last executing test programs: 36.712748183s ago: executing program 0 (id=1215): r0 = creat(&(0x7f0000000300)='./file0\x00', 0x92) write$FUSE_NOTIFY_RESEND(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='D\xa3\xd5Wj\x00\x00x0\xc1\xac*\x1a\vG\xa9~vB\xbc\t\x00\x00\x00VoA\xaa\xbc\xee[\xe1\xa2\xe0\xff\x04\x00\x00\x00\\i\xcf\t\xb0\xa9 +H/\x1a\xe7\x95\xce\"\"\xbd\xf9\xd0\xc0\xa9\b\x98\xfc:\x1b\xc4\x80!\xfd\xa4\xcaN\x84\xadS\x8bqE\x99\x01t\xb1\x1f|\x99PL\x92\x8f\xc2\xf9\xcd\x8cj\x03X\x05\x17mwI\xf0\x01\xe5z\xcdJ)\xc7\xfa)\xaa}\xef\xbb\xf5\xcd\xb1o5\x18\xd6\v\x85q\x98\x9bB\xb9\xea\xe7\xff\x7f\x00\x00T\xc0\xd2\t?\bpBl\xf4*8\xc6\xe5\x06P\xc11\f^\x7f\x8e\xc1\xd1Wra\x19)\xe3\x8f\xd9\x9f\x15\x1e\xf2\x18\r\xad\b\xe0\x96NH\x85\r+\xfc\xb3\xdd\xddhg \x03\xa7\x92\xff\x00+h\xb7@#K\x9cMY\xd3\x9b\b-G\xb1\xdaS\x81\xb2\x93\xb83\x8a\x94*\x8d\\\b\xff/\xa1\xc0\xf9&\xd3M\xf6\n\xff\x83k\xe6\rDa\x16\xbd\x00\x02\xdf\b~\xd5)\xa4\x80\xad\x97\'\x1b\xfd}\x96&\xd2\x0eGp\x8e\x1a\x19o\xf1\x14\xe2]J\xf2\xb5h\x9bt*\xd2\xfbT\x01ci\x87\x18\xc9\x13=\x1b\xadl;}\x9d\xbe\x9a\xee\x1a\xfc\x96 \x93\x12@\x19|f\x98\xdc,\x82SlA\x19\xcb\xfe\xccSKO}\xb2U\xd6\xc5\xa7=\xf8s\x1dp\xe0\x14\xe5\x92\xfd)\bB\xcd\xc2\xb6\x85$%nV\xd3*\x00`OE\x8e\xf0\xf9\xd2!KZ%\xad\xa1\x92b\x1e%\x9f!\xd8mV$\x1d?\xc2\f\xcc\xc5x\x9fJ#\xce\x90\xc5\x82\xfb\x97\xd2\xb7\xb5\xed\xb5\'J\xfc\xf4Z.\rS\x88\f\xd0zK\xc7\x81\xbe\xd5\xc2\xce\x89\xbc\x1e\xb78\xf6Z\xd5\x1b\xf1\x9bMD\f\xf6\xc5V\xe1\x12j\xdfW\x87\xf09\n\x1e\x1b\f\xe5p\xab\x9e\xe5}\x96\x9b\xea\x86\x0f\xca\xcf\x16\x96\x0e6\x8d\x11\xd2&\"eKKV\x8b?]<\xa7]\x93\xad\x1d\xfe\x13\xee\xca\xdc\x97\xa9\a\b\xac\xdd\xa0\xfe\x97\xa1?\xa2F\xae\xb7f\x85\xda', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = openat$vhost_vsock(0xffffff9c, &(0x7f0000002180), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x3f3e00, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x5452, &(0x7f0000000040)={0x7, 'ip6gre0\x00', {0x9}, 0x8}) r4 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_PANTHOR_TILER_HEAP_DESTROY(r4, 0xc008644c, 0x0) r5 = openat$selinux_mls(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) write$FUSE_LK(r5, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x4e23, 0xf8c, @remote, 0x6}}, 0x0, 0x0, 0x15, 0x0, "e71f7a2c5a7a994067ded68a3e99a3257752bb2b7c6280b9dba7ba0278961405c6ac0adcb5662445566d11e64091372cb07acd37a9d64a5b6d220bf43774d5c255f48174d64d40b612e97f2282b2c7ba"}, 0xd8) r6 = dup(r2) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r6, 0xc0884123, &(0x7f0000000200)={0x3, "f7f2b6449a6af281455065784c4938d945f7fb3a6d00edf7572ca28df572ffc68022ae0530e4acd0ee1b51d5d62a7a2eb1009346d98a1e875e210c3dccb99b17", {0xb, 0x6}}) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = openat$vhost_vsock(0xffffff9c, &(0x7f0000002180), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) r9 = dup(r8) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r9, 0x408c5333, &(0x7f0000000000)={0xfffffffc, 0x7, 0x1, 'queue1\x00', 0x9}) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b0, 0x1c0, 0x111, 0x4b4, 0x1c0, 0xd4feffff, 0x2d0, 0x20a, 0x278, 0x2d0, 0x278, 0x3, 0x0, {[{{@ipv6={@empty, @empty, [0x0, 0xffffff00], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6, 0xfe}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@loopback, @mcast2, [], [], 'veth1_to_hsr\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) r10 = openat$selinux_status(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r11 = openat$snapshot(0xffffff9c, &(0x7f00000000c0), 0x802, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r11, 0x400c330d, &(0x7f0000000100)={0x1, 0xae}) ioctl$TIOCEXCL(r10, 0x5450) ioctl$SOUND_MIXER_WRITE_VOLUME(r10, 0xc0040d07, &(0x7f0000000040)=0x121) 35.704044849s ago: executing program 0 (id=1216): read(0xffffffffffffffff, &(0x7f0000008a00), 0x0) 35.416553919s ago: executing program 0 (id=1218): r0 = openat$snapshot(0xffffff9c, &(0x7f0000000040), 0x101500, 0x0) fsetxattr$security_ima(r0, &(0x7f00000011c0), &(0x7f0000001200)=@sha1={0x1, "29992cf740f046f6718561a408ff553cea2f53bb"}, 0x15, 0x0) 34.947830899s ago: executing program 0 (id=1219): r0 = openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000040)) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x341800, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x7) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40086410, &(0x7f00000001c0)={0xf8, &(0x7f00000000c0)="e6a5f0f840eb6cecbc9b4526f5055796a0054a377a3ed90dcc640320f9acc5e291fc3aaa2b69df3efb0c68d866b0c82b04a8dbb74e91af112760d122d8774340f51b8a0c9f09f16f691070f088929f3b686d583cc2fa2953052ef7c656348ebc57161bdccfcdd573e8ff5e2613b68373f9550585688be5378cdc7cecce7c76a87537f5c8a2085a85d472cc18c8fc8e49e2c2bc863fdea77081bd18361668f043e827d542384a2b0b700a1c148928f4a6f137afab0388a54f2debf0aeffbf019336df889c11eb6d1890a2fc439a87f8dcf987cdb36e507992ab6563f99b47a7cb9c239763702c7a2576abcef676bf1e11bdd150e21a85207a"}) setsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000200)="80e913b9e965118e614aaaf8ccbb5f83e4ddb8da14779fcf02344515fcee5737b46bd2176e404f4f4ca88e6f6eefc27aceee6941e303c2a67c9d355654e851b1b54c4f3fbc5d5794ed8b3f36e758c8faf44b4035d0f743b04277f44da5dcb94aa219fa1ecb4a017e077b44b486f29eb12e1e64f8fbb4a6bd916bbbf386907a64442ef6830c90eafff4e3bf46da059b63f43d27a3e649977e7d5db8527add226b408eedc76efebf566e96895853a0c3ff67726ab92d7decd47562716cf6841b6f587aba", 0xc3) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$XFS_IOC_ERROR_INJECTION(r2, 0x40085874, &(0x7f0000000300)={r1, 0x6}) r3 = openat$snapshot(0xffffff9c, &(0x7f0000000340), 0x50180, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40047602, &(0x7f0000000380)=0x5) sendfile(r1, r3, &(0x7f00000003c0)=0xfffffffa, 0x4) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, r5, 0x800, 0x70bd27, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x18}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000) mq_open(&(0x7f0000000580)='/dev/dlm_plock\x00', 0x1, 0x10, &(0x7f00000005c0)={0x10, 0x2}) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000600)) mq_open(&(0x7f0000000640)='/-\x00', 0x2, 0x1, &(0x7f0000000680)={0x64f, 0x5, 0x5fb, 0x256}) openat$cgroup_freezer_state(r1, &(0x7f00000006c0), 0x2, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000700)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = dup(r6) r8 = openat$cgroup_root(0xffffff9c, &(0x7f0000000740)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r8, &(0x7f0000000780), 0x2, 0x0) fcntl$getflags(r6, 0x401) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), r7) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r7, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r9, 0x2, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0xd}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40850}, 0x20000000) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000900)={0x8, 0x0, 0x1, 0x2, 0x9}) syz_open_procfs$userns(0x0, &(0x7f0000000940)) socket$unix(0x1, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) 34.32242399s ago: executing program 0 (id=1220): r0 = io_uring_setup(0x1cb6, &(0x7f0000000300)) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="0000000000000000000012000000"], 0x33fe0}}, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x38}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) 33.580146358s ago: executing program 0 (id=1221): ioctl$XFS_IOC_FD_TO_HANDLE(0xffffffffffffffff, 0xc01c586a, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x41e601, &(0x7f0000000040)={@_ha_fsid={[0x101, 0x3]}, {0x7, 0x8a74, 0x9, 0x9}}, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x6}) r1 = syz_clone3(&(0x7f0000000300)={0x14104c000, &(0x7f0000000140)=0xffffffffffffffff, &(0x7f0000000180)=0x0, &(0x7f00000001c0), {0x10}, &(0x7f0000000200)=""/36, 0x24, &(0x7f0000000240)=""/94, &(0x7f00000002c0)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) r4 = fcntl$dupfd(r0, 0x0, r2) kcmp$KCMP_EPOLL_TFD(r3, r1, 0x7, r4, &(0x7f0000000380)={r4, r4, 0xda1}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r4) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x54, r5, 0x20, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4001) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000540)=0x4ba) fsetxattr$security_selinux(r2, &(0x7f0000000580), &(0x7f00000005c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x1) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x200, @remote, 0x8}, 0x1c) r6 = semget$private(0x0, 0x2, 0x2a) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000640)) semctl$SETALL(r6, 0x0, 0x11, &(0x7f0000000680)=[0x1, 0xd9]) r7 = openat$incfs(r4, &(0x7f00000006c0)='.log\x00', 0x440000, 0x1) semop(r6, &(0x7f0000000700)=[{0x0, 0x800}], 0x1) rt_sigreturn() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, &(0x7f0000000780)={0x92, r2, 0x2}) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x80, 0x1405, 0x420, 0x70bd29, 0x25dfdbfe, "", [{{0x8}, {0x8, 0x3, 0x2}}, {{0x8}, {0x8}}, {{0x8}, {0x8, 0x3, 0x1}}, {{0x8}, {0x8, 0x3, 0x1}}, {{0x8, 0x1, 0x1}, {0x8}}, {{0x8}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}]}, 0x80}}, 0x2010) semctl$SETVAL(r6, 0x1, 0x10, &(0x7f0000000900)=0x3) ioctl$TIOCMBIC(r8, 0x5417, &(0x7f0000000940)=0x1) epoll_create1(0x0) r9 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(r8, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x1c, r9, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x20040044) mq_open(&(0x7f0000000ac0)='system_u:object_r:netutils_exec_t:s0\x00', 0x40, 0x142, &(0x7f0000000b00)={0x3, 0x4, 0x8d8, 0x5}) semtimedop(r6, &(0x7f0000000b40)=[{0x3, 0x7, 0x800}, {0x0, 0x8b77, 0x800}, {0x4, 0x5a09}], 0x3, &(0x7f0000000b80)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r7, 0x8982, &(0x7f0000000bc0)={0x0, 'ip6tnl0\x00', {0x4}, 0x7}) epoll_wait(r0, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x8) write$eventfd(r0, &(0x7f0000000c80)=0x7, 0x8) semctl$IPC_INFO(r6, 0x1, 0x3, &(0x7f0000000cc0)=""/4096) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000001f00)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x44, 0x5}, 0x3c, 0x7, 0x4, 0x7, 0x0, 0x0, 0x5}) 11.266765061s ago: executing program 1 (id=1235): bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000002000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x61800, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="700200001300290a000000000000000007000000", @ANYRES32=r1, @ANYBLOB="000000000000000010010c8013000c800ca3488008000000000000000800038064001d80050006000000000014000500714abbd2547de97cbbf6efb226f19bf90d0002003a288e5e5b5b5a40000000006000078014000400293a02149f3b75a67093c28fd6f55a2314000400e48f01e49713f0c2d839f940d9f088d8050006000000003bd00002006272696467655f736c6176655f30000007000200293a00000500060000000000080001000000000018002580140004004d2906d0880fc8acc30fe2020f9849675000028004000500a1085e7df341b9dc3d8008a2fe5bdaad140004009c7e472c916020fe41bcc5aa8f56c9471400050080ab8be51421cfa3c9e5cbfe8217e0af0800010000000000080001000000000060001a803f"], 0x270}, 0x1, 0x0, 0x0, 0x20008014}, 0x4) r2 = socket(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 10.792576882s ago: executing program 1 (id=1236): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 10.234962499s ago: executing program 1 (id=1237): r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)={0x10, 0x3f8, 0x100, 0x70bd28, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x8000) 8.935172604s ago: executing program 1 (id=1238): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0xd8, 0x0) 7.612874701s ago: executing program 1 (id=1239): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x5, 0x7ffc0001}]}) syz_clone(0x4400, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x10) pipe(0x0) 0s ago: executing program 1 (id=1240): socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="61158800000000006113500000000000bfa000000000000007000000ee0016055e0301000000000064050000000000006916300000000000bf07000000000000260507000fff07206706000020000000470600000ee6ffb0bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): :sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 734.094656][ T28] audit: type=1400 audit(734.000:11838): avc: denied { ioctl } for pid=7496 comm="syz.1.1004" path="socket:[12543]" dev="sockfs" ino=12543 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 734.114758][ T28] audit: type=1400 audit(734.020:11839): avc: denied { bind } for pid=7496 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 734.143941][ T28] audit: type=1400 audit(734.050:11840): avc: denied { write } for pid=7496 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 734.228153][ T28] audit: type=1400 audit(734.130:11841): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.235246][ T28] audit: type=1400 audit(734.140:11842): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.249702][ T28] audit: type=1400 audit(734.150:11843): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.425232][ T28] audit: type=1400 audit(734.330:11844): avc: denied { read } for pid=7498 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 734.465985][ T28] audit: type=1400 audit(734.370:11845): avc: denied { read write } for pid=7498 comm="syz.1.1005" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 739.659232][ T28] kauditd_printk_skb: 56 callbacks suppressed [ 739.661400][ T28] audit: type=1400 audit(739.560:11902): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.684019][ T28] audit: type=1400 audit(739.560:11903): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.685838][ T28] audit: type=1400 audit(739.590:11904): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.806939][ T28] audit: type=1400 audit(739.710:11905): avc: denied { read } for pid=7511 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 739.847342][ T28] audit: type=1400 audit(739.750:11906): avc: denied { create } for pid=7511 comm="syz.1.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 739.869875][ T28] audit: type=1400 audit(739.770:11907): avc: denied { write } for pid=7511 comm="syz.1.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 739.988691][ T28] audit: type=1400 audit(739.890:11908): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.992144][ T28] audit: type=1400 audit(739.890:11909): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.000621][ T28] audit: type=1400 audit(739.900:11910): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.193292][ T28] audit: type=1400 audit(740.100:11911): avc: denied { read } for pid=7513 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.187488][ T7532] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7532 comm=syz.1.1016 [ 744.807353][ T28] kauditd_printk_skb: 113 callbacks suppressed [ 744.807724][ T28] audit: type=1400 audit(744.710:12025): avc: denied { read } for pid=7535 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.861973][ T28] audit: type=1400 audit(744.760:12026): avc: denied { read } for pid=7535 comm="syz.0.1018" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.870591][ T28] audit: type=1400 audit(744.760:12027): avc: denied { read open } for pid=7535 comm="syz.0.1018" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.918317][ T28] audit: type=1400 audit(744.820:12028): avc: denied { ioctl } for pid=7535 comm="syz.0.1018" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x550c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.974802][ T28] audit: type=1400 audit(744.880:12029): avc: denied { create } for pid=7535 comm="syz.0.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 745.003648][ T28] audit: type=1400 audit(744.910:12030): avc: denied { read write } for pid=7535 comm="syz.0.1018" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.006596][ T28] audit: type=1400 audit(744.910:12031): avc: denied { read open } for pid=7535 comm="syz.0.1018" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.065999][ T28] audit: type=1400 audit(744.970:12032): avc: denied { read write } for pid=7535 comm="syz.0.1018" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.072173][ T28] audit: type=1400 audit(744.970:12033): avc: denied { read write open } for pid=7535 comm="syz.0.1018" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.112186][ T28] audit: type=1400 audit(745.020:12034): avc: denied { prog_load } for pid=7535 comm="syz.0.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 749.923853][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 749.924487][ T28] audit: type=1400 audit(749.830:12102): avc: denied { read } for pid=7548 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 749.998514][ T28] audit: type=1400 audit(749.900:12103): avc: denied { read } for pid=7548 comm="syz.0.1023" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 750.016144][ T28] audit: type=1400 audit(749.920:12104): avc: denied { read open } for pid=7548 comm="syz.0.1023" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 750.056211][ T28] audit: type=1400 audit(749.950:12105): avc: denied { setattr } for pid=7548 comm="syz.0.1023" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 750.218862][ T28] audit: type=1400 audit(750.120:12106): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 750.222475][ T28] audit: type=1400 audit(750.130:12107): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 750.225251][ T28] audit: type=1400 audit(750.130:12108): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 750.447501][ T28] audit: type=1400 audit(750.350:12109): avc: denied { read } for pid=7550 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 750.620342][ T28] audit: type=1400 audit(750.520:12110): avc: denied { create } for pid=7550 comm="syz.0.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 750.645818][ T28] audit: type=1400 audit(750.550:12111): avc: denied { write } for pid=7550 comm="syz.0.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 754.307124][ T7566] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7566 comm=syz.0.1029 [ 754.933072][ T28] kauditd_printk_skb: 90 callbacks suppressed [ 754.933546][ T28] audit: type=1400 audit(754.840:12202): avc: denied { read } for pid=7569 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.961932][ T28] audit: type=1400 audit(754.870:12203): avc: denied { read } for pid=7569 comm="syz.1.1031" dev="nsfs" ino=4026532753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 754.969371][ T28] audit: type=1400 audit(754.870:12204): avc: denied { read open } for pid=7569 comm="syz.1.1031" path="net:[4026532753]" dev="nsfs" ino=4026532753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 754.987015][ T28] audit: type=1400 audit(754.890:12205): avc: denied { create } for pid=7569 comm="syz.1.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 755.005725][ T28] audit: type=1400 audit(754.910:12206): avc: denied { write } for pid=7569 comm="syz.1.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 755.054977][ T28] audit: type=1400 audit(754.960:12207): avc: denied { create } for pid=7569 comm="syz.1.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 755.138686][ T28] audit: type=1400 audit(755.040:12208): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.153392][ T28] audit: type=1400 audit(755.060:12209): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.162090][ T28] audit: type=1400 audit(755.070:12210): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.358166][ T28] audit: type=1400 audit(755.260:12211): avc: denied { read } for pid=7571 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.039334][ T28] kauditd_printk_skb: 70 callbacks suppressed [ 760.047839][ T28] audit: type=1400 audit(759.940:12282): avc: denied { read } for pid=7592 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.090579][ T28] audit: type=1400 audit(759.990:12283): avc: denied { read } for pid=7592 comm="syz.1.1036" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.094707][ T28] audit: type=1400 audit(760.000:12284): avc: denied { read open } for pid=7592 comm="syz.1.1036" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.107814][ T28] audit: type=1400 audit(760.010:12285): avc: denied { ioctl } for pid=7592 comm="syz.1.1036" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 ioctlcmd=0x6426 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.160884][ T28] audit: type=1400 audit(760.060:12286): avc: denied { ioctl } for pid=7592 comm="syz.1.1036" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.172470][ T28] audit: type=1400 audit(760.070:12287): avc: denied { ioctl } for pid=7592 comm="syz.1.1036" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 ioctlcmd=0x4110 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.194787][ T28] audit: type=1400 audit(760.100:12288): avc: denied { write } for pid=7592 comm="syz.1.1036" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.196064][ T28] audit: type=1400 audit(760.100:12289): avc: denied { write open } for pid=7592 comm="syz.1.1036" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.207671][ T28] audit: type=1400 audit(760.110:12290): avc: denied { read write } for pid=7592 comm="syz.1.1036" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.215317][ T28] audit: type=1400 audit(760.120:12291): avc: denied { read write open } for pid=7592 comm="syz.1.1036" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 764.994210][ T7614] fuse: Invalid rootmode [ 765.077861][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 765.078160][ T28] audit: type=1400 audit(764.970:12360): avc: denied { write } for pid=7611 comm="syz.1.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 765.181273][ T28] audit: type=1400 audit(765.080:12361): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.191024][ T28] audit: type=1400 audit(765.090:12362): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.191395][ T28] audit: type=1400 audit(765.090:12363): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.278770][ T28] audit: type=1400 audit(765.180:12364): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.284569][ T28] audit: type=1400 audit(765.190:12365): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.304098][ T28] audit: type=1400 audit(765.210:12366): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.355397][ T28] audit: type=1400 audit(765.260:12367): avc: denied { read } for pid=7616 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 765.492236][ T28] audit: type=1400 audit(765.400:12368): avc: denied { read } for pid=7618 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 765.547279][ T28] audit: type=1400 audit(765.450:12369): avc: denied { create } for pid=7616 comm="syz.1.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 766.990212][ T7631] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7631 comm=syz.0.1047 [ 767.653971][ T7633] fuse: Invalid rootmode [ 770.138585][ T28] kauditd_printk_skb: 262 callbacks suppressed [ 770.143254][ T28] audit: type=1400 audit(770.040:12632): avc: denied { create } for pid=7634 comm="syz.1.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 770.145314][ T28] audit: type=1400 audit(770.050:12633): avc: denied { module_request } for pid=7634 comm="syz.1.1049" kmod="net-pf-8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 770.518690][ T28] audit: type=1400 audit(770.420:12634): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.522369][ T28] audit: type=1400 audit(770.420:12635): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.562518][ T28] audit: type=1400 audit(770.470:12636): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.766694][ T28] audit: type=1400 audit(770.670:12637): avc: denied { read } for pid=7653 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 770.808011][ T28] audit: type=1400 audit(770.710:12638): avc: denied { create } for pid=7653 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 770.835337][ T28] audit: type=1400 audit(770.740:12639): avc: denied { write } for pid=7653 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 770.895090][ T28] audit: type=1400 audit(770.800:12640): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.896491][ T28] audit: type=1400 audit(770.800:12641): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 771.412408][ T7658] vcan0: entered allmulticast mode [ 771.773094][ T7660] fuse: Bad value for 'rootmode' [ 775.143541][ T28] kauditd_printk_skb: 80 callbacks suppressed [ 775.147183][ T28] audit: type=1400 audit(775.050:12722): avc: denied { ioctl } for pid=7672 comm="syz.1.1058" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 775.350737][ T11] usb 2-1: new full-speed USB device number 84 using dummy_hcd [ 775.407819][ T28] audit: type=1400 audit(775.310:12723): avc: denied { relabelfrom } for pid=7672 comm="syz.1.1058" name="UNIX" dev="sockfs" ino=13679 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 775.412842][ T28] audit: type=1400 audit(775.310:12724): avc: denied { mac_admin } for pid=7672 comm="syz.1.1058" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 775.444220][ T7673] SELinux: Context system_u:object_r:bsdpty_device_t:s0 is not valid (left unmapped). [ 775.472865][ T28] audit: type=1400 audit(775.380:12725): avc: denied { relabelto } for pid=7672 comm="syz.1.1058" name="UNIX" dev="sockfs" ino=13679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=unix_stream_socket permissive=1 trawcon="system_u:object_r:bsdpty_device_t:s0" [ 775.664368][ T28] audit: type=1400 audit(775.570:12726): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.667420][ T28] audit: type=1400 audit(775.570:12727): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.675642][ T28] audit: type=1400 audit(775.580:12728): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.775163][ T28] audit: type=1400 audit(775.680:12729): avc: denied { read } for pid=7681 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 775.796865][ T28] audit: type=1400 audit(775.700:12730): avc: denied { create } for pid=7681 comm="syz.1.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 775.816401][ T28] audit: type=1400 audit(775.720:12731): avc: denied { write } for pid=7681 comm="syz.1.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 777.657956][ T7695] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7695 comm=syz.0.1065 [ 780.157721][ T28] kauditd_printk_skb: 71 callbacks suppressed [ 780.158183][ T28] audit: type=1400 audit(780.060:12801): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.164983][ T28] audit: type=1400 audit(780.070:12802): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.166518][ T28] audit: type=1400 audit(780.070:12803): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.328050][ T28] audit: type=1400 audit(780.230:12804): avc: denied { read } for pid=7700 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 780.373014][ T28] audit: type=1400 audit(780.280:12805): avc: denied { write } for pid=7696 comm="syz.1.1066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 780.389469][ T28] audit: type=1400 audit(780.290:12806): avc: denied { create } for pid=7700 comm="syz.0.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 780.396712][ T28] audit: type=1400 audit(780.300:12807): avc: denied { create } for pid=7700 comm="syz.0.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 780.396974][ T28] audit: type=1400 audit(780.300:12808): avc: denied { write } for pid=7700 comm="syz.0.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 780.411532][ T28] audit: type=1400 audit(780.300:12809): avc: denied { read } for pid=7700 comm="syz.0.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 780.412009][ T28] audit: type=1400 audit(780.310:12810): avc: denied { read } for pid=7700 comm="syz.0.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 780.873165][ T7703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7703 comm=syz.0.1068 [ 782.749495][ T7715] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7715 comm=syz.1.1071 [ 785.285476][ T28] kauditd_printk_skb: 89 callbacks suppressed [ 785.287167][ T28] audit: type=1400 audit(785.190:12900): avc: denied { create } for pid=7717 comm="syz.1.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 785.305503][ T28] audit: type=1400 audit(785.210:12901): avc: denied { ioctl } for pid=7717 comm="syz.1.1072" path="socket:[13755]" dev="sockfs" ino=13755 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 785.313226][ T28] audit: type=1400 audit(785.220:12902): avc: denied { bind } for pid=7717 comm="syz.1.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 785.327953][ T28] audit: type=1400 audit(785.230:12903): avc: denied { write } for pid=7717 comm="syz.1.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 785.796447][ T28] audit: type=1400 audit(785.700:12904): avc: denied { write } for pid=7717 comm="syz.1.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 786.299603][ T28] audit: type=1400 audit(786.200:12905): avc: denied { read write } for pid=7717 comm="syz.1.1072" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.318339][ T28] audit: type=1400 audit(786.220:12906): avc: denied { read write open } for pid=7717 comm="syz.1.1072" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.340490][ T28] audit: type=1400 audit(786.240:12907): avc: denied { ioctl } for pid=7717 comm="syz.1.1072" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.405997][ T28] audit: type=1400 audit(786.310:12908): avc: denied { ioctl } for pid=7717 comm="syz.1.1072" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0x4b65 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.426380][ T28] audit: type=1400 audit(786.330:12909): avc: denied { write } for pid=7717 comm="syz.1.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 790.335048][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 790.336431][ T28] audit: type=1400 audit(790.240:12925): avc: denied { ioctl } for pid=7722 comm="syz.1.1073" path="/dev/full" dev="devtmpfs" ino=6 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.347512][ T28] audit: type=1400 audit(790.250:12926): avc: denied { ioctl } for pid=7722 comm="syz.1.1073" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x9416 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.366749][ T28] audit: type=1400 audit(790.270:12927): avc: denied { ioctl } for pid=7722 comm="syz.1.1073" path="/dev/full" dev="devtmpfs" ino=6 ioctlcmd=0x4b4d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.385388][ T28] audit: type=1400 audit(790.290:12928): avc: denied { ioctl } for pid=7722 comm="syz.1.1073" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5881 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.480946][ T28] audit: type=1400 audit(790.390:12929): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.482960][ T28] audit: type=1400 audit(790.390:12930): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.484758][ T28] audit: type=1400 audit(790.390:12931): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.720717][ T28] audit: type=1400 audit(790.620:12932): avc: denied { read } for pid=7729 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.739421][ T28] audit: type=1400 audit(790.640:12933): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.744489][ T28] audit: type=1400 audit(790.650:12934): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 791.617958][ T7736] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7736 comm=syz.1.1076 [ 794.237185][ T7748] FAULT_INJECTION: forcing a failure. [ 794.237185][ T7748] name failslab, interval 1, probability 0, space 0, times 0 [ 794.247520][ T7748] CPU: 0 UID: 0 PID: 7748 Comm: syz.1.1082 Not tainted syzkaller #0 PREEMPT [ 794.247624][ T7748] Hardware name: ARM-Versatile Express [ 794.247641][ T7748] Call trace: [ 794.247666][ T7748] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 794.247736][ T7748] r7:60000013 r6:60000013 r5:822a79b0 r4:00000000 [ 794.247751][ T7748] [<80201af0>] (show_stack) from [<8021e464>] (dump_stack_lvl+0x5c/0x70) [ 794.247780][ T7748] [<8021e408>] (dump_stack_lvl) from [<8021e490>] (dump_stack+0x18/0x1c) [ 794.247814][ T7748] r7:00000000 r6:00000000 r5:83f6c800 r4:829193d0 [ 794.247825][ T7748] [<8021e478>] (dump_stack) from [<809bb0e8>] (should_fail_ex+0x1c0/0x224) [ 794.247855][ T7748] [<809baf28>] (should_fail_ex) from [<805435f8>] (should_failslab+0x6c/0x94) [ 794.247889][ T7748] r8:00000cc0 r7:00000000 r6:00000cc0 r5:00000000 r4:830d5780 [ 794.247901][ T7748] [<8054358c>] (should_failslab) from [<805227f4>] (kmem_cache_alloc_node_noprof+0x58/0x3c8) [ 794.247928][ T7748] [<8052279c>] (kmem_cache_alloc_node_noprof) from [<815d3584>] (__alloc_skb+0x74/0x2c0) [ 794.247984][ T7748] r10:00000000 r9:815d3734 r8:00000cc0 r7:00000000 r6:830d5780 r5:ffffffff [ 794.247998][ T7748] r4:dddd0688 [ 794.248008][ T7748] [<815d3510>] (__alloc_skb) from [<816f4e50>] (netlink_alloc_large_skb+0x8c/0xa8) [ 794.248054][ T7748] r9:00000000 r8:00000000 r7:861c9800 r6:0000001c r5:85500780 r4:00000140 [ 794.248068][ T7748] [<816f4dc4>] (netlink_alloc_large_skb) from [<816f5610>] (netlink_sendmsg+0x130/0x440) [ 794.248096][ T7748] r5:85500780 r4:edfc5f20 [ 794.248106][ T7748] [<816f54e0>] (netlink_sendmsg) from [<815c1ad4>] (__sock_sendmsg+0x44/0x78) [ 794.248142][ T7748] r10:20000820 r9:00000000 r8:edfc5dcc r7:00000000 r6:85500780 r5:edfc5f20 [ 794.248155][ T7748] r4:00000000 [ 794.248164][ T7748] [<815c1a90>] (__sock_sendmsg) from [<815c2994>] (____sys_sendmsg+0x238/0x2c4) [ 794.248252][ T7748] r7:00000000 r6:00000000 r5:85500780 r4:edfc5f20 [ 794.248270][ T7748] [<815c275c>] (____sys_sendmsg) from [<815c2d94>] (___sys_sendmsg+0x9c/0xd0) [ 794.248319][ T7748] r10:00000128 r9:20000240 r8:20000820 r7:00000000 r6:85500780 r5:edfc5f20 [ 794.248333][ T7748] r4:00000000 [ 794.248342][ T7748] [<815c2cf8>] (___sys_sendmsg) from [<815c4dfc>] (__sys_sendmsg+0x8c/0xe0) [ 794.248375][ T7748] r9:83f6c800 r8:84f75b40 r7:20000820 r6:20000240 r5:84f75b41 r4:00000000 [ 794.248387][ T7748] [<815c4d70>] (__sys_sendmsg) from [<815c4e64>] (sys_sendmsg+0x14/0x18) [ 794.248417][ T7748] r8:8020029c r7:00000128 r6:0012ece4 r5:00000000 r4:00000000 [ 794.248428][ T7748] [<815c4e50>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 794.248451][ T7748] Exception stack(0xedfc5fa8 to 0xedfc5ff0) [ 794.248473][ T7748] 5fa0: 00000000 00000000 00000000 20000240 20000820 00000000 [ 794.248495][ T7748] 5fc0: 00000000 00000000 0012ece4 00000128 003462d8 00000000 00000001 76f100dc [ 794.248511][ T7748] 5fe0: 76f0fe88 76f0fe78 00018ba0 001302e0 [ 794.448828][ T7749] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7749 comm=syz.0.1081 [ 795.059592][ T7755] FAULT_INJECTION: forcing a failure. [ 795.059592][ T7755] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 795.063320][ T7755] CPU: 0 UID: 0 PID: 7755 Comm: syz.1.1085 Not tainted syzkaller #0 PREEMPT [ 795.063490][ T7755] Hardware name: ARM-Versatile Express [ 795.063520][ T7755] Call trace: [ 795.063569][ T7755] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 795.063680][ T7755] r7:60000013 r6:60000013 r5:822a79b0 r4:00000000 [ 795.063791][ T7755] [<80201af0>] (show_stack) from [<8021e464>] (dump_stack_lvl+0x5c/0x70) [ 795.063859][ T7755] [<8021e408>] (dump_stack_lvl) from [<8021e490>] (dump_stack+0x18/0x1c) [ 795.063926][ T7755] r7:00000001 r6:00000000 r5:850d1800 r4:82919424 [ 795.063974][ T7755] [<8021e478>] (dump_stack) from [<809bb0e8>] (should_fail_ex+0x1c0/0x224) [ 795.064043][ T7755] [<809baf28>] (should_fail_ex) from [<80543688>] (should_fail_alloc_page+0x68/0x74) [ 795.064127][ T7755] r8:ee23ddb4 r7:00000001 r6:00000000 r5:00140cca r4:ee23ddc0 [ 795.064151][ T7755] [<80543620>] (should_fail_alloc_page) from [<8050a110>] (prepare_alloc_pages+0xf8/0x1b4) [ 795.064209][ T7755] [<8050a018>] (prepare_alloc_pages) from [<805134b8>] (__alloc_frozen_pages_noprof+0xb0/0x1644) [ 795.064279][ T7755] r10:76f0d000 r9:844d8f00 r8:00000000 r7:00140cca r6:850d1800 r5:00000000 [ 795.064307][ T7755] r4:ee23deb8 [ 795.064324][ T7755] [<80513408>] (__alloc_frozen_pages_noprof) from [<80514ac0>] (__folio_alloc_noprof+0x14/0x6c) [ 795.064459][ T7755] r10:76f0d000 r9:844d8f00 r8:00000000 r7:00000000 r6:8532be80 r5:00000001 [ 795.064489][ T7755] r4:ee23deb8 [ 795.064614][ T7755] [<80514aac>] (__folio_alloc_noprof) from [<804de560>] (do_anonymous_page+0xf0/0x5d0) [ 795.064708][ T7755] r5:00000001 r4:ee23deb8 [ 795.064731][ T7755] [<804de470>] (do_anonymous_page) from [<804e2770>] (handle_mm_fault+0x5bc/0x6b8) [ 795.064841][ T7755] r10:00000040 r9:00000000 r8:00000000 r7:ee23dfb0 r6:76f0ddc0 r5:850d1800 [ 795.064884][ T7755] r4:00001255 [ 795.064909][ T7755] [<804e21b4>] (handle_mm_fault) from [<802330f8>] (do_page_fault+0x21c/0x4d0) [ 795.064989][ T7755] r10:00000002 r9:844d8f00 r8:00000255 r7:850d1800 r6:00000a07 r5:76f0ddc0 [ 795.065095][ T7755] r4:ee23dfb0 [ 795.065121][ T7755] [<80232edc>] (do_page_fault) from [<8023357c>] (do_DataAbort+0x38/0xac) [ 795.065221][ T7755] r10:003d0f00 r9:00000000 r8:80232edc r7:ee23dfb0 r6:76f0ddc0 r5:00000a07 [ 795.065251][ T7755] r4:8281d3d0 [ 795.065271][ T7755] [<80233544>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 795.065324][ T7755] Exception stack(0xee23dfb0 to 0xee23dff8) [ 795.065364][ T7755] dfa0: 0018ef9c 20000280 00000080 76f0fe64 [ 795.065407][ T7755] dfc0: 20000640 00000002 20000280 00000080 00000002 00000000 003d0f00 76f100dc [ 795.065447][ T7755] dfe0: 20000640 76f0ddd0 000233a8 00013ec8 20000010 ffffffff [ 795.065489][ T7755] r8:826c1044 r7:850d1800 r6:ffffffff r5:20000010 r4:00013ec8 [ 795.071898][ T7755] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 795.346713][ T28] kauditd_printk_skb: 126 callbacks suppressed [ 795.347037][ T28] audit: type=1400 audit(795.250:13061): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.401418][ T2873] usb 2-1: new full-speed USB device number 85 using dummy_hcd [ 795.420739][ T28] audit: type=1400 audit(795.320:13062): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.432571][ T28] audit: type=1400 audit(795.340:13063): avc: denied { read } for pid=7759 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.438208][ T28] audit: type=1400 audit(795.340:13064): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.447129][ T28] audit: type=1400 audit(795.350:13065): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.493673][ T28] audit: type=1400 audit(795.400:13066): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.549092][ T28] audit: type=1400 audit(795.450:13067): avc: denied { module_request } for pid=7759 comm="syz.0.1086" kmod="net-pf-16-proto-23" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 795.559588][ T28] audit: type=1400 audit(795.460:13068): avc: denied { module_request } for pid=7759 comm="syz.0.1086" kmod="net-pf-16-proto-23" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 795.596765][ T28] audit: type=1400 audit(795.500:13069): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.615915][ T28] audit: type=1400 audit(795.520:13070): avc: denied { ioctl } for pid=7754 comm="syz.1.1085" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 795.681604][ T2873] usb 2-1: unable to get BOS descriptor or descriptor too short [ 795.695466][ T2873] usb 2-1: not running at top speed; connect to a high speed hub [ 795.736607][ T2873] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 255, changing to 4 [ 795.780731][ T2873] usb 2-1: New USB device found, idVendor=0e41, idProduct=4242, bcdDevice= 0.40 [ 795.780949][ T2873] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 795.781124][ T2873] usb 2-1: Product: syz [ 795.781152][ T2873] usb 2-1: Manufacturer: syz [ 795.781168][ T2873] usb 2-1: SerialNumber: syz [ 796.088619][ T2873] usb 2-1: Audio class v2/v3 interfaces need an interface association [ 796.158710][ T2873] snd-usb-audio 2-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 796.206149][ T2873] usb 2-1: USB disconnect, device number 85 [ 797.029087][ T7790] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7790 comm=syz.0.1088 [ 797.317067][ T7792] fuse: Bad value for 'fd' [ 798.858748][ T7802] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7802 comm=syz.1.1094 [ 799.268076][ T7807] fuse: Bad value for 'fd' [ 800.436998][ T28] kauditd_printk_skb: 173 callbacks suppressed [ 800.437342][ T28] audit: type=1400 audit(800.340:13244): avc: denied { read open } for pid=7814 comm="syz.0.1099" path="/dev/snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 800.494219][ T28] audit: type=1400 audit(800.400:13245): avc: denied { setattr } for pid=7814 comm="syz.0.1099" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 800.528626][ T28] audit: type=1400 audit(800.430:13246): avc: denied { ioctl } for pid=7814 comm="syz.0.1099" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x661b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 800.587387][ T28] audit: type=1400 audit(800.490:13247): avc: denied { read } for pid=7809 comm="syz.1.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 800.593626][ T28] audit: type=1400 audit(800.500:13248): avc: denied { read write } for pid=7814 comm="syz.0.1099" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 800.608430][ T28] audit: type=1400 audit(800.510:13249): avc: denied { read open } for pid=7814 comm="syz.0.1099" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 800.639843][ T28] audit: type=1400 audit(800.540:13250): avc: denied { write } for pid=7809 comm="syz.1.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 800.671277][ T28] audit: type=1400 audit(800.560:13251): avc: denied { ioctl } for pid=7814 comm="syz.0.1099" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 800.672209][ T28] audit: type=1400 audit(800.570:13252): avc: denied { ioctl } for pid=7809 comm="syz.1.1097" path="socket:[13890]" dev="sockfs" ino=13890 ioctlcmd=0xf504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 800.672326][ T28] audit: type=1400 audit(800.570:13253): avc: denied { ioctl } for pid=7809 comm="syz.1.1097" path="socket:[13890]" dev="sockfs" ino=13890 ioctlcmd=0xf504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 802.507418][ T7828] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7828 comm=syz.0.1100 [ 803.803604][ T7833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7833 comm=syz.1.1101 [ 804.227842][ T7835] fuse: Unknown parameter '00000000000000000000003' [ 804.596064][ T7837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7837 comm=syz.1.1103 [ 805.490828][ T28] kauditd_printk_skb: 230 callbacks suppressed [ 805.492166][ T28] audit: type=1400 audit(805.390:13484): avc: denied { read } for pid=7838 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 805.523442][ T28] audit: type=1400 audit(805.430:13485): avc: denied { ioctl } for pid=7838 comm="syz.1.1104" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0xaf80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 805.531079][ T28] audit: type=1400 audit(805.430:13486): avc: denied { ioctl } for pid=7838 comm="syz.1.1104" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 805.549855][ T28] audit: type=1400 audit(805.450:13487): avc: denied { ioctl } for pid=7838 comm="syz.1.1104" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 805.612520][ T28] audit: type=1400 audit(805.520:13488): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 805.614774][ T28] audit: type=1400 audit(805.520:13489): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 805.617098][ T28] audit: type=1400 audit(805.520:13490): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 805.850862][ T28] audit: type=1400 audit(805.750:13491): avc: denied { read } for pid=7842 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 806.581318][ T28] audit: type=1400 audit(806.480:13492): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 806.584683][ T28] audit: type=1400 audit(806.490:13493): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 807.533832][ T7849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=7849 comm=syz.1.1107 [ 810.641886][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 810.644287][ T28] audit: type=1400 audit(810.550:13560): avc: denied { read } for pid=7861 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 810.673815][ T28] audit: type=1400 audit(810.580:13561): avc: denied { create } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.713889][ T28] audit: type=1400 audit(810.620:13562): avc: denied { create } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 810.767068][ T28] audit: type=1400 audit(810.670:13563): avc: denied { bind } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.786773][ T28] audit: type=1400 audit(810.690:13564): avc: denied { accept } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.804450][ T28] audit: type=1400 audit(810.710:13565): avc: denied { write } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.819380][ T28] audit: type=1400 audit(810.720:13566): avc: denied { create } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.839685][ T28] audit: type=1400 audit(810.740:13567): avc: denied { create } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 810.895910][ T28] audit: type=1400 audit(810.800:13568): avc: denied { bind } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.912177][ T28] audit: type=1400 audit(810.820:13569): avc: denied { accept } for pid=7861 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 813.793932][ T7878] fuse: Unknown parameter '00000000000000000000003' [ 815.811678][ T28] kauditd_printk_skb: 91 callbacks suppressed [ 815.812994][ T28] audit: type=1400 audit(815.720:13661): avc: denied { read } for pid=7889 comm="syz.1.1119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 815.877227][ T28] audit: type=1400 audit(815.780:13662): avc: denied { ioctl } for pid=7889 comm="syz.1.1119" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0xaf80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.879617][ T28] audit: type=1400 audit(815.780:13663): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 815.891354][ T28] audit: type=1400 audit(815.780:13664): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 815.893466][ T28] audit: type=1400 audit(815.790:13665): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 815.915220][ T28] audit: type=1400 audit(815.820:13666): avc: denied { ioctl } for pid=7889 comm="syz.1.1119" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.936805][ T28] audit: type=1400 audit(815.840:13667): avc: denied { ioctl } for pid=7889 comm="syz.1.1119" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 816.005637][ T28] audit: type=1400 audit(815.910:13668): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 816.008525][ T28] audit: type=1400 audit(815.910:13669): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 816.016847][ T28] audit: type=1400 audit(815.920:13670): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 816.235448][ T7894] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7894 comm=syz.0.1120 [ 816.853151][ T7898] fuse: Unknown parameter '00000000000000000000003' [ 818.987669][ T7910] fuse: Unknown parameter 'fd00000000000000000000003' [ 821.917377][ T28] kauditd_printk_skb: 80 callbacks suppressed [ 821.917832][ T28] audit: type=1400 audit(821.810:13751): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 821.987919][ T28] audit: type=1400 audit(821.890:13752): avc: denied { read write } for pid=3088 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 822.004218][ T28] audit: type=1400 audit(821.910:13753): avc: denied { read write open } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 822.008843][ T28] audit: type=1400 audit(821.910:13754): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 822.209818][ T28] audit: type=1400 audit(822.110:13755): avc: denied { read } for pid=7917 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 822.260432][ T28] audit: type=1400 audit(822.160:13756): avc: denied { create } for pid=7917 comm="syz.1.1129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 822.272210][ T28] audit: type=1400 audit(822.180:13757): avc: denied { ioctl } for pid=7917 comm="syz.1.1129" path="socket:[14122]" dev="sockfs" ino=14122 ioctlcmd=0xf50f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 822.307018][ T28] audit: type=1400 audit(822.210:13758): avc: denied { read } for pid=7917 comm="syz.1.1129" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 822.309446][ T28] audit: type=1400 audit(822.210:13759): avc: denied { read open } for pid=7917 comm="syz.1.1129" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 822.357391][ T28] audit: type=1400 audit(822.260:13760): avc: denied { ioctl } for pid=7917 comm="syz.1.1129" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x540e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 826.996788][ T28] kauditd_printk_skb: 92 callbacks suppressed [ 826.998055][ T28] audit: type=1400 audit(826.890:13853): avc: denied { read write } for pid=7937 comm="syz.1.1135" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 827.041014][ T28] audit: type=1400 audit(826.940:13854): avc: denied { read open } for pid=7937 comm="syz.1.1135" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 827.109146][ T28] audit: type=1400 audit(827.010:13855): avc: denied { ioctl } for pid=7937 comm="syz.1.1135" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 827.119194][ T28] audit: type=1400 audit(827.020:13856): avc: denied { ioctl } for pid=7937 comm="syz.1.1135" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 827.161640][ T28] audit: type=1400 audit(827.060:13857): avc: denied { create } for pid=7937 comm="syz.1.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 827.190513][ T28] audit: type=1400 audit(827.090:13858): avc: denied { write } for pid=7937 comm="syz.1.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 827.195445][ T28] audit: type=1400 audit(827.100:13859): avc: denied { module_request } for pid=7937 comm="syz.1.1135" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 827.276551][ T28] audit: type=1400 audit(827.180:13860): avc: denied { write } for pid=7934 comm="syz.0.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 827.294240][ T28] audit: type=1400 audit(827.200:13861): avc: denied { read } for pid=7934 comm="syz.0.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 827.697160][ T28] audit: type=1400 audit(827.600:13862): avc: denied { read } for pid=7937 comm="syz.1.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 830.908601][ T7954] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7954 comm=syz.1.1138 [ 832.113188][ T28] kauditd_printk_skb: 104 callbacks suppressed [ 832.113653][ T28] audit: type=1400 audit(832.020:13967): avc: denied { read } for pid=7958 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.173779][ T28] audit: type=1400 audit(832.080:13968): avc: denied { read write } for pid=7958 comm="syz.0.1140" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.199688][ T28] audit: type=1400 audit(832.100:13969): avc: denied { read write open } for pid=7958 comm="syz.0.1140" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.211268][ T28] audit: type=1400 audit(832.110:13970): avc: denied { ioctl } for pid=7958 comm="syz.0.1140" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.239857][ T28] audit: type=1400 audit(832.140:13971): avc: denied { ioctl } for pid=7958 comm="syz.0.1140" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.275297][ T28] audit: type=1400 audit(832.180:13972): avc: denied { ioctl } for pid=7958 comm="syz.0.1140" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x5408 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.306223][ T28] audit: type=1400 audit(832.210:13973): avc: denied { read } for pid=7958 comm="syz.0.1140" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.321256][ T28] audit: type=1400 audit(832.210:13974): avc: denied { read open } for pid=7958 comm="syz.0.1140" path="/dev/snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.400705][ T28] audit: type=1400 audit(832.290:13975): avc: denied { setattr } for pid=7958 comm="syz.0.1140" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.409478][ T28] audit: type=1400 audit(832.310:13976): avc: denied { ioctl } for pid=7958 comm="syz.0.1140" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x661b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 837.126167][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 837.129703][ T28] audit: type=1400 audit(837.030:14056): avc: denied { read } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 837.195601][ T28] audit: type=1400 audit(837.100:14057): avc: denied { create } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 837.215489][ T28] audit: type=1400 audit(837.120:14058): avc: denied { create } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 837.241422][ T28] audit: type=1400 audit(837.140:14059): avc: denied { getopt } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 837.245622][ T28] audit: type=1400 audit(837.150:14060): avc: denied { getopt } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 837.284778][ T28] audit: type=1400 audit(837.190:14061): avc: denied { create } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 837.321334][ T28] audit: type=1400 audit(837.210:14062): avc: denied { write } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 837.330696][ T28] audit: type=1400 audit(837.230:14063): avc: denied { read } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 837.353825][ T28] audit: type=1400 audit(837.260:14064): avc: denied { read } for pid=7976 comm="syz.0.1146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 837.464964][ T28] audit: type=1400 audit(837.370:14065): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 842.228850][ T28] kauditd_printk_skb: 91 callbacks suppressed [ 842.229794][ T28] audit: type=1400 audit(842.130:14157): avc: denied { execute } for pid=8001 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 842.251019][ T28] audit: type=1400 audit(842.150:14158): avc: denied { execute_no_trans } for pid=8001 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 842.260920][ T28] audit: type=1400 audit(842.160:14159): avc: denied { execute } for pid=8001 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 842.341335][ T28] audit: type=1400 audit(842.250:14160): avc: denied { execmem } for pid=8001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 842.433840][ T1261] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 842.453746][ T28] audit: type=1400 audit(842.360:14161): avc: denied { read } for pid=8004 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 842.459079][ T28] audit: type=1400 audit(842.360:14162): avc: denied { read open } for pid=8004 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 842.483981][ T1261] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 842.514986][ T28] audit: type=1400 audit(842.420:14163): avc: denied { mounton } for pid=8004 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 842.563441][ T1261] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 842.575161][ T28] audit: type=1400 audit(842.480:14164): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 842.619566][ T1261] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 842.904731][ T28] audit: type=1400 audit(842.800:14165): avc: denied { sys_module } for pid=8004 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 842.906554][ T28] audit: type=1400 audit(842.810:14166): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 843.019147][ T1261] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 843.046205][ T1261] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 843.058262][ T1261] bond0 (unregistering): Released all slaves [ 843.186705][ T1261] hsr_slave_0: left promiscuous mode [ 843.189651][ T1261] hsr_slave_1: left promiscuous mode [ 843.223777][ T1261] veth1_macvtap: left promiscuous mode [ 843.224945][ T1261] veth0_macvtap: left promiscuous mode [ 843.229860][ T1261] veth1_vlan: left promiscuous mode [ 843.238677][ T1261] veth0_vlan: left promiscuous mode [ 843.662687][ T1261] vcan0 (unregistering): left allmulticast mode [ 845.460934][ T2873] usb 1-1: new high-speed USB device number 56 using dummy_hcd [ 845.790960][ T2873] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 845.791320][ T2873] usb 1-1: config 1 has no interface number 0 [ 845.791626][ T2873] usb 1-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 845.791818][ T2873] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 845.792000][ T2873] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x7 has invalid maxpacket 16 [ 845.792170][ T2873] usb 1-1: config 1 interface 7 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 845.897100][ T2873] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 845.898197][ T2873] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 845.899476][ T2873] usb 1-1: Product: syz [ 845.900737][ T2873] usb 1-1: Manufacturer: syz [ 845.903491][ T2873] usb 1-1: SerialNumber: syz [ 845.998846][ T8033] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 846.026783][ T8033] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 846.049183][ T2873] usb 1-1: Expected 3 endpoints, found: 2 [ 847.230954][ T28] kauditd_printk_skb: 230 callbacks suppressed [ 847.231424][ T28] audit: type=1400 audit(847.120:14397): avc: denied { search } for pid=8076 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.245214][ T28] audit: type=1400 audit(847.140:14398): avc: denied { search } for pid=8076 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.245921][ T28] audit: type=1400 audit(847.140:14399): avc: denied { search } for pid=8076 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.279142][ T28] audit: type=1400 audit(847.180:14400): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 847.311815][ T28] audit: type=1400 audit(847.210:14401): avc: denied { search } for pid=8029 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.600927][ T28] audit: type=1400 audit(847.500:14402): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 847.865703][ T28] audit: type=1400 audit(847.770:14403): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 848.274095][ T28] audit: type=1400 audit(848.180:14404): avc: denied { write } for pid=8095 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 848.282656][ T28] audit: type=1400 audit(848.190:14405): avc: denied { write open } for pid=8095 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 848.486000][ T28] audit: type=1400 audit(848.390:14406): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 849.899595][ T8004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 849.961238][ T8004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 851.352314][ T2873] usb 1-1: USB disconnect, device number 56 [ 852.242506][ T28] kauditd_printk_skb: 192 callbacks suppressed [ 852.244850][ T28] audit: type=1400 audit(852.150:14599): avc: denied { write } for pid=8215 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.250940][ T28] audit: type=1400 audit(852.150:14600): avc: denied { write open } for pid=8215 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.286488][ T28] audit: type=1400 audit(852.190:14601): avc: denied { read } for pid=8217 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.392526][ T28] audit: type=1400 audit(852.280:14602): avc: denied { read write } for pid=8217 comm="syz.0.1158" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.392994][ T28] audit: type=1400 audit(852.300:14603): avc: denied { read write open } for pid=8217 comm="syz.0.1158" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.413774][ T28] audit: type=1400 audit(852.310:14604): avc: denied { mounton } for pid=8217 comm="syz.0.1158" path="/556/file0" dev="tmpfs" ino=2946 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 852.450620][ T28] audit: type=1400 audit(852.350:14605): avc: denied { mount } for pid=8217 comm="syz.0.1158" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 852.456126][ T28] audit: type=1400 audit(852.360:14606): avc: denied { sys_module } for pid=8004 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 852.469099][ T28] audit: type=1400 audit(852.370:14607): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 852.780573][ T28] audit: type=1400 audit(852.680:14608): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 853.881294][ T8004] hsr_slave_0: entered promiscuous mode [ 853.889095][ T8004] hsr_slave_1: entered promiscuous mode [ 853.892924][ T8004] debugfs: 'hsr0' already exists in 'hsr' [ 853.893893][ T8004] Cannot create hsr debugfs directory [ 855.308646][ T8004] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 855.365491][ T8004] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 855.407568][ T8004] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 855.467701][ T8004] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 857.252875][ T28] kauditd_printk_skb: 380 callbacks suppressed [ 857.260644][ T28] audit: type=1400 audit(857.160:14989): avc: denied { append open } for pid=8359 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=37 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 857.278176][ T28] audit: type=1400 audit(857.180:14990): avc: denied { search } for pid=8359 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 857.292890][ T28] audit: type=1400 audit(857.200:14991): avc: denied { getattr } for pid=8359 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 857.309311][ T28] audit: type=1400 audit(857.210:14992): avc: denied { search } for pid=8359 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 857.315484][ T28] audit: type=1400 audit(857.220:14993): avc: denied { getattr } for pid=8359 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 857.333570][ T28] audit: type=1400 audit(857.240:14994): avc: denied { search } for pid=8359 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 857.333926][ T28] audit: type=1400 audit(857.240:14995): avc: denied { search } for pid=8359 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 857.334149][ T28] audit: type=1400 audit(857.240:14996): avc: denied { search } for pid=8359 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 857.357346][ T28] audit: type=1400 audit(857.260:14997): avc: denied { getattr } for pid=8359 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=37 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 857.357612][ T28] audit: type=1400 audit(857.260:14998): avc: denied { write } for pid=8359 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 858.824385][ T8004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.518803][ T28] kauditd_printk_skb: 397 callbacks suppressed [ 862.519040][ T28] audit: type=1400 audit(862.420:15396): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 862.575361][ T28] audit: type=1400 audit(862.480:15397): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 862.578210][ T28] audit: type=1400 audit(862.480:15398): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 862.588900][ T28] audit: type=1400 audit(862.490:15399): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 862.593344][ T28] audit: type=1400 audit(862.500:15400): avc: denied { search } for pid=8395 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 862.599342][ T28] audit: type=1400 audit(862.500:15401): avc: denied { search } for pid=8395 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 862.599563][ T28] audit: type=1400 audit(862.500:15402): avc: denied { search } for pid=8395 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 862.614643][ T28] audit: type=1400 audit(862.510:15403): avc: denied { getattr } for pid=8395 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.dhcp" dev="tmpfs" ino=39 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 862.623934][ T28] audit: type=1400 audit(862.530:15404): avc: denied { search } for pid=8395 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 862.624865][ T28] audit: type=1400 audit(862.530:15405): avc: denied { search } for pid=8395 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.607978][ T28] kauditd_printk_skb: 522 callbacks suppressed [ 867.620793][ T28] audit: type=1400 audit(867.510:15928): avc: denied { module_request } for pid=8004 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 867.794194][ T28] audit: type=1400 audit(867.700:15929): avc: denied { search } for pid=8438 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.798961][ T28] audit: type=1400 audit(867.700:15930): avc: denied { read } for pid=8438 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.806636][ T28] audit: type=1400 audit(867.710:15931): avc: denied { read open } for pid=8438 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.815066][ T28] audit: type=1400 audit(867.720:15932): avc: denied { search } for pid=8438 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.816480][ T28] audit: type=1400 audit(867.720:15933): avc: denied { search } for pid=8438 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.830728][ T28] audit: type=1400 audit(867.730:15934): avc: denied { search } for pid=8438 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.831208][ T28] audit: type=1400 audit(867.730:15935): avc: denied { read } for pid=8438 comm="cmp" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=42 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.831511][ T28] audit: type=1400 audit(867.730:15936): avc: denied { read open } for pid=8438 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.dhcp" dev="tmpfs" ino=42 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.831741][ T28] audit: type=1400 audit(867.730:15937): avc: denied { getattr } for pid=8438 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 868.426794][ T8004] veth0_vlan: entered promiscuous mode [ 868.516312][ T8004] veth1_vlan: entered promiscuous mode [ 868.704343][ T8004] veth0_macvtap: entered promiscuous mode [ 868.781195][ T8004] veth1_macvtap: entered promiscuous mode [ 869.098289][ T8182] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 869.099091][ T8182] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 869.100870][ T8182] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 869.101433][ T8182] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 871.918418][ T8465] misc userio: Begin command sent, but we're already running [ 872.622026][ T28] kauditd_printk_skb: 283 callbacks suppressed [ 872.622328][ T28] audit: type=1400 audit(872.520:16221): avc: denied { read } for pid=8468 comm="syz.0.1170" path="socket:[15633]" dev="sockfs" ino=15633 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 872.648204][ T28] audit: type=1400 audit(872.550:16222): avc: denied { create } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.660389][ T28] audit: type=1400 audit(872.560:16223): avc: denied { write } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.676552][ T28] audit: type=1400 audit(872.580:16224): avc: denied { read } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.686065][ T28] audit: type=1400 audit(872.590:16225): avc: denied { read } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.707152][ T28] audit: type=1400 audit(872.610:16226): avc: denied { create } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.717511][ T28] audit: type=1400 audit(872.620:16227): avc: denied { write } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.726371][ T28] audit: type=1400 audit(872.630:16228): avc: denied { module_request } for pid=8468 comm="syz.0.1170" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 872.859269][ T28] audit: type=1400 audit(872.760:16229): avc: denied { read } for pid=8468 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.939315][ T28] audit: type=1400 audit(872.840:16230): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 872.970988][ T8449] atkbd serio2: keyboard reset failed on [ 877.954317][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 877.954755][ T28] audit: type=1400 audit(877.860:16310): avc: denied { read } for pid=8495 comm="syz.0.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 877.979624][ T28] audit: type=1400 audit(877.880:16311): avc: denied { write } for pid=8495 comm="syz.0.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 877.988162][ T28] audit: type=1400 audit(877.890:16312): avc: denied { ioctl } for pid=8495 comm="syz.0.1179" path="socket:[15019]" dev="sockfs" ino=15019 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 878.009155][ T28] audit: type=1400 audit(877.910:16313): avc: denied { module_request } for pid=8495 comm="syz.0.1179" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 878.036452][ T28] audit: type=1400 audit(877.930:16314): avc: denied { module_request } for pid=8495 comm="syz.0.1179" kmod="netdev-wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 878.037249][ T28] audit: type=1400 audit(877.940:16315): avc: denied { write } for pid=8499 comm="syz.1.1180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 878.298706][ T28] audit: type=1400 audit(878.200:16316): avc: denied { sys_module } for pid=8495 comm="syz.0.1179" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 878.326126][ T28] audit: type=1400 audit(878.230:16317): avc: denied { module_request } for pid=8495 comm="syz.0.1179" kmod="wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 878.502863][ T28] audit: type=1400 audit(878.400:16318): avc: denied { write } for pid=8495 comm="syz.0.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 878.585988][ T28] audit: type=1400 audit(878.490:16319): avc: denied { read } for pid=8495 comm="syz.0.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 882.988522][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 882.995848][ T28] audit: type=1400 audit(882.890:16343): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 882.998605][ T28] audit: type=1400 audit(882.900:16344): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 883.007575][ T28] audit: type=1400 audit(882.900:16345): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 883.150519][ T28] audit: type=1400 audit(883.050:16346): avc: denied { read } for pid=8515 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 883.169367][ T28] audit: type=1400 audit(883.070:16347): avc: denied { create } for pid=8515 comm="syz.0.1183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 883.175106][ T28] audit: type=1400 audit(883.080:16348): avc: denied { ioctl } for pid=8515 comm="syz.0.1183" path="socket:[15697]" dev="sockfs" ino=15697 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 883.196628][ T28] audit: type=1400 audit(883.100:16349): avc: denied { accept } for pid=8515 comm="syz.0.1183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 883.219297][ T28] audit: type=1400 audit(883.120:16350): avc: denied { create } for pid=8515 comm="syz.0.1183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 883.227540][ T28] audit: type=1400 audit(883.130:16351): avc: denied { read write } for pid=8515 comm="syz.0.1183" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 883.242625][ T28] audit: type=1400 audit(883.130:16352): avc: denied { read write open } for pid=8515 comm="syz.0.1183" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 888.306132][ T28] kauditd_printk_skb: 70 callbacks suppressed [ 888.307634][ T28] audit: type=1400 audit(888.210:16423): avc: denied { write } for pid=8535 comm="syz.0.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 888.812665][ T28] audit: type=1400 audit(888.720:16424): avc: denied { getopt } for pid=8535 comm="syz.0.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 890.314270][ T28] audit: type=1400 audit(890.210:16425): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.316237][ T28] audit: type=1400 audit(890.220:16426): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.318786][ T28] audit: type=1400 audit(890.220:16427): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.510757][ T28] audit: type=1400 audit(890.410:16428): avc: denied { read } for pid=8539 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 890.548685][ T28] audit: type=1400 audit(890.450:16429): avc: denied { read write } for pid=8539 comm="syz.0.1192" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 890.552778][ T28] audit: type=1400 audit(890.450:16430): avc: denied { read write open } for pid=8539 comm="syz.0.1192" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 890.554812][ T28] audit: type=1400 audit(890.460:16431): avc: denied { mounton } for pid=8539 comm="syz.0.1192" path="/582/file0" dev="tmpfs" ino=3082 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 890.573278][ T28] audit: type=1400 audit(890.480:16432): avc: denied { mount } for pid=8539 comm="syz.0.1192" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 893.311136][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 893.311364][ T28] audit: type=1400 audit(893.210:16441): avc: denied { read } for pid=8547 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 893.405196][ T28] audit: type=1400 audit(893.310:16442): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.406740][ T28] audit: type=1400 audit(893.310:16443): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.408195][ T28] audit: type=1400 audit(893.310:16444): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.599648][ T28] audit: type=1400 audit(893.500:16445): avc: denied { read } for pid=8549 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 893.640411][ T28] audit: type=1400 audit(893.540:16446): avc: denied { read open } for pid=8549 comm="syz.0.1195" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 893.687657][ T28] audit: type=1400 audit(893.590:16447): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.697277][ T28] audit: type=1400 audit(893.600:16448): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.710859][ T28] audit: type=1400 audit(893.610:16449): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.833493][ T28] audit: type=1400 audit(893.740:16450): avc: denied { read } for pid=8552 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.366608][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 898.370714][ T28] audit: type=1400 audit(898.270:16514): avc: denied { read write } for pid=8575 comm="syz.0.1205" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.378079][ T28] audit: type=1400 audit(898.280:16515): avc: denied { read write open } for pid=8575 comm="syz.0.1205" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.403705][ T28] audit: type=1400 audit(898.310:16516): avc: denied { mounton } for pid=8575 comm="syz.0.1205" path="/589/file0" dev="tmpfs" ino=3120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 898.421078][ T28] audit: type=1400 audit(898.320:16517): avc: denied { mount } for pid=8575 comm="syz.0.1205" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 898.933454][ T28] audit: type=1400 audit(898.840:16518): avc: denied { read write } for pid=8004 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 898.935482][ T28] audit: type=1400 audit(898.840:16519): avc: denied { read write open } for pid=8004 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 898.951530][ T28] audit: type=1400 audit(898.850:16520): avc: denied { ioctl } for pid=8004 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 899.258117][ T28] audit: type=1400 audit(899.160:16521): avc: denied { create } for pid=8580 comm="syz.1.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 899.298950][ T28] audit: type=1400 audit(899.200:16522): avc: denied { read } for pid=8580 comm="syz.1.1206" path="socket:[15819]" dev="sockfs" ino=15819 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 899.433021][ T28] audit: type=1400 audit(899.340:16523): avc: denied { read write } for pid=8004 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.451474][ T28] kauditd_printk_skb: 103 callbacks suppressed [ 903.451817][ T28] audit: type=1400 audit(903.340:16627): avc: denied { read write } for pid=8004 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.452098][ T28] audit: type=1400 audit(903.350:16628): avc: denied { read write open } for pid=8004 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.452332][ T28] audit: type=1400 audit(903.350:16629): avc: denied { ioctl } for pid=8004 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.471891][ T28] audit: type=1400 audit(903.380:16630): avc: denied { read write } for pid=3087 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.477293][ T28] audit: type=1400 audit(903.380:16631): avc: denied { read write open } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.497871][ T28] audit: type=1400 audit(903.400:16632): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 903.656685][ T28] audit: type=1400 audit(903.560:16633): avc: denied { read } for pid=8606 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 903.658600][ T28] audit: type=1400 audit(903.560:16634): avc: denied { create } for pid=8605 comm="syz.1.1214" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 903.669281][ T28] audit: type=1400 audit(903.570:16635): avc: denied { create } for pid=8605 comm="syz.1.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 903.690582][ T28] audit: type=1400 audit(903.590:16636): avc: denied { module_request } for pid=8605 comm="syz.1.1214" kmod="net-pf-2-proto-9-type-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 904.194725][ T8612] fuse: Bad value for 'user_id' [ 904.195131][ T8612] fuse: Bad value for 'user_id' [ 907.852652][ T8636] FAULT_INJECTION: forcing a failure. [ 907.852652][ T8636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 907.855860][ T8636] CPU: 0 UID: 0 PID: 8636 Comm: syz.1.1224 Not tainted syzkaller #0 PREEMPT [ 907.855994][ T8636] Hardware name: ARM-Versatile Express [ 907.856020][ T8636] Call trace: [ 907.856064][ T8636] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 907.856171][ T8636] r7:60000013 r6:60000013 r5:822a79b0 r4:00000000 [ 907.856194][ T8636] [<80201af0>] (show_stack) from [<8021e464>] (dump_stack_lvl+0x5c/0x70) [ 907.856244][ T8636] [<8021e408>] (dump_stack_lvl) from [<8021e490>] (dump_stack+0x18/0x1c) [ 907.856371][ T8636] r7:200002c0 r6:00000000 r5:839f0c00 r4:8295121c [ 907.856514][ T8636] [<8021e478>] (dump_stack) from [<809bb0e8>] (should_fail_ex+0x1c0/0x224) [ 907.857043][ T8636] [<809baf28>] (should_fail_ex) from [<809bb160>] (should_fail+0x14/0x18) [ 907.857123][ T8636] r8:00008000 r7:200002c0 r6:eae3de28 r5:00000000 r4:eae3df20 [ 907.857212][ T8636] [<809bb14c>] (should_fail) from [<809bb180>] (should_fail_usercopy+0x1c/0x20) [ 907.857681][ T8636] [<809bb164>] (should_fail_usercopy) from [<815c2b68>] (copy_msghdr_from_user+0x50/0x1e0) [ 907.857849][ T8636] [<815c2b18>] (copy_msghdr_from_user) from [<815c2d70>] (___sys_sendmsg+0x78/0xd0) [ 907.857917][ T8636] r8:00008000 r7:00000000 r6:854eef00 r5:eae3df20 r4:eae3de6c [ 907.857963][ T8636] [<815c2cf8>] (___sys_sendmsg) from [<815c4dfc>] (__sys_sendmsg+0x8c/0xe0) [ 907.858224][ T8636] r9:839f0c00 r8:84f68a80 r7:00008000 r6:200002c0 r5:84f68a81 r4:00000003 [ 907.859120][ T8636] [<815c4d70>] (__sys_sendmsg) from [<815c4e64>] (sys_sendmsg+0x14/0x18) [ 907.859571][ T8636] r8:8020029c r7:00000128 r6:0012ece4 r5:00000000 r4:00000000 [ 907.859824][ T8636] [<815c4e50>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 907.860062][ T8636] Exception stack(0xeae3dfa8 to 0xeae3dff0) [ 907.860130][ T8636] dfa0: 00000000 00000000 00000003 200002c0 00008000 00000000 [ 907.860182][ T8636] dfc0: 00000000 00000000 0012ece4 00000128 003462d8 00000000 00000001 76f210dc [ 907.860222][ T8636] dfe0: 76f20e88 76f20e78 00018ba0 001302e0 [ 908.496209][ T28] kauditd_printk_skb: 96 callbacks suppressed [ 908.497381][ T28] audit: type=1400 audit(908.400:16733): avc: denied { read write } for pid=8639 comm="syz.1.1226" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 908.513790][ T28] audit: type=1400 audit(908.420:16734): avc: denied { read write open } for pid=8639 comm="syz.1.1226" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 908.527812][ T28] audit: type=1400 audit(908.430:16735): avc: denied { mounton } for pid=8639 comm="syz.1.1226" path="/25/file0" dev="tmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 908.547454][ T28] audit: type=1400 audit(908.450:16736): avc: denied { mount } for pid=8639 comm="syz.1.1226" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 908.752195][ T28] audit: type=1400 audit(908.660:16737): avc: denied { execute } for pid=8642 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 908.757276][ T28] audit: type=1400 audit(908.660:16738): avc: denied { execute_no_trans } for pid=8642 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 908.766476][ T28] audit: type=1400 audit(908.670:16739): avc: denied { execute } for pid=8642 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 908.803479][ T28] audit: type=1400 audit(908.710:16740): avc: denied { execmem } for pid=8642 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 908.840372][ T28] audit: type=1400 audit(908.740:16741): avc: denied { read } for pid=8645 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 908.844270][ T28] audit: type=1400 audit(908.750:16742): avc: denied { read open } for pid=8645 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 909.023404][ T263] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 909.124429][ T263] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 909.207951][ T263] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 909.274434][ T263] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 909.518924][ T263] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 909.527164][ T263] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 909.537021][ T263] bond0 (unregistering): Released all slaves [ 909.661153][ T263] hsr_slave_0: left promiscuous mode [ 909.663624][ T263] hsr_slave_1: left promiscuous mode [ 909.682640][ T263] veth1_macvtap: left promiscuous mode [ 909.683284][ T263] veth0_macvtap: left promiscuous mode [ 909.685733][ T263] veth1_vlan: left promiscuous mode [ 909.686617][ T263] veth0_vlan: left promiscuous mode [ 913.535088][ T28] kauditd_printk_skb: 209 callbacks suppressed [ 913.535384][ T28] audit: type=1400 audit(913.440:16952): avc: denied { module_request } for pid=8645 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 913.741585][ T28] audit: type=1400 audit(913.640:16953): avc: denied { read } for pid=8728 comm="syz.1.1229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 913.802520][ T28] audit: type=1400 audit(913.710:16954): avc: denied { ioctl } for pid=8728 comm="syz.1.1229" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0xaf80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.808801][ T28] audit: type=1400 audit(913.710:16955): avc: denied { ioctl } for pid=8728 comm="syz.1.1229" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.840716][ T28] audit: type=1400 audit(913.740:16956): avc: denied { ioctl } for pid=8728 comm="syz.1.1229" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.876760][ T28] audit: type=1400 audit(913.780:16957): avc: denied { write } for pid=8762 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.882760][ T28] audit: type=1400 audit(913.790:16958): avc: denied { write open } for pid=8762 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.912793][ T28] audit: type=1400 audit(913.820:16959): avc: denied { search } for pid=8762 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 913.914966][ T28] audit: type=1400 audit(913.820:16960): avc: denied { search } for pid=8762 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 913.917207][ T28] audit: type=1400 audit(913.820:16961): avc: denied { search } for pid=8762 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 914.433781][ T8784] FAULT_INJECTION: forcing a failure. [ 914.433781][ T8784] name failslab, interval 1, probability 0, space 0, times 0 [ 914.440583][ T8784] CPU: 1 UID: 0 PID: 8784 Comm: syz.1.1230 Not tainted syzkaller #0 PREEMPT [ 914.440740][ T8784] Hardware name: ARM-Versatile Express [ 914.440770][ T8784] Call trace: [ 914.440827][ T8784] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 914.440942][ T8784] r7:60000113 r6:60000113 r5:822a79b0 r4:00000000 [ 914.440967][ T8784] [<80201af0>] (show_stack) from [<8021e464>] (dump_stack_lvl+0x5c/0x70) [ 914.441019][ T8784] [<8021e408>] (dump_stack_lvl) from [<8021e490>] (dump_stack+0x18/0x1c) [ 914.441078][ T8784] r7:00000000 r6:00000000 r5:83fda400 r4:829193d0 [ 914.441098][ T8784] [<8021e478>] (dump_stack) from [<809bb0e8>] (should_fail_ex+0x1c0/0x224) [ 914.441153][ T8784] [<809baf28>] (should_fail_ex) from [<805435f8>] (should_failslab+0x6c/0x94) [ 914.441216][ T8784] r8:00000000 r7:00000000 r6:83001180 r5:00000d40 r4:00000029 [ 914.441240][ T8784] [<8054358c>] (should_failslab) from [<80522fc4>] (__kmalloc_noprof+0xa4/0x39c) [ 914.441288][ T8784] [<80522f20>] (__kmalloc_noprof) from [<807fa3dc>] (tomoyo_encode2+0x64/0xec) [ 914.441357][ T8784] r10:00000fff r9:839adc00 r8:00000000 r7:8340f3b8 r6:86998b68 r5:85c55ffc [ 914.441383][ T8784] r4:85c55fde [ 914.441400][ T8784] [<807fa378>] (tomoyo_encode2) from [<807fa488>] (tomoyo_encode+0x24/0x30) [ 914.441461][ T8784] r9:839adc00 r8:00000000 r7:8340f3b8 r6:86998b68 r5:00001000 r4:85c55fdf [ 914.441486][ T8784] [<807fa464>] (tomoyo_encode) from [<807fa514>] (tomoyo_realpath_from_path+0x80/0x16c) [ 914.441538][ T8784] r5:00001000 r4:85c55000 [ 914.441556][ T8784] [<807fa494>] (tomoyo_realpath_from_path) from [<807f6598>] (tomoyo_path_number_perm+0xcc/0x22c) [ 914.441617][ T8784] r10:00000000 r9:00000003 r8:86998b40 r7:00005452 r6:81cd9ee4 r5:00000004 [ 914.441644][ T8784] r4:86998b68 r3:826ca380 [ 914.441661][ T8784] [<807f64cc>] (tomoyo_path_number_perm) from [<807faeec>] (tomoyo_file_ioctl+0x1c/0x20) [ 914.441723][ T8784] r10:83fda400 r9:00000003 r8:86998b40 r7:200004c0 r6:200004c0 r5:00005452 [ 914.441751][ T8784] r4:86998b40 [ 914.441769][ T8784] [<807faed0>] (tomoyo_file_ioctl) from [<807a6a58>] (security_file_ioctl+0x80/0x1d4) [ 914.441831][ T8784] [<807a69d8>] (security_file_ioctl) from [<8058ff18>] (sys_ioctl+0x4c/0xb5c) [ 914.441891][ T8784] r7:200004c0 r6:00005452 r5:86998b41 r4:00000000 [ 914.441912][ T8784] [<8058fecc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 914.441956][ T8784] Exception stack(0xeb0adfa8 to 0xeb0adff0) [ 914.441998][ T8784] dfa0: 00000000 00000000 00000003 00005452 200004c0 00000000 [ 914.442039][ T8784] dfc0: 00000000 00000000 0012ece4 00000036 003462d8 00000000 00000001 76f210dc [ 914.442073][ T8784] dfe0: 76f20e88 76f20e78 00018ba0 001302e0 [ 914.442113][ T8784] r10:00000036 r9:83fda400 r8:8020029c r7:00000036 r6:0012ece4 r5:00000000 [ 914.442164][ T8784] r4:00000000 [ 914.451523][ T8784] ERROR: Out of memory at tomoyo_realpath_from_path. [ 915.261580][ T8645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 915.274169][ T8645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 917.746385][ T8645] hsr_slave_0: entered promiscuous mode [ 917.749207][ T8645] hsr_slave_1: entered promiscuous mode [ 918.240944][ T6468] usb 2-1: new low-speed USB device number 86 using dummy_hcd [ 918.542255][ T28] kauditd_printk_skb: 368 callbacks suppressed [ 918.542654][ T28] audit: type=1400 audit(918.440:17330): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.580730][ T28] audit: type=1400 audit(918.460:17331): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.581681][ T28] audit: type=1400 audit(918.460:17332): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.590377][ T28] audit: type=1400 audit(918.490:17333): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.590733][ T28] audit: type=1400 audit(918.490:17334): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.595659][ T6468] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 918.614936][ T28] audit: type=1400 audit(918.520:17335): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.618671][ T28] audit: type=1400 audit(918.520:17336): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.702790][ T28] audit: type=1400 audit(918.610:17337): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.706477][ T28] audit: type=1400 audit(918.610:17338): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.721004][ T28] audit: type=1400 audit(918.610:17339): avc: denied { ioctl } for pid=8880 comm="syz.1.1232" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.785023][ T6468] usb 2-1: language id specifier not provided by device, defaulting to English [ 919.724662][ T8645] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 919.807524][ T8645] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 919.839892][ T8645] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 919.919508][ T8645] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 923.622414][ T28] kauditd_printk_skb: 410 callbacks suppressed [ 923.627516][ T28] audit: type=1400 audit(923.530:17750): avc: denied { search } for pid=8997 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.646120][ T28] audit: type=1400 audit(923.550:17751): avc: denied { read } for pid=8997 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.656167][ T28] audit: type=1400 audit(923.560:17752): avc: denied { read open } for pid=8997 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.682595][ T28] audit: type=1400 audit(923.590:17753): avc: denied { search } for pid=8997 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.697670][ T28] audit: type=1400 audit(923.600:17754): avc: denied { search } for pid=8997 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.698319][ T28] audit: type=1400 audit(923.600:17755): avc: denied { search } for pid=8997 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.698711][ T28] audit: type=1400 audit(923.600:17756): avc: denied { read } for pid=8997 comm="cmp" name="resolv.conf.eth2.link" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.699015][ T28] audit: type=1400 audit(923.600:17757): avc: denied { read open } for pid=8997 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.716185][ T28] audit: type=1400 audit(923.620:17758): avc: denied { getattr } for pid=8997 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.732163][ T28] audit: type=1400 audit(923.630:17759): avc: denied { getattr } for pid=8997 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 924.037859][ T6468] usb 2-1: New USB device found, idVendor=04b8, idProduct=0202, bcdDevice= 0.40 [ 924.038276][ T6468] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 924.038665][ T6468] usb 2-1: SerialNumber: syz [ 924.592085][ T8890] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 924.597084][ T8890] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 925.538323][ T8645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 926.842096][ T4608] usb 2-1: USB disconnect, device number 86 [ 928.736316][ T28] kauditd_printk_skb: 388 callbacks suppressed [ 928.736600][ T28] audit: type=1400 audit(928.640:18148): avc: denied { search } for pid=9029 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.736821][ T28] audit: type=1400 audit(928.640:18149): avc: denied { search } for pid=9029 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.736957][ T28] audit: type=1400 audit(928.640:18150): avc: denied { search } for pid=9029 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.737034][ T28] audit: type=1400 audit(928.640:18151): avc: denied { getattr } for pid=9029 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=50 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 928.761994][ T28] audit: type=1400 audit(928.670:18152): avc: denied { search } for pid=9029 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.762485][ T28] audit: type=1400 audit(928.670:18153): avc: denied { search } for pid=9029 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.762591][ T28] audit: type=1400 audit(928.670:18154): avc: denied { search } for pid=9029 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.770471][ T28] audit: type=1400 audit(928.670:18155): avc: denied { search } for pid=9029 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.775484][ T28] audit: type=1400 audit(928.680:18156): avc: denied { remove_name search } for pid=9029 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=50 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 928.785639][ T28] audit: type=1400 audit(928.690:18157): avc: denied { create } for pid=9033 comm="syz.1.1234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 933.752919][ T28] kauditd_printk_skb: 207 callbacks suppressed [ 933.753192][ T28] audit: type=1400 audit(933.660:18365): avc: denied { module_request } for pid=8645 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 934.319955][ T28] audit: type=1400 audit(934.220:18366): avc: denied { search } for pid=9058 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 934.321041][ T28] audit: type=1400 audit(934.220:18367): avc: denied { search } for pid=9058 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 934.321390][ T28] audit: type=1400 audit(934.220:18368): avc: denied { search } for pid=9058 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 934.360514][ T28] audit: type=1400 audit(934.260:18369): avc: denied { sys_module } for pid=8645 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 934.360769][ T28] audit: type=1400 audit(934.260:18370): avc: denied { module_request } for pid=8645 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 934.487508][ T28] audit: type=1400 audit(934.390:18371): avc: denied { search } for pid=9041 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 934.897277][ T28] audit: type=1400 audit(934.800:18372): avc: denied { module_request } for pid=8645 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 935.260363][ T28] audit: type=1400 audit(935.150:18373): avc: denied { write } for pid=9061 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 935.260690][ T28] audit: type=1400 audit(935.160:18374): avc: denied { write open } for pid=9061 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.771158][ T28] kauditd_printk_skb: 537 callbacks suppressed [ 938.771477][ T28] audit: type=1326 audit(938.680:18912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.796471][ T28] audit: type=1326 audit(938.700:18913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.807770][ T28] audit: type=1326 audit(938.710:18914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.821731][ T28] audit: type=1326 audit(938.720:18915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.838644][ T28] audit: type=1326 audit(938.740:18916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.844389][ T28] audit: type=1326 audit(938.750:18917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.855341][ T28] audit: type=1326 audit(938.760:18918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.866952][ T28] audit: type=1326 audit(938.770:18919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.893474][ T28] audit: type=1326 audit(938.780:18920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 938.893889][ T28] audit: type=1326 audit(938.790:18921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9056 comm="syz.1.1239" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1120e8 code=0x7ffc0000 [ 943.784245][ T28] kauditd_printk_skb: 176 callbacks suppressed [ 943.784624][ T28] audit: type=1400 audit(943.670:19098): avc: denied { search } for pid=9085 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 943.784931][ T28] audit: type=1400 audit(943.670:19099): avc: denied { search } for pid=9085 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 944.002273][ T28] audit: type=1400 audit(943.910:19100): avc: denied { search } for pid=9074 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 944.454595][ T8645] veth0_vlan: entered promiscuous mode [ 944.599208][ T8645] veth1_vlan: entered promiscuous mode [ 945.176621][ T8645] veth0_macvtap: entered promiscuous mode [ 945.239457][ T8645] veth1_macvtap: entered promiscuous mode [ 945.518799][ T263] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 945.532337][ T263] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 945.533900][ T263] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 945.535013][ T263] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 945.990940][ T28] audit: type=1400 audit(945.890:19101): avc: denied { mounton } for pid=8645 comm="syz-executor" path="/syzkaller.rwFRli/syz-tmp" dev="vda" ino=817 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 946.002254][ T28] audit: type=1400 audit(945.900:19102): avc: denied { mount } for pid=8645 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 946.014237][ T28] audit: type=1400 audit(945.920:19103): avc: denied { mounton } for pid=8645 comm="syz-executor" path="/syzkaller.rwFRli/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 946.227192][ T28] audit: type=1400 audit(946.130:19104): avc: denied { mounton } for pid=8645 comm="syz-executor" path="/syzkaller.rwFRli/syz-tmp/newroot/proc" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 946.252469][ T28] audit: type=1400 audit(946.150:19105): avc: denied { mount } for pid=8645 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 946.416221][ T28] audit: type=1400 audit(946.320:19106): avc: denied { prog_load } for pid=9079 comm="syz.1.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 946.440738][ T28] audit: type=1400 audit(946.340:19107): avc: denied { mounton } for pid=8645 comm="syz-executor" path="/syzkaller.rwFRli/syz-tmp/newroot/selinux" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 946.547161][ T9088] ------------[ cut here ]------------ [ 946.547974][ T9088] WARNING: kernel/bpf/verifier.c:2793 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.1.1240/9088 [ 946.554439][ T9088] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 946.555573][ T9088] Modules linked in: [ 946.556993][ T9088] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 946.557914][ T9088] CPU: 0 UID: 0 PID: 9088 Comm: syz.1.1240 Not tainted syzkaller #0 PREEMPT [ 946.558316][ T9088] Hardware name: ARM-Versatile Express [ 946.558730][ T9088] Call trace: [ 946.558988][ T9088] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 946.559407][ T9088] r7:8281f940 r6:00000000 r5:822a79b0 r4:00000001 [ 946.559680][ T9088] [<80201af0>] (show_stack) from [<8021e464>] (dump_stack_lvl+0x5c/0x70) [ 946.560434][ T9088] [<8021e408>] (dump_stack_lvl) from [<8021e490>] (dump_stack+0x18/0x1c) [ 946.560948][ T9088] r7:8281f940 r6:00000000 r5:846b4800 r4:82a80d14 [ 946.561293][ T9088] [<8021e478>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 946.561656][ T9088] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 946.562020][ T9088] r7:803e0a34 [ 946.562196][ T9088] [<80202818>] (panic) from [<80250a0c>] (get_taint+0x0/0x1c) [ 946.562975][ T9088] r3:8280c544 r2:00000001 r1:8228e754 r0:8229600c [ 946.563389][ T9088] [<80250994>] (check_panic_on_warn) from [<80250b88>] (__warn+0x98/0x1ac) [ 946.563740][ T9088] [<80250af0>] (__warn) from [<80250e84>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 946.564128][ T9088] r8:00000009 r7:822ae2e8 r6:df9c58c4 r5:846b4800 r4:00000000 [ 946.564420][ T9088] [<80250ca0>] (warn_slowpath_fmt) from [<803e0a34>] (reg_bounds_sanity_check+0x3c0/0x428) [ 946.564881][ T9088] r10:860f0000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822aea90 [ 946.565481][ T9088] r4:85d98230 [ 946.565730][ T9088] [<803e0674>] (reg_bounds_sanity_check) from [<803ed8d4>] (reg_set_min_max+0x1d4/0x298) [ 946.566187][ T9088] r10:00000001 r9:00000010 r8:860f0000 r7:84fe1b10 r6:85d98310 r5:85d98230 [ 946.566626][ T9088] r4:84fe1a30 [ 946.566799][ T9088] [<803ed700>] (reg_set_min_max) from [<803fe504>] (check_cond_jmp_op+0xc7c/0x1980) [ 946.567187][ T9088] r10:85d98000 r9:00000010 r8:830bc900 r7:ffffffff r6:80000000 r5:858b63c0 [ 946.567493][ T9088] r4:df97e0c0 r3:84fe1a30 [ 946.567691][ T9088] [<803fd888>] (check_cond_jmp_op) from [<80404b78>] (do_check_common+0x259c/0x3228) [ 946.568125][ T9088] r10:860f4000 r9:860f0000 r8:df97e0c0 r7:860f6000 r6:00000018 r5:df97e078 [ 946.568445][ T9088] r4:df97e000 [ 946.568616][ T9088] [<804025dc>] (do_check_common) from [<80408778>] (bpf_check+0x2290/0x2d30) [ 946.569025][ T9088] r10:860f6000 r9:00000001 r8:860f0000 r7:00000a7b r6:860f08bc r5:00000000 [ 946.569343][ T9088] r4:00000016 [ 946.569511][ T9088] [<804064e8>] (bpf_check) from [<803d9d7c>] (bpf_prog_load+0x5b8/0xdec) [ 946.569907][ T9088] r10:df97e000 r9:846b4800 r8:8597f330 r7:df9c5d18 r6:00000000 r5:00000000 [ 946.570954][ T9088] r4:df9c5eb0 [ 946.571300][ T9088] [<803d97c4>] (bpf_prog_load) from [<803db5a4>] (__sys_bpf+0x2d8/0x2034) [ 946.572088][ T9088] r10:00000005 r9:00000000 r8:df9c5e50 r7:00000048 r6:846b4800 r5:200054c0 [ 946.572550][ T9088] r4:00000000 [ 946.572786][ T9088] [<803db2cc>] (__sys_bpf) from [<803dd898>] (sys_bpf+0x2c/0x48) [ 946.573319][ T9088] r10:00000182 r9:846b4800 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 946.573747][ T9088] r4:00000000 [ 946.573921][ T9088] [<803dd86c>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 946.574262][ T9088] Exception stack(0xdf9c5fa8 to 0xdf9c5ff0) [ 946.574618][ T9088] 5fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 946.574974][ T9088] 5fc0: 00000000 00000000 00346450 00000182 00346418 00000000 003d0f00 76edf0dc [ 946.575420][ T9088] 5fe0: 76edee88 76edee78 00018ba0 001302e0 [ 946.579010][ T9088] Rebooting in 86400 seconds..