last executing test programs: 1m55.557892972s ago: executing program 0 (id=4915): ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) 1m54.85946471s ago: executing program 0 (id=4916): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/firmware/fdt', 0x0, 0x0) r1 = epoll_create(0x1dffffa) close_range(r0, r1, 0x0) socketpair(0x9, 0x5, 0x0, &(0x7f0000001700)) r2 = landlock_create_ruleset(&(0x7f0000000100)={0x9168, 0x0, 0x1}, 0x18, 0x0) landlock_restrict_self(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r3, 0x5404, 0x0) openat$binder_debug(0xffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSFF(r4, 0x40044591, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, 0x0) r6 = openat$mixer(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) r7 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x234680, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_udp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000300)) r9 = dup3(r6, r7, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000180)) r10 = dup2(r6, r9) ioctl$USBDEVFS_CONTROL(r10, 0xc0105500, &(0x7f0000000040)={0x2, 0x16, 0x8001, 0xfffd, 0x0, 0x4, 0x0}) 1m53.279267224s ago: executing program 0 (id=4917): r0 = io_uring_setup(0x13a5, &(0x7f0000000280)={0x0, 0xb431, 0x0, 0x3, 0x382}) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES32=r0], 0x33fe0}}, 0x20000800) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xe488f1dc0cd6cc0b}, 0x5) close_range(r0, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) 1m51.629219789s ago: executing program 0 (id=4918): ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x5451, 0x0) 1m50.630171249s ago: executing program 0 (id=4919): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40000000010800034000000014480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c0003801800008008000340000000020c0004400000000000000c7f14000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004180)=ANY=[@ANYBLOB="480000000d0a010802000000000000000a0000010900020073797a31000000000900010073797a3100000c001c0003804c"], 0x48}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) 1m48.960159036s ago: executing program 0 (id=4923): pipe2(&(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) socket$kcm(0x2d, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='netlink_extack\x00', r2}, 0x10) r3 = io_uring_setup(0x75c0, &(0x7f0000000ac0)={0x0, 0x9de6, 0x40, 0x2, 0x4800020}) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f00000003c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r4, 0x3b85, &(0x7f0000000040)={0x28, 0x7, r5, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r4, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r5, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r4, 0x3ba0, &(0x7f0000000100)={0x48, 0x7, r6, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x334e8b}) close_range(r3, 0xffffffffffffffff, 0x200000000000000) socket$nl_xfrm(0x10, 0x3, 0x6) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000041436120410e5150e8d5000000010902f98a5c01000000090401"], 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 1m3.261472289s ago: executing program 32 (id=4923): pipe2(&(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) socket$kcm(0x2d, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='netlink_extack\x00', r2}, 0x10) r3 = io_uring_setup(0x75c0, &(0x7f0000000ac0)={0x0, 0x9de6, 0x40, 0x2, 0x4800020}) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f00000003c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r4, 0x3b85, &(0x7f0000000040)={0x28, 0x7, r5, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r4, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r5, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r4, 0x3ba0, &(0x7f0000000100)={0x48, 0x7, r6, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x334e8b}) close_range(r3, 0xffffffffffffffff, 0x200000000000000) socket$nl_xfrm(0x10, 0x3, 0x6) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000041436120410e5150e8d5000000010902f98a5c01000000090401"], 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 6.448579568s ago: executing program 2 (id=4965): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109022d0001100000000904000003fe03010009cd8d1f000200000009050502000000001009058b1e20"], 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000300)={0x84, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0xc0) mount$fuse(0x0, 0x0, 0x0, 0x919009, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0]) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='autofs\x00', 0x201000c, 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0/file1\x00', r3, &(0x7f0000000080)='./file0\x00') r4 = dup(r3) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r4, 0x40049366, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000180)=""/9) ioctl$FS_IOC_GETVERSION(r2, 0xc0145b0e, &(0x7f0000000040)) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50}, 0x4080) 5.540951483s ago: executing program 2 (id=4967): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000003c0)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newtfilter={0x58, 0x2c, 0xd27, 0x30bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xd, 0xffff}, {}, {0xfff1}}, [@filter_kind_options=@f_flow={{0x9}, {0x28, 0x2, [@TCA_FLOW_EMATCHES={0x24, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x0, 0x7, 0x4}, {{0x2, 0x1}, {0x1, 0x0, 0x0, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xff}}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x2008c014) 5.419200018s ago: executing program 1 (id=4968): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001400)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r1, 0x0, 0x0, 0x1, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="19"], 0x8, 0x0) 4.681242917s ago: executing program 2 (id=4969): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010025bd7000000000000300000040000180100001006574683a69703667726530"], 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 3.964624645s ago: executing program 1 (id=4970): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)="d8000000180081054e81f782db4cb904021d0800fe00fe0506ff55a10a0015000600142603600e1208000f007f370301a8001600a40012400f000100035c0461c1d67f6f94007134cf6edb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090014d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00350db798262f3d40fad95667e006dcdf63951f215c3f8b6ad2cba0e2375ee535e3bb9ad809d5e1cace81ed0bffece0b42a4d7f000000000000d6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x20000800) 3.510883803s ago: executing program 1 (id=4971): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c9801288463608646667011"], 0xffdd) 2.966042005s ago: executing program 2 (id=4972): r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') read$FUSE(r0, &(0x7f00000005c0)={0x2020}, 0x2020) 2.788412071s ago: executing program 1 (id=4973): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0xc, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x4}]}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x800) 2.517489622s ago: executing program 2 (id=4974): r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x300) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffff8) 1.742675342s ago: executing program 2 (id=4975): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000340)="01000722625a900ede290f00015b097ead85847837353d2dbad05d", 0x1b, r3) 659.763195ms ago: executing program 1 (id=4976): r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="700200001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000010010c8013000c800ca3488008000000000000000800038064001c8005"], 0x270}, 0x1, 0x0, 0x0, 0x20008014}, 0x4) 0s ago: executing program 1 (id=4977): syz_usb_connect(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="1201000027951840240401c04099010203010902240001000400010904"], 0x0) kernel console output (not intermixed with test programs): .0.4778" path="socket:[54975]" dev="sockfs" ino=54975 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2767.940602][T21571] FAULT_INJECTION: forcing a failure. [ 2767.940602][T21571] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.943697][T21571] CPU: 0 UID: 0 PID: 21571 Comm: syz.1.4785 Not tainted syzkaller #0 PREEMPT [ 2767.943825][T21571] Hardware name: ARM-Versatile Express [ 2767.943862][T21571] Call trace: [ 2767.943921][T21571] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2767.944026][T21571] r7:00000000 r6:00000000 r5:60000013 r4:8224deb0 [ 2767.944083][T21571] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 2767.944183][T21571] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 2767.944240][T21571] r5:84f95400 r4:82918790 [ 2767.944255][T21571] [<8021f928>] (dump_stack) from [<80984eb8>] (should_fail_ex+0x1c4/0x228) [ 2767.944320][T21571] [<80984cf4>] (should_fail_ex) from [<8052dda4>] (should_failslab+0x6c/0x94) [ 2767.944383][T21571] r8:84f95400 r7:00000000 r6:00000cc0 r5:0000000b r4:830a4a80 [ 2767.944401][T21571] [<8052dd38>] (should_failslab) from [<8050da88>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 2767.944446][T21571] [<8050da3c>] (kmem_cache_alloc_noprof) from [<8056bed0>] (getname_kernel+0x30/0xfc) [ 2767.944504][T21571] r10:edf41d74 r9:859045c0 r8:84a0e040 r7:84a0e740 r6:824528b8 r5:0000000b [ 2767.944601][T21571] r4:edf41e58 [ 2767.944618][T21571] [<8056bea0>] (getname_kernel) from [<80572870>] (kern_path+0x1c/0x54) [ 2767.944677][T21571] r7:ffffffff r6:edf41d74 r5:00000001 r4:edf41e58 [ 2767.944694][T21571] [<80572854>] (kern_path) from [<807cfb6c>] (tomoyo_mount_acl+0x26c/0x32c) [ 2767.944750][T21571] r6:84a0e740 r5:00000000 r4:edf41e58 [ 2767.944768][T21571] [<807cf900>] (tomoyo_mount_acl) from [<807cfcdc>] (tomoyo_mount_permission+0xb0/0x1f0) [ 2767.944820][T21571] r10:84f95400 r9:807d1d40 r8:8229d444 r7:edf41f6c r6:84a0e740 r5:00000001 [ 2767.944837][T21571] r4:00000000 [ 2767.944853][T21571] [<807cfc2c>] (tomoyo_mount_permission) from [<807d1d5c>] (tomoyo_sb_mount+0x1c/0x24) [ 2767.944908][T21571] r8:85ded000 r7:01281040 r6:00000000 r5:edf41f6c r4:84a0e740 [ 2767.944925][T21571] [<807d1d40>] (tomoyo_sb_mount) from [<80787424>] (security_sb_mount+0x7c/0x24c) [ 2767.944971][T21571] [<807873a8>] (security_sb_mount) from [<8058ff04>] (path_mount+0x78/0xb30) [ 2767.945031][T21571] r9:85ded000 r8:00000000 r7:84a0e740 r6:edf41f6c r5:20000100 r4:01281040 [ 2767.945048][T21571] [<8058fe8c>] (path_mount) from [<80590f6c>] (sys_mount+0x178/0x260) [ 2767.945106][T21571] r10:00000015 r9:b5403587 r8:85ded000 r7:84a0e740 r6:00000000 r5:20000100 [ 2767.945125][T21571] r4:00000000 [ 2767.945140][T21571] [<80590df4>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2767.945182][T21571] Exception stack(0xedf41fa8 to 0xedf41ff0) [ 2767.945215][T21571] 1fa0: 20000100 00000000 20000000 20000a80 00000000 01281040 [ 2767.945245][T21571] 1fc0: 20000100 00000000 001304b8 00000015 00300000 00000000 00006364 76f7f0bc [ 2767.945271][T21571] 1fe0: 76f7eec0 76f7eeb0 000195a4 00132510 [ 2767.945310][T21571] r10:00000015 r9:84f95400 r8:8020029c r7:00000015 r6:001304b8 r5:00000000 [ 2767.945329][T21571] r4:20000100 [ 2768.160866][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2768.161611][ T31] audit: type=1400 audit(2768.080:1817): avc: denied { read } for pid=21566 comm="syz.0.4783" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2768.177746][ T31] audit: type=1400 audit(2768.100:1818): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2768.179249][ T31] audit: type=1400 audit(2768.100:1819): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2768.181154][ T31] audit: type=1400 audit(2768.100:1820): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2768.318674][ T31] audit: type=1400 audit(2768.240:1821): avc: denied { read open } for pid=21566 comm="syz.0.4783" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2768.453115][ T31] audit: type=1400 audit(2768.370:1822): avc: denied { create } for pid=21573 comm="syz.1.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2768.476955][ T31] audit: type=1400 audit(2768.400:1823): avc: denied { ioctl } for pid=21573 comm="syz.1.4786" path="socket:[54994]" dev="sockfs" ino=54994 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2768.484714][ T31] audit: type=1400 audit(2768.400:1824): avc: denied { bind } for pid=21573 comm="syz.1.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2768.501885][ T31] audit: type=1400 audit(2768.420:1825): avc: denied { write } for pid=21573 comm="syz.1.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2768.503843][ T31] audit: type=1400 audit(2768.420:1826): avc: denied { read } for pid=21573 comm="syz.1.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2773.173325][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 2773.173635][ T31] audit: type=1400 audit(2773.090:1914): avc: denied { write } for pid=21589 comm="syz.1.4794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2773.196043][ T31] audit: type=1400 audit(2773.120:1915): avc: denied { read } for pid=21589 comm="syz.1.4794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2773.262009][ T31] audit: type=1400 audit(2773.180:1916): avc: denied { write } for pid=21587 comm="syz.0.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2773.265553][ T31] audit: type=1400 audit(2773.180:1917): avc: denied { read } for pid=21587 comm="syz.0.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2773.682017][ T31] audit: type=1400 audit(2773.600:1918): avc: denied { write } for pid=21589 comm="syz.1.4794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2773.772840][ T31] audit: type=1400 audit(2773.690:1919): avc: denied { write } for pid=21587 comm="syz.0.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2775.674601][ T31] audit: type=1400 audit(2775.590:1920): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2775.687937][ T31] audit: type=1400 audit(2775.610:1921): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2775.690831][ T31] audit: type=1400 audit(2775.610:1922): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2775.828293][ T31] audit: type=1400 audit(2775.750:1923): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2778.213993][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 2778.214915][ T31] audit: type=1400 audit(2778.130:1965): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2778.232407][ T31] audit: type=1400 audit(2778.150:1966): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2778.235887][ T31] audit: type=1400 audit(2778.160:1967): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2778.345927][ T31] audit: type=1400 audit(2778.270:1968): avc: denied { read } for pid=21614 comm="syz.1.4805" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2778.353058][ T31] audit: type=1400 audit(2778.270:1969): avc: denied { read open } for pid=21614 comm="syz.1.4805" path="net:[4026532708]" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2778.356449][ T31] audit: type=1400 audit(2778.270:1970): avc: denied { create } for pid=21614 comm="syz.1.4805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2778.360902][ T31] audit: type=1400 audit(2778.280:1971): avc: denied { write } for pid=21614 comm="syz.1.4805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2778.373825][ T31] audit: type=1400 audit(2778.290:1972): avc: denied { read } for pid=21614 comm="syz.1.4805" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2778.377600][ T31] audit: type=1400 audit(2778.300:1973): avc: denied { read open } for pid=21614 comm="syz.1.4805" path="net:[4026532708]" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2778.382082][ T31] audit: type=1400 audit(2778.300:1974): avc: denied { create } for pid=21614 comm="syz.1.4805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2783.393523][ T31] kauditd_printk_skb: 128 callbacks suppressed [ 2783.397128][ T31] audit: type=1400 audit(2783.310:2103): avc: denied { create } for pid=21637 comm="syz.1.4813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2783.408833][ T31] audit: type=1400 audit(2783.330:2104): avc: denied { ioctl } for pid=21637 comm="syz.1.4813" path="socket:[55149]" dev="sockfs" ino=55149 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2783.439243][ T31] audit: type=1400 audit(2783.360:2105): avc: denied { bind } for pid=21637 comm="syz.1.4813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2783.454770][ T31] audit: type=1400 audit(2783.370:2106): avc: denied { write } for pid=21637 comm="syz.1.4813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2783.467600][ T31] audit: type=1400 audit(2783.390:2107): avc: denied { write } for pid=21637 comm="syz.1.4813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2783.512415][ T31] audit: type=1400 audit(2783.430:2108): avc: denied { write } for pid=21616 comm="syz.0.4802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2783.648793][ T31] audit: type=1400 audit(2783.570:2109): avc: denied { write } for pid=21616 comm="syz.0.4802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2783.713922][ T31] audit: type=1400 audit(2783.630:2110): avc: denied { write } for pid=21616 comm="syz.0.4802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2783.879891][T21636] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=262 sclass=netlink_audit_socket pid=21636 comm=syz.0.4802 [ 2783.978110][ T31] audit: type=1400 audit(2783.900:2111): avc: denied { write } for pid=21637 comm="syz.1.4813" path="socket:[55149]" dev="sockfs" ino=55149 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2783.981750][ T31] audit: type=1400 audit(2783.900:2112): avc: denied { write } for pid=21637 comm="syz.1.4813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2788.620186][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 2788.620539][ T31] audit: type=1400 audit(2788.540:2129): avc: denied { create } for pid=21648 comm="syz.0.4817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2788.871828][ T31] audit: type=1400 audit(2788.790:2130): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2788.873575][ T31] audit: type=1400 audit(2788.790:2131): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2788.920905][ T31] audit: type=1400 audit(2788.840:2132): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2789.516563][ T31] audit: type=1400 audit(2789.440:2133): avc: denied { create } for pid=21650 comm="syz.0.4818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2789.538976][ T31] audit: type=1400 audit(2789.460:2134): avc: denied { ioctl } for pid=21650 comm="syz.0.4818" path="socket:[55191]" dev="sockfs" ino=55191 ioctlcmd=0x4610 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2789.562566][ T31] audit: type=1400 audit(2789.480:2135): avc: denied { getopt } for pid=21650 comm="syz.0.4818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2789.819214][ T31] audit: type=1400 audit(2789.740:2136): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2789.826075][ T31] audit: type=1400 audit(2789.750:2137): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2789.832754][ T31] audit: type=1400 audit(2789.750:2138): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2794.290442][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 2794.290838][ T31] audit: type=1400 audit(2794.210:2175): avc: denied { create } for pid=21662 comm="syz.0.4823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2794.322041][ T31] audit: type=1400 audit(2794.240:2176): avc: denied { write } for pid=21662 comm="syz.0.4823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2794.476100][ T31] audit: type=1400 audit(2794.400:2177): avc: denied { write } for pid=21662 comm="syz.0.4823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2794.974898][T21663] FAULT_INJECTION: forcing a failure. [ 2794.974898][T21663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2794.975149][T21663] CPU: 1 UID: 0 PID: 21663 Comm: syz.0.4823 Not tainted syzkaller #0 PREEMPT [ 2794.975223][T21663] Hardware name: ARM-Versatile Express [ 2794.975259][T21663] Call trace: [ 2794.975313][T21663] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2794.975384][T21663] r7:b5403587 r6:00000000 r5:60000013 r4:8224deb0 [ 2794.975395][T21663] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 2794.975420][T21663] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 2794.975473][T21663] r5:83382400 r4:8294f510 [ 2794.975489][T21663] [<8021f928>] (dump_stack) from [<80984eb8>] (should_fail_ex+0x1c4/0x228) [ 2794.975541][T21663] [<80984cf4>] (should_fail_ex) from [<80984f30>] (should_fail+0x14/0x18) [ 2794.975575][T21663] r8:00000000 r7:b5403587 r6:76f10bb8 r5:00000000 r4:ee3c9fb0 [ 2794.975593][T21663] [<80984f1c>] (should_fail) from [<80984f50>] (should_fail_usercopy+0x1c/0x20) [ 2794.975642][T21663] [<80984f34>] (should_fail_usercopy) from [<8022b588>] (restore_sigframe+0x94/0x210) [ 2794.975681][T21663] [<8022b4f4>] (restore_sigframe) from [<8022b744>] (sys_sigreturn+0x40/0x60) [ 2794.975709][T21663] r7:00000077 r6:001304b8 r5:00000000 r4:ee3c9fb0 [ 2794.975716][T21663] [<8022b704>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2794.975738][T21663] Exception stack(0xee3c9fa8 to 0xee3c9ff0) [ 2794.975757][T21663] 9fa0: 00000000 00000000 00000011 200003c0 200040a1 00000000 [ 2794.975772][T21663] 9fc0: 00000000 00000000 001304b8 00000077 00300000 00000000 00006364 76f110bc [ 2794.975783][T21663] 9fe0: 76f10ec0 76f10bb8 000ef5d0 000ef5d8 [ 2794.975795][T21663] r5:00000000 r4:00000000 [ 2795.588212][ T31] audit: type=1400 audit(2795.510:2178): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2795.596774][ T31] audit: type=1400 audit(2795.520:2179): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2795.608336][ T31] audit: type=1400 audit(2795.530:2180): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2796.388991][ T31] audit: type=1400 audit(2796.310:2181): avc: denied { create } for pid=21665 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2796.401339][ T31] audit: type=1400 audit(2796.320:2182): avc: denied { accept } for pid=21665 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2796.618456][ T31] audit: type=1400 audit(2796.540:2183): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2796.622400][ T31] audit: type=1400 audit(2796.540:2184): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2799.375254][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 2799.376388][ T31] audit: type=1400 audit(2799.290:2234): avc: denied { create } for pid=21676 comm="syz.1.4829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2799.394338][ T31] audit: type=1400 audit(2799.310:2235): avc: denied { write } for pid=21676 comm="syz.1.4829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2799.409963][ T31] audit: type=1400 audit(2799.330:2236): avc: denied { write } for pid=21676 comm="syz.1.4829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2799.651433][ T31] audit: type=1400 audit(2799.570:2237): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2799.667545][ T31] audit: type=1400 audit(2799.590:2238): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2799.678926][ T31] audit: type=1400 audit(2799.600:2239): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2800.610269][ T31] audit: type=1400 audit(2800.530:2240): avc: denied { read write } for pid=21679 comm="syz.0.4830" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2800.637901][ T31] audit: type=1400 audit(2800.560:2241): avc: denied { read write open } for pid=21679 comm="syz.0.4830" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2800.657342][ T31] audit: type=1400 audit(2800.580:2242): avc: denied { ioctl } for pid=21679 comm="syz.0.4830" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0x542c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2800.732308][ T31] audit: type=1400 audit(2800.650:2243): avc: denied { create } for pid=21679 comm="syz.0.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2803.776943][T21689] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65381 sclass=netlink_tcpdiag_socket pid=21689 comm=syz.0.4833 [ 2804.538839][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 2804.539196][ T31] audit: type=1400 audit(2804.460:2290): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.560689][ T31] audit: type=1400 audit(2804.480:2291): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.567110][ T31] audit: type=1400 audit(2804.490:2292): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2804.829915][ T31] audit: type=1400 audit(2804.750:2293): avc: denied { create } for pid=21694 comm="syz.1.4838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2804.843253][ T31] audit: type=1400 audit(2804.760:2294): avc: denied { write } for pid=21694 comm="syz.1.4838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2804.879010][ T31] audit: type=1400 audit(2804.800:2295): avc: denied { audit_write } for pid=21694 comm="syz.1.4838" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2804.908181][ T31] audit: type=1400 audit(2804.830:2296): avc: denied { audit_write } for pid=21694 comm="syz.1.4838" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2804.927414][ T31] audit: type=1400 audit(2804.850:2297): avc: denied { write } for pid=21694 comm="syz.1.4838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2804.943070][ T31] audit: type=1400 audit(2804.860:2298): avc: denied { read write } for pid=21694 comm="syz.1.4838" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2804.949155][ T31] audit: type=1400 audit(2804.860:2299): avc: denied { ioctl open } for pid=21694 comm="syz.1.4838" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2808.320763][T21709] FAULT_INJECTION: forcing a failure. [ 2808.320763][T21709] name failslab, interval 1, probability 0, space 0, times 0 [ 2808.321123][T21709] CPU: 1 UID: 0 PID: 21709 Comm: syz.1.4842 Not tainted syzkaller #0 PREEMPT [ 2808.321214][T21709] Hardware name: ARM-Versatile Express [ 2808.321238][T21709] Call trace: [ 2808.321281][T21709] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2808.321393][T21709] r7:00000c40 r6:00000000 r5:60000013 r4:8224deb0 [ 2808.321523][T21709] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 2808.321852][T21709] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 2808.322611][T21709] r5:83383000 r4:82918790 [ 2808.322668][T21709] [<8021f928>] (dump_stack) from [<80984eb8>] (should_fail_ex+0x1c4/0x228) [ 2808.322822][T21709] [<80984cf4>] (should_fail_ex) from [<8052dda4>] (should_failslab+0x6c/0x94) [ 2808.323165][T21709] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 2808.323537][T21709] [<8052dd38>] (should_failslab) from [<805093ec>] (__kmalloc_noprof+0x9c/0x568) [ 2808.324016][T21709] [<80509350>] (__kmalloc_noprof) from [<807d1380>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 2808.324564][T21709] r10:ee68dd74 r9:85790c00 r8:00000000 r7:83615bb0 r6:ee68df6c r5:00001000 [ 2808.324871][T21709] r4:00000000 [ 2808.324921][T21709] [<807d1344>] (tomoyo_realpath_from_path) from [<807cf9ac>] (tomoyo_mount_acl+0xac/0x32c) [ 2808.324983][T21709] r10:ee68dd74 r9:ee68df6c r8:84f4f740 r7:8229d444 r6:85896640 r5:00000000 [ 2808.325006][T21709] r4:ee68de58 r3:ee68ddb0 [ 2808.325022][T21709] [<807cf900>] (tomoyo_mount_acl) from [<807cfcdc>] (tomoyo_mount_permission+0xb0/0x1f0) [ 2808.325074][T21709] r10:83383000 r9:807d1d40 r8:8229d444 r7:ee68df6c r6:85896640 r5:00000001 [ 2808.325114][T21709] r4:00000000 [ 2808.325132][T21709] [<807cfc2c>] (tomoyo_mount_permission) from [<807d1d5c>] (tomoyo_sb_mount+0x1c/0x24) [ 2808.325186][T21709] r8:8403a000 r7:03801003 r6:00000000 r5:ee68df6c r4:85896640 [ 2808.325205][T21709] [<807d1d40>] (tomoyo_sb_mount) from [<80787424>] (security_sb_mount+0x7c/0x24c) [ 2808.325253][T21709] [<807873a8>] (security_sb_mount) from [<8058ff04>] (path_mount+0x78/0xb30) [ 2808.325326][T21709] r9:8403a000 r8:00000000 r7:85896640 r6:ee68df6c r5:20000180 r4:03801003 [ 2808.325434][T21709] [<8058fe8c>] (path_mount) from [<80590f6c>] (sys_mount+0x178/0x260) [ 2808.325576][T21709] r10:00000015 r9:b5403587 r8:8403a000 r7:85896640 r6:00000000 r5:20000180 [ 2808.325599][T21709] r4:00000000 [ 2808.325674][T21709] [<80590df4>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2808.325839][T21709] Exception stack(0xee68dfa8 to 0xee68dff0) [ 2808.325882][T21709] dfa0: 20000180 00000000 20000000 20000a80 00000000 03801003 [ 2808.326029][T21709] dfc0: 20000180 00000000 001304b8 00000015 00300000 00000000 00006364 76f7f0bc [ 2808.326349][T21709] dfe0: 76f7eec0 76f7eeb0 000195a4 00132510 [ 2808.326394][T21709] r10:00000015 r9:83383000 r8:8020029c r7:00000015 r6:001304b8 r5:00000000 [ 2808.326473][T21709] r4:20000180 [ 2808.335876][T21709] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2809.753200][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 2809.753510][ T31] audit: type=1400 audit(2809.670:2360): avc: denied { create } for pid=21712 comm="syz.0.4841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2809.783572][ T31] audit: type=1400 audit(2809.700:2361): avc: denied { write } for pid=21712 comm="syz.0.4841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2809.798137][ T31] audit: type=1400 audit(2809.720:2362): avc: denied { module_request } for pid=21712 comm="syz.0.4841" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2810.047261][ T31] audit: type=1400 audit(2809.970:2363): avc: denied { read } for pid=21712 comm="syz.0.4841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2810.300455][ T31] audit: type=1400 audit(2810.220:2364): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2810.367982][ T31] audit: type=1400 audit(2810.290:2365): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2810.369476][ T31] audit: type=1400 audit(2810.290:2366): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2811.495053][ T31] audit: type=1400 audit(2811.410:2367): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2811.527718][ T31] audit: type=1400 audit(2811.450:2368): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2811.556740][ T31] audit: type=1400 audit(2811.480:2369): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2814.905582][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 2814.905899][ T31] audit: type=1400 audit(2814.820:2399): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2814.906145][ T31] audit: type=1400 audit(2814.820:2400): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2814.909417][ T31] audit: type=1400 audit(2814.830:2401): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2815.124553][ T31] audit: type=1400 audit(2815.040:2402): avc: denied { create } for pid=21733 comm="syz.1.4851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2815.128010][ T31] audit: type=1400 audit(2815.050:2403): avc: denied { write } for pid=21733 comm="syz.1.4851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2815.132937][ T31] audit: type=1400 audit(2815.050:2404): avc: denied { create } for pid=21733 comm="syz.1.4851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2815.155495][ T31] audit: type=1400 audit(2815.070:2405): avc: denied { create } for pid=21733 comm="syz.1.4851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2815.160008][ T31] audit: type=1400 audit(2815.080:2406): avc: denied { create } for pid=21733 comm="syz.1.4851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2815.174807][ T31] audit: type=1400 audit(2815.090:2407): avc: denied { write } for pid=21733 comm="syz.1.4851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2815.189230][ T31] audit: type=1400 audit(2815.110:2408): avc: denied { module_request } for pid=21733 comm="syz.1.4851" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2820.097685][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 2820.097947][ T31] audit: type=1400 audit(2820.020:2443): avc: denied { create } for pid=21744 comm="syz.1.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2820.116101][ T31] audit: type=1400 audit(2820.040:2444): avc: denied { write } for pid=21744 comm="syz.1.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2820.146902][ T31] audit: type=1400 audit(2820.070:2445): avc: denied { read } for pid=21744 comm="syz.1.4854" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2820.149975][ T31] audit: type=1400 audit(2820.070:2446): avc: denied { read open } for pid=21744 comm="syz.1.4854" path="net:[4026532708]" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2820.208610][ T31] audit: type=1400 audit(2820.130:2447): avc: denied { create } for pid=21744 comm="syz.1.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2820.212797][ T31] audit: type=1400 audit(2820.130:2448): avc: denied { write } for pid=21744 comm="syz.1.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2820.219554][ T31] audit: type=1400 audit(2820.140:2449): avc: denied { module_request } for pid=21744 comm="syz.1.4854" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2820.405666][ T31] audit: type=1400 audit(2820.330:2450): avc: denied { read } for pid=21744 comm="syz.1.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2820.430706][ T31] audit: type=1400 audit(2820.350:2451): avc: denied { read } for pid=21744 comm="syz.1.4854" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2820.433854][ T31] audit: type=1400 audit(2820.350:2452): avc: denied { read open } for pid=21744 comm="syz.1.4854" path="net:[4026532708]" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2825.153926][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 2825.154624][ T31] audit: type=1400 audit(2825.070:2522): avc: denied { write } for pid=21757 comm="syz.0.4857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2825.465756][ T31] audit: type=1400 audit(2825.390:2523): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2825.469126][ T31] audit: type=1400 audit(2825.390:2524): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2825.475130][ T31] audit: type=1400 audit(2825.390:2525): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2825.637389][ T31] audit: type=1400 audit(2825.560:2526): avc: denied { create } for pid=21763 comm="syz.1.4861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2825.647942][ T31] audit: type=1400 audit(2825.560:2527): avc: denied { write } for pid=21763 comm="syz.1.4861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2825.672842][ T31] audit: type=1400 audit(2825.590:2528): avc: denied { write } for pid=21757 comm="syz.0.4857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2825.724439][ T31] audit: type=1400 audit(2825.640:2529): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2825.724664][ T31] audit: type=1400 audit(2825.640:2530): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2825.724892][ T31] audit: type=1400 audit(2825.640:2531): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2830.223393][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2830.223702][ T31] audit: type=1400 audit(2830.140:2565): avc: denied { read } for pid=21776 comm="syz.1.4866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2830.246778][ T31] audit: type=1400 audit(2830.170:2566): avc: denied { ioctl } for pid=21776 comm="syz.1.4866" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2830.261309][ T31] audit: type=1400 audit(2830.180:2567): avc: denied { create } for pid=21776 comm="syz.1.4866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2830.289175][ T31] audit: type=1400 audit(2830.210:2568): avc: denied { write } for pid=21776 comm="syz.1.4866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2830.301751][ T31] audit: type=1400 audit(2830.220:2569): avc: denied { module_request } for pid=21776 comm="syz.1.4866" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2830.598897][ T31] audit: type=1400 audit(2830.520:2570): avc: denied { read } for pid=21776 comm="syz.1.4866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2830.605850][ T31] audit: type=1400 audit(2830.530:2571): avc: denied { ioctl } for pid=21776 comm="syz.1.4866" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2830.622015][ T31] audit: type=1400 audit(2830.540:2572): avc: denied { read } for pid=21776 comm="syz.1.4866" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2830.639375][ T31] audit: type=1400 audit(2830.560:2573): avc: denied { read open } for pid=21776 comm="syz.1.4866" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2830.648252][ T31] audit: type=1400 audit(2830.570:2574): avc: denied { ioctl } for pid=21776 comm="syz.1.4866" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x5701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2835.258414][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 2835.258720][ T31] audit: type=1400 audit(2835.180:2651): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.323614][ T31] audit: type=1400 audit(2835.240:2652): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.331893][ T31] audit: type=1400 audit(2835.250:2653): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.346639][ T31] audit: type=1400 audit(2835.270:2654): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.497793][ T31] audit: type=1400 audit(2835.420:2655): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.527633][ T31] audit: type=1400 audit(2835.450:2656): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2835.621143][ T31] audit: type=1400 audit(2835.540:2657): avc: denied { create } for pid=21789 comm="syz.1.4868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.630977][ T31] audit: type=1400 audit(2835.550:2658): avc: denied { write } for pid=21789 comm="syz.1.4868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.633693][ T31] audit: type=1400 audit(2835.550:2659): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.684667][ T31] audit: type=1400 audit(2835.600:2660): avc: denied { write } for pid=21789 comm="syz.1.4868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2836.557887][T21793] FAULT_INJECTION: forcing a failure. [ 2836.557887][T21793] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2836.560744][T21793] CPU: 0 UID: 0 PID: 21793 Comm: syz.1.4869 Not tainted syzkaller #0 PREEMPT [ 2836.560870][T21793] Hardware name: ARM-Versatile Express [ 2836.560905][T21793] Call trace: [ 2836.560947][T21793] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2836.561063][T21793] r7:dfb15e20 r6:00000000 r5:60000013 r4:8224deb0 [ 2836.561085][T21793] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 2836.561209][T21793] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 2836.561273][T21793] r5:84f93000 r4:8294f510 [ 2836.561309][T21793] [<8021f928>] (dump_stack) from [<80984eb8>] (should_fail_ex+0x1c4/0x228) [ 2836.561367][T21793] [<80984cf4>] (should_fail_ex) from [<80984f30>] (should_fail+0x14/0x18) [ 2836.561424][T21793] r8:00000080 r7:dfb15e20 r6:20000240 r5:00000000 r4:dfb15f20 [ 2836.561441][T21793] [<80984f1c>] (should_fail) from [<80984f50>] (should_fail_usercopy+0x1c/0x20) [ 2836.561530][T21793] [<80984f34>] (should_fail_usercopy) from [<81554510>] (copy_msghdr_from_user+0x50/0x130) [ 2836.561588][T21793] [<815544c0>] (copy_msghdr_from_user) from [<81554668>] (___sys_sendmsg+0x78/0xd0) [ 2836.561640][T21793] r8:00000080 r7:00000000 r6:837e0f00 r5:dfb15f20 r4:dfb15e64 [ 2836.561710][T21793] [<815545f0>] (___sys_sendmsg) from [<81554b24>] (__sys_sendmsg+0x8c/0xe0) [ 2836.561807][T21793] r10:00000128 r9:84f93000 r8:85ad7180 r7:00000080 r6:20000240 r5:85ad7181 [ 2836.561832][T21793] r4:00000000 [ 2836.561848][T21793] [<81554a98>] (__sys_sendmsg) from [<81554b8c>] (sys_sendmsg+0x14/0x18) [ 2836.561903][T21793] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 2836.561920][T21793] [<81554b78>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2836.561964][T21793] Exception stack(0xdfb15fa8 to 0xdfb15ff0) [ 2836.561999][T21793] 5fa0: 00000000 00000000 00000000 20000240 00000080 00000000 [ 2836.562029][T21793] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f7f0bc [ 2836.562054][T21793] 5fe0: 76f7eec0 76f7eeb0 000195a4 00132510 [ 2840.420221][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2840.420615][ T31] audit: type=1400 audit(2840.340:2720): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2840.434673][ T31] audit: type=1400 audit(2840.350:2721): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2840.657802][ T31] audit: type=1400 audit(2840.580:2722): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2840.825221][ T31] audit: type=1400 audit(2840.740:2723): avc: denied { create } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2840.896848][ T31] audit: type=1400 audit(2840.820:2724): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2840.903316][ T31] audit: type=1400 audit(2840.820:2725): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2840.998468][ T31] audit: type=1400 audit(2840.920:2726): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2841.099476][ T31] audit: type=1400 audit(2841.020:2727): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2841.255758][ T31] audit: type=1400 audit(2841.180:2728): avc: denied { write } for pid=21771 comm="syz.0.4863" path="socket:[55882]" dev="sockfs" ino=55882 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2841.260127][ T31] audit: type=1400 audit(2841.180:2729): avc: denied { write } for pid=21771 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2845.722659][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 2845.723038][ T31] audit: type=1400 audit(2845.640:2813): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2845.783697][ T31] audit: type=1400 audit(2845.700:2814): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2845.816202][ T31] audit: type=1400 audit(2845.740:2815): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2846.639803][ T31] audit: type=1400 audit(2846.560:2816): avc: denied { create } for pid=21823 comm="syz.0.4881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2846.730364][ T31] audit: type=1400 audit(2846.650:2817): avc: denied { write } for pid=21823 comm="syz.0.4881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2846.860999][ T31] audit: type=1400 audit(2846.780:2818): avc: denied { write } for pid=21823 comm="syz.0.4881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2847.229444][ T31] audit: type=1400 audit(2847.150:2819): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2847.236498][ T31] audit: type=1400 audit(2847.150:2820): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2847.251984][ T31] audit: type=1400 audit(2847.170:2821): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2847.493387][ T31] audit: type=1400 audit(2847.410:2822): avc: denied { create } for pid=21826 comm="syz.1.4882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2851.091756][T21835] FAULT_INJECTION: forcing a failure. [ 2851.091756][T21835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2851.092067][T21835] CPU: 1 UID: 0 PID: 21835 Comm: syz.1.4885 Not tainted syzkaller #0 PREEMPT [ 2851.092137][T21835] Hardware name: ARM-Versatile Express [ 2851.092157][T21835] Call trace: [ 2851.092194][T21835] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2851.092283][T21835] r7:dfd51e20 r6:00000000 r5:60000013 r4:8224deb0 [ 2851.092426][T21835] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 2851.092475][T21835] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 2851.092544][T21835] r5:84f96000 r4:8294f510 [ 2851.092574][T21835] [<8021f928>] (dump_stack) from [<80984eb8>] (should_fail_ex+0x1c4/0x228) [ 2851.092626][T21835] [<80984cf4>] (should_fail_ex) from [<80984f30>] (should_fail+0x14/0x18) [ 2851.092784][T21835] r8:6f3abba9 r7:dfd51e20 r6:20000380 r5:00000000 r4:dfd51f20 [ 2851.092829][T21835] [<80984f1c>] (should_fail) from [<80984f50>] (should_fail_usercopy+0x1c/0x20) [ 2851.092898][T21835] [<80984f34>] (should_fail_usercopy) from [<81554510>] (copy_msghdr_from_user+0x50/0x130) [ 2851.093000][T21835] [<815544c0>] (copy_msghdr_from_user) from [<81554668>] (___sys_sendmsg+0x78/0xd0) [ 2851.093060][T21835] r8:6f3abba9 r7:00000000 r6:837d8280 r5:dfd51f20 r4:dfd51e64 [ 2851.093104][T21835] [<815545f0>] (___sys_sendmsg) from [<81554b24>] (__sys_sendmsg+0x8c/0xe0) [ 2851.093217][T21835] r10:00000128 r9:84f96000 r8:85ad7c00 r7:6f3abba9 r6:20000380 r5:85ad7c01 [ 2851.093295][T21835] r4:00000003 [ 2851.093391][T21835] [<81554a98>] (__sys_sendmsg) from [<81554b8c>] (sys_sendmsg+0x14/0x18) [ 2851.093577][T21835] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 2851.093616][T21835] [<81554b78>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2851.093660][T21835] Exception stack(0xdfd51fa8 to 0xdfd51ff0) [ 2851.093697][T21835] 1fa0: 00000000 00000000 00000003 20000380 6f3abba9 00000000 [ 2851.093938][T21835] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f5e0bc [ 2851.094008][T21835] 1fe0: 76f5dec0 76f5deb0 000195a4 00132510 [ 2851.651480][ T31] kauditd_printk_skb: 158 callbacks suppressed [ 2851.651735][ T31] audit: type=1400 audit(2851.570:2981): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2851.664926][ T31] audit: type=1400 audit(2851.580:2982): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2851.666843][ T31] audit: type=1400 audit(2851.580:2983): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2852.070049][ T31] audit: type=1400 audit(2851.990:2984): avc: denied { read } for pid=21837 comm="syz.1.4886" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2852.092950][ T31] audit: type=1400 audit(2851.990:2985): avc: denied { read open } for pid=21837 comm="syz.1.4886" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2852.209713][ T31] audit: type=1400 audit(2852.130:2986): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2852.212083][ T31] audit: type=1400 audit(2852.130:2987): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2852.238198][ T31] audit: type=1400 audit(2852.160:2988): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2852.337073][ T31] audit: type=1400 audit(2852.260:2989): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2852.341995][ T31] audit: type=1400 audit(2852.260:2990): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2856.659419][ T31] kauditd_printk_skb: 161 callbacks suppressed [ 2856.660473][ T31] audit: type=1400 audit(2856.580:3152): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.662422][ T31] audit: type=1400 audit(2856.580:3153): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.667251][ T31] audit: type=1400 audit(2856.590:3154): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.683527][ T31] audit: type=1400 audit(2856.600:3155): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.696036][ T31] audit: type=1400 audit(2856.620:3156): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.710230][ T31] audit: type=1400 audit(2856.630:3157): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.718850][ T31] audit: type=1400 audit(2856.640:3158): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.734555][ T31] audit: type=1400 audit(2856.650:3159): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.736317][ T31] audit: type=1400 audit(2856.660:3160): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2856.740639][ T31] audit: type=1400 audit(2856.660:3161): avc: denied { write } for pid=21850 comm="syz.1.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.668608][ T31] kauditd_printk_skb: 217 callbacks suppressed [ 2861.668765][ T31] audit: type=1400 audit(2861.590:3379): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.680083][ T31] audit: type=1400 audit(2861.600:3380): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.691740][ T31] audit: type=1400 audit(2861.610:3381): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.703062][ T31] audit: type=1400 audit(2861.620:3382): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.709860][ T31] audit: type=1400 audit(2861.630:3383): avc: denied { write } for pid=21878 comm="syz.1.4896" path="socket:[55976]" dev="sockfs" ino=55976 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2861.718608][ T31] audit: type=1400 audit(2861.640:3385): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.720818][ T31] audit: type=1400 audit(2861.630:3384): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2861.747918][ T31] audit: type=1400 audit(2861.670:3386): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.752296][ T31] audit: type=1400 audit(2861.670:3387): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2861.766955][ T31] audit: type=1400 audit(2861.690:3388): avc: denied { write } for pid=21878 comm="syz.1.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2867.336970][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 2867.337150][ T31] audit: type=1400 audit(2867.260:3475): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2867.343485][ T31] audit: type=1400 audit(2867.260:3476): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2867.366307][ T31] audit: type=1400 audit(2867.290:3477): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2867.426094][ T31] audit: type=1400 audit(2867.350:3478): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2868.091732][ T31] audit: type=1400 audit(2868.010:3479): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2868.228098][ T31] audit: type=1400 audit(2868.150:3480): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2868.261076][ T31] audit: type=1400 audit(2868.180:3481): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2868.313215][ T31] audit: type=1400 audit(2868.230:3482): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2868.319920][ T31] audit: type=1400 audit(2868.240:3483): avc: denied { write } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2868.330444][ T31] audit: type=1400 audit(2868.250:3484): avc: denied { create } for pid=21898 comm="syz.1.4901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2872.838386][ T31] kauditd_printk_skb: 126 callbacks suppressed [ 2872.838679][ T31] audit: type=1400 audit(2872.760:3611): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2872.862600][ T31] audit: type=1400 audit(2872.780:3612): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2872.939205][ T31] audit: type=1400 audit(2872.860:3613): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2873.742133][ T31] audit: type=1400 audit(2873.660:3614): avc: denied { read } for pid=21907 comm="syz.0.4904" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2873.761488][ T31] audit: type=1400 audit(2873.680:3615): avc: denied { read open } for pid=21907 comm="syz.0.4904" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2873.805108][ T31] audit: type=1400 audit(2873.730:3616): avc: denied { create } for pid=21907 comm="syz.0.4904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2873.840022][ T31] audit: type=1400 audit(2873.760:3617): avc: denied { ioctl } for pid=21907 comm="syz.0.4904" path="socket:[56741]" dev="sockfs" ino=56741 ioctlcmd=0x9434 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2873.894823][ T31] audit: type=1400 audit(2873.810:3618): avc: denied { ioctl } for pid=21907 comm="syz.0.4904" path="socket:[56741]" dev="sockfs" ino=56741 ioctlcmd=0x941e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2873.989838][ T31] audit: type=1400 audit(2873.910:3619): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2873.991991][ T31] audit: type=1400 audit(2873.910:3620): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2874.478681][T19741] hid (null): unknown global tag 0xc [ 2874.479047][T19741] hid (null): unknown global tag 0xd [ 2874.479533][T19741] hid (null): report_id 0 is invalid [ 2874.479806][T19741] hid (null): unknown global tag 0xc [ 2874.483414][T19741] hid-generic 0000:0009:0009.0002: unknown global tag 0xc [ 2874.485686][T19741] hid-generic 0000:0009:0009.0002: item 0 4 1 12 parsing failed [ 2874.486459][T19741] hid-generic 0000:0009:0009.0002: probe with driver hid-generic failed with error -22 [ 2878.029100][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 2878.029282][ T31] audit: type=1400 audit(2877.950:3672): avc: denied { create } for pid=21941 comm="syz.0.4909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2878.048313][ T31] audit: type=1400 audit(2877.970:3673): avc: denied { module_request } for pid=21941 comm="syz.0.4909" kmod="net-pf-9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2878.260969][ T31] audit: type=1400 audit(2878.180:3674): avc: denied { read } for pid=21941 comm="syz.0.4909" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2878.263305][ T31] audit: type=1400 audit(2878.180:3675): avc: denied { read open } for pid=21941 comm="syz.0.4909" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2878.380796][ T31] audit: type=1400 audit(2878.300:3676): avc: denied { read } for pid=21941 comm="syz.0.4909" name="event0" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2878.403949][ T31] audit: type=1400 audit(2878.320:3677): avc: denied { read open } for pid=21941 comm="syz.0.4909" path="/dev/input/event0" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2878.495554][ T31] audit: type=1400 audit(2878.420:3678): avc: denied { read } for pid=21941 comm="syz.0.4909" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2878.498136][ T31] audit: type=1400 audit(2878.420:3679): avc: denied { read open } for pid=21941 comm="syz.0.4909" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2878.677602][ T31] audit: type=1400 audit(2878.600:3680): avc: denied { create } for pid=21941 comm="syz.0.4909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2878.758846][ T31] audit: type=1400 audit(2878.680:3681): avc: denied { ioctl } for pid=21941 comm="syz.0.4909" path="socket:[56781]" dev="sockfs" ino=56781 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2885.098277][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 2885.098442][ T31] audit: type=1400 audit(2885.020:3701): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2885.116984][ T31] audit: type=1400 audit(2885.040:3702): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2885.129890][ T31] audit: type=1400 audit(2885.050:3703): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2885.861046][ T31] audit: type=1400 audit(2885.780:3704): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2885.880104][ T31] audit: type=1400 audit(2885.800:3705): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2885.917978][ T31] audit: type=1400 audit(2885.840:3706): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2886.728736][ T31] audit: type=1400 audit(2886.650:3707): avc: denied { create } for pid=21958 comm="syz.0.4916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2886.766180][ T31] audit: type=1400 audit(2886.690:3708): avc: denied { module_request } for pid=21958 comm="syz.0.4916" kmod="net-pf-9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2886.960431][ T31] audit: type=1400 audit(2886.880:3709): avc: denied { read } for pid=21958 comm="syz.0.4916" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2886.971295][ T31] audit: type=1400 audit(2886.890:3710): avc: denied { read open } for pid=21958 comm="syz.0.4916" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2890.118825][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 2890.119103][ T31] audit: type=1400 audit(2890.040:3726): avc: denied { read write } for pid=18866 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.167687][ T31] audit: type=1400 audit(2890.090:3727): avc: denied { read write open } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.184123][ T31] audit: type=1400 audit(2890.100:3728): avc: denied { ioctl } for pid=18866 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.540538][ T31] audit: type=1400 audit(2890.460:3729): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.549602][ T31] audit: type=1400 audit(2890.470:3730): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.550000][ T31] audit: type=1400 audit(2890.470:3731): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.764035][ T31] audit: type=1400 audit(2890.680:3732): avc: denied { execmem } for pid=21966 comm="syz.1.4920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2890.771987][ T31] audit: type=1400 audit(2890.690:3733): avc: denied { execute } for pid=21966 comm="syz.1.4920" path="/421/cgroup.controllers" dev="tmpfs" ino=2233 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2890.876766][ T31] audit: type=1400 audit(2890.800:3734): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2890.881500][ T31] audit: type=1400 audit(2890.800:3735): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2895.578130][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 2895.578464][ T31] audit: type=1400 audit(2895.500:3762): avc: denied { prog_load } for pid=21976 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2895.756495][ T31] audit: type=1400 audit(2895.680:3763): avc: denied { bpf } for pid=21976 comm="syz.0.4923" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2895.789230][ T31] audit: type=1400 audit(2895.710:3764): avc: denied { perfmon } for pid=21976 comm="syz.0.4923" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2898.787009][ T31] audit: type=1400 audit(2898.710:3765): avc: denied { perfmon } for pid=21976 comm="syz.0.4923" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2899.697850][ T31] audit: type=1400 audit(2899.620:3766): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2899.701179][ T31] audit: type=1400 audit(2899.620:3767): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2899.717866][ T31] audit: type=1400 audit(2899.640:3768): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2899.849363][ T31] audit: type=1400 audit(2899.770:3769): avc: denied { allowed } for pid=21976 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2899.926319][ T31] audit: type=1400 audit(2899.840:3770): avc: denied { read write } for pid=21983 comm="syz.1.4924" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.932127][ T31] audit: type=1400 audit(2899.850:3771): avc: denied { read write open } for pid=21983 comm="syz.1.4924" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2900.185320][T12754] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 2900.462627][T12754] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x6 has invalid maxpacket 1023 [ 2900.464742][T12754] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xBA, changing to 0x8A [ 2900.466194][T12754] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8A has invalid maxpacket 121 [ 2900.508648][T12754] usb 2-1: New USB device found, idVendor=2294, idProduct=425b, bcdDevice=a2.10 [ 2900.509727][T12754] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2900.510731][T12754] usb 2-1: Product: syz [ 2900.511373][T12754] usb 2-1: Manufacturer: syz [ 2900.512019][T12754] usb 2-1: SerialNumber: syz [ 2900.521099][T12754] usb 2-1: config 0 descriptor?? [ 2900.561086][T21984] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2900.568156][T21984] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2900.583562][T12754] usb 2-1: ucan: probing device on interface #0 [ 2900.793894][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 2900.794490][ T31] audit: type=1400 audit(2900.710:3809): avc: denied { ioctl } for pid=21983 comm="syz.1.4924" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2900.799009][ T31] audit: type=1400 audit(2900.720:3810): avc: denied { ioctl } for pid=21983 comm="syz.1.4924" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2901.019035][ T31] audit: type=1400 audit(2900.940:3811): avc: denied { ioctl } for pid=21976 comm="syz.0.4923" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2901.019472][ T31] audit: type=1400 audit(2900.940:3812): avc: denied { ioctl } for pid=21983 comm="syz.1.4924" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2901.035327][ T31] audit: type=1400 audit(2900.960:3813): avc: denied { ioctl } for pid=21983 comm="syz.1.4924" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2901.074017][ T31] audit: type=1400 audit(2900.990:3814): avc: denied { ioctl } for pid=21976 comm="syz.0.4923" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2901.246264][T12754] ucan 2-1:0.0: probe with driver ucan failed with error -71 [ 2901.259767][T12754] usb 2-1: USB disconnect, device number 27 [ 2901.362487][ T31] audit: type=1400 audit(2901.280:3815): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2901.366464][ T31] audit: type=1400 audit(2901.290:3816): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2901.378048][ T31] audit: type=1400 audit(2901.300:3817): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2901.567986][ T31] audit: type=1400 audit(2901.490:3818): avc: denied { ioctl } for pid=21976 comm="syz.0.4923" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2901.665389][T21999] Illegal XDP return value 2487075200 on prog (id 63) dev syz_tun, expect packet loss! [ 2902.704836][ T44] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 2903.094975][ T44] usb 1-1: Using ep0 maxpacket: 32 [ 2904.323770][ T44] usb 1-1: config index 0 descriptor too short (expected 35577, got 27) [ 2904.325339][ T44] usb 1-1: config 1 has too many interfaces: 92, using maximum allowed: 32 [ 2904.326291][ T44] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2904.327147][ T44] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 92 [ 2904.332845][ T44] usb 1-1: config 1 has no interface number 0 [ 2904.333961][ T44] usb 1-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2904.335348][ T44] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2905.270694][ T44] snd_usb_pod 1-1:1.1: Line 6 Pocket POD found [ 2910.205075][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 2910.205674][ T31] audit: type=1400 audit(2910.120:3864): avc: denied { execmem } for pid=22011 comm="syz.1.4927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2910.317695][ T44] snd_usb_pod 1-1:1.1: set_interface failed [ 2910.319816][ T44] snd_usb_pod 1-1:1.1: Line 6 Pocket POD now disconnected [ 2910.321850][ T44] snd_usb_pod 1-1:1.1: probe with driver snd_usb_pod failed with error -110 [ 2910.716730][ T31] audit: type=1400 audit(2910.640:3865): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2910.726927][ T31] audit: type=1400 audit(2910.650:3866): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2910.774654][ T31] audit: type=1400 audit(2910.690:3867): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2911.330990][ T31] audit: type=1400 audit(2911.250:3868): avc: denied { read write } for pid=22015 comm="syz.1.4928" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2911.355394][ T31] audit: type=1400 audit(2911.280:3869): avc: denied { read write open } for pid=22015 comm="syz.1.4928" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2911.358544][ T31] audit: type=1400 audit(2911.280:3870): avc: denied { ioctl } for pid=22015 comm="syz.1.4928" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2911.454941][ T31] audit: type=1400 audit(2911.310:3871): avc: denied { ioctl } for pid=22015 comm="syz.1.4928" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2911.498267][ T31] audit: type=1400 audit(2911.420:3872): avc: denied { ioctl } for pid=22015 comm="syz.1.4928" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2911.518736][ T31] audit: type=1400 audit(2911.440:3873): avc: denied { ioctl } for pid=22015 comm="syz.1.4928" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2911.754969][T18295] usb 2-1: new full-speed USB device number 28 using dummy_hcd [ 2912.115611][T18295] usb 2-1: config 0 has an invalid interface number: 175 but max is 0 [ 2912.115808][T18295] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2912.115987][T18295] usb 2-1: config 0 has no interface number 0 [ 2912.116103][T18295] usb 2-1: config 0 interface 175 altsetting 0 has an endpoint descriptor with address 0xBC, changing to 0x8C [ 2912.116281][T18295] usb 2-1: config 0 interface 175 altsetting 0 endpoint 0x8C has an invalid bInterval 0, changing to 10 [ 2912.116375][T18295] usb 2-1: config 0 interface 175 altsetting 0 endpoint 0x8C has invalid wMaxPacketSize 0 [ 2912.116422][T18295] usb 2-1: config 0 interface 175 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 16 [ 2912.279103][T18295] usb 2-1: New USB device found, idVendor=05e0, idProduct=0600, bcdDevice=f9.9b [ 2912.280098][T18295] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2912.280285][T18295] usb 2-1: Product: syz [ 2912.280311][T18295] usb 2-1: Manufacturer: syz [ 2912.280325][T18295] usb 2-1: SerialNumber: syz [ 2912.293081][T18295] usb 2-1: config 0 descriptor?? [ 2912.447797][T18295] symbolserial 2-1:0.175: symbol converter detected [ 2912.486748][T18295] usb 2-1: symbol converter now attached to ttyUSB0 [ 2912.678934][T18295] usb 2-1: USB disconnect, device number 28 [ 2912.759462][T18295] symbol ttyUSB0: symbol converter now disconnected from ttyUSB0 [ 2912.767766][T18295] symbolserial 2-1:0.175: device disconnected [ 2915.546965][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 2915.547263][ T31] audit: type=1400 audit(2915.470:3916): avc: denied { prog_load } for pid=22042 comm="syz.1.4931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2915.551186][ T31] audit: type=1400 audit(2915.470:3917): avc: denied { bpf } for pid=22042 comm="syz.1.4931" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2915.553667][ T31] audit: type=1400 audit(2915.470:3918): avc: denied { perfmon } for pid=22042 comm="syz.1.4931" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2916.860686][ T31] audit: type=1400 audit(2916.780:3919): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2916.863895][ T31] audit: type=1400 audit(2916.780:3920): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2916.889715][ T31] audit: type=1400 audit(2916.800:3921): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2917.029755][T22046] netlink: 'syz.1.4932': attribute type 10 has an invalid length. [ 2917.048034][ T31] audit: type=1400 audit(2916.960:3922): avc: denied { prog_load } for pid=22045 comm="syz.1.4932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2917.048438][ T31] audit: type=1400 audit(2916.960:3923): avc: denied { bpf } for pid=22045 comm="syz.1.4932" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2917.167037][T22046] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2917.247526][T22046] bond_slave_0: entered promiscuous mode [ 2917.247925][T22046] bond_slave_1: entered promiscuous mode [ 2917.250196][T22046] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2917.261632][T22046] bond1: (slave macvlan2): Enslaving as an active interface with an up link [ 2917.336902][ T31] audit: type=1400 audit(2917.260:3924): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2917.337301][ T31] audit: type=1400 audit(2917.260:3925): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2922.345178][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2922.345539][ T31] audit: type=1400 audit(2922.240:3954): avc: denied { create } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2922.345810][ T31] audit: type=1400 audit(2922.260:3955): avc: denied { bind } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2922.350310][ T31] audit: type=1400 audit(2922.270:3956): avc: denied { accept } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2922.352108][ T31] audit: type=1400 audit(2922.270:3957): avc: denied { write } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2922.365219][ T31] audit: type=1400 audit(2922.280:3958): avc: denied { write } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2922.365649][ T31] audit: type=1400 audit(2922.280:3959): avc: denied { read } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2922.365869][ T31] audit: type=1400 audit(2922.280:3960): avc: denied { write } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2922.365936][ T31] audit: type=1400 audit(2922.280:3961): avc: denied { module_request } for pid=22093 comm="syz.1.4936" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2922.681486][ T31] audit: type=1400 audit(2922.600:3962): avc: denied { read } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2922.685678][ T31] audit: type=1400 audit(2922.610:3963): avc: denied { create } for pid=22093 comm="syz.1.4936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2929.251880][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2929.252236][ T31] audit: type=1400 audit(2929.170:3970): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2929.255915][ T31] audit: type=1400 audit(2929.170:3971): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2929.271571][ T31] audit: type=1400 audit(2929.190:3972): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2932.164016][ T31] audit: type=1400 audit(2932.080:3973): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2932.177742][ T31] audit: type=1400 audit(2932.100:3974): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2932.185738][ T31] audit: type=1400 audit(2932.100:3975): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2932.462585][ T31] audit: type=1400 audit(2932.370:3976): avc: denied { execmem } for pid=22103 comm="syz.1.4938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2934.521699][ T31] audit: type=1400 audit(2934.440:3977): avc: denied { read } for pid=22103 comm="syz.1.4938" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2934.525894][ T31] audit: type=1400 audit(2934.450:3978): avc: denied { read open } for pid=22103 comm="syz.1.4938" path="net:[4026532708]" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2934.529075][ T31] audit: type=1400 audit(2934.450:3979): avc: denied { prog_load } for pid=22103 comm="syz.1.4938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2934.531896][ T31] audit: type=1400 audit(2934.450:3980): avc: denied { bpf } for pid=22103 comm="syz.1.4938" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2934.544840][ T31] audit: type=1400 audit(2934.460:3981): avc: denied { perfmon } for pid=22103 comm="syz.1.4938" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2934.545084][ T31] audit: type=1400 audit(2934.460:3982): avc: denied { perfmon } for pid=22103 comm="syz.1.4938" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2934.545197][ T31] audit: type=1400 audit(2934.460:3983): avc: denied { perfmon } for pid=22103 comm="syz.1.4938" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2934.545321][ T31] audit: type=1400 audit(2934.460:3984): avc: denied { perfmon } for pid=22103 comm="syz.1.4938" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2934.545427][ T31] audit: type=1400 audit(2934.460:3985): avc: denied { bpf } for pid=22103 comm="syz.1.4938" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2934.549058][ T31] audit: type=1400 audit(2934.470:3986): avc: denied { bpf } for pid=22103 comm="syz.1.4938" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2940.027232][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 2940.027562][ T31] audit: type=1400 audit(2939.950:4003): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="netdev-rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2940.662093][ T31] audit: type=1400 audit(2940.580:4004): avc: denied { sys_module } for pid=22110 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2940.666647][ T31] audit: type=1400 audit(2940.590:4005): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2941.233174][T12754] usb 1-1: USB disconnect, device number 32 [ 2941.415805][T18869] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2941.444842][ T31] audit: type=1400 audit(2941.360:4006): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="netdev-rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2941.517442][T18869] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2941.576198][T18869] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2941.699976][T18869] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2942.133914][T18869] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2942.139510][T18869] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2942.151131][T18869] bond0 (unregistering): Released all slaves [ 2942.227815][ T31] audit: type=1400 audit(2942.150:4007): avc: denied { sys_module } for pid=22110 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2942.228846][ T31] audit: type=1400 audit(2942.150:4008): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2942.311032][T18869] hsr_slave_0: left promiscuous mode [ 2942.337815][T18869] hsr_slave_1: left promiscuous mode [ 2942.375576][T18869] veth1_macvtap: left promiscuous mode [ 2942.375916][T18869] veth0_macvtap: left promiscuous mode [ 2942.376113][T18869] veth1_vlan: left promiscuous mode [ 2942.376278][T18869] veth0_vlan: left promiscuous mode [ 2943.529953][ T31] audit: type=1400 audit(2943.450:4009): avc: denied { read write } for pid=22110 comm="syz-executor" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2943.532937][ T31] audit: type=1400 audit(2943.450:4010): avc: denied { read write open } for pid=22110 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2943.574512][ T31] audit: type=1400 audit(2943.470:4011): avc: denied { ioctl } for pid=22110 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2943.988270][ T31] audit: type=1400 audit(2943.910:4012): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2945.036410][ T31] kauditd_printk_skb: 139 callbacks suppressed [ 2945.036572][ T31] audit: type=1400 audit(2944.960:4152): avc: denied { getattr } for pid=22165 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2945.040052][ T31] audit: type=1400 audit(2944.960:4153): avc: denied { search } for pid=22165 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2945.041746][ T31] audit: type=1400 audit(2944.960:4154): avc: denied { getattr } for pid=22165 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2945.064587][ T31] audit: type=1400 audit(2944.980:4155): avc: denied { search } for pid=22165 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2945.064810][ T31] audit: type=1400 audit(2944.980:4156): avc: denied { search } for pid=22165 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2945.064943][ T31] audit: type=1400 audit(2944.980:4157): avc: denied { search } for pid=22165 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2945.065079][ T31] audit: type=1400 audit(2944.980:4158): avc: denied { getattr } for pid=22165 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=106 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2945.065205][ T31] audit: type=1400 audit(2944.980:4159): avc: denied { write } for pid=22165 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2945.065316][ T31] audit: type=1400 audit(2944.980:4160): avc: denied { write open } for pid=22165 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2945.065413][ T31] audit: type=1400 audit(2944.980:4161): avc: denied { getattr } for pid=22165 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2947.127596][T22110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2947.167130][T22110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2950.366935][ T31] kauditd_printk_skb: 230 callbacks suppressed [ 2950.367236][ T31] audit: type=1400 audit(2950.290:4392): avc: denied { prog_load } for pid=22319 comm="syz.1.4940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2950.447338][T22110] hsr_slave_0: entered promiscuous mode [ 2950.452608][T22110] hsr_slave_1: entered promiscuous mode [ 2950.457384][ T31] audit: type=1400 audit(2950.380:4393): avc: denied { bpf } for pid=22319 comm="syz.1.4940" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.459016][ T31] audit: type=1400 audit(2950.380:4394): avc: denied { perfmon } for pid=22319 comm="syz.1.4940" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.484920][ T31] audit: type=1400 audit(2950.400:4395): avc: denied { perfmon } for pid=22319 comm="syz.1.4940" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.485491][ T31] audit: type=1400 audit(2950.400:4396): avc: denied { perfmon } for pid=22319 comm="syz.1.4940" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.485748][ T31] audit: type=1400 audit(2950.400:4397): avc: denied { perfmon } for pid=22319 comm="syz.1.4940" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.485966][ T31] audit: type=1400 audit(2950.400:4398): avc: denied { perfmon } for pid=22319 comm="syz.1.4940" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.518946][ T31] audit: type=1400 audit(2950.440:4399): avc: denied { bpf } for pid=22319 comm="syz.1.4940" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.534018][ T31] audit: type=1400 audit(2950.450:4400): avc: denied { bpf } for pid=22319 comm="syz.1.4940" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2950.539781][ T31] audit: type=1400 audit(2950.460:4401): avc: denied { prog_run } for pid=22319 comm="syz.1.4940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2951.465663][T22110] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2951.487495][T22110] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2951.500696][T22110] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2951.521909][T22110] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2955.934003][ T31] kauditd_printk_skb: 218 callbacks suppressed [ 2955.934902][ T31] audit: type=1400 audit(2955.850:4620): avc: denied { write } for pid=22472 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2955.948297][ T31] audit: type=1400 audit(2955.870:4621): avc: denied { write open } for pid=22472 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2956.538674][ T31] audit: type=1400 audit(2956.460:4622): avc: denied { write } for pid=22473 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2956.541008][ T31] audit: type=1400 audit(2956.460:4623): avc: denied { write open } for pid=22473 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2956.569678][ T31] audit: type=1400 audit(2956.490:4624): avc: denied { search } for pid=22473 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2956.578744][ T31] audit: type=1400 audit(2956.500:4625): avc: denied { search } for pid=22473 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2956.580094][ T31] audit: type=1400 audit(2956.500:4626): avc: denied { search } for pid=22473 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2956.581391][ T31] audit: type=1400 audit(2956.500:4627): avc: denied { search } for pid=22473 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2956.813303][ T31] audit: type=1400 audit(2956.730:4628): avc: denied { search } for pid=22474 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2956.829176][ T31] audit: type=1400 audit(2956.750:4629): avc: denied { search } for pid=22474 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2957.125218][T22110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2961.243247][ T31] kauditd_printk_skb: 198 callbacks suppressed [ 2961.243489][ T31] audit: type=1400 audit(2961.160:4828): avc: denied { write } for pid=22484 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2961.284399][ T31] audit: type=1400 audit(2961.180:4829): avc: denied { write open } for pid=22484 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2961.602232][ T31] audit: type=1400 audit(2961.520:4830): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2961.939524][ T31] audit: type=1400 audit(2961.860:4831): avc: denied { write } for pid=22486 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2961.939879][ T31] audit: type=1400 audit(2961.860:4832): avc: denied { write open } for pid=22486 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2961.948643][ T31] audit: type=1400 audit(2961.870:4833): avc: denied { sys_module } for pid=22110 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2961.959190][ T31] audit: type=1400 audit(2961.880:4834): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2962.258310][ T31] audit: type=1400 audit(2962.180:4835): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2962.562922][ T31] audit: type=1400 audit(2962.480:4836): avc: denied { write } for pid=22488 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2962.578584][ T31] audit: type=1400 audit(2962.500:4837): avc: denied { write open } for pid=22488 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2966.310182][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 2966.310396][ T31] audit: type=1400 audit(2966.230:4877): avc: denied { create } for pid=22515 comm="syz.1.4942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2966.320583][ T31] audit: type=1400 audit(2966.240:4878): avc: denied { create } for pid=22515 comm="syz.1.4942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2966.323260][ T31] audit: type=1400 audit(2966.240:4879): avc: denied { write } for pid=22515 comm="syz.1.4942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2966.331372][ T31] audit: type=1400 audit(2966.250:4880): avc: denied { module_request } for pid=22515 comm="syz.1.4942" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2966.395061][ T31] audit: type=1400 audit(2966.300:4881): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2966.515099][ T31] audit: type=1400 audit(2966.430:4882): avc: denied { sys_module } for pid=22110 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2966.518143][ T31] audit: type=1400 audit(2966.440:4883): avc: denied { module_request } for pid=22110 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2966.566176][ T31] audit: type=1400 audit(2966.490:4884): avc: denied { read } for pid=22515 comm="syz.1.4942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2966.578827][ T31] audit: type=1400 audit(2966.490:4885): avc: denied { write } for pid=22515 comm="syz.1.4942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2966.675713][ T31] audit: type=1400 audit(2966.600:4886): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2966.743545][T22110] veth0_vlan: entered promiscuous mode [ 2966.783163][T22110] veth1_vlan: entered promiscuous mode [ 2966.988439][T22110] veth0_macvtap: entered promiscuous mode [ 2967.026102][T22110] veth1_macvtap: entered promiscuous mode [ 2967.229553][T15799] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2967.230772][T15799] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2967.231918][T15799] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2967.232883][T15799] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2967.345287][T22525] netem: incorrect gi model size [ 2967.345565][T22525] netem: change failed [ 2969.989428][T22552] netlink: 96 bytes leftover after parsing attributes in process `syz.2.4953'. [ 2972.487670][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 2972.487994][ T31] audit: type=1400 audit(2972.410:4954): avc: denied { read } for pid=22553 comm="syz.2.4954" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2972.508296][ T31] audit: type=1400 audit(2972.430:4955): avc: denied { read open } for pid=22553 comm="syz.2.4954" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2972.594931][ T31] audit: type=1400 audit(2972.510:4956): avc: denied { ioctl } for pid=22553 comm="syz.2.4954" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2972.606352][ T31] audit: type=1400 audit(2972.530:4957): avc: denied { sys_module } for pid=22553 comm="syz.2.4954" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2972.609354][ T31] audit: type=1400 audit(2972.530:4958): avc: denied { module_request } for pid=22553 comm="syz.2.4954" kmod="tty-ldisc-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2973.284996][ T31] audit: type=1400 audit(2973.190:4959): avc: denied { execmem } for pid=22553 comm="syz.2.4954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2973.359953][ T31] audit: type=1400 audit(2973.280:4960): avc: denied { create } for pid=22555 comm="syz.1.4955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2974.364644][ T31] audit: type=1400 audit(2974.280:4961): avc: denied { write } for pid=22564 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2974.364842][ T31] audit: type=1400 audit(2974.280:4962): avc: denied { write open } for pid=22564 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2974.395019][ T31] audit: type=1400 audit(2974.310:4963): avc: denied { search } for pid=22564 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.257778][ T31] kauditd_printk_skb: 194 callbacks suppressed [ 2978.259666][ T31] audit: type=1400 audit(2978.180:5158): avc: denied { write } for pid=22571 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2978.261396][ T31] audit: type=1400 audit(2978.180:5159): avc: denied { write open } for pid=22571 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2978.313410][ T31] audit: type=1400 audit(2978.220:5160): avc: denied { search } for pid=22571 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.313774][ T31] audit: type=1400 audit(2978.230:5161): avc: denied { search } for pid=22571 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.314012][ T31] audit: type=1400 audit(2978.230:5162): avc: denied { search } for pid=22571 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.314688][ T31] audit: type=1400 audit(2978.230:5163): avc: denied { search } for pid=22571 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.754849][ T31] audit: type=1400 audit(2978.620:5164): avc: denied { search } for pid=22572 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.755191][ T31] audit: type=1400 audit(2978.620:5165): avc: denied { search } for pid=22572 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.755498][ T31] audit: type=1400 audit(2978.620:5166): avc: denied { search } for pid=22572 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.755575][ T31] audit: type=1400 audit(2978.620:5167): avc: denied { read open } for pid=22572 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2983.407354][ T31] kauditd_printk_skb: 380 callbacks suppressed [ 2983.411963][ T31] audit: type=1400 audit(2983.330:5548): avc: denied { search } for pid=22581 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2983.427574][ T31] audit: type=1400 audit(2983.330:5549): avc: denied { search } for pid=22581 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2983.427898][ T31] audit: type=1400 audit(2983.330:5550): avc: denied { search } for pid=22581 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2983.737569][ T31] audit: type=1400 audit(2983.650:5551): avc: denied { search } for pid=22577 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2984.247772][ T31] audit: type=1400 audit(2984.160:5552): avc: denied { write } for pid=22583 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2984.264777][ T31] audit: type=1400 audit(2984.180:5553): avc: denied { write open } for pid=22583 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2984.289768][ T31] audit: type=1400 audit(2984.210:5554): avc: denied { search } for pid=22583 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2984.294709][ T31] audit: type=1400 audit(2984.210:5555): avc: denied { search } for pid=22583 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2984.294910][ T31] audit: type=1400 audit(2984.210:5556): avc: denied { search } for pid=22583 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2984.295015][ T31] audit: type=1400 audit(2984.210:5557): avc: denied { search } for pid=22583 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2988.023206][T22590] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4956'. [ 2988.425124][ T31] kauditd_printk_skb: 199 callbacks suppressed [ 2988.425431][ T31] audit: type=1400 audit(2988.340:5757): avc: denied { read write } for pid=22591 comm="syz.1.4957" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.425714][ T31] audit: type=1400 audit(2988.340:5758): avc: denied { read write open } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.450233][ T31] audit: type=1400 audit(2988.370:5759): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.450589][ T31] audit: type=1400 audit(2988.370:5760): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.479420][ T31] audit: type=1400 audit(2988.400:5761): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.481973][ T31] audit: type=1400 audit(2988.400:5762): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.559881][ T31] audit: type=1400 audit(2988.480:5763): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.628611][ T31] audit: type=1400 audit(2988.550:5764): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.685076][ T3793] usb 2-1: new high-speed USB device number 29 using dummy_hcd [ 2988.723877][ T31] audit: type=1400 audit(2988.640:5765): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.736832][ T31] audit: type=1400 audit(2988.660:5766): avc: denied { ioctl } for pid=22591 comm="syz.1.4957" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.950385][ T3793] usb 2-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 2988.950664][ T3793] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2988.983699][ T3793] usb 2-1: config 0 descriptor?? [ 2989.368390][ T3793] udl 2-1:0.0: [drm] Unrecognized vendor firmware descriptor [ 2989.576387][ T3793] [drm:udl_init] *ERROR* Selecting channel failed [ 2989.609027][ T3793] [drm] Initialized udl 0.0.1 for 2-1:0.0 on minor 3 [ 2989.609373][ T3793] [drm] Initialized udl on minor 3 [ 2989.646114][ T3793] udl 2-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 2989.647091][ T3793] udl 2-1:0.0: [drm] Cannot find any crtc or sizes [ 2989.660706][T18295] udl 2-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 2989.664768][T18295] udl 2-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 2989.665209][T18295] udl 2-1:0.0: [drm] Cannot find any crtc or sizes [ 2989.665735][ T3793] usb 2-1: USB disconnect, device number 29 [ 2993.508098][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 2993.508678][ T31] audit: type=1400 audit(2993.430:5835): avc: denied { create } for pid=22624 comm="syz.2.4962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2993.526988][ T31] audit: type=1400 audit(2993.450:5836): avc: denied { ioctl } for pid=22624 comm="syz.2.4962" path="socket:[57617]" dev="sockfs" ino=57617 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2993.876499][ T31] audit: type=1400 audit(2993.800:5837): avc: denied { read write } for pid=19303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2993.895076][ T31] audit: type=1400 audit(2993.810:5838): avc: denied { read write open } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2993.895471][ T31] audit: type=1400 audit(2993.810:5839): avc: denied { ioctl } for pid=19303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2994.059547][ T31] audit: type=1400 audit(2993.980:5840): avc: denied { create } for pid=22630 comm="syz.2.4963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2994.070545][ T31] audit: type=1400 audit(2993.990:5841): avc: denied { write } for pid=22630 comm="syz.2.4963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2994.241427][ T31] audit: type=1400 audit(2994.160:5842): avc: denied { read } for pid=22632 comm="syz.1.4964" name="controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2994.258040][ T31] audit: type=1400 audit(2994.180:5843): avc: denied { read open } for pid=22632 comm="syz.1.4964" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2994.267539][ T31] audit: type=1400 audit(2994.190:5844): avc: denied { ioctl } for pid=22632 comm="syz.1.4964" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 ioctlcmd=0x5513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2994.897496][T22636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2994.915780][T22636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2997.039238][T22653] netlink: 'syz.1.4970': attribute type 21 has an invalid length. [ 2997.465245][T22655] syzkaller0: entered promiscuous mode [ 2997.474854][T22655] syzkaller0: entered allmulticast mode [ 2998.703325][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 2998.703671][ T31] audit: type=1400 audit(2998.620:5922): avc: denied { read write } for pid=22670 comm="syz.2.4974" name="nbd2" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2998.730518][ T31] audit: type=1400 audit(2998.650:5923): avc: denied { read open } for pid=22670 comm="syz.2.4974" path="/dev/nbd2" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2998.750705][ T31] audit: type=1400 audit(2998.670:5924): avc: denied { ioctl } for pid=22670 comm="syz.2.4974" path="/dev/nbd2" dev="devtmpfs" ino=638 ioctlcmd=0xab07 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2998.898070][ T31] audit: type=1400 audit(2998.820:5925): avc: denied { ioctl } for pid=22667 comm="syz.1.4973" path="socket:[58441]" dev="sockfs" ino=58441 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2998.909091][ T31] audit: type=1400 audit(2998.830:5926): avc: denied { module_request } for pid=22667 comm="syz.1.4973" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2999.218810][ T31] audit: type=1400 audit(2999.140:5927): avc: denied { read } for pid=22667 comm="syz.1.4973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2999.419104][ T31] audit: type=1400 audit(2999.340:5928): avc: denied { write } for pid=22667 comm="syz.1.4973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2999.422698][ T31] audit: type=1400 audit(2999.340:5929): avc: denied { sys_module } for pid=22667 comm="syz.1.4973" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2999.438933][ T31] audit: type=1400 audit(2999.340:5930): avc: denied { module_request } for pid=22667 comm="syz.1.4973" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2999.606076][ T31] audit: type=1400 audit(2999.520:5931): avc: denied { execmem } for pid=22676 comm="syz.2.4975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3001.415197][T21990] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 3001.832850][T21990] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3001.972677][T21990] usb 2-1: New USB device found, idVendor=0424, idProduct=c001, bcdDevice=99.40 [ 3001.973899][T21990] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3001.975238][T21990] usb 2-1: Product: syz [ 3001.975937][T21990] usb 2-1: Manufacturer: syz [ 3001.985765][T21990] usb 2-1: SerialNumber: syz [ 3002.007770][T21990] usb 2-1: config 0 descriptor?? [ 3002.368233][T21990] usb 2-1: USB disconnect, device number 30 [ 3002.380476][T21990] ------------[ cut here ]------------ [ 3002.380945][T21990] WARNING: CPU: 0 PID: 21990 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 3002.386316][T21990] refcount_t: underflow; use-after-free. [ 3002.386747][T21990] Modules linked in: [ 3002.387756][T21990] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3002.388487][T21990] CPU: 0 UID: 0 PID: 21990 Comm: kworker/0:0 Not tainted syzkaller #0 PREEMPT [ 3002.388880][T21990] Hardware name: ARM-Versatile Express [ 3002.389667][T21990] Workqueue: usb_hub_wq hub_event [ 3002.390025][T21990] Call trace: [ 3002.390410][T21990] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3002.390854][T21990] r7:8223c1ac r6:84285400 r5:00000000 r4:8224deb0 [ 3002.391137][T21990] [<80201b08>] (show_stack) from [<8021f900>] (dump_stack_lvl+0x54/0x7c) [ 3002.391557][T21990] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 3002.391904][T21990] r5:00000000 r4:82a77d18 [ 3002.392083][T21990] [<8021f928>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 3002.392401][T21990] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 3002.392957][T21990] r7:808cace0 [ 3002.393111][T21990] [<80202800>] (panic) from [<80252948>] (get_taint+0x0/0x1c) [ 3002.393423][T21990] r3:8280c684 r2:00000001 r1:82234710 r0:8223c1ac [ 3002.393715][T21990] [<802528d0>] (check_panic_on_warn) from [<80252aac>] (__warn+0x80/0x188) [ 3002.394100][T21990] [<80252a2c>] (__warn) from [<80252d9c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 3002.394871][T21990] r8:00000009 r7:822a6a34 r6:e0715bfc r5:84285400 r4:00000000 [ 3002.395531][T21990] [<80252bb8>] (warn_slowpath_fmt) from [<808cace0>] (refcount_warn_saturate+0x13c/0x174) [ 3002.396274][T21990] r10:00000100 r9:829d7a8c r8:84cfb488 r7:84cfb074 r6:88646fb4 r5:84cfb000 [ 3002.396639][T21990] r4:88646800 [ 3002.396810][T21990] [<808caba4>] (refcount_warn_saturate) from [<81a0fa48>] (kobject_put+0x158/0x1f4) [ 3002.397199][T21990] [<81a0f8f0>] (kobject_put) from [<80b51f40>] (put_device+0x18/0x1c) [ 3002.397655][T21990] r7:84cfb074 r6:88646fb4 r5:84cfb000 r4:88646800 [ 3002.398131][T21990] [<80b51f28>] (put_device) from [<81456f48>] (hdm_disconnect+0x98/0x9c) [ 3002.398744][T21990] [<81456eb0>] (hdm_disconnect) from [<80eb3178>] (usb_unbind_interface+0x84/0x2b8) [ 3002.399517][T21990] r7:84cfb074 r6:84cfb030 r5:00000000 r4:84cfb400 [ 3002.399813][T21990] [<80eb30f4>] (usb_unbind_interface) from [<80b5a0e8>] (device_remove+0x64/0x6c) [ 3002.400255][T21990] r10:00000100 r9:84cfb488 r8:00000044 r7:84cfb074 r6:829d7a8c r5:00000000 [ 3002.400640][T21990] r4:84cfb030 [ 3002.400827][T21990] [<80b5a084>] (device_remove) from [<80b5b5d8>] (device_release_driver_internal+0x18c/0x200) [ 3002.401391][T21990] r5:00000000 r4:84cfb030 [ 3002.401650][T21990] [<80b5b44c>] (device_release_driver_internal) from [<80b5b664>] (device_release_driver+0x18/0x1c) [ 3002.402150][T21990] r9:84cfb488 r8:833cce40 r7:833cce38 r6:833cce0c r5:84cfb030 r4:833cce30 [ 3002.402465][T21990] [<80b5b64c>] (device_release_driver) from [<80b59728>] (bus_remove_device+0xcc/0x120) [ 3002.402953][T21990] [<80b5965c>] (bus_remove_device) from [<80b53994>] (device_del+0x148/0x38c) [ 3002.403343][T21990] r9:84cfb488 r8:84285400 r7:04208060 r6:00000000 r5:84cfb030 r4:84cfb074 [ 3002.403697][T21990] [<80b5384c>] (device_del) from [<80eb0a64>] (usb_disable_device+0xd4/0x1e8) [ 3002.404067][T21990] r10:00000100 r9:00000000 r8:00000000 r7:84cfb000 r6:84cfb400 r5:85bc8148 [ 3002.404609][T21990] r4:60000013 [ 3002.404915][T21990] [<80eb0990>] (usb_disable_device) from [<80ea57d4>] (usb_disconnect+0xec/0x2ac) [ 3002.405424][T21990] r9:84a9e200 r8:84cfb4cc r7:83c48000 r6:84cfb488 r5:84cfb400 r4:60000013 [ 3002.405880][T21990] [<80ea56e8>] (usb_disconnect) from [<80ea87d0>] (hub_event+0x1194/0x1950) [ 3002.406685][T21990] r10:00000100 r9:83c1b92c r8:83c3b800 r7:84cfb400 r6:83c1b200 r5:00000001 [ 3002.407064][T21990] r4:00000001 [ 3002.407244][T21990] [<80ea763c>] (hub_event) from [<80278594>] (process_one_work+0x1b4/0x4f4) [ 3002.407792][T21990] r10:833d4070 r9:83272c05 r8:84285400 r7:dddcfd80 r6:83272c00 r5:83c1b92c [ 3002.408168][T21990] r4:84f59e80 [ 3002.408343][T21990] [<802783e0>] (process_one_work) from [<802791dc>] (worker_thread+0x1fc/0x3d8) [ 3002.408771][T21990] r10:61c88647 r9:84285400 r8:84f59eac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3002.409130][T21990] r4:84f59e80 [ 3002.409315][T21990] [<80278fe0>] (worker_thread) from [<80280200>] (kthread+0x12c/0x280) [ 3002.409766][T21990] r10:00000000 r9:84f59e80 r8:80278fe0 r7:df915e60 r6:84f5b500 r5:84285400 [ 3002.410323][T21990] r4:00000001 [ 3002.410543][T21990] [<802800d4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3002.410924][T21990] Exception stack(0xe0715fb0 to 0xe0715ff8) [ 3002.411211][T21990] 5fa0: 00000000 00000000 00000000 00000000 [ 3002.411613][T21990] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3002.412029][T21990] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3002.412323][T21990] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800d4 [ 3002.412717][T21990] r4:85888d00 [ 3002.414926][T21990] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:11:08 Registers: info registers vcpu 0 CPU#0 R00=82a78158 R01=8226da18 R02=00000000 R03=84285400 R04=829fcc13 R05=8226da18 R06=829fcc13 R07=82a78158 R08=e0715b9c R09=000055e6 R10=00000000 R11=e0715ad4 R12=e0715a90 R13=e0715a90 R14=0054504d R15=8029633c PSR=60000093 -ZC- A S svc32 s00=72657475 s01=76612073 d00=7661207372657475 s02=00000001 s03=76f1ca88 d01=76f1ca8800000001 s04=e4000000 s05=e4000000 d02=e4000000e4000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=c0200400 d04=c020040000000000 s10=00040000 s11=80402000 d05=8040200000040000 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=84997844 R02=00000000 R03=b5403587 R04=00000000 R05=82a7a4d0 R06=76fb8140 R07=000003ff R08=00000000 R09=00000044 R10=82a7a270 R11=ec2c1e34 R12=ec2c1e20 R13=ec2c1da8 R14=00000000 R15=802e4800 PSR=20000113 --C- A S svc32 s00=73656420 s01=70697263 d00=7069726373656420 s02=00000000 s03=00000000 d01=0000000000000000 s04=ef0cee00 s05=ef0cee00 d02=ef0cee00ef0cee00 s06=08040200 s07=80402000 d03=8040200008040200 s08=00000c00 s09=c0200c03 d04=c0200c0300000c00 s10=08040201 s11=80402000 d05=8040200008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000