last executing test programs: 37m52.933635061s ago: executing program 1 (id=1172): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x24088004}, 0x20004804) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x20000000) (fail_nth: 2) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 37m52.652276776s ago: executing program 1 (id=1173): r0 = syz_usb_connect$cdc_ecm(0x5, 0x4d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010002020000082505a1a44000010203010902"], 0x0) syz_usb_disconnect(r0) r1 = socket$inet6(0x10, 0x3, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x5451, 0x0) r2 = openat$vcs(0xffffff9c, &(0x7f0000001c80), 0x40040, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x140, 0x102) getsockname$unix(r2, &(0x7f0000000280), &(0x7f0000000300)=0x6e) syz_usb_connect$cdc_ncm(0x4, 0x91, &(0x7f0000000080)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7f, 0x2, 0x1, 0x2, 0x10, 0x7f, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "1158"}, {0x5, 0x24, 0x0, 0xffff}, {0xd, 0x24, 0xf, 0x1, 0x1000, 0x0, 0x5, 0x1}, {0x6, 0x24, 0x1a, 0x6, 0x21}, [@call_mgmt={0x5, 0x24, 0x1, 0x3}, @mdlm={0x15, 0x24, 0x12, 0x5}, @dmm={0x7, 0x24, 0x14, 0x7, 0x433}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0xb, 0x3, 0xf}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400, 0x9, 0x80, 0x5}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x2, 0x1, 0x2}}}}}}}]}}, &(0x7f0000000640)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x310, 0x8, 0x9, 0x5, 0x40, 0x8}, 0xeb, &(0x7f0000000180)={0x5, 0xf, 0xeb, 0x2, [@generic={0xdf, 0x10, 0x1, "d77af7d6e92b4071334f1d99fbbddbbf3257527f8fbe9c3f9ce442010179193570845203eb36aae47341e325b3351d423b3f3784b066d335300179912611344cb0e95f99e8d13fb13b4e721599737a754748ffbe2591c4196278c6b6f58ae124af8559feae920040fc5cb3c17801d084058f2d8c3bf8f5de9ec766eeafc72a4d2f44c02693664a1ab06b1b002ca300644a493d9116d3e8e0803e039d2cee2a6bbd58f6452ea5eb74d1dd525a6c84314c18d6a5ca4c219e896fc43a1e8fedbc26279aa406b73b49574bb881afcc6c5542ed54e57ba066d1fd7d9a7441"}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x3, 0xf, 0x7f}]}, 0x7, [{0xbc, &(0x7f00000006c0)=ANY=[@ANYBLOB="bc031cc4ff07966b5ab065a10ec7444142b499cc7375bdac25b10685fa3e0b4616ff8764951c0ab64df35f98e1cf5d7d7b010edf57a16c20edd2419b4913928eae95961735e85e25c82d55a52ffdc0d383dc57357b74332f18321b973ed1f055a64c66d5f2e3c5fb6f5f7c0ee4b2cb4e0874f3a6eafe2038de65a120f238fa8422184a79b9f37dbe26207bc9de5723f51d722398c8a48fc24ce4a8785cf02a6e6fc23638d31413f65428290d37d0a98bf9419d30a1449b54c780e14a6564090de6e2639ac49bf54364f9a3b0"]}, {0xa2, &(0x7f0000000340)=@string={0xa2, 0x3, "241247897a1d5dda41ec898e0d8d6e6ff442380a73f5cb070fdde75890445ac94c4a25842c483dac1f65ac4920e17b47ab1392d41e597a770d09d3d9bbc6a48b6a44ff9fd27bbbb1be3878c0de9ce31fb01e33c89e6f4e2e0d507ae4c7b641e2402d5cceb2c10fa6278dd8657a459dbdd23ab4c4a35d7e1c2e81ec77acb4b901456add447b764bbe957025f823b8c85fb585f9528a10d9566b888a58546ae6c8"}}, {0xdd, &(0x7f0000000400)=@string={0xdd, 0x3, "3255f94b8cf877cbc071fda65bf48365873dbc1c2167a29a0b6e6a08741c35b064d8f0ff09462ffefc9a5e3555f7d4ff9cd9c0c3c575cf8a913cda7458da8502e1f6d6a33a957abee0da5056e5a1882b88b557bc2aaf993a84293f2cc4a4ce5e1643b98bb98a3698c16dd0af529f828170fcfca2a8da395537db9eb4b568cb71bd107c732ade13fc90a9a41289dc3c581428beeb2302d9374b4c39a0a259c07909ce4b555f63405ded12bd610f0e4cc070042a76f85707ae9ac20bba5525eb03e8c799e78e0047511cf92f3626a8fc3484bf8d419bcf804145d3b9"}}, {0xba, &(0x7f0000000500)=@string={0xba, 0x3, "86beb9cbaed23c2e8ffaaf5e8a1fa4c7273277707891ff44c4dedb7c798400e8f66a89bc0d96529c96ad9a619c11970cac5806ffd0873783293eecffb43a4c24d2a72b8f5ebdb0b62c9a1d009f8c521e0e8aa01e55ae762dbfd01d3b8d8a724833ccf2f2df5db4a07ae6e327db2ecd69c8dd65351f497a2c892ee2c5498c8b874cc194bd5d4ba1d135084b57773d5dc2dbd469da0782698ebcb78a43d3eb6827113249e04a21372a80c3d4df51e50a100c12d8fc54754377"}}, {0x4, &(0x7f00000005c0)=@lang_id={0x4, 0x3, 0x280a}}, {0x0, 0xfffffffffffffffe}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x41d}}]}) syz_usb_control_io(r0, 0x0, 0x0) 37m51.603127885s ago: executing program 1 (id=1176): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000200)={0x1d, r1, 0x1}, 0x18) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f000000a4c0)={0x0, 0x0, &(0x7f000000a480)={&(0x7f0000000280)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x6c}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000800}, 0x8044) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x8) 37m50.25486621s ago: executing program 1 (id=1177): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$TIOCGISO7816(r1, 0x5452, &(0x7f0000000040)) r2 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCOUTQNSD(r2, 0x5421, &(0x7f0000000000)) close_range(r0, r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)={0x2c, 0x6, 0x0, {0x5, 0x4, 0x3, 0x0, '^\t['}}, 0x2c) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2014800, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x204) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) recvmsg$can_raw(r6, &(0x7f00000001c0)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendto$l2tp6(r0, &(0x7f0000000040)="add45d", 0x3, 0x4008050, 0x0, 0x0) 37m49.782137248s ago: executing program 1 (id=1179): r0 = socket(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 37m49.422447885s ago: executing program 1 (id=1180): r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$tcp_congestion(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = dup(r1) write$vga_arbiter(r2, &(0x7f0000000f80)=@other={'trylock', ' ', 'io'}, 0xb) sendto$inet(r0, 0x0, 0x0, 0x1, &(0x7f0000000c80)={0x2, 0x4e22, @broadcast}, 0x10) 37m49.422254715s ago: executing program 32 (id=1180): r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$tcp_congestion(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = dup(r1) write$vga_arbiter(r2, &(0x7f0000000f80)=@other={'trylock', ' ', 'io'}, 0xb) sendto$inet(r0, 0x0, 0x0, 0x1, &(0x7f0000000c80)={0x2, 0x4e22, @broadcast}, 0x10) 34m36.234938786s ago: executing program 2 (id=1466): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x2, 0x1}, 0xff}, 0x18) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x4031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), r0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4008010) 34m35.398256821s ago: executing program 2 (id=1467): openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x91a2f0007feb3929, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) dup2(0xffffffffffffffff, r0) getsockname$unix(r0, 0x0, &(0x7f0000000100)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = dup2(r1, r1) ioctl$IOMMU_GET_HW_INFO(r2, 0x3b8a, &(0x7f0000000240)={0x28, 0x0, 0x0, 0xd4, &(0x7f0000000140)=""/212}) 34m35.290606173s ago: executing program 2 (id=1468): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000804) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4001}, 0x80) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 34m34.702208204s ago: executing program 2 (id=1469): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x10000}) mkdir(&(0x7f0000000080)='./file1\x00', 0x40) mount(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x800, &(0x7f0000000300)='usrquota') r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000280)='.pending_reads\x00', 0x40040, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20040004) chdir(&(0x7f0000000140)='./file1\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000100), 0x272a80, 0x0) syz_clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0) close(r2) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = dup2(r4, r4) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000800}, 0x20008044) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001a40)) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000001c0)) quotactl_fd$Q_SETQUOTA(r1, 0xffffffff80000800, 0x0, &(0x7f0000000340)={0xb, 0x4, 0x1, 0x3, 0x0, 0x6a1c000, 0x5e96, 0x800000000000001, 0x7fff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r6, 0xc0189436, &(0x7f0000000f00)={'sit0\x00', &(0x7f0000000e80)={@multicast1}}) mknod(&(0x7f0000000040)='./file0\x00', 0x1000, 0x0) 34m34.569702136s ago: executing program 2 (id=1470): sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000804) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x80, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x80}, 0x1, 0x0, 0x0, 0x4001}, 0x80) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 34m34.296514932s ago: executing program 2 (id=1472): r0 = openat$zero(0xffffff9c, &(0x7f0000000080), 0x6a0903, 0x0) close(r0) fcntl$F_GET_FILE_RW_HINT(r0, 0x9, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000024c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000002580)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000002540)={&(0x7f0000002500)={0x34, r1, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x85}, 0x40042) 34m34.293859462s ago: executing program 33 (id=1472): r0 = openat$zero(0xffffff9c, &(0x7f0000000080), 0x6a0903, 0x0) close(r0) fcntl$F_GET_FILE_RW_HINT(r0, 0x9, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000024c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000002580)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000002540)={&(0x7f0000002500)={0x34, r1, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x85}, 0x40042) 23m57.650961142s ago: executing program 3 (id=2039): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$poke(0x5, r0, &(0x7f0000000200), 0x0) 23m57.572169044s ago: executing program 3 (id=2040): syz_usb_connect(0x5, 0x36, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) chdir(&(0x7f0000000140)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040), 0x208e24b) 23m42.287983693s ago: executing program 3 (id=2042): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1) syz_open_procfs(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_clone(0x2a801400, 0x0, 0x0, 0x0, 0x0, 0x0) syslog(0x4, &(0x7f0000000140)=""/179, 0xb3) 23m33.620747746s ago: executing program 3 (id=2043): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000013906c08e90f01db9be9010203010902120001000000000904"], 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x400, 0x48940) 23m33.541832838s ago: executing program 3 (id=2044): r0 = socket(0x400000000010, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x100, 0xe}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r6, {0xc, 0xc}, {0x0, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) 23m33.051218437s ago: executing program 3 (id=2045): sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x20008084) socket$kcm(0x10, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad00"/16, 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) 22m47.819622075s ago: executing program 34 (id=2045): sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x20008084) socket$kcm(0x10, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad00"/16, 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) 26.493096606s ago: executing program 0 (id=4158): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x208240, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x5, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x7fffe, {0x0, 0x0, 0x0, r7, {0x0, 0xfff3}, {0xb, 0xb}, {0x2, 0xb}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x6, 0x808, 0xa4b6, 0x1, 0xc}, 0xb, 0x0, 0x32, 0x5, 0xb, 0x7, 0x9, 0x1a, 0x1, 0xffffff5c, {0xffff1c72, 0x23, 0x4, 0x6, 0xfffffffe, 0x7583}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x404c800}, 0x44000) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) sendto$packet(r4, &(0x7f00000002c0)="0503d6fcd3fc140000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x86dd, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) 25.629445492s ago: executing program 0 (id=4159): sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) unshare(0x2c020400) r3 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') r4 = openat$binfmt(0xffffffffffffff9c, r3, 0x42, 0x1ff) write$binfmt_script(r4, &(0x7f0000000080)={'#! ', './file1'}, 0xb) close(r4) execveat$binfmt(0xffffffffffffff9c, r3, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.parent_freezing\x00', 0x275a, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4f}, {}, {0x0, 0x3}}, {{@in6=@mcast2, 0x404d3, 0x2b}, 0x0, @in=@empty}}, 0xe8) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x10}}, 0x0) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) close(r5) 20.408714017s ago: executing program 4 (id=4165): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000580)={0x3c, 0xb, '\x00', [@generic={0x64, 0x56, "69ec32bc5aba5d3dca430c165d4b8c237469b66081c9e08c1601ae71c134ff3c8102290b81ee1c7df7bd2a7eebdc38bfa43f5e2daa73df8efe1f005cc7c73b10c646e051690a69c693c5d66e570a5b991c6a6cf423c6"}]}, 0x60) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\t\x00F', 0x14, 0x6, 0x0, @empty, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x1}}}}}}}, 0x0) 20.137979002s ago: executing program 4 (id=4166): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r1, {0x0, 0xfff3}, {0xffff, 0xffff}, {0xffe0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}]}, 0x40}}, 0x4c840) 19.508562273s ago: executing program 4 (id=4167): r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000740)=""/70, &(0x7f00000007c0)=0x46) 18.871308136s ago: executing program 4 (id=4168): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x180) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000004180)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x90, 0x0, 0xffffffffffffffff, {0xffffffffffffffff, 0x2, 0x101, 0x0, 0x0, 0x10000000, {0x40, 0xd08, 0x4, 0x2, 0x4, 0x0, 0x7, 0x0, 0x122, 0x6000, 0x10000, 0x0, r2, 0x982}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000440)={0x50, 0x0, r1, {0x7, 0x29, 0x0, 0x0, 0x0, 0x2, 0xfffffffd, 0x2, 0x0, 0x0, 0x0, 0x1}}, 0x50) r3 = openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x3) ioctl$TIOCGPTPEER(r3, 0x4004092b, 0x200000000005) 17.649867078s ago: executing program 4 (id=4169): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6(0xa, 0x80001, 0x0) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r4, 0x3b82, &(0x7f0000000180)={0x18, r5, 0x1, 0x0, &(0x7f0000000140)=[{0x0, 0x1000}]}) ioctl$IOMMU_IOAS_MAP(r4, 0x3b85, &(0x7f0000000000)={0x28, 0x6, r5, 0x0, 0x0, 0x0, 0x56149216}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, 0x0, 0x310) epoll_create1(0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) readv(r7, &(0x7f0000000040), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000034c0)={0x2020}, 0x2020) 7.410973565s ago: executing program 0 (id=4170): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001040)=@newtfilter={0x44, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0xb, 0xc}, {0x0, 0xfff3}, {0xd, 0x10}}, [@filter_kind_options=@f_route={{0xa}, {0x14, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x1c}, @TCA_ROUTE4_FROM={0x8, 0x3, 0x3ff}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) 6.888351554s ago: executing program 0 (id=4171): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() open(0x0, 0x0, 0x112) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) ioprio_set$pid(0x2, 0x0, 0x4000) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r3, 0x0, 0x0) 2.042026842s ago: executing program 0 (id=4172): socket$unix(0x1, 0x1, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006800e9782bbd7000ffdbdf250a0000000000000008000500", @ANYRES32=r2], 0x20}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000006800010003001000fdffff7f00000000000000000c00020001000000150000000c000c8006000100d43f000006000300010000005e5214d7fdbf019b"], 0x38}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) 1.271543626s ago: executing program 0 (id=4173): capget(0x0, 0x0) capget(0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) prlimit64(r0, 0xf, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_clone(0x2080, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) 0s ago: executing program 4 (id=4174): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x64) kernel console output (not intermixed with test programs): _u:object_r:tmpfs_t tclass=file permissive=1 [ 2711.306023][ T28] audit: type=1400 audit(2967.271:3838): avc: denied { search } for pid=19849 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2711.308933][ T28] audit: type=1400 audit(2967.271:3839): avc: denied { search } for pid=19849 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2711.371170][ T28] audit: type=1400 audit(2967.271:3840): avc: denied { search } for pid=19849 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2711.374500][ T28] audit: type=1400 audit(2967.341:3841): avc: denied { getattr } for pid=19849 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth13.link" dev="tmpfs" ino=127 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2711.417603][ T28] audit: type=1400 audit(2967.381:3842): avc: denied { write } for pid=19849 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2711.443382][ T28] audit: type=1400 audit(2967.411:3843): avc: denied { write open } for pid=19849 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.279364][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 2716.281611][ T28] audit: type=1400 audit(2972.251:3907): avc: denied { read write } for pid=19880 comm="syz.0.3921" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.319128][ T28] audit: type=1400 audit(2972.281:3908): avc: denied { read write open } for pid=19880 comm="syz.0.3921" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.341056][ T28] audit: type=1400 audit(2972.311:3909): avc: denied { ioctl } for pid=19880 comm="syz.0.3921" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.369880][ T28] audit: type=1400 audit(2972.341:3910): avc: denied { ioctl } for pid=19880 comm="syz.0.3921" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.410219][ T28] audit: type=1400 audit(2972.361:3911): avc: denied { create } for pid=19882 comm="syz.4.3922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2716.424720][ T28] audit: type=1400 audit(2972.391:3912): avc: denied { ioctl } for pid=19882 comm="syz.4.3922" path="socket:[44592]" dev="sockfs" ino=44592 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2716.425155][ T28] audit: type=1400 audit(2972.391:3913): avc: denied { bind } for pid=19882 comm="syz.4.3922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2716.458677][ T28] audit: type=1400 audit(2972.421:3914): avc: denied { write } for pid=19882 comm="syz.4.3922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2716.473499][ T28] audit: type=1400 audit(2972.441:3915): avc: denied { ioctl } for pid=19880 comm="syz.0.3921" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x4506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.771417][ T28] audit: type=1400 audit(2972.741:3916): avc: denied { create } for pid=19885 comm="syz.0.3923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2721.418965][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 2721.420142][ T28] audit: type=1400 audit(2977.391:3948): avc: denied { create } for pid=19899 comm="syz.0.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2721.435021][ T28] audit: type=1400 audit(2977.401:3949): avc: denied { create } for pid=19899 comm="syz.0.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2721.461150][ T28] audit: type=1400 audit(2977.431:3950): avc: denied { write } for pid=19899 comm="syz.0.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2721.477110][ T28] audit: type=1400 audit(2977.441:3951): avc: denied { module_request } for pid=19899 comm="syz.0.3928" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2721.769039][ T28] audit: type=1400 audit(2977.731:3952): avc: denied { read } for pid=19899 comm="syz.0.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2721.810253][ T28] audit: type=1400 audit(2977.781:3953): avc: denied { write } for pid=19899 comm="syz.0.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2721.857202][ T28] audit: type=1400 audit(2977.821:3954): avc: denied { read write } for pid=19899 comm="syz.0.3928" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2721.884917][ T28] audit: type=1400 audit(2977.851:3955): avc: denied { read write open } for pid=19899 comm="syz.0.3928" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2721.912054][ T28] audit: type=1400 audit(2977.881:3956): avc: denied { ioctl } for pid=19899 comm="syz.0.3928" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2721.962604][ T28] audit: type=1400 audit(2977.931:3957): avc: denied { read write } for pid=19899 comm="syz.0.3928" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2727.401181][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 2727.401540][ T28] audit: type=1400 audit(2983.371:4037): avc: denied { create } for pid=19934 comm="syz.4.3938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2727.580606][ T28] audit: type=1400 audit(2983.551:4038): avc: denied { read } for pid=19936 comm="syz.4.3939" name="userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2727.581917][ T28] audit: type=1400 audit(2983.551:4039): avc: denied { read open } for pid=19936 comm="syz.4.3939" path="/dev/userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2727.589982][ T28] audit: type=1400 audit(2983.561:4040): avc: denied { ioctl } for pid=19936 comm="syz.4.3939" path="/dev/userfaultfd" dev="devtmpfs" ino=84 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2727.591577][ T28] audit: type=1400 audit(2983.561:4041): avc: denied { create } for pid=19936 comm="syz.4.3939" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2727.606422][ T28] audit: type=1400 audit(2983.571:4042): avc: denied { ioctl } for pid=19936 comm="syz.4.3939" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=45168 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2727.623916][ T28] audit: type=1400 audit(2983.591:4043): avc: denied { create } for pid=19936 comm="syz.4.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2727.638076][ T28] audit: type=1400 audit(2983.611:4044): avc: denied { create } for pid=19936 comm="syz.4.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2727.642965][ T28] audit: type=1400 audit(2983.611:4045): avc: denied { write } for pid=19936 comm="syz.4.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2727.657979][ T28] audit: type=1400 audit(2983.631:4046): avc: denied { write } for pid=19936 comm="syz.4.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2732.112859][T19968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19968 comm=syz.4.3949 [ 2732.749116][ T28] kauditd_printk_skb: 85 callbacks suppressed [ 2732.749526][ T28] audit: type=1400 audit(2988.721:4130): avc: denied { create } for pid=19969 comm="syz.0.3950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2733.031170][ T28] audit: type=1400 audit(2989.001:4131): avc: denied { create } for pid=19971 comm="syz.0.3951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2733.062572][ T28] audit: type=1400 audit(2989.031:4132): avc: denied { setopt } for pid=19971 comm="syz.0.3951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2733.312975][ T28] audit: type=1400 audit(2989.281:4133): avc: denied { read write } for pid=19973 comm="syz.0.3952" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2733.326797][ T28] audit: type=1400 audit(2989.281:4134): avc: denied { ioctl open } for pid=19973 comm="syz.0.3952" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2733.331041][ T28] audit: type=1400 audit(2989.301:4135): avc: denied { read write } for pid=19973 comm="syz.0.3952" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2733.334625][ T28] audit: type=1400 audit(2989.301:4136): avc: denied { read write open } for pid=19973 comm="syz.0.3952" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2733.368639][ T28] audit: type=1400 audit(2989.341:4137): avc: denied { create } for pid=19973 comm="syz.0.3952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2733.385534][ T28] audit: type=1400 audit(2989.351:4138): avc: denied { create } for pid=19973 comm="syz.0.3952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2733.409543][ T28] audit: type=1400 audit(2989.371:4139): avc: denied { write } for pid=19973 comm="syz.0.3952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2736.113287][T19984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19984 comm=syz.0.3956 [ 2736.131008][T19984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19984 comm=syz.0.3956 [ 2738.932844][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 2738.933181][ T28] audit: type=1400 audit(2994.901:4180): avc: denied { read append } for pid=19994 comm="syz.0.3961" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2738.951013][ T28] audit: type=1400 audit(2994.911:4181): avc: denied { read append open } for pid=19994 comm="syz.0.3961" path="/dev/vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2738.967804][ T28] audit: type=1400 audit(2994.931:4182): avc: denied { setattr } for pid=19994 comm="syz.0.3961" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2739.240426][ T28] audit: type=1400 audit(2995.211:4183): avc: denied { create } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2739.276973][ T28] audit: type=1400 audit(2995.241:4184): avc: denied { write } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2739.279237][ T28] audit: type=1400 audit(2995.251:4185): avc: denied { read } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2739.281175][ T28] audit: type=1400 audit(2995.251:4186): avc: denied { read } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2739.282337][ T28] audit: type=1400 audit(2995.251:4187): avc: denied { write } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2739.285629][ T28] audit: type=1400 audit(2995.251:4188): avc: denied { read } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2739.305226][ T28] audit: type=1400 audit(2995.271:4189): avc: denied { write } for pid=19996 comm="syz.0.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2744.057891][ T28] kauditd_printk_skb: 70 callbacks suppressed [ 2744.058981][ T28] audit: type=1400 audit(3000.031:4260): avc: denied { create } for pid=20020 comm="syz.4.3969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2744.065006][ T28] audit: type=1400 audit(3000.031:4261): avc: denied { ioctl } for pid=20020 comm="syz.4.3969" path="socket:[45338]" dev="sockfs" ino=45338 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2744.190330][ T28] audit: type=1400 audit(3000.161:4262): avc: denied { create } for pid=20020 comm="syz.4.3969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2744.193741][ T28] audit: type=1400 audit(3000.161:4263): avc: denied { create } for pid=20022 comm="syz.0.3970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2744.224420][ T28] audit: type=1400 audit(3000.191:4264): avc: denied { setattr } for pid=20020 comm="syz.4.3969" name="RAW" dev="sockfs" ino=44768 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2744.239190][ T28] audit: type=1400 audit(3000.211:4265): avc: denied { ioctl } for pid=20022 comm="syz.0.3970" path="socket:[45344]" dev="sockfs" ino=45344 ioctlcmd=0x702 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2744.250941][ T28] audit: type=1400 audit(3000.221:4266): avc: denied { write } for pid=20022 comm="syz.0.3970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2744.270531][ T28] audit: type=1400 audit(3000.241:4267): avc: denied { bind } for pid=20020 comm="syz.4.3969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2744.296433][ T28] audit: type=1400 audit(3000.251:4268): avc: denied { write } for pid=20020 comm="syz.4.3969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2744.603578][ T28] audit: type=1400 audit(3000.571:4269): avc: denied { create } for pid=20026 comm="syz.0.3972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2746.400236][T20033] FAULT_INJECTION: forcing a failure. [ 2746.400236][T20033] name failslab, interval 1, probability 0, space 0, times 0 [ 2746.402596][T20033] CPU: 0 UID: 0 PID: 20033 Comm: syz.0.3974 Tainted: G L syzkaller #0 PREEMPT [ 2746.402704][T20033] Tainted: [L]=SOFTLOCKUP [ 2746.402743][T20033] Hardware name: ARM-Versatile Express [ 2746.402772][T20033] Call trace: [ 2746.402813][T20033] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2746.402953][T20033] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2746.402992][T20033] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2746.403057][T20033] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2746.403113][T20033] r7:00000000 r6:00000000 r5:84776e40 r4:82b17e08 [ 2746.403129][T20033] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2746.403194][T20033] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2746.403292][T20033] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 2746.403312][T20033] [<8054ef68>] (should_failslab) from [<8052d5d4>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 2746.403386][T20033] [<8052d52c>] (__kmalloc_node_track_caller_noprof) from [<804bc750>] (kmemdup_noprof+0x28/0x44) [ 2746.403454][T20033] r10:00044000 r9:864ce004 r8:eca35bd8 r7:83195000 r6:84e9aed8 r5:eca35bd0 [ 2746.403475][T20033] r4:00000017 [ 2746.403491][T20033] [<804bc728>] (kmemdup_noprof) from [<807e9bd0>] (sidtab_sid2str_get+0x54/0xa4) [ 2746.403592][T20033] r7:83195000 r6:eca35bd8 r5:eca35bd0 r4:847ce0c0 [ 2746.403631][T20033] [<807e9b7c>] (sidtab_sid2str_get) from [<807f1160>] (sidtab_entry_to_string+0x34/0x94) [ 2746.403700][T20033] r7:83195000 r6:847ce0c0 r5:eca35bd0 r4:0000005f [ 2746.403719][T20033] [<807f112c>] (sidtab_entry_to_string) from [<807f12d8>] (security_sid_to_context_core+0x118/0x17c) [ 2746.403816][T20033] r9:eca35cf4 r8:83195000 r7:864ce004 r6:eca35bd8 r5:eca35bd0 r4:0000005f [ 2746.403836][T20033] [<807f11c0>] (security_sid_to_context_core) from [<807f422c>] (security_sid_to_context+0x1c/0x24) [ 2746.403948][T20033] r8:807d3c48 r7:807d49c0 r6:84776e40 r5:830ac508 r4:eca35c60 [ 2746.403987][T20033] [<807f4210>] (security_sid_to_context) from [<807d4a40>] (avc_audit_post_callback+0x80/0x32c) [ 2746.404053][T20033] [<807d49c0>] (avc_audit_post_callback) from [<807fc7c8>] (common_lsm_audit+0x108/0x14c) [ 2746.404133][T20033] r10:00044000 r9:eca35cf4 r8:807d3c48 r7:807d49c0 r6:eca35cf4 r5:830ac508 [ 2746.404154][T20033] r4:84777668 [ 2746.404170][T20033] [<807fc6c0>] (common_lsm_audit) from [<807d4f04>] (slow_avc_audit+0xbc/0x114) [ 2746.404236][T20033] r8:00000049 r7:00000000 r6:0000005f r5:0000005f r4:0000005f [ 2746.404325][T20033] [<807d4e48>] (slow_avc_audit) from [<807d5958>] (avc_has_perm+0xe4/0xf4) [ 2746.404382][T20033] r5:0000005f r4:00000004 [ 2746.404400][T20033] [<807d5874>] (avc_has_perm) from [<807dc01c>] (sock_has_perm+0xd0/0xfc) [ 2746.404462][T20033] r9:00000000 r8:84776e40 r7:86349840 r6:00000004 r5:86898000 r4:00000000 [ 2746.404483][T20033] [<807dbf4c>] (sock_has_perm) from [<807dc0d0>] (selinux_socket_sendmsg+0x18/0x1c) [ 2746.404552][T20033] r8:eca35dcc r7:00000000 r6:00000014 r5:eca35f20 r4:83646540 [ 2746.404609][T20033] [<807dc0b8>] (selinux_socket_sendmsg) from [<807ce05c>] (security_socket_sendmsg+0x80/0x1d4) [ 2746.404672][T20033] [<807cdfdc>] (security_socket_sendmsg) from [<815de7a4>] (__sock_sendmsg+0x1c/0x78) [ 2746.404741][T20033] r7:00000000 r6:83646540 r5:eca35f20 r4:eca35f20 [ 2746.404760][T20033] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2746.404835][T20033] r7:00000000 r6:00000000 r5:83646540 r4:eca35f20 [ 2746.404870][T20033] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2746.404966][T20033] r10:00000128 r9:20000140 r8:00044000 r7:00000000 r6:83646540 r5:eca35f20 [ 2746.404988][T20033] r4:00000000 [ 2746.405012][T20033] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2746.405072][T20033] r9:84776e40 r8:86617180 r7:00044000 r6:20000140 r5:86617181 r4:00000003 [ 2746.405092][T20033] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2746.405149][T20033] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2746.405168][T20033] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2746.405258][T20033] Exception stack(0xeca35fa8 to 0xeca35ff0) [ 2746.405299][T20033] 5fa0: 00000000 00000000 00000003 20000140 00044000 00000000 [ 2746.405330][T20033] 5fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f420dc [ 2746.405355][T20033] 5fe0: 76f41e88 76f41e78 00018e58 001307a0 [ 2746.763667][T20035] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2746.768231][T20035] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2749.244170][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 2749.244570][ T28] audit: type=1400 audit(3005.211:4303): avc: denied { read write } for pid=20054 comm="syz.4.3983" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.248555][ T28] audit: type=1400 audit(3005.221:4304): avc: denied { read write open } for pid=20054 comm="syz.4.3983" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.273347][ T28] audit: type=1400 audit(3005.241:4305): avc: denied { ioctl } for pid=20054 comm="syz.4.3983" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.359569][ T28] audit: type=1400 audit(3005.331:4306): avc: denied { read write } for pid=20054 comm="syz.4.3983" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.361937][ T28] audit: type=1400 audit(3005.331:4307): avc: denied { read write open } for pid=20054 comm="syz.4.3983" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.384193][ T28] audit: type=1400 audit(3005.351:4308): avc: denied { ioctl } for pid=20054 comm="syz.4.3983" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.710368][ T28] audit: type=1400 audit(3005.681:4309): avc: denied { read write } for pid=20059 comm="syz.4.3984" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.712584][ T28] audit: type=1400 audit(3005.681:4310): avc: denied { read write open } for pid=20059 comm="syz.4.3984" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2749.729685][ T28] audit: type=1400 audit(3005.701:4311): avc: denied { mounton } for pid=20059 comm="syz.4.3984" path="/423/file0" dev="tmpfs" ino=2218 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2749.730214][T20060] fuse: Bad value for 'fd' [ 2750.252602][ T28] audit: type=1400 audit(3006.221:4312): avc: denied { read } for pid=20059 comm="syz.4.3984" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2752.794882][T20068] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=4 sclass=netlink_tcpdiag_socket pid=20068 comm=syz.0.3987 [ 2754.716744][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 2754.717074][ T28] audit: type=1400 audit(3010.681:4345): avc: denied { create } for pid=20078 comm="syz.4.3992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.742276][ T28] audit: type=1400 audit(3010.711:4346): avc: denied { ioctl } for pid=20078 comm="syz.4.3992" path="socket:[44868]" dev="sockfs" ino=44868 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.760018][ T28] audit: type=1400 audit(3010.731:4347): avc: denied { bind } for pid=20078 comm="syz.4.3992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.777017][ T28] audit: type=1400 audit(3010.741:4348): avc: denied { write } for pid=20078 comm="syz.4.3992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.921136][ T28] audit: type=1400 audit(3010.891:4349): avc: denied { create } for pid=20080 comm="syz.0.3993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.927936][ T28] audit: type=1400 audit(3010.901:4350): avc: denied { ioctl } for pid=20080 comm="syz.0.3993" path="socket:[45437]" dev="sockfs" ino=45437 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.937920][ T28] audit: type=1400 audit(3010.901:4351): avc: denied { bind } for pid=20080 comm="syz.0.3993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.961202][ T28] audit: type=1400 audit(3010.931:4352): avc: denied { write } for pid=20080 comm="syz.0.3993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2754.993672][ T28] audit: type=1400 audit(3010.961:4353): avc: denied { write } for pid=20080 comm="syz.0.3993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2755.214625][ T28] audit: type=1400 audit(3011.181:4354): avc: denied { create } for pid=20082 comm="syz.4.3994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2760.280556][ T28] kauditd_printk_skb: 81 callbacks suppressed [ 2760.281088][ T28] audit: type=1400 audit(3016.251:4436): avc: denied { create } for pid=20111 comm="syz.4.4004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.312999][ T28] audit: type=1400 audit(3016.281:4437): avc: denied { ioctl } for pid=20111 comm="syz.4.4004" path="socket:[45483]" dev="sockfs" ino=45483 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.351044][ T28] audit: type=1400 audit(3016.311:4438): avc: denied { bind } for pid=20111 comm="syz.4.4004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.359248][ T28] audit: type=1400 audit(3016.331:4439): avc: denied { write } for pid=20111 comm="syz.4.4004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.417009][ T28] audit: type=1400 audit(3016.381:4440): avc: denied { create } for pid=20113 comm="syz.0.4005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.436559][ T28] audit: type=1400 audit(3016.401:4441): avc: denied { ioctl } for pid=20113 comm="syz.0.4005" path="socket:[45486]" dev="sockfs" ino=45486 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.442703][ T28] audit: type=1400 audit(3016.411:4442): avc: denied { bind } for pid=20113 comm="syz.0.4005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.450245][ T28] audit: type=1400 audit(3016.421:4443): avc: denied { write } for pid=20113 comm="syz.0.4005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.458086][ T28] audit: type=1400 audit(3016.421:4444): avc: denied { write } for pid=20113 comm="syz.0.4005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2760.632959][ T28] audit: type=1400 audit(3016.601:4445): avc: denied { read write } for pid=20115 comm="syz.0.4006" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.431600][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 2765.432036][ T28] audit: type=1400 audit(3021.401:4512): avc: denied { read append } for pid=20142 comm="syz.0.4016" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.446129][ T28] audit: type=1400 audit(3021.411:4513): avc: denied { read append open } for pid=20142 comm="syz.0.4016" path="/dev/vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.626173][ T28] audit: type=1400 audit(3021.591:4514): avc: denied { read write } for pid=20144 comm="syz.4.4017" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.641464][ T28] audit: type=1400 audit(3021.611:4515): avc: denied { ioctl open } for pid=20144 comm="syz.4.4017" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.712828][ T28] audit: type=1400 audit(3021.681:4516): avc: denied { read write } for pid=20144 comm="syz.4.4017" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.740867][ T28] audit: type=1400 audit(3021.711:4517): avc: denied { read write open } for pid=20144 comm="syz.4.4017" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2765.793245][ T28] audit: type=1400 audit(3021.761:4518): avc: denied { create } for pid=20144 comm="syz.4.4017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2765.865196][ T28] audit: type=1400 audit(3021.831:4519): avc: denied { create } for pid=20144 comm="syz.4.4017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2765.881310][ T28] audit: type=1400 audit(3021.851:4520): avc: denied { write } for pid=20144 comm="syz.4.4017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2765.898218][ T28] audit: type=1400 audit(3021.871:4521): avc: denied { read } for pid=20144 comm="syz.4.4017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2769.002000][T20162] FAULT_INJECTION: forcing a failure. [ 2769.002000][T20162] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.017495][T20162] CPU: 1 UID: 0 PID: 20162 Comm: syz.4.4024 Tainted: G L syzkaller #0 PREEMPT [ 2769.017581][T20162] Tainted: [L]=SOFTLOCKUP [ 2769.017592][T20162] Hardware name: ARM-Versatile Express [ 2769.017624][T20162] Call trace: [ 2769.017646][T20162] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2769.017711][T20162] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2769.017731][T20162] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2769.017795][T20162] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2769.017826][T20162] r7:00000000 r6:00000000 r5:8398d5c0 r4:82b17e08 [ 2769.017834][T20162] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2769.017885][T20162] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2769.017927][T20162] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000019 [ 2769.017961][T20162] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 2769.018013][T20162] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 2769.018051][T20162] r10:00000fff r9:83810800 r8:00000000 r7:8504f880 r6:86616728 r5:84876ffd [ 2769.018062][T20162] r4:84876fef [ 2769.018070][T20162] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 2769.018106][T20162] r9:83810800 r8:00000000 r7:8504f880 r6:86616728 r5:00001000 r4:84876ff0 [ 2769.018115][T20162] [<8080b324>] (tomoyo_encode) from [<8080b3d4>] (tomoyo_realpath_from_path+0x80/0x16c) [ 2769.018145][T20162] r5:00001000 r4:84876000 [ 2769.018153][T20162] [<8080b354>] (tomoyo_realpath_from_path) from [<80807458>] (tomoyo_path_number_perm+0xcc/0x22c) [ 2769.018200][T20162] r10:00000000 r9:00000003 r8:86616700 r7:00008983 r6:81cda174 r5:00000004 [ 2769.018235][T20162] r4:86616728 r3:828d1400 [ 2769.018244][T20162] [<8080738c>] (tomoyo_path_number_perm) from [<8080bdac>] (tomoyo_file_ioctl+0x1c/0x20) [ 2769.018305][T20162] r10:8398d5c0 r9:00000003 r8:86616700 r7:20001c00 r6:20001c00 r5:00008983 [ 2769.018317][T20162] r4:86616700 [ 2769.018326][T20162] [<8080bd90>] (tomoyo_file_ioctl) from [<807b6e34>] (security_file_ioctl+0x80/0x1d4) [ 2769.018356][T20162] [<807b6db4>] (security_file_ioctl) from [<8059c0b4>] (sys_ioctl+0x4c/0xb5c) [ 2769.018389][T20162] r7:20001c00 r6:00008983 r5:86616701 r4:00000000 [ 2769.018398][T20162] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2769.018421][T20162] Exception stack(0xecfe1fa8 to 0xecfe1ff0) [ 2769.018442][T20162] 1fa0: 00000000 00000000 00000003 00008983 20001c00 00000000 [ 2769.018459][T20162] 1fc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76f570dc [ 2769.018472][T20162] 1fe0: 76f56e88 76f56e78 00018e58 001307a0 [ 2769.018500][T20162] r10:00000036 r9:8398d5c0 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 2769.018512][T20162] r4:00000000 [ 2769.037557][T20162] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2770.533826][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 2770.534021][ T28] audit: type=1400 audit(3026.501:4571): avc: denied { create } for pid=20167 comm="syz.0.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2770.573460][ T28] audit: type=1400 audit(3026.541:4572): avc: denied { ioctl } for pid=20167 comm="syz.0.4027" path="socket:[45030]" dev="sockfs" ino=45030 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2770.635717][ T28] audit: type=1400 audit(3026.601:4573): avc: denied { ioctl } for pid=20167 comm="syz.0.4027" path="socket:[45030]" dev="sockfs" ino=45030 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2770.933653][ T28] audit: type=1400 audit(3026.901:4574): avc: denied { create } for pid=20170 comm="syz.4.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2770.945232][ T28] audit: type=1400 audit(3026.911:4575): avc: denied { ioctl } for pid=20170 comm="syz.4.4028" path="socket:[45041]" dev="sockfs" ino=45041 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2770.964108][ T28] audit: type=1400 audit(3026.931:4576): avc: denied { read write } for pid=20169 comm="syz.0.4029" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2770.966988][ T28] audit: type=1400 audit(3026.931:4577): avc: denied { ioctl open } for pid=20169 comm="syz.0.4029" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2770.970199][ T28] audit: type=1400 audit(3026.941:4578): avc: denied { bind } for pid=20170 comm="syz.4.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2770.998890][ T28] audit: type=1400 audit(3026.971:4579): avc: denied { write } for pid=20170 comm="syz.4.4028" path="socket:[45041]" dev="sockfs" ino=45041 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2771.004543][ T28] audit: type=1400 audit(3026.971:4580): avc: denied { write } for pid=20170 comm="syz.4.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2775.821922][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 2775.822384][ T28] audit: type=1400 audit(3031.791:4633): avc: denied { create } for pid=20196 comm="syz.0.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2775.845383][ T28] audit: type=1400 audit(3031.811:4634): avc: denied { ioctl } for pid=20196 comm="syz.0.4037" path="socket:[45619]" dev="sockfs" ino=45619 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2775.858890][ T28] audit: type=1400 audit(3031.831:4635): avc: denied { bind } for pid=20196 comm="syz.0.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2775.877114][ T28] audit: type=1400 audit(3031.831:4636): avc: denied { write } for pid=20194 comm="syz.4.4036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2775.994554][ T28] audit: type=1400 audit(3031.961:4637): avc: denied { ioctl } for pid=20196 comm="syz.0.4037" path="socket:[45619]" dev="sockfs" ino=45619 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2776.034528][ T28] audit: type=1400 audit(3032.001:4638): avc: denied { getopt } for pid=20196 comm="syz.0.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2776.121068][ T28] audit: type=1400 audit(3032.091:4639): avc: denied { write } for pid=20196 comm="syz.0.4037" name="psched" dev="proc" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2776.123293][ T28] audit: type=1400 audit(3032.091:4640): avc: denied { write } for pid=20196 comm="syz.0.4037" path="/proc/165/net/psched" dev="proc" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2776.201378][ T28] audit: type=1400 audit(3032.171:4641): avc: denied { write } for pid=20196 comm="syz.0.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2776.203150][ T28] audit: type=1400 audit(3032.171:4642): avc: denied { read } for pid=20196 comm="syz.0.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2781.058234][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 2781.061212][ T28] audit: type=1400 audit(3037.031:4676): avc: denied { write } for pid=20211 comm="syz.4.4042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2781.414274][ T28] audit: type=1400 audit(3037.381:4677): avc: denied { create } for pid=20219 comm="syz.4.4043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2781.445793][ T28] audit: type=1400 audit(3037.411:4678): avc: denied { getopt } for pid=20219 comm="syz.4.4043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2781.604554][ T28] audit: type=1400 audit(3037.571:4679): avc: denied { create } for pid=20221 comm="syz.4.4044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2781.980321][ T28] audit: type=1400 audit(3037.951:4680): avc: denied { create } for pid=20223 comm="syz.4.4045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2782.018827][ T28] audit: type=1400 audit(3037.991:4681): avc: denied { ioctl } for pid=20223 comm="syz.4.4045" path="socket:[46132]" dev="sockfs" ino=46132 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2782.024267][ T28] audit: type=1400 audit(3037.991:4682): avc: denied { bind } for pid=20223 comm="syz.4.4045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2782.031909][ T28] audit: type=1400 audit(3038.001:4683): avc: denied { write } for pid=20223 comm="syz.4.4045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2782.157899][ T28] audit: type=1400 audit(3038.131:4684): avc: denied { create } for pid=20225 comm="syz.0.4046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2782.173334][ T28] audit: type=1400 audit(3038.141:4685): avc: denied { ioctl } for pid=20225 comm="syz.0.4046" path="socket:[46136]" dev="sockfs" ino=46136 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.098745][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 2786.099145][ T28] audit: type=1400 audit(3042.071:4710): avc: denied { create } for pid=20239 comm="syz.0.4050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.127105][ T28] audit: type=1400 audit(3042.091:4711): avc: denied { ioctl } for pid=20239 comm="syz.0.4050" path="socket:[45675]" dev="sockfs" ino=45675 ioctlcmd=0x54e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.156686][ T28] audit: type=1400 audit(3042.111:4712): avc: denied { read } for pid=20239 comm="syz.0.4050" path="socket:[45675]" dev="sockfs" ino=45675 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.161662][ T28] audit: type=1400 audit(3042.131:4713): avc: denied { read } for pid=20239 comm="syz.0.4050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.221236][ T28] audit: type=1400 audit(3042.191:4714): avc: denied { setopt } for pid=20239 comm="syz.0.4050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.229707][ T28] audit: type=1400 audit(3042.201:4715): avc: denied { ioctl } for pid=20239 comm="syz.0.4050" path="socket:[45675]" dev="sockfs" ino=45675 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.341858][ T28] audit: type=1400 audit(3042.311:4716): avc: denied { bind } for pid=20239 comm="syz.0.4050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.349100][ T28] audit: type=1400 audit(3042.321:4717): avc: denied { write } for pid=20239 comm="syz.0.4050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.891209][ T28] audit: type=1400 audit(3042.861:4718): avc: denied { create } for pid=20241 comm="syz.4.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2786.899690][ T28] audit: type=1400 audit(3042.871:4719): avc: denied { ioctl } for pid=20241 comm="syz.4.4051" path="socket:[46160]" dev="sockfs" ino=46160 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2790.007710][ T3653] usb 1-1: new high-speed USB device number 42 using dummy_hcd [ 2790.186974][ T3653] usb 1-1: Using ep0 maxpacket: 8 [ 2790.228096][ T3653] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2790.228437][ T3653] usb 1-1: config 1 has 0 interfaces, different from the descriptor's value: 1 [ 2790.297215][ T3653] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2790.297797][ T3653] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2790.297891][ T3653] usb 1-1: Product: syz [ 2790.297964][ T3653] usb 1-1: Manufacturer: syz [ 2790.297996][ T3653] usb 1-1: SerialNumber: syz [ 2790.728106][ T3653] usb 1-1: USB disconnect, device number 42 [ 2791.310448][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 2791.312092][ T28] audit: type=1400 audit(3047.281:4774): avc: denied { read } for pid=20265 comm="syz.0.4056" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2791.316015][ T28] audit: type=1400 audit(3047.281:4775): avc: denied { read open } for pid=20265 comm="syz.0.4056" path="net:[4026532657]" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2791.330861][ T28] audit: type=1400 audit(3047.301:4776): avc: denied { create } for pid=20265 comm="syz.0.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2791.380217][ T28] audit: type=1400 audit(3047.351:4777): avc: denied { write } for pid=20265 comm="syz.0.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2791.400143][ T28] audit: type=1400 audit(3047.371:4778): avc: denied { create } for pid=20265 comm="syz.0.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2791.456671][ T28] audit: type=1400 audit(3047.421:4779): avc: denied { mounton } for pid=20265 comm="syz.0.4056" path="/78/file0" dev="tmpfs" ino=417 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2791.500966][ T28] audit: type=1400 audit(3047.471:4780): avc: denied { setopt } for pid=20265 comm="syz.0.4056" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2791.550384][ T28] audit: type=1400 audit(3047.521:4781): avc: denied { read write } for pid=20265 comm="syz.0.4056" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2791.560391][ T28] audit: type=1400 audit(3047.531:4782): avc: denied { read write open } for pid=20265 comm="syz.0.4056" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2791.642425][ T28] audit: type=1400 audit(3047.611:4783): avc: denied { unmount } for pid=19327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2791.973411][T20268] FAULT_INJECTION: forcing a failure. [ 2791.973411][T20268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2791.973886][T20268] CPU: 0 UID: 0 PID: 20268 Comm: syz.0.4057 Tainted: G L syzkaller #0 PREEMPT [ 2791.973941][T20268] Tainted: [L]=SOFTLOCKUP [ 2791.973951][T20268] Hardware name: ARM-Versatile Express [ 2791.973965][T20268] Call trace: [ 2791.973986][T20268] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2791.974050][T20268] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 2791.974059][T20268] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2791.974087][T20268] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2791.974118][T20268] r7:00000001 r6:00000000 r5:8398d5c0 r4:82b17e5c [ 2791.974126][T20268] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2791.974157][T20268] [<809cd1cc>] (should_fail_ex) from [<8054f064>] (should_fail_alloc_page+0x68/0x74) [ 2791.974194][T20268] r8:ed401b64 r7:00000001 r6:00000000 r5:00440dc2 r4:ed401b70 [ 2791.974202][T20268] [<8054effc>] (should_fail_alloc_page) from [<80514c88>] (prepare_alloc_pages+0xf8/0x1b4) [ 2791.974304][T20268] [<80514b90>] (prepare_alloc_pages) from [<8051dd54>] (__alloc_frozen_pages_noprof+0xb0/0x161c) [ 2791.974357][T20268] r10:00000000 r9:8398d5c0 r8:86ab7480 r7:20001000 r6:00440dc2 r5:00000000 [ 2791.974448][T20268] r4:84fa6580 [ 2791.974483][T20268] [<8051dca4>] (__alloc_frozen_pages_noprof) from [<8051f2d0>] (__alloc_pages_noprof+0x10/0x60) [ 2791.974631][T20268] r10:00000000 r9:84fa6580 r8:86ab7480 r7:20001000 r6:86a25080 r5:84fa6580 [ 2791.974644][T20268] r4:84fa6580 [ 2791.974653][T20268] [<8051f2c0>] (__alloc_pages_noprof) from [<804e4014>] (pte_alloc_one+0x28/0x108) [ 2791.974718][T20268] [<804e3fec>] (pte_alloc_one) from [<804e5efc>] (__pte_alloc+0x2c/0x128) [ 2791.974884][T20268] r5:86d6b800 r4:84fa6580 [ 2791.974934][T20268] [<804e5ed0>] (__pte_alloc) from [<804e98e4>] (do_anonymous_page+0x334/0x648) [ 2791.975062][T20268] r5:8398d5c0 r4:ed401c90 [ 2791.975238][T20268] [<804e95b0>] (do_anonymous_page) from [<804ec568>] (handle_mm_fault+0x5bc/0x6b8) [ 2791.975287][T20268] r10:00000000 r9:84fa6580 r8:86ab7480 r7:ed401db0 r6:20001000 r5:8398d5c0 [ 2791.975402][T20268] r4:00000215 [ 2791.975422][T20268] [<804ebfac>] (handle_mm_fault) from [<80232fb0>] (do_page_fault+0xf0/0x4d0) [ 2791.975460][T20268] r10:00000002 r9:84fa6580 r8:00000215 r7:20001000 r6:00000a06 r5:200010c0 [ 2791.975472][T20268] r4:ed401db0 [ 2791.975481][T20268] [<80232ec0>] (do_page_fault) from [<802334b0>] (do_translation_fault+0x120/0x128) [ 2791.975551][T20268] r10:000000c5 r9:8398d5c0 r8:80233390 r7:ed401db0 r6:200010c0 r5:00000a06 [ 2791.975580][T20268] r4:82a1c440 [ 2791.975662][T20268] [<80233390>] (do_translation_fault) from [<8023355c>] (do_DataAbort+0x38/0xac) [ 2791.975771][T20268] r9:8398d5c0 r8:80233390 r7:ed401db0 r6:200010c0 r5:00000a06 r4:82a1c440 [ 2791.975835][T20268] [<80233524>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 2791.976004][T20268] Exception stack(0xed401db0 to 0xed401df8) [ 2791.976118][T20268] 1da0: 200010c0 ed401e48 ffffffc8 0000000a [ 2791.976183][T20268] 1dc0: 00000000 00000000 0000b460 00000000 0000c1ff 00000001 000000c5 ed401eb4 [ 2791.976328][T20268] 1de0: 00000000 ed401e04 00000000 81ad1fe0 a0000013 ffffffff [ 2791.976382][T20268] r8:0000c1ff r7:ed401de4 r6:ffffffff r5:a0000013 r4:81ad1fe0 [ 2791.976454][T20268] [<805883d4>] (cp_new_stat64) from [<80589270>] (__do_sys_fstat64+0x74/0x7c) [ 2791.976488][T20268] r7:000000c5 r6:0012f1a4 r5:200010c0 r4:00000003 [ 2791.976512][T20268] [<805891fc>] (__do_sys_fstat64) from [<80589458>] (sys_fstat64+0x10/0x14) [ 2791.976544][T20268] r5:00000000 r4:00000000 [ 2791.976552][T20268] [<80589448>] (sys_fstat64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2791.976575][T20268] Exception stack(0xed401fa8 to 0xed401ff0) [ 2791.976591][T20268] 1fa0: 00000000 00000000 00000003 200010c0 00000000 00000000 [ 2791.976607][T20268] 1fc0: 00000000 00000000 0012f1a4 000000c5 003462d8 00000000 00000001 76f420dc [ 2791.976621][T20268] 1fe0: 76f41e88 76f41e78 00018e58 001307a0 [ 2795.660495][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.685285][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.703230][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.752984][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.780769][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.785374][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.830526][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.859197][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.864176][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2795.904107][T20287] binder_alloc: binder_alloc_mmap_handler: 20285 20000000-20b36000 already mapped failed -16 [ 2796.317426][ T28] kauditd_printk_skb: 293 callbacks suppressed [ 2796.318410][ T28] audit: type=1400 audit(3052.291:5077): avc: denied { read } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.321837][ T28] audit: type=1400 audit(3052.291:5078): avc: denied { map } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.326830][ T28] audit: type=1400 audit(3052.291:5079): avc: denied { read } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.330310][ T28] audit: type=1400 audit(3052.301:5080): avc: denied { map } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.332163][ T28] audit: type=1400 audit(3052.301:5081): avc: denied { read } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.334243][ T28] audit: type=1400 audit(3052.301:5082): avc: denied { map } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.336841][ T28] audit: type=1400 audit(3052.301:5083): avc: denied { read } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.346821][ T28] audit: type=1400 audit(3052.301:5084): avc: denied { map } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.347228][ T28] audit: type=1400 audit(3052.311:5085): avc: denied { read } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2796.347446][ T28] audit: type=1400 audit(3052.311:5086): avc: denied { map } for pid=20285 comm="syz.0.4063" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2800.008852][T20307] FAULT_INJECTION: forcing a failure. [ 2800.008852][T20307] name failslab, interval 1, probability 0, space 0, times 0 [ 2800.010534][T20307] CPU: 1 UID: 0 PID: 20307 Comm: syz.0.4067 Tainted: G L syzkaller #0 PREEMPT [ 2800.010656][T20307] Tainted: [L]=SOFTLOCKUP [ 2800.010675][T20307] Hardware name: ARM-Versatile Express [ 2800.010707][T20307] Call trace: [ 2800.010749][T20307] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2800.010849][T20307] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2800.010869][T20307] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2800.010921][T20307] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2800.010980][T20307] r7:00000000 r6:00000000 r5:84773d40 r4:82b17e08 [ 2800.010998][T20307] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2800.011056][T20307] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2800.011127][T20307] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:0000001d [ 2800.011147][T20307] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 2800.011203][T20307] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 2800.011270][T20307] r10:00000fff r9:830c0000 r8:00000000 r7:8342a4c8 r6:85d21c28 r5:863d8ffc [ 2800.011292][T20307] r4:863d8fea [ 2800.011310][T20307] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 2800.011378][T20307] r9:830c0000 r8:00000000 r7:8342a4c8 r6:85d21c28 r5:00001000 r4:863d8feb [ 2800.011395][T20307] [<8080b324>] (tomoyo_encode) from [<8080b3d4>] (tomoyo_realpath_from_path+0x80/0x16c) [ 2800.011454][T20307] r5:00001000 r4:863d8000 [ 2800.011470][T20307] [<8080b354>] (tomoyo_realpath_from_path) from [<80807458>] (tomoyo_path_number_perm+0xcc/0x22c) [ 2800.011538][T20307] r10:00000000 r9:00000003 r8:85d21c00 r7:0000541c r6:81cda174 r5:00000004 [ 2800.011562][T20307] r4:85d21c28 r3:828d1400 [ 2800.011580][T20307] [<8080738c>] (tomoyo_path_number_perm) from [<8080bdac>] (tomoyo_file_ioctl+0x1c/0x20) [ 2800.011643][T20307] r10:84773d40 r9:00000003 r8:85d21c00 r7:00000000 r6:00000000 r5:0000541c [ 2800.011664][T20307] r4:85d21c00 [ 2800.011679][T20307] [<8080bd90>] (tomoyo_file_ioctl) from [<807b6e34>] (security_file_ioctl+0x80/0x1d4) [ 2800.011773][T20307] [<807b6db4>] (security_file_ioctl) from [<8059c0b4>] (sys_ioctl+0x4c/0xb5c) [ 2800.011838][T20307] r7:00000000 r6:0000541c r5:85d21c01 r4:00000000 [ 2800.011857][T20307] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2800.011905][T20307] Exception stack(0xed631fa8 to 0xed631ff0) [ 2800.011942][T20307] 1fa0: 00000000 00000000 00000003 0000541c 00000000 00000000 [ 2800.011978][T20307] 1fc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76f420dc [ 2800.012048][T20307] 1fe0: 76f41e88 76f41e78 00018e58 001307a0 [ 2800.012087][T20307] r10:00000036 r9:84773d40 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 2800.012107][T20307] r4:00000000 [ 2800.047005][T20307] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2802.422236][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 2802.422578][ T28] audit: type=1400 audit(3058.381:5140): avc: denied { create } for pid=20311 comm="syz.0.4069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2802.430414][ T28] audit: type=1400 audit(3058.401:5141): avc: denied { write } for pid=20311 comm="syz.0.4069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2802.944121][ T28] audit: type=1400 audit(3058.911:5142): avc: denied { read write } for pid=20313 comm="syz.0.4070" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2802.952349][ T28] audit: type=1400 audit(3058.921:5143): avc: denied { read write open } for pid=20313 comm="syz.0.4070" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2803.459068][ T28] audit: type=1400 audit(3059.421:5144): avc: denied { create } for pid=20315 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2803.475049][ T28] audit: type=1400 audit(3059.441:5145): avc: denied { ioctl } for pid=20315 comm="syz.0.4071" path="socket:[46239]" dev="sockfs" ino=46239 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2803.480830][ T28] audit: type=1400 audit(3059.451:5146): avc: denied { bind } for pid=20315 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2803.490786][ T28] audit: type=1400 audit(3059.461:5147): avc: denied { write } for pid=20315 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2803.507574][ T28] audit: type=1400 audit(3059.471:5148): avc: denied { write } for pid=20315 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2804.018756][ T28] audit: type=1400 audit(3059.991:5149): avc: denied { write } for pid=20315 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2810.122866][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 2810.123354][ T28] audit: type=1400 audit(3066.091:5162): avc: denied { create } for pid=20323 comm="syz.4.4074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2810.144716][ T28] audit: type=1400 audit(3066.111:5163): avc: denied { write } for pid=20323 comm="syz.4.4074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2815.470065][ T28] audit: type=1400 audit(3071.441:5164): avc: denied { create } for pid=20333 comm="syz.4.4077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2816.881810][ T28] audit: type=1400 audit(3072.851:5165): avc: denied { setopt } for pid=20333 comm="syz.4.4077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2826.209957][ T28] audit: type=1400 audit(3082.181:5166): avc: denied { write } for pid=20337 comm="syz.0.4078" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.220273][ T28] audit: type=1400 audit(3082.191:5167): avc: denied { write open } for pid=20337 comm="syz.0.4078" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.240489][ T28] audit: type=1400 audit(3082.211:5168): avc: denied { read } for pid=20337 comm="syz.0.4078" name="controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.260897][ T28] audit: type=1400 audit(3082.231:5169): avc: denied { read open } for pid=20337 comm="syz.0.4078" path="/dev/snd/controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.299542][ T28] audit: type=1400 audit(3082.271:5170): avc: denied { ioctl } for pid=20337 comm="syz.0.4078" path="/dev/snd/controlC0" dev="devtmpfs" ino=727 ioctlcmd=0x5532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.334418][ T28] audit: type=1400 audit(3082.301:5171): avc: denied { append } for pid=20337 comm="syz.0.4078" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.353147][ T28] audit: type=1400 audit(3082.321:5172): avc: denied { append open } for pid=20337 comm="syz.0.4078" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.363708][ T28] audit: type=1400 audit(3082.331:5173): avc: denied { ioctl } for pid=20337 comm="syz.0.4078" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=723 ioctlcmd=0x4113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2826.374153][ T28] audit: type=1400 audit(3082.341:5174): avc: denied { ioctl } for pid=20337 comm="syz.0.4078" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=723 ioctlcmd=0x4120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2827.439056][ T28] audit: type=1400 audit(3083.411:5175): avc: denied { read } for pid=20339 comm="syz.0.4079" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2828.113773][T20346] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2828.606621][T20326] usb 1-1: new high-speed USB device number 43 using dummy_hcd [ 2828.814169][T20326] usb 1-1: Using ep0 maxpacket: 8 [ 2828.947619][T20326] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 2828.948846][T20326] usb 1-1: config 179 has no interface number 0 [ 2828.949898][T20326] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0xF has an invalid bInterval 63, changing to 9 [ 2828.951001][T20326] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0xF has invalid maxpacket 57605, setting to 1024 [ 2828.952219][T20326] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0x83 has an invalid bInterval 52, changing to 9 [ 2828.953356][T20326] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0x83 has invalid maxpacket 8241, setting to 1024 [ 2828.954483][T20326] usb 1-1: config 179 interface 65 altsetting 12 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 2828.955774][T20326] usb 1-1: config 179 interface 65 has no altsetting 0 [ 2828.958061][T20326] usb 1-1: New USB device found, idVendor=12ab, idProduct=0004, bcdDevice= 0.00 [ 2828.959204][T20326] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2829.084395][T20326] input: Honey Bee Xbox360 dancepad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:179.65/input/input12 [ 2829.549383][ C1] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 2829.549886][T20326] usb 1-1: USB disconnect, device number 43 [ 2831.706772][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 2831.707240][ T28] audit: type=1400 audit(3087.661:5210): avc: denied { name_bind } for pid=20376 comm="syz.0.4084" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2832.926993][ T28] audit: type=1400 audit(3088.891:5211): avc: denied { allowed } for pid=20382 comm="syz.0.4086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2833.223676][ T28] audit: type=1400 audit(3089.191:5212): avc: denied { prog_load } for pid=20382 comm="syz.0.4086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2833.225439][ T28] audit: type=1400 audit(3089.191:5213): avc: denied { bpf } for pid=20382 comm="syz.0.4086" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2833.738054][ T28] audit: type=1400 audit(3089.701:5214): avc: denied { name_bind } for pid=20384 comm="syz.0.4087" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2833.739646][ T28] audit: type=1400 audit(3089.711:5215): avc: denied { node_bind } for pid=20384 comm="syz.0.4087" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2834.860157][ T28] audit: type=1400 audit(3090.831:5216): avc: denied { execmem } for pid=20387 comm="syz.4.4088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2836.805464][ T28] audit: type=1400 audit(3092.771:5217): avc: denied { execmem } for pid=20390 comm="syz.0.4089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2839.285160][ T28] audit: type=1400 audit(3095.251:5218): avc: denied { name_bind } for pid=20390 comm="syz.0.4089" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2839.296886][ T28] audit: type=1400 audit(3095.261:5219): avc: denied { node_bind } for pid=20390 comm="syz.0.4089" saddr=224.0.0.2 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2839.817137][ T28] audit: type=1400 audit(3095.781:5220): avc: denied { create } for pid=20390 comm="syz.0.4089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2839.833188][ T28] audit: type=1400 audit(3095.801:5221): avc: denied { bind } for pid=20390 comm="syz.0.4089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2842.096886][ T28] audit: type=1400 audit(3098.061:5222): avc: denied { read write } for pid=20396 comm="syz.0.4091" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.102809][ T28] audit: type=1400 audit(3098.071:5223): avc: denied { read write open } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.109897][ T28] audit: type=1400 audit(3098.081:5224): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.129059][ T28] audit: type=1400 audit(3098.101:5225): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.161861][ T28] audit: type=1400 audit(3098.121:5226): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.165143][ T28] audit: type=1400 audit(3098.121:5227): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.257643][ T28] audit: type=1400 audit(3098.221:5228): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.321168][ T28] audit: type=1400 audit(3098.291:5229): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.376985][ T3653] usb 1-1: new high-speed USB device number 44 using dummy_hcd [ 2842.391978][ T28] audit: type=1400 audit(3098.361:5230): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.422531][ T28] audit: type=1400 audit(3098.391:5231): avc: denied { ioctl } for pid=20396 comm="syz.0.4091" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2842.600033][ T3653] usb 1-1: too many configurations: 9, using maximum allowed: 8 [ 2842.707499][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.708471][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.713107][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.734152][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.734823][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.739697][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.777294][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.778107][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.782331][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.805203][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.805949][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.806811][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.835318][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.835542][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.835713][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.869145][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.869350][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.869539][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.912709][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.913097][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.913451][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2842.944562][ T3653] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 2842.944975][ T3653] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 2842.945088][ T3653] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2843.011568][ T3653] usb 1-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 2843.012007][ T3653] usb 1-1: New USB device strings: Mfr=41, Product=64, SerialNumber=168 [ 2843.012078][ T3653] usb 1-1: Product: syz [ 2843.012112][ T3653] usb 1-1: Manufacturer: syz [ 2843.012143][ T3653] usb 1-1: SerialNumber: syz [ 2843.038019][ T3653] usb 1-1: config 0 descriptor?? [ 2843.181188][ T3653] yurex 1-1:0.0: USB YUREX device now attached to Yurex #0 [ 2843.374742][T19806] usb 1-1: USB disconnect, device number 44 [ 2843.404925][T19806] yurex 1-1:0.0: USB YUREX #0 now disconnected [ 2847.857159][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 2847.857564][ T28] audit: type=1400 audit(3103.831:5300): avc: denied { execmem } for pid=20428 comm="syz.0.4097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2851.410475][ T28] audit: type=1400 audit(3107.381:5301): avc: denied { module_request } for pid=20428 comm="syz.0.4097" kmod="fs-nfsd" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2852.297316][ T28] audit: type=1400 audit(3108.251:5302): avc: denied { read } for pid=20434 comm="syz.4.4098" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2852.329157][ T28] audit: type=1400 audit(3108.291:5303): avc: denied { read open } for pid=20434 comm="syz.4.4098" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2852.372904][ T28] audit: type=1400 audit(3108.331:5304): avc: denied { read } for pid=20434 comm="syz.4.4098" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2852.428557][ T28] audit: type=1400 audit(3108.391:5305): avc: denied { read open } for pid=20434 comm="syz.4.4098" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2852.442091][ T28] audit: type=1400 audit(3108.411:5306): avc: denied { create } for pid=20434 comm="syz.4.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2852.581828][ T28] audit: type=1400 audit(3108.541:5307): avc: denied { create } for pid=20434 comm="syz.4.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2852.633418][ T28] audit: type=1400 audit(3108.591:5308): avc: denied { create } for pid=20434 comm="syz.4.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2852.677004][ T28] audit: type=1400 audit(3108.621:5309): avc: denied { create } for pid=20434 comm="syz.4.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2853.832650][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2853.833877][ T28] audit: type=1400 audit(3109.801:5314): avc: denied { read write } for pid=20438 comm="syz.4.4100" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2853.860248][ T28] audit: type=1400 audit(3109.831:5315): avc: denied { read write open } for pid=20438 comm="syz.4.4100" path="/dev/audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2853.865079][ T28] audit: type=1400 audit(3109.831:5316): avc: denied { ioctl } for pid=20438 comm="syz.4.4100" path="/dev/audio1" dev="devtmpfs" ino=732 ioctlcmd=0x4dfe scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2854.469735][ T28] audit: type=1400 audit(3110.441:5317): avc: denied { module_request } for pid=20440 comm="syz.4.4101" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2854.997704][ T28] audit: type=1400 audit(3110.951:5318): avc: denied { create } for pid=20440 comm="syz.4.4101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2855.026972][ T28] audit: type=1400 audit(3110.991:5319): avc: denied { write } for pid=20440 comm="syz.4.4101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2855.035028][ T28] audit: type=1400 audit(3111.001:5320): avc: denied { sys_module } for pid=20440 comm="syz.4.4101" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2855.041752][ T28] audit: type=1400 audit(3111.011:5321): avc: denied { module_request } for pid=20440 comm="syz.4.4101" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2856.347997][ T28] audit: type=1400 audit(3112.321:5322): avc: denied { create } for pid=20445 comm="syz.4.4102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2856.370352][ T28] audit: type=1400 audit(3112.341:5323): avc: denied { prog_load } for pid=20445 comm="syz.4.4102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2868.218563][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 2868.219024][ T28] audit: type=1400 audit(3124.191:5337): avc: denied { create } for pid=20449 comm="syz.0.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2868.240227][ T28] audit: type=1400 audit(3124.201:5338): avc: denied { write } for pid=20449 comm="syz.0.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2868.242592][ T28] audit: type=1400 audit(3124.201:5339): avc: denied { nlmsg_write } for pid=20449 comm="syz.0.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2868.267416][ T28] audit: type=1400 audit(3124.221:5340): avc: denied { create } for pid=20449 comm="syz.0.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2868.374182][ T28] audit: type=1400 audit(3124.341:5341): avc: denied { write } for pid=20449 comm="syz.0.4103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2869.051959][ T28] audit: type=1400 audit(3125.021:5342): avc: denied { create } for pid=20451 comm="syz.0.4104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2873.854494][ T28] audit: type=1400 audit(3129.821:5343): avc: denied { read write } for pid=20453 comm="syz.0.4105" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2873.855612][ T28] audit: type=1400 audit(3129.821:5344): avc: denied { read write open } for pid=20453 comm="syz.0.4105" path="/dev/userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2874.806829][ T28] audit: type=1400 audit(3130.771:5345): avc: denied { execmem } for pid=20455 comm="syz.4.4106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2876.973117][ T28] audit: type=1400 audit(3132.941:5346): avc: denied { read append } for pid=20457 comm="syz.0.4107" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2876.975722][ T28] audit: type=1400 audit(3132.941:5347): avc: denied { read append open } for pid=20457 comm="syz.0.4107" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2877.006748][ T28] audit: type=1400 audit(3132.971:5348): avc: denied { ioctl } for pid=20457 comm="syz.0.4107" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2877.054877][ T28] audit: type=1400 audit(3133.021:5349): avc: denied { read } for pid=20457 comm="syz.0.4107" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2877.055245][ T28] audit: type=1400 audit(3133.021:5350): avc: denied { read open } for pid=20457 comm="syz.0.4107" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2877.102149][ T28] audit: type=1400 audit(3133.071:5351): avc: denied { map_create } for pid=20457 comm="syz.0.4107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2877.104386][ T28] audit: type=1400 audit(3133.071:5352): avc: denied { perfmon } for pid=20457 comm="syz.0.4107" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2877.285445][T20459] syzkaller0: entered promiscuous mode [ 2877.285828][T20459] syzkaller0: entered allmulticast mode [ 2879.544632][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 2879.544986][ T28] audit: type=1400 audit(3135.511:5371): avc: denied { map_create } for pid=20468 comm="syz.0.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2879.545233][ T28] audit: type=1400 audit(3135.511:5372): avc: denied { perfmon } for pid=20468 comm="syz.0.4110" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2879.545434][ T28] audit: type=1400 audit(3135.511:5373): avc: denied { map_create } for pid=20468 comm="syz.0.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2879.551355][ T28] audit: type=1400 audit(3135.521:5374): avc: denied { map_read map_write } for pid=20468 comm="syz.0.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2881.863192][T20465] netlink: 32 bytes leftover after parsing attributes in process `syz.4.4108'. [ 2882.580699][ T28] audit: type=1400 audit(3138.551:5375): avc: denied { create } for pid=20472 comm="syz.0.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2882.637398][ T28] audit: type=1400 audit(3138.601:5376): avc: denied { create } for pid=20472 comm="syz.0.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2882.646867][ T28] audit: type=1400 audit(3138.601:5377): avc: denied { write } for pid=20472 comm="syz.0.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2882.672123][ T28] audit: type=1400 audit(3138.641:5378): avc: denied { read } for pid=20472 comm="syz.0.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2882.672461][ T28] audit: type=1400 audit(3138.641:5379): avc: denied { read } for pid=20472 comm="syz.0.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2882.700053][ T28] audit: type=1400 audit(3138.671:5380): avc: denied { write } for pid=20472 comm="syz.0.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2882.820689][T20480] random: crng reseeded on system resumption [ 2884.050465][T20482] syzkaller0: entered promiscuous mode [ 2884.050791][T20482] syzkaller0: entered allmulticast mode [ 2885.066471][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 2885.078161][ T28] audit: type=1400 audit(3141.031:5397): avc: denied { read } for pid=20487 comm="syz.4.4115" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2885.128021][ T28] audit: type=1400 audit(3141.061:5398): avc: denied { read open } for pid=20487 comm="syz.4.4115" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2885.158036][ T28] audit: type=1400 audit(3141.131:5399): avc: denied { read write } for pid=20487 comm="syz.4.4115" name="midiC2D0" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2885.161388][ T28] audit: type=1400 audit(3141.131:5400): avc: denied { read write open } for pid=20487 comm="syz.4.4115" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2890.396689][ T28] audit: type=1400 audit(3146.361:5401): avc: denied { read write } for pid=20491 comm="syz.4.4116" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2890.400014][ T28] audit: type=1400 audit(3146.361:5402): avc: denied { read write open } for pid=20491 comm="syz.4.4116" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2890.436689][ T28] audit: type=1400 audit(3146.391:5403): avc: denied { ioctl } for pid=20491 comm="syz.4.4116" path="/dev/ttynull" dev="devtmpfs" ino=609 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2890.469432][ T28] audit: type=1400 audit(3146.441:5404): avc: denied { read write } for pid=20491 comm="syz.4.4116" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2890.471402][ T28] audit: type=1400 audit(3146.441:5405): avc: denied { read write open } for pid=20491 comm="syz.4.4116" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2891.286615][ T28] audit: type=1400 audit(3147.251:5406): avc: denied { create } for pid=20493 comm="syz.4.4117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2891.326829][ T28] audit: type=1400 audit(3147.291:5407): avc: denied { bind } for pid=20493 comm="syz.4.4117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2891.345654][ T28] audit: type=1400 audit(3147.311:5408): avc: denied { accept } for pid=20493 comm="syz.4.4117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2891.365459][ T28] audit: type=1400 audit(3147.331:5409): avc: denied { write } for pid=20493 comm="syz.4.4117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2892.466921][ T28] audit: type=1400 audit(3148.431:5410): avc: denied { write } for pid=20495 comm="syz.4.4118" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2894.345915][T20503] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4119'. [ 2894.407260][T20503] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4119'. [ 2895.436044][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 2895.438179][ T28] audit: type=1400 audit(3151.401:5416): avc: denied { read append } for pid=20501 comm="syz.4.4119" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2895.463503][ T28] audit: type=1400 audit(3151.431:5417): avc: denied { read open } for pid=20501 comm="syz.4.4119" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2895.518740][ T28] audit: type=1400 audit(3151.481:5418): avc: denied { ioctl } for pid=20501 comm="syz.4.4119" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5425 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2895.735847][T12614] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2895.736648][T12614] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2895.737018][T12614] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2895.737237][T12614] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2897.449604][ T28] audit: type=1400 audit(3153.421:5419): avc: denied { read } for pid=20506 comm="syz.4.4120" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2897.459233][ T28] audit: type=1400 audit(3153.431:5420): avc: denied { read open } for pid=20506 comm="syz.4.4120" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2897.500475][ T28] audit: type=1400 audit(3153.471:5421): avc: denied { ioctl } for pid=20506 comm="syz.4.4120" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2897.563504][ T28] audit: type=1400 audit(3153.531:5422): avc: denied { read } for pid=20506 comm="syz.4.4120" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2897.565404][ T28] audit: type=1400 audit(3153.531:5423): avc: denied { read open } for pid=20506 comm="syz.4.4120" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2897.620986][T20507] syzkaller0: entered promiscuous mode [ 2897.621419][T20507] syzkaller0: entered allmulticast mode [ 2897.800193][ T28] audit: type=1400 audit(3153.771:5424): avc: denied { create } for pid=20506 comm="syz.4.4120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2897.849075][ T28] audit: type=1400 audit(3153.821:5425): avc: denied { write } for pid=20506 comm="syz.4.4120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2900.783680][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 2900.792392][ T28] audit: type=1400 audit(3156.751:5439): avc: denied { read } for pid=20520 comm="syz.4.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2900.837030][ T28] audit: type=1400 audit(3156.801:5440): avc: denied { write } for pid=20520 comm="syz.4.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2900.852503][ T28] audit: type=1400 audit(3156.811:5441): avc: denied { ioctl } for pid=20520 comm="syz.4.4123" path="socket:[45957]" dev="sockfs" ino=45957 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2900.868958][T20521] syzkaller0: entered promiscuous mode [ 2900.872569][T20521] syzkaller0: entered allmulticast mode [ 2900.927236][ T28] audit: type=1400 audit(3156.891:5442): avc: denied { read } for pid=20520 comm="syz.4.4123" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2900.957342][ T28] audit: type=1400 audit(3156.911:5443): avc: denied { read open } for pid=20520 comm="syz.4.4123" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2902.871299][ T28] audit: type=1400 audit(3158.841:5444): avc: denied { create } for pid=20531 comm="syz.0.4126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2902.902880][ T28] audit: type=1400 audit(3158.871:5445): avc: denied { write } for pid=20531 comm="syz.0.4126" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2903.442725][ T28] audit: type=1400 audit(3159.411:5446): avc: denied { create } for pid=20533 comm="syz.0.4127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2903.485430][ T28] audit: type=1400 audit(3159.451:5447): avc: denied { execmem } for pid=20533 comm="syz.0.4127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2905.983190][T20530] mmap: syz.4.4125 (20530) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2907.104990][ T28] audit: type=1400 audit(3163.061:5448): avc: denied { read } for pid=20537 comm="syz.4.4128" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2907.127705][ T28] audit: type=1400 audit(3163.091:5449): avc: denied { read open } for pid=20537 comm="syz.4.4128" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2907.157272][ T28] audit: type=1400 audit(3163.121:5450): avc: denied { ioctl } for pid=20537 comm="syz.4.4128" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2907.176664][ T28] audit: type=1400 audit(3163.141:5451): avc: denied { ioctl } for pid=20537 comm="syz.4.4128" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2907.192703][ T28] audit: type=1400 audit(3163.161:5452): avc: denied { ioctl } for pid=20537 comm="syz.4.4128" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2907.530079][ T28] audit: type=1400 audit(3163.491:5453): avc: denied { setopt } for pid=20533 comm="syz.0.4127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2907.800386][ T28] audit: type=1400 audit(3163.771:5454): avc: denied { create } for pid=20540 comm="syz.4.4129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2907.824896][ T28] audit: type=1400 audit(3163.791:5455): avc: denied { getopt } for pid=20540 comm="syz.4.4129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2908.032351][ T28] audit: type=1400 audit(3164.001:5456): avc: denied { execute } for pid=20542 comm="syz.4.4130" name="file2" dev="tmpfs" ino=2536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2908.045154][ T28] audit: type=1400 audit(3164.011:5457): avc: denied { execute_no_trans } for pid=20542 comm="syz.4.4130" path="/485/file2" dev="tmpfs" ino=2536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2912.146988][ T28] kauditd_printk_skb: 211 callbacks suppressed [ 2912.147493][ T28] audit: type=1400 audit(3168.111:5669): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.147794][ T28] audit: type=1400 audit(3168.111:5670): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.148354][ T28] audit: type=1400 audit(3168.111:5671): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.148585][ T28] audit: type=1400 audit(3168.111:5672): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.148845][ T28] audit: type=1400 audit(3168.111:5673): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.149082][ T28] audit: type=1400 audit(3168.111:5674): avc: denied { getattr } for pid=20546 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.216863][ T28] audit: type=1400 audit(3168.181:5675): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.277215][ T28] audit: type=1400 audit(3168.221:5676): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.277934][ T28] audit: type=1400 audit(3168.221:5677): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2912.278189][ T28] audit: type=1400 audit(3168.221:5678): avc: denied { search } for pid=20546 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2914.927274][T20561] input: syz0 as /devices/virtual/input/input13 [ 2916.951389][T20569] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 2916.952304][T20569] block device autoloading is deprecated and will be removed. [ 2917.229449][ T28] kauditd_printk_skb: 74 callbacks suppressed [ 2917.229786][ T28] audit: type=1400 audit(3173.201:5753): avc: denied { unmount } for pid=17196 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2917.711195][ T28] audit: type=1400 audit(3173.681:5754): avc: denied { prog_load } for pid=20575 comm="syz.4.4136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2917.714120][ T28] audit: type=1400 audit(3173.681:5755): avc: denied { bpf } for pid=20575 comm="syz.4.4136" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.738486][ T28] audit: type=1400 audit(3173.711:5756): avc: denied { prog_load } for pid=20575 comm="syz.4.4136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2917.740416][ T28] audit: type=1400 audit(3173.711:5757): avc: denied { perfmon } for pid=20575 comm="syz.4.4136" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.745884][ T28] audit: type=1400 audit(3173.711:5758): avc: denied { perfmon } for pid=20575 comm="syz.4.4136" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.787037][ T28] audit: type=1400 audit(3173.751:5759): avc: denied { perfmon } for pid=20575 comm="syz.4.4136" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.787480][ T28] audit: type=1400 audit(3173.751:5760): avc: denied { perfmon } for pid=20575 comm="syz.4.4136" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.787569][ T28] audit: type=1400 audit(3173.751:5761): avc: denied { bpf } for pid=20575 comm="syz.4.4136" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.800077][ T28] audit: type=1400 audit(3173.771:5762): avc: denied { prog_load } for pid=20575 comm="syz.4.4136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2925.270468][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2925.270875][ T28] audit: type=1400 audit(3181.241:5767): avc: denied { prog_load } for pid=20583 comm="syz.0.4138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2925.299227][ T28] audit: type=1400 audit(3181.261:5768): avc: denied { bpf } for pid=20583 comm="syz.0.4138" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.307228][ T28] audit: type=1400 audit(3181.271:5769): avc: denied { prog_load } for pid=20583 comm="syz.0.4138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2925.316829][ T28] audit: type=1400 audit(3181.281:5770): avc: denied { perfmon } for pid=20583 comm="syz.0.4138" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.322797][ T28] audit: type=1400 audit(3181.291:5771): avc: denied { perfmon } for pid=20583 comm="syz.0.4138" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.334706][ T28] audit: type=1400 audit(3181.301:5772): avc: denied { perfmon } for pid=20583 comm="syz.0.4138" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.339824][ T28] audit: type=1400 audit(3181.311:5773): avc: denied { perfmon } for pid=20583 comm="syz.0.4138" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.353126][ T28] audit: type=1400 audit(3181.321:5774): avc: denied { bpf } for pid=20583 comm="syz.0.4138" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.409938][ T28] audit: type=1400 audit(3181.381:5775): avc: denied { bpf } for pid=20583 comm="syz.0.4138" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2925.414639][ T28] audit: type=1400 audit(3181.381:5776): avc: denied { prog_run } for pid=20583 comm="syz.0.4138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2939.157269][ T28] audit: type=1400 audit(3195.121:5777): avc: denied { read write } for pid=20589 comm="syz.4.4140" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.180278][ T28] audit: type=1400 audit(3195.151:5778): avc: denied { read open } for pid=20589 comm="syz.4.4140" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.200331][ T28] audit: type=1400 audit(3195.171:5779): avc: denied { read write } for pid=20589 comm="syz.4.4140" name="midiC2D0" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.250951][ T28] audit: type=1400 audit(3195.221:5780): avc: denied { read write open } for pid=20589 comm="syz.4.4140" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.666814][ T28] audit: type=1400 audit(3195.631:5781): avc: denied { prog_load } for pid=20589 comm="syz.4.4140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2939.673118][ T28] audit: type=1400 audit(3195.641:5782): avc: denied { bpf } for pid=20589 comm="syz.4.4140" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2939.695417][ T28] audit: type=1400 audit(3195.661:5783): avc: denied { write } for pid=20589 comm="syz.4.4140" name="adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.713987][ T28] audit: type=1400 audit(3195.671:5784): avc: denied { write open } for pid=20589 comm="syz.4.4140" path="/dev/adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.737784][ T28] audit: type=1400 audit(3195.701:5785): avc: denied { ioctl } for pid=20589 comm="syz.4.4140" path="/dev/adsp1" dev="devtmpfs" ino=735 ioctlcmd=0x500a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2939.748002][ T28] audit: type=1400 audit(3195.721:5786): avc: denied { ioctl } for pid=20589 comm="syz.4.4140" path="/dev/adsp1" dev="devtmpfs" ino=735 ioctlcmd=0x5006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2940.380486][T20591] securityfs: Unknown parameter '' [ 2943.190602][T15491] atkbd serio2: keyboard reset failed on [ 2949.380988][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 2949.381322][ T28] audit: type=1400 audit(3205.351:5801): avc: denied { read } for pid=20602 comm="syz.4.4144" dev="nsfs" ino=4026532722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2949.439906][ T28] audit: type=1400 audit(3205.411:5802): avc: denied { read open } for pid=20602 comm="syz.4.4144" path="net:[4026532722]" dev="nsfs" ino=4026532722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2949.457227][ T28] audit: type=1400 audit(3205.421:5803): avc: denied { create } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2949.532669][ T28] audit: type=1400 audit(3205.501:5804): avc: denied { create } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2949.587714][ T28] audit: type=1400 audit(3205.561:5805): avc: denied { create } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2949.629530][ T28] audit: type=1400 audit(3205.601:5806): avc: denied { write } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2949.632906][ T28] audit: type=1400 audit(3205.601:5807): avc: denied { read } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2949.666850][ T28] audit: type=1400 audit(3205.631:5808): avc: denied { read } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2949.744308][ T28] audit: type=1400 audit(3205.711:5809): avc: denied { write } for pid=20602 comm="syz.4.4144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2959.062535][ T28] audit: type=1400 audit(3215.031:5810): avc: denied { read } for pid=20607 comm="syz.0.4145" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.064607][ T28] audit: type=1400 audit(3215.031:5811): avc: denied { read open } for pid=20607 comm="syz.0.4145" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.072043][ T28] audit: type=1400 audit(3215.041:5812): avc: denied { read } for pid=20607 comm="syz.0.4145" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.086733][ T28] audit: type=1400 audit(3215.051:5813): avc: denied { read open } for pid=20607 comm="syz.0.4145" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.094400][ T28] audit: type=1400 audit(3215.061:5814): avc: denied { ioctl } for pid=20607 comm="syz.0.4145" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x545c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.112237][ T28] audit: type=1400 audit(3215.081:5815): avc: denied { ioctl } for pid=20607 comm="syz.0.4145" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.851594][ T28] audit: type=1400 audit(3215.801:5816): avc: denied { read write } for pid=20611 comm="syz.0.4147" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.852057][ T28] audit: type=1400 audit(3215.811:5817): avc: denied { read write open } for pid=20611 comm="syz.0.4147" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.852415][ T28] audit: type=1400 audit(3215.811:5818): avc: denied { ioctl } for pid=20611 comm="syz.0.4147" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2959.852632][ T28] audit: type=1400 audit(3215.811:5819): avc: denied { ioctl } for pid=20611 comm="syz.0.4147" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2960.096941][ T23] usb 1-1: new high-speed USB device number 45 using dummy_hcd [ 2960.267036][ T23] usb 1-1: Using ep0 maxpacket: 8 [ 2960.508369][ T23] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 2960.508810][ T23] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 2960.508889][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2960.541343][ T23] usb 1-1: config 0 descriptor?? [ 2960.967479][ T23] iowarrior 1-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 2961.554755][ T3653] usb 1-1: USB disconnect, device number 45 [ 2964.359620][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 2964.360033][ T28] audit: type=1400 audit(3220.331:5845): avc: denied { read } for pid=20633 comm="syz.4.4150" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2964.364578][ T28] audit: type=1400 audit(3220.331:5846): avc: denied { read open } for pid=20633 comm="syz.4.4150" path="/497/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2964.401708][T20636] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 2964.423404][T20636] block device autoloading is deprecated and will be removed. [ 2964.430649][ T28] audit: type=1400 audit(3220.401:5847): avc: denied { ioctl } for pid=20633 comm="syz.4.4150" path="/497/file0/file0" dev="fuse" ino=3 ioctlcmd=0x6441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2964.518591][ T28] audit: type=1400 audit(3220.481:5848): avc: denied { unmount } for pid=17196 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2964.955763][ T28] audit: type=1400 audit(3220.921:5849): avc: denied { module_request } for pid=20640 comm="syz.4.4151" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2965.356905][ T28] audit: type=1400 audit(3221.321:5850): avc: denied { write } for pid=20640 comm="syz.4.4151" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2965.377033][ T28] audit: type=1400 audit(3221.331:5851): avc: denied { write open } for pid=20640 comm="syz.4.4151" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2965.930612][ T28] audit: type=1400 audit(3221.901:5852): avc: denied { create } for pid=20640 comm="syz.4.4151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2965.940053][ T28] audit: type=1400 audit(3221.911:5853): avc: denied { bind } for pid=20640 comm="syz.4.4151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2965.967107][ T28] audit: type=1400 audit(3221.931:5854): avc: denied { accept } for pid=20640 comm="syz.4.4151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2969.102187][T20652] syzkaller0: entered promiscuous mode [ 2969.102503][T20652] syzkaller0: entered allmulticast mode [ 2969.189165][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189510][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189691][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189738][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189770][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189792][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189814][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189826][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189836][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189845][T20652] tc action pedit offset -536870912 out of bounds [ 2969.189905][T20652] TC_ACT_REPEAT abuse ? [ 2969.624846][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 2969.630325][ T28] audit: type=1400 audit(3225.591:5873): avc: denied { execmem } for pid=20657 comm="syz.0.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2970.022168][ T28] audit: type=1400 audit(3225.991:5874): avc: denied { create } for pid=20659 comm="syz.4.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2970.057917][ T28] audit: type=1400 audit(3226.031:5875): avc: denied { create } for pid=20659 comm="syz.4.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2970.069476][ T28] audit: type=1400 audit(3226.041:5876): avc: denied { write } for pid=20659 comm="syz.4.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2970.089597][ T28] audit: type=1400 audit(3226.051:5877): avc: denied { module_request } for pid=20659 comm="syz.4.4156" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2970.569849][ T28] audit: type=1400 audit(3226.541:5878): avc: denied { write } for pid=20659 comm="syz.4.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2970.616826][ T28] audit: type=1400 audit(3226.581:5879): avc: denied { read } for pid=20659 comm="syz.4.4156" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2970.661822][ T28] audit: type=1400 audit(3226.621:5880): avc: denied { read open } for pid=20659 comm="syz.4.4156" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2970.727428][ T28] audit: type=1400 audit(3226.691:5881): avc: denied { create } for pid=20659 comm="syz.4.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2970.734045][ T28] audit: type=1400 audit(3226.701:5882): avc: denied { ioctl } for pid=20659 comm="syz.4.4156" path="socket:[46075]" dev="sockfs" ino=46075 ioctlcmd=0x8b18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2970.778470][T20662] netlink: 'syz.4.4156': attribute type 10 has an invalid length. [ 2974.800581][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2974.800796][ T28] audit: type=1400 audit(3230.771:5887): avc: denied { create } for pid=20663 comm="syz.4.4157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2974.811163][ T28] audit: type=1400 audit(3230.781:5888): avc: denied { bind } for pid=20663 comm="syz.4.4157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2974.813166][ T28] audit: type=1400 audit(3230.781:5889): avc: denied { module_request } for pid=20663 comm="syz.4.4157" kmod="crypto-ecb-camellia-asm" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2975.327157][ T28] audit: type=1400 audit(3231.291:5890): avc: denied { setopt } for pid=20663 comm="syz.4.4157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2975.355313][ T28] audit: type=1400 audit(3231.301:5891): avc: denied { accept } for pid=20663 comm="syz.4.4157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2975.358773][ T28] audit: type=1400 audit(3231.331:5892): avc: denied { module_request } for pid=20663 comm="syz.4.4157" kmod="crypto-ecb-camellia-asm-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2984.932696][ T28] audit: type=1400 audit(3240.901:5893): avc: denied { read } for pid=20672 comm="syz.0.4158" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2984.933176][ T28] audit: type=1400 audit(3240.901:5894): avc: denied { read open } for pid=20672 comm="syz.0.4158" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2984.940507][ T28] audit: type=1400 audit(3240.911:5895): avc: denied { ioctl } for pid=20672 comm="syz.0.4158" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2985.058347][ T28] audit: type=1400 audit(3241.031:5896): avc: denied { create } for pid=20672 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2985.073669][T20673] syzkaller0: entered promiscuous mode [ 2985.082763][T20673] syzkaller0: entered allmulticast mode [ 2985.171710][ T28] audit: type=1400 audit(3241.141:5897): avc: denied { setopt } for pid=20672 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2985.210628][ T28] audit: type=1400 audit(3241.181:5898): avc: denied { ioctl } for pid=20672 comm="syz.0.4158" path="socket:[46661]" dev="sockfs" ino=46661 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2985.229620][ T28] audit: type=1400 audit(3241.201:5899): avc: denied { write } for pid=20672 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2985.884039][ T28] audit: type=1400 audit(3241.851:5900): avc: denied { execmem } for pid=20678 comm="syz.0.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2987.726966][ T28] audit: type=1400 audit(3243.691:5901): avc: denied { create } for pid=20680 comm="syz.4.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2987.732620][ T28] audit: type=1400 audit(3243.701:5902): avc: denied { write } for pid=20680 comm="syz.4.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2988.264648][T20685] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2988.268604][T20685] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2989.944247][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 2989.944801][ T28] audit: type=1400 audit(3245.911:5923): avc: denied { create } for pid=20678 comm="syz.0.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2989.966021][ T28] audit: type=1400 audit(3245.931:5924): avc: denied { sys_module } for pid=20688 comm="syz.4.4163" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2989.974205][ T28] audit: type=1400 audit(3245.941:5925): avc: denied { module_request } for pid=20688 comm="syz.4.4163" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2989.980542][ T28] audit: type=1400 audit(3245.951:5926): avc: denied { write } for pid=20678 comm="syz.0.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2989.991565][ T28] audit: type=1400 audit(3245.961:5927): avc: denied { write } for pid=20678 comm="syz.0.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2990.845331][ T28] audit: type=1400 audit(3246.811:5928): avc: denied { name_bind } for pid=20700 comm="syz.4.4165" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2990.847853][ T28] audit: type=1400 audit(3246.811:5929): avc: denied { node_bind } for pid=20700 comm="syz.4.4165" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2992.137287][ T28] audit: type=1400 audit(3248.101:5930): avc: denied { create } for pid=20704 comm="syz.4.4167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2992.144141][ T28] audit: type=1400 audit(3248.111:5931): avc: denied { getopt } for pid=20704 comm="syz.4.4167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2992.633105][ T28] audit: type=1400 audit(3248.601:5932): avc: denied { read write } for pid=20706 comm="syz.4.4168" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2993.295493][T20709] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 2993.307116][T20709] block device autoloading is deprecated and will be removed. [ 2997.771967][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 2997.774852][ T28] audit: type=1400 audit(3253.741:5941): avc: denied { read } for pid=20713 comm="syz.4.4169" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2997.776016][ T28] audit: type=1400 audit(3253.741:5942): avc: denied { read open } for pid=20713 comm="syz.4.4169" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2997.811517][ T28] audit: type=1400 audit(3253.781:5943): avc: denied { ioctl } for pid=20713 comm="syz.4.4169" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2997.824208][ T28] audit: type=1400 audit(3253.791:5944): avc: denied { ioctl } for pid=20713 comm="syz.4.4169" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2997.857011][ T28] audit: type=1400 audit(3253.821:5945): avc: denied { ioctl } for pid=20713 comm="syz.4.4169" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2998.007506][ T28] audit: type=1400 audit(3253.961:5946): avc: denied { read } for pid=20713 comm="syz.4.4169" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2998.011510][ T28] audit: type=1400 audit(3253.981:5947): avc: denied { read open } for pid=20713 comm="syz.4.4169" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3004.537396][ T28] audit: type=1400 audit(3260.511:5948): avc: denied { execmem } for pid=20719 comm="syz.0.4171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3009.571431][ T28] audit: type=1400 audit(3265.541:5949): avc: denied { read } for pid=20722 comm="syz.0.4172" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3009.606905][ T28] audit: type=1400 audit(3265.571:5950): avc: denied { read open } for pid=20722 comm="syz.0.4172" path="/dev/ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3010.388909][ T28] audit: type=1400 audit(3266.361:5951): avc: denied { create } for pid=20724 comm="syz.0.4173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3011.781309][ T28] audit: type=1400 audit(3267.751:5952): avc: denied { name_bind } for pid=20728 comm="syz.4.4174" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3011.781705][ T28] audit: type=1400 audit(3267.751:5953): avc: denied { node_bind } for pid=20728 comm="syz.4.4174" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3013.065943][T20729] ------------[ cut here ]------------ [ 3013.066452][T20729] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#0: syz.0.4173/20729 [ 3013.068482][T20729] Modules linked in: [ 3013.069599][T20729] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3013.070334][T20729] CPU: 0 UID: 0 PID: 20729 Comm: syz.0.4173 Tainted: G L syzkaller #0 PREEMPT [ 3013.070934][T20729] Tainted: [L]=SOFTLOCKUP [ 3013.071134][T20729] Hardware name: ARM-Versatile Express [ 3013.071337][T20729] Call trace: [ 3013.071519][T20729] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3013.071930][T20729] r7:82a1e7b8 r6:00000000 r5:8231c350 r4:00000001 [ 3013.072190][T20729] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3013.072529][T20729] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3013.072880][T20729] r7:82a1e7b8 r6:00000000 r5:847bd5c0 r4:82c7bd3c [ 3013.073134][T20729] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 3013.073457][T20729] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 3013.073796][T20729] r7:80265f80 [ 3013.073950][T20729] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 3013.074287][T20729] r3:82a0b544 r2:00000001 r1:82302e38 r0:8230a718 [ 3013.074531][T20729] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 3013.074886][T20729] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 3013.075267][T20729] r8:00000009 r7:8230b914 r6:e0209ebc r5:847bd5c0 r4:00000000 [ 3013.075534][T20729] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 3013.075928][T20729] r10:847bdcb4 r9:00000000 r8:e0209f68 r7:847bde90 r6:00000080 r5:847bd5c0 [ 3013.076315][T20729] r4:847bd5c0 [ 3013.076467][T20729] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 3013.076877][T20729] r8:e0209f68 r7:847bde90 r6:833e3a40 r5:847bd5c0 r4:83993d40 [ 3013.077139][T20729] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 3013.077440][T20729] r7:00000001 [ 3013.077584][T20729] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3013.077885][T20729] Exception stack(0xe0209fa8 to 0xe0209ff0) [ 3013.078131][T20729] 9fa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 3013.078433][T20729] 9fc0: 00000000 00000000 00000000 00000001 00346418 00000000 003d0f00 76f000dc [ 3013.078823][T20729] 9fe0: 76effe60 76effe50 000193b4 001307a0 [ 3013.081312][T20729] Rebooting in 86400 seconds..