84c6c300 r7:200000c0 r6:40946400 r5:84c6c301 [ 5768.969201][T32148] r4:00000000 [ 5768.969376][T32148] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5768.971047][T32148] Exception stack(0xdf9bdfa8 to 0xdf9bdff0) [ 5768.972029][T32148] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 5768.972620][T32148] dfc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f400dc [ 5768.973306][T32148] dfe0: 76f3fe88 76f3fe78 00018734 0012fc20 [ 5768.973636][T32148] r10:00000036 r9:8320e000 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 5768.973994][T32148] r4:00000000 [ 5768.974618][T32148] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 5768.976631][T32148] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 5769.027199][T32148] Kernel panic - not syncing: Fatal exception [ 5769.029161][T32148] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:50:55 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=eac15954 R02=86a34800 R03=00000001 R04=86a34800 R05=00000000 R06=8022c974 R07=0000027e R08=82aee114 R09=807a9550 R10=82aee118 R11=eac1592c R12=eac158d0 R13=eac15970 R14=81ab4850 R15=8022c974 PSR=60070093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=81ab4500 R02=00000000 R03=81ab43f0 R04=82aee110 R05=00000000 R06=82aed78c R07=000003a0 R08=82aee114 R09=807a9550 R10=82aee118 R11=df965cac R12=df965c68 R13=df965c68 R14=81ab4850 R15=802ce668 PSR=20010093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000