last executing test programs: 19.558282713s ago: executing program 1 (id=4451): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/image_size', 0x2300, 0x0) r1 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/comedi4\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000d, 0x13, r1, 0x0) syz_clone3(&(0x7f00000003c0)={0x385200080, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 18.959474803s ago: executing program 1 (id=4452): mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/devices.allow\x00', 0x189002, 0x40) write$cgroup_devices(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='c '], 0x11) 18.54090401s ago: executing program 1 (id=4453): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x181041, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000340)={0x28, 0x5, r1, 0x0, &(0x7f00000003c0)='a', 0x1, 0xf9d}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000200)={0x28, 0x5, r1, 0x0, &(0x7f0000000a40)="7f", 0x1, 0x4}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f00000002c0)={0x28, 0x6, r1, 0x0, &(0x7f0000ae0000/0x2000)=nil, 0x2000, 0x7}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000300)={0x28, 0x2, r1, 0x0, &(0x7f0000000600)="a1", 0x1, 0x9}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000040)={0x28, 0x2, r1, 0x0, &(0x7f0000000780)='\x00', 0x1, 0xbe9}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f00000001c0)={0x28, 0x6, r1, 0x0, &(0x7f0000000280)="b9", 0x1, 0x121}) ioctl$IOMMU_IOAS_UNMAP(r0, 0x3b86, &(0x7f0000000240)={0x18, r1, 0x8, 0x80000000}) 17.863401945s ago: executing program 1 (id=4455): unshare(0x6a040000) socket(0x10, 0x80002, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="540000002000010000000000000000000200200003000000000000001400110076657468305f6d616376746170000000080002"], 0x54}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 16.903413527s ago: executing program 1 (id=4458): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x275a, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f00000005c0)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x4000095, 0x0) socket(0x8000000010, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @empty}, {}, 0x0, {0x2, 0x0, @multicast1=0xe000cc02}}) 7.245164303s ago: executing program 0 (id=4468): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r2, 0x0, 0x0, 0x20048004, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 6.471577064s ago: executing program 0 (id=4469): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) 5.513600267s ago: executing program 0 (id=4470): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0xe59bca127d81b0fa, 0xc574450d1af7edbc}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x10, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MULTICAST_ROUTER={0x5, 0x19, 0x3}, @IFLA_BRPORT_FLUSH={0x4}]}}}, @IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20044010}, 0x4040) 4.030221475s ago: executing program 0 (id=4471): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000c000000638af8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018240000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) 1.138295105s ago: executing program 1 (id=4472): r0 = syz_usb_connect$uac1(0x0, 0xac, &(0x7f0000000240)=ANY=[@ANYBLOB="12010000000000106b1d010140000102030109029a0003010000000904000000010100000a240100f9ff0201020c24020000000000000800000524050000082407000000009e0c240700000000a3e82f07070d240701040000fd80000000e80924030000000001"], 0x0) syz_usb_control_io(r0, &(0x7f0000000140)={0x2c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0003040000000403"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000001840)={0x14, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_usb_control_io(r0, 0x0, &(0x7f00000008c0)={0x84, &(0x7f0000000000)={0x20, 0x31, 0x2, "ae46"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000a80)={0x84, &(0x7f0000000540)={0x20, 0xd, 0x1, '^'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 689.478904ms ago: executing program 0 (id=4473): unshare(0x8060480) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syzkaller0\x00', 0x10) 0s ago: executing program 0 (id=4474): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x5, 0x2, 0x0, 0x1, 0xcc7, 0xfff, 0x5c95239c, 0x5, 0x3ff, 0x802, 0x1600, 0x1, 0x1, 0x9, 0xe1cb, 0x6, 0x4, 0x3, 0x395, 0x80000089, 0xfffffffe, 0xb, 0xfffffff5, 0xffffeadb, 0x3, 0x3c, 0x0, 0x4, 0x8000000, 0xdffffffa]}) kernel console output (not intermixed with test programs): :sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3543.725001][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 3543.730636][ T29] audit: type=1400 audit(3543.630:27832): avc: denied { create } for pid=22382 comm="syz.0.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3543.753128][ T29] audit: type=1400 audit(3543.660:27833): avc: denied { write } for pid=22382 comm="syz.0.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3543.757694][ T29] audit: type=1400 audit(3543.660:27834): avc: denied { create } for pid=22382 comm="syz.0.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3543.781174][ T29] audit: type=1400 audit(3543.690:27835): avc: denied { ioctl } for pid=22382 comm="syz.0.4183" path="socket:[50303]" dev="sockfs" ino=50303 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3543.911586][ T29] audit: type=1400 audit(3543.820:27836): avc: denied { read } for pid=22379 comm="syz.1.4182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3543.936260][ T29] audit: type=1400 audit(3543.840:27837): avc: denied { write } for pid=22379 comm="syz.1.4182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3543.954495][ T29] audit: type=1400 audit(3543.860:27838): avc: denied { create } for pid=22379 comm="syz.1.4182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3543.976735][ T29] audit: type=1400 audit(3543.880:27839): avc: denied { write } for pid=22379 comm="syz.1.4182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3543.991457][ T29] audit: type=1400 audit(3543.900:27840): avc: denied { create } for pid=22384 comm="syz.0.4184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3544.000985][ T29] audit: type=1400 audit(3543.910:27841): avc: denied { module_request } for pid=22379 comm="syz.1.4182" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3544.288102][T22380] SELinux: Context system_u:object_r:vhost_device_t:s0 is not valid (left unmapped). [ 3548.745466][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 3548.748946][ T29] audit: type=1400 audit(3548.650:27891): avc: denied { ioctl } for pid=22402 comm="syz.0.4189" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0xf50b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3548.834444][ T29] audit: type=1400 audit(3548.730:27892): avc: denied { write } for pid=22402 comm="syz.0.4189" name="ip_tables_targets" dev="proc" ino=4026532779 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3548.835304][ T29] audit: type=1400 audit(3548.730:27893): avc: denied { write } for pid=22402 comm="syz.0.4189" path="/proc/501/net/ip_tables_targets" dev="proc" ino=4026532779 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3548.906625][ T29] audit: type=1400 audit(3548.810:27894): avc: denied { create } for pid=22402 comm="syz.0.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3548.914087][ T29] audit: type=1400 audit(3548.820:27895): avc: denied { create } for pid=22404 comm="syz.1.4190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3548.922107][ T29] audit: type=1400 audit(3548.830:27896): avc: denied { write } for pid=22404 comm="syz.1.4190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3548.945475][ T29] audit: type=1400 audit(3548.850:27897): avc: denied { write } for pid=22404 comm="syz.1.4190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3549.286540][ T29] audit: type=1400 audit(3549.190:27898): avc: denied { create } for pid=22406 comm="syz.0.4191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3549.302726][ T29] audit: type=1400 audit(3549.210:27899): avc: denied { setopt } for pid=22406 comm="syz.0.4191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3549.314470][ T29] audit: type=1400 audit(3549.220:27900): avc: denied { create } for pid=22406 comm="syz.0.4191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3554.220033][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 3554.221691][ T29] audit: type=1400 audit(3554.120:27942): avc: denied { read } for pid=22419 comm="syz.1.4195" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3554.236688][ T29] audit: type=1400 audit(3554.140:27943): avc: denied { read open } for pid=22419 comm="syz.1.4195" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3554.327228][ T29] audit: type=1400 audit(3554.230:27944): avc: denied { create } for pid=22419 comm="syz.1.4195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3554.596564][ T29] audit: type=1400 audit(3554.500:27945): avc: denied { read } for pid=22419 comm="syz.1.4195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3555.057505][ T29] audit: type=1400 audit(3554.960:27946): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.067859][ T29] audit: type=1400 audit(3554.970:27947): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.094291][ T29] audit: type=1400 audit(3555.000:27948): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.507438][ T29] audit: type=1400 audit(3555.410:27949): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.515884][ T29] audit: type=1400 audit(3555.420:27950): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.534463][ T29] audit: type=1400 audit(3555.430:27951): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3560.227543][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 3560.229259][ T29] audit: type=1400 audit(3560.130:28091): avc: denied { create } for pid=22447 comm="syz.0.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3560.241268][ T29] audit: type=1400 audit(3560.150:28092): avc: denied { write } for pid=22447 comm="syz.0.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3560.263970][ T29] audit: type=1400 audit(3560.170:28093): avc: denied { write } for pid=22447 comm="syz.0.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3562.612482][ T29] audit: type=1400 audit(3562.520:28094): avc: denied { write } for pid=22442 comm="syz.1.4201" name="card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.621762][ T29] audit: type=1400 audit(3562.530:28095): avc: denied { write open } for pid=22442 comm="syz.1.4201" path="/dev/dri/card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.645355][ T29] audit: type=1400 audit(3562.550:28096): avc: denied { lock } for pid=22442 comm="syz.1.4201" path="/dev/dri/card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.663824][ T29] audit: type=1400 audit(3562.570:28097): avc: denied { create } for pid=22442 comm="syz.1.4201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3563.059483][ T29] audit: type=1400 audit(3562.960:28098): avc: denied { read write } for pid=22451 comm="syz.0.4204" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3563.061997][ T29] audit: type=1400 audit(3562.960:28099): avc: denied { read write open } for pid=22451 comm="syz.0.4204" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3563.064750][ T29] audit: type=1400 audit(3562.970:28100): avc: denied { ioctl } for pid=22451 comm="syz.0.4204" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3563.082906][T22452] FAULT_INJECTION: forcing a failure. [ 3563.082906][T22452] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3563.084620][T22452] CPU: 0 UID: 0 PID: 22452 Comm: syz.0.4204 Tainted: G L syzkaller #0 PREEMPT [ 3563.084739][T22452] Tainted: [L]=SOFTLOCKUP [ 3563.084761][T22452] Hardware name: ARM-Versatile Express [ 3563.084788][T22452] Call trace: [ 3563.084831][T22452] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3563.084953][T22452] r7:76fcce60 r6:00000000 r5:60000013 r4:82295cd4 [ 3563.084977][T22452] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3563.085035][T22452] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3563.085093][T22452] r5:84c61800 r4:8294fc90 [ 3563.085111][T22452] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 3563.085171][T22452] [<80999e68>] (should_fail_ex) from [<8099a0a4>] (should_fail+0x14/0x18) [ 3563.085241][T22452] r8:85044a80 r7:76fcce60 r6:84cd1000 r5:76fcce60 r4:00000101 [ 3563.085262][T22452] [<8099a090>] (should_fail) from [<8099a0c4>] (should_fail_usercopy+0x1c/0x20) [ 3563.085318][T22452] [<8099a0a8>] (should_fail_usercopy) from [<8109f36c>] (raw_ioctl_init+0x40/0x354) [ 3563.085390][T22452] [<8109f32c>] (raw_ioctl_init) from [<810a0ca8>] (raw_ioctl+0x3e4/0x1238) [ 3563.085465][T22452] r10:84c61800 r9:00000004 r8:85044a80 r7:76fcce60 r6:76fcce60 r5:00000000 [ 3563.085489][T22452] r4:84cd1000 [ 3563.085509][T22452] [<810a08c4>] (raw_ioctl) from [<80585ba8>] (sys_ioctl+0x130/0xba0) [ 3563.085592][T22452] r10:84c61800 r9:00000004 r8:85044a80 r7:76fcce60 r6:85044a81 r5:00000000 [ 3563.085616][T22452] r4:41015500 [ 3563.085635][T22452] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3563.085708][T22452] Exception stack(0xdfb55fa8 to 0xdfb55ff0) [ 3563.085757][T22452] 5fa0: 00000004 76fcce70 00000004 41015500 76fcce60 76fcbe00 [ 3563.085799][T22452] 5fc0: 00000004 76fcce70 76fcbe70 00000036 00000003 76fcce60 00450418 00000000 [ 3563.085830][T22452] 5fe0: 00000000 76fcbde8 002f7000 00131d2c [ 3563.085867][T22452] r10:00000036 r9:84c61800 r8:8020029c r7:00000036 r6:76fcbe70 r5:76fcce70 [ 3563.085889][T22452] r4:00000004 [ 3566.803921][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 3566.808838][ T29] audit: type=1400 audit(3566.710:28133): avc: denied { create } for pid=22464 comm="syz.0.4209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3566.815151][ T29] audit: type=1400 audit(3566.720:28134): avc: denied { write } for pid=22464 comm="syz.0.4209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3566.827901][ T29] audit: type=1400 audit(3566.730:28135): avc: denied { write } for pid=22464 comm="syz.0.4209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3567.091882][ T29] audit: type=1400 audit(3567.000:28136): avc: denied { module_request } for pid=22466 comm="syz.0.4210" kmod=7463705F01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3567.442127][ T29] audit: type=1400 audit(3567.350:28137): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3567.449253][ T29] audit: type=1400 audit(3567.350:28138): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3567.450652][ T29] audit: type=1400 audit(3567.350:28139): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3567.570140][ T29] audit: type=1400 audit(3567.470:28140): avc: denied { read write } for pid=22469 comm="syz.0.4211" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3567.583708][ T29] audit: type=1400 audit(3567.490:28141): avc: denied { read write open } for pid=22469 comm="syz.0.4211" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3567.597486][ T29] audit: type=1400 audit(3567.500:28142): avc: denied { mounton } for pid=22469 comm="syz.0.4211" path="/202/file0" dev="tmpfs" ino=1065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3571.782114][T22495] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22495 comm=syz.1.4219 [ 3571.828772][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 3571.829977][ T29] audit: type=1400 audit(3571.730:28185): avc: denied { create } for pid=22494 comm="syz.1.4219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3571.881538][ T29] audit: type=1400 audit(3571.780:28186): avc: denied { read open } for pid=22494 comm="syz.1.4219" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3572.071969][ T29] audit: type=1400 audit(3571.980:28187): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3572.078933][ T29] audit: type=1400 audit(3571.980:28188): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3572.081859][ T29] audit: type=1400 audit(3571.980:28189): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3572.400777][ T29] audit: type=1400 audit(3572.310:28190): avc: denied { create } for pid=22496 comm="syz.1.4220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3572.411454][ T29] audit: type=1400 audit(3572.320:28191): avc: denied { ioctl } for pid=22496 comm="syz.1.4220" path="socket:[49590]" dev="sockfs" ino=49590 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3572.431847][ T29] audit: type=1400 audit(3572.340:28192): avc: denied { read } for pid=22496 comm="syz.1.4220" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3572.440758][ T29] audit: type=1400 audit(3572.350:28193): avc: denied { read open } for pid=22496 comm="syz.1.4220" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3572.453650][ T29] audit: type=1400 audit(3572.360:28194): avc: denied { create } for pid=22496 comm="syz.1.4220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3572.462742][T22499] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=56 sclass=netlink_audit_socket pid=22499 comm=syz.0.4221 [ 3576.863941][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 3576.865627][ T29] audit: type=1400 audit(3576.770:28241): avc: denied { create } for pid=22522 comm="syz.0.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3576.877808][ T29] audit: type=1400 audit(3576.780:28242): avc: denied { write } for pid=22522 comm="syz.0.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3576.897689][ T29] audit: type=1400 audit(3576.800:28243): avc: denied { write } for pid=22522 comm="syz.0.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3577.421190][ T29] audit: type=1400 audit(3577.320:28244): avc: denied { create } for pid=22522 comm="syz.0.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3577.425737][ T29] audit: type=1400 audit(3577.330:28245): avc: denied { ioctl } for pid=22522 comm="syz.0.4229" path="socket:[50507]" dev="sockfs" ino=50507 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3577.454284][ T29] audit: type=1400 audit(3577.350:28246): avc: denied { bind } for pid=22522 comm="syz.0.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3577.454681][ T29] audit: type=1400 audit(3577.360:28247): avc: denied { write } for pid=22522 comm="syz.0.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3577.827890][ T29] audit: type=1400 audit(3577.730:28248): avc: denied { create } for pid=22525 comm="syz.0.4230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3577.840771][ T29] audit: type=1400 audit(3577.750:28249): avc: denied { write } for pid=22525 comm="syz.0.4230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3577.850313][ T29] audit: type=1400 audit(3577.760:28250): avc: denied { write } for pid=22525 comm="syz.0.4230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3580.970789][T22533] FAULT_INJECTION: forcing a failure. [ 3580.970789][T22533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3580.972519][T22533] CPU: 0 UID: 0 PID: 22533 Comm: syz.0.4232 Tainted: G L syzkaller #0 PREEMPT [ 3580.972621][T22533] Tainted: [L]=SOFTLOCKUP [ 3580.972643][T22533] Hardware name: ARM-Versatile Express [ 3580.972670][T22533] Call trace: [ 3580.972733][T22533] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3580.972851][T22533] r7:00000000 r6:00000000 r5:60000013 r4:82295cd4 [ 3580.972874][T22533] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3580.972935][T22533] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3580.973077][T22533] r5:85968000 r4:8294fc90 [ 3580.973111][T22533] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 3580.973183][T22533] [<80999e68>] (should_fail_ex) from [<8099a0a4>] (should_fail+0x14/0x18) [ 3580.973255][T22533] r8:76facf30 r7:00000000 r6:00000000 r5:e0309f68 r4:00000002 [ 3580.973312][T22533] [<8099a090>] (should_fail) from [<8099a0c4>] (should_fail_usercopy+0x1c/0x20) [ 3580.973374][T22533] [<8099a0a8>] (should_fail_usercopy) from [<805a7414>] (simple_read_from_buffer+0x80/0x13c) [ 3580.973484][T22533] [<805a7394>] (simple_read_from_buffer) from [<8062522c>] (proc_fail_nth_read+0xb8/0x108) [ 3580.973560][T22533] r10:00000001 r9:80625174 r8:00000002 r7:e0309f68 r6:0000000f r5:76facf30 [ 3580.973585][T22533] r4:85968000 r3:e0309e9f [ 3580.973603][T22533] [<80625174>] (proc_fail_nth_read) from [<8056ab70>] (vfs_read+0x98/0x324) [ 3580.973705][T22533] r8:76facf30 r7:e0309f68 r6:85968000 r5:0000000f r4:85044e40 [ 3580.973729][T22533] [<8056aad8>] (vfs_read) from [<8056b880>] (ksys_read+0x74/0xe8) [ 3580.973792][T22533] r10:00000003 r9:85968000 r8:8020029c r7:00000000 r6:00000000 r5:85044e40 [ 3580.973813][T22533] r4:85044e43 [ 3580.973830][T22533] [<8056b80c>] (ksys_read) from [<8056b904>] (sys_read+0x10/0x14) [ 3580.973890][T22533] r7:00000003 r6:00000006 r5:76facf30 r4:0000000f [ 3580.973942][T22533] [<8056b8f4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3580.974001][T22533] Exception stack(0xe0309fa8 to 0xe0309ff0) [ 3580.974044][T22533] 9fa0: 0000000f 76facf30 00000006 76facf30 0000000f 00000000 [ 3580.974082][T22533] 9fc0: 0000000f 76facf30 00000006 00000003 00310000 00000000 00006364 76fad0bc [ 3580.974111][T22533] 9fe0: 00000158 76faced0 000d801c 0013022c [ 3581.466040][T22535] FAULT_INJECTION: forcing a failure. [ 3581.466040][T22535] name failslab, interval 1, probability 0, space 0, times 0 [ 3581.466573][T22535] CPU: 1 UID: 0 PID: 22535 Comm: syz.0.4233 Tainted: G L syzkaller #0 PREEMPT [ 3581.466689][T22535] Tainted: [L]=SOFTLOCKUP [ 3581.466716][T22535] Hardware name: ARM-Versatile Express [ 3581.466744][T22535] Call trace: [ 3581.466800][T22535] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3581.466998][T22535] r7:00000d40 r6:00000000 r5:60000013 r4:82295cd4 [ 3581.467072][T22535] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3581.467136][T22535] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3581.467326][T22535] r5:8596c800 r4:82918a08 [ 3581.467373][T22535] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 3581.467533][T22535] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 3581.467684][T22535] r8:00000000 r7:00000d40 r6:00000019 r5:85988ffd r4:83001240 [ 3581.467753][T22535] [<8053a81c>] (should_failslab) from [<8051548c>] (__kmalloc_noprof+0x9c/0x568) [ 3581.467903][T22535] [<805153f0>] (__kmalloc_noprof) from [<807e44d8>] (tomoyo_encode2+0x64/0xf0) [ 3581.467998][T22535] r10:00000fff r9:830a7400 r8:00000000 r7:85417dd0 r6:85a549e8 r5:85988ffd [ 3581.468156][T22535] r4:85988fef [ 3581.468317][T22535] [<807e4474>] (tomoyo_encode2) from [<807e4588>] (tomoyo_encode+0x24/0x30) [ 3581.468454][T22535] r9:830a7400 r8:00000000 r7:85417dd0 r6:85a549e8 r5:00001000 r4:85988ff0 [ 3581.468474][T22535] [<807e4564>] (tomoyo_encode) from [<807e4614>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3581.468536][T22535] r5:00001000 r4:85988000 [ 3581.468554][T22535] [<807e4594>] (tomoyo_realpath_from_path) from [<807e0714>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3581.468652][T22535] r10:8596c800 r9:00000000 r8:85a549c0 r7:000089b0 r6:00000004 r5:81cd6ac0 [ 3581.468679][T22535] r4:85a549e8 r3:826c2240 [ 3581.468697][T22535] [<807e0648>] (tomoyo_path_number_perm) from [<807e4ff4>] (tomoyo_file_ioctl+0x1c/0x20) [ 3581.468769][T22535] r9:00000004 r8:85a549c0 r7:200019c0 r6:200019c0 r5:000089b0 r4:85a549c0 [ 3581.468863][T22535] [<807e4fd8>] (tomoyo_file_ioctl) from [<80791260>] (security_file_ioctl+0x64/0x1e4) [ 3581.468938][T22535] [<807911fc>] (security_file_ioctl) from [<80585ac4>] (sys_ioctl+0x4c/0xba0) [ 3581.469012][T22535] r7:200019c0 r6:85a549c1 r5:00000000 r4:000089b0 [ 3581.469032][T22535] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3581.469082][T22535] Exception stack(0xe0299fa8 to 0xe0299ff0) [ 3581.469164][T22535] 9fa0: 00000000 00000000 00000004 000089b0 200019c0 00000000 [ 3581.469205][T22535] 9fc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76fce0bc [ 3581.469296][T22535] 9fe0: 76fcdec0 76fcdeb0 000192bc 00132360 [ 3581.469461][T22535] r10:00000036 r9:8596c800 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3581.469629][T22535] r4:00000000 [ 3581.485195][T22535] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3581.915454][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 3581.919396][ T29] audit: type=1400 audit(3581.820:28280): avc: denied { sys_module } for pid=22534 comm="syz.0.4233" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3581.923885][ T29] audit: type=1400 audit(3581.830:28281): avc: denied { module_request } for pid=22534 comm="syz.0.4233" kmod="netpci0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3582.007584][ T29] audit: type=1400 audit(3581.910:28282): avc: denied { read write } for pid=22534 comm="syz.0.4233" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3582.008042][ T29] audit: type=1400 audit(3581.910:28283): avc: denied { read write open } for pid=22534 comm="syz.0.4233" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3582.008943][ T29] audit: type=1400 audit(3581.910:28284): avc: denied { ioctl } for pid=22534 comm="syz.0.4233" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3582.230174][ T29] audit: type=1400 audit(3582.130:28285): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3582.231279][ T29] audit: type=1400 audit(3582.130:28286): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3582.231501][ T29] audit: type=1400 audit(3582.130:28287): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3582.441819][ T29] audit: type=1400 audit(3582.350:28288): avc: denied { create } for pid=22539 comm="syz.1.4234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3582.472098][ T29] audit: type=1400 audit(3582.380:28289): avc: denied { write } for pid=22539 comm="syz.1.4234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3582.532298][T22542] FAULT_INJECTION: forcing a failure. [ 3582.532298][T22542] name failslab, interval 1, probability 0, space 0, times 0 [ 3582.534194][T22542] CPU: 0 UID: 0 PID: 22542 Comm: syz.0.4235 Tainted: G L syzkaller #0 PREEMPT [ 3582.534329][T22542] Tainted: [L]=SOFTLOCKUP [ 3582.534354][T22542] Hardware name: ARM-Versatile Express [ 3582.534381][T22542] Call trace: [ 3582.534427][T22542] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3582.534547][T22542] r7:00000c40 r6:00000000 r5:60000013 r4:82295cd4 [ 3582.534571][T22542] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3582.534633][T22542] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3582.534693][T22542] r5:85b75400 r4:82918a08 [ 3582.534969][T22542] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 3582.535095][T22542] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 3582.535254][T22542] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 3582.535283][T22542] [<8053a81c>] (should_failslab) from [<8051548c>] (__kmalloc_noprof+0x9c/0x568) [ 3582.535351][T22542] [<805153f0>] (__kmalloc_noprof) from [<807e45d0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3582.535458][T22542] r10:85b75400 r9:830a6000 r8:00000000 r7:834e2198 r6:85044568 r5:00001000 [ 3582.535486][T22542] r4:00000000 [ 3582.535509][T22542] [<807e4594>] (tomoyo_realpath_from_path) from [<807e0714>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3582.535600][T22542] r10:85b75400 r9:00000000 r8:85044540 r7:4008af13 r6:00000004 r5:81cd6ac0 [ 3582.535633][T22542] r4:85044568 r3:826c2240 [ 3582.535735][T22542] [<807e0648>] (tomoyo_path_number_perm) from [<807e4ff4>] (tomoyo_file_ioctl+0x1c/0x20) [ 3582.535840][T22542] r9:00000003 r8:85044540 r7:20000040 r6:20000040 r5:4008af13 r4:85044540 [ 3582.535869][T22542] [<807e4fd8>] (tomoyo_file_ioctl) from [<80791260>] (security_file_ioctl+0x64/0x1e4) [ 3582.535987][T22542] [<807911fc>] (security_file_ioctl) from [<80585ac4>] (sys_ioctl+0x4c/0xba0) [ 3582.536063][T22542] r7:20000040 r6:85044541 r5:00000000 r4:4008af13 [ 3582.536087][T22542] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3582.536146][T22542] Exception stack(0xe43d1fa8 to 0xe43d1ff0) [ 3582.536201][T22542] 1fa0: 00000000 00000000 00000003 4008af13 20000040 00000000 [ 3582.536245][T22542] 1fc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76fce0bc [ 3582.536312][T22542] 1fe0: 76fcdec0 76fcdeb0 000192bc 00132360 [ 3582.536352][T22542] r10:00000036 r9:85b75400 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3582.536375][T22542] r4:00000000 [ 3582.564745][T22542] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3586.927534][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 3586.928224][ T29] audit: type=1400 audit(3586.830:28356): avc: denied { write } for pid=22560 comm="syz.0.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3586.929156][ T29] audit: type=1400 audit(3586.830:28357): avc: denied { create } for pid=22560 comm="syz.0.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3586.948988][ T29] audit: type=1400 audit(3586.850:28358): avc: denied { write } for pid=22560 comm="syz.0.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3586.953564][ T29] audit: type=1400 audit(3586.860:28359): avc: denied { write } for pid=22560 comm="syz.0.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3587.199071][ T29] audit: type=1400 audit(3587.100:28360): avc: denied { read } for pid=22564 comm="syz.1.4243" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3587.203555][ T29] audit: type=1400 audit(3587.110:28361): avc: denied { read open } for pid=22564 comm="syz.1.4243" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3587.239201][ T29] audit: type=1400 audit(3587.140:28362): avc: denied { create } for pid=22564 comm="syz.1.4243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3587.371599][ T29] audit: type=1400 audit(3587.270:28363): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3587.387652][ T29] audit: type=1400 audit(3587.290:28364): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3587.418151][ T29] audit: type=1400 audit(3587.320:28365): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3592.036503][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 3592.038000][ T29] audit: type=1400 audit(3591.940:28439): avc: denied { create } for pid=22586 comm="syz.0.4250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3592.055271][ T29] audit: type=1400 audit(3591.960:28440): avc: denied { write } for pid=22586 comm="syz.0.4250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3592.077911][ T29] audit: type=1400 audit(3591.980:28441): avc: denied { module_request } for pid=22586 comm="syz.0.4250" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3592.443349][ T29] audit: type=1400 audit(3592.340:28442): avc: denied { create } for pid=22586 comm="syz.0.4250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3592.449985][ T29] audit: type=1400 audit(3592.350:28443): avc: denied { module_request } for pid=22586 comm="syz.0.4250" kmod="net-pf-2-proto-4-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3592.611322][ T29] audit: type=1400 audit(3592.520:28444): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3592.615134][ T29] audit: type=1400 audit(3592.520:28445): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3592.632112][ T29] audit: type=1400 audit(3592.530:28446): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3592.861233][ T29] audit: type=1400 audit(3592.770:28447): avc: denied { module_request } for pid=22586 comm="syz.0.4250" kmod="net-pf-2-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3592.962892][ T29] audit: type=1400 audit(3592.870:28448): avc: denied { map_create } for pid=22586 comm="syz.0.4250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3594.484801][T22601] FAULT_INJECTION: forcing a failure. [ 3594.484801][T22601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3594.489295][T22601] CPU: 0 UID: 0 PID: 22601 Comm: syz.1.4254 Tainted: G L syzkaller #0 PREEMPT [ 3594.489438][T22601] Tainted: [L]=SOFTLOCKUP [ 3594.489463][T22601] Hardware name: ARM-Versatile Express [ 3594.489493][T22601] Call trace: [ 3594.489540][T22601] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3594.489676][T22601] r7:00000000 r6:00000000 r5:60000113 r4:82295cd4 [ 3594.489701][T22601] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3594.489763][T22601] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3594.489825][T22601] r5:85968000 r4:8294fc90 [ 3594.489845][T22601] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 3594.489920][T22601] [<80999e68>] (should_fail_ex) from [<8099a0a4>] (should_fail+0x14/0x18) [ 3594.489996][T22601] r8:76fd4f30 r7:00000000 r6:00000000 r5:ea611f68 r4:00000002 [ 3594.490017][T22601] [<8099a090>] (should_fail) from [<8099a0c4>] (should_fail_usercopy+0x1c/0x20) [ 3594.490077][T22601] [<8099a0a8>] (should_fail_usercopy) from [<805a7414>] (simple_read_from_buffer+0x80/0x13c) [ 3594.490141][T22601] [<805a7394>] (simple_read_from_buffer) from [<8062522c>] (proc_fail_nth_read+0xb8/0x108) [ 3594.490219][T22601] r10:00000001 r9:80625174 r8:00000002 r7:ea611f68 r6:0000000f r5:76fd4f30 [ 3594.490248][T22601] r4:85968000 r3:ea611e9f [ 3594.490268][T22601] [<80625174>] (proc_fail_nth_read) from [<8056ab70>] (vfs_read+0x98/0x324) [ 3594.490339][T22601] r8:76fd4f30 r7:ea611f68 r6:85968000 r5:0000000f r4:85044000 [ 3594.490361][T22601] [<8056aad8>] (vfs_read) from [<8056b880>] (ksys_read+0x74/0xe8) [ 3594.490433][T22601] r10:00000003 r9:85968000 r8:8020029c r7:00000000 r6:00000000 r5:85044000 [ 3594.490459][T22601] r4:85044000 [ 3594.490479][T22601] [<8056b80c>] (ksys_read) from [<8056b904>] (sys_read+0x10/0x14) [ 3594.490543][T22601] r7:00000003 r6:00000006 r5:76fd4f30 r4:0000000f [ 3594.490566][T22601] [<8056b8f4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3594.490648][T22601] Exception stack(0xea611fa8 to 0xea611ff0) [ 3594.490697][T22601] 1fa0: 0000000f 76fd4f30 00000006 76fd4f30 0000000f 00000000 [ 3594.490742][T22601] 1fc0: 0000000f 76fd4f30 00000006 00000003 00310000 00000000 00006364 76fd50bc [ 3594.490791][T22601] 1fe0: 00000158 76fd4ed0 000d801c 0013022c [ 3595.743677][T22612] fuse: Unknown parameter 'rootmoje' [ 3597.090698][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 3597.096055][ T29] audit: type=1400 audit(3597.000:28518): avc: denied { create } for pid=22620 comm="syz.0.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3597.126094][ T29] audit: type=1400 audit(3597.030:28519): avc: denied { read } for pid=22620 comm="syz.0.4262" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3597.129951][ T29] audit: type=1400 audit(3597.030:28520): avc: denied { read open } for pid=22620 comm="syz.0.4262" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3597.163500][ T29] audit: type=1400 audit(3597.070:28521): avc: denied { create } for pid=22620 comm="syz.0.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3597.182068][ T29] audit: type=1400 audit(3597.090:28522): avc: denied { read } for pid=22620 comm="syz.0.4262" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3597.188119][ T29] audit: type=1400 audit(3597.090:28523): avc: denied { read open } for pid=22620 comm="syz.0.4262" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3597.200481][ T29] audit: type=1400 audit(3597.100:28524): avc: denied { create } for pid=22620 comm="syz.0.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3597.209330][ T29] audit: type=1400 audit(3597.110:28525): avc: denied { write } for pid=22620 comm="syz.0.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3597.214842][ T29] audit: type=1400 audit(3597.120:28526): avc: denied { create } for pid=22620 comm="syz.0.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3597.228881][ T29] audit: type=1400 audit(3597.130:28527): avc: denied { create } for pid=22619 comm="syz.1.4261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3602.124377][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 3602.125400][ T29] audit: type=1400 audit(3602.030:28599): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3602.127102][ T29] audit: type=1400 audit(3602.030:28600): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3602.131710][ T29] audit: type=1400 audit(3602.030:28601): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3602.322412][ T29] audit: type=1400 audit(3602.230:28602): avc: denied { create } for pid=22644 comm="syz.0.4269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3602.345303][ T29] audit: type=1400 audit(3602.250:28603): avc: denied { write } for pid=22644 comm="syz.0.4269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3602.373727][ T29] audit: type=1400 audit(3602.280:28604): avc: denied { write } for pid=22644 comm="syz.0.4269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3602.539909][ T29] audit: type=1400 audit(3602.440:28605): avc: denied { create } for pid=22646 comm="syz.1.4270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3602.559252][ T29] audit: type=1400 audit(3602.460:28606): avc: denied { getattr } for pid=22646 comm="syz.1.4270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3602.897635][ T29] audit: type=1400 audit(3602.800:28607): avc: denied { create } for pid=22644 comm="syz.0.4269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3602.906200][ T29] audit: type=1400 audit(3602.810:28608): avc: denied { bind } for pid=22644 comm="syz.0.4269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3607.344867][ T29] kauditd_printk_skb: 181 callbacks suppressed [ 3607.349111][ T29] audit: type=1400 audit(3607.250:28790): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3607.394472][ T29] audit: type=1400 audit(3607.300:28791): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3607.411623][ T29] audit: type=1400 audit(3607.320:28792): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3607.434881][ T29] audit: type=1400 audit(3607.340:28793): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3607.495712][ T29] audit: type=1400 audit(3607.400:28794): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3607.627354][ T29] audit: type=1400 audit(3607.530:28795): avc: denied { append } for pid=22670 comm="syz.0.4278" name="audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3607.627835][ T29] audit: type=1400 audit(3607.530:28796): avc: denied { append open } for pid=22670 comm="syz.0.4278" path="/dev/audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3607.664997][ T29] audit: type=1400 audit(3607.570:28797): avc: denied { create } for pid=22670 comm="syz.0.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3607.671588][ T29] audit: type=1400 audit(3607.580:28798): avc: denied { write } for pid=22670 comm="syz.0.4278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3607.679396][ T29] audit: type=1400 audit(3607.580:28799): avc: denied { module_request } for pid=22670 comm="syz.0.4278" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3612.522942][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 3612.526508][ T29] audit: type=1400 audit(3612.430:28960): avc: denied { read } for pid=22691 comm="syz.0.4284" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3612.529168][ T29] audit: type=1400 audit(3612.430:28961): avc: denied { read open } for pid=22691 comm="syz.0.4284" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3612.536119][ T29] audit: type=1400 audit(3612.440:28962): avc: denied { read } for pid=22691 comm="syz.0.4284" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3612.542077][ T29] audit: type=1400 audit(3612.450:28963): avc: denied { read open } for pid=22691 comm="syz.0.4284" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3612.551117][T22692] FAULT_INJECTION: forcing a failure. [ 3612.551117][T22692] name failslab, interval 1, probability 0, space 0, times 0 [ 3612.551646][T22692] CPU: 0 UID: 0 PID: 22692 Comm: syz.0.4284 Tainted: G L syzkaller #0 PREEMPT [ 3612.551744][T22692] Tainted: [L]=SOFTLOCKUP [ 3612.551776][T22692] Hardware name: ARM-Versatile Express [ 3612.551800][T22692] Call trace: [ 3612.551855][T22692] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3612.551972][T22692] r7:00000c40 r6:00000000 r5:60000013 r4:82295cd4 [ 3612.551994][T22692] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3612.552074][T22692] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3612.552141][T22692] r5:85b74800 r4:82918a08 [ 3612.552157][T22692] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 3612.552219][T22692] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 3612.552369][T22692] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 3612.552397][T22692] [<8053a81c>] (should_failslab) from [<8051548c>] (__kmalloc_noprof+0x9c/0x568) [ 3612.552460][T22692] [<805153f0>] (__kmalloc_noprof) from [<807e45d0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3612.552544][T22692] r10:85b74800 r9:830a6000 r8:00000000 r7:834e2198 r6:850449e8 r5:00001000 [ 3612.552569][T22692] r4:00000000 [ 3612.552587][T22692] [<807e4594>] (tomoyo_realpath_from_path) from [<807e0714>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3612.552661][T22692] r10:85b74800 r9:00000000 r8:850449c0 r7:c0186405 r6:00000004 r5:81cd6ac0 [ 3612.552686][T22692] r4:850449e8 r3:826c2240 [ 3612.552766][T22692] [<807e0648>] (tomoyo_path_number_perm) from [<807e4ff4>] (tomoyo_file_ioctl+0x1c/0x20) [ 3612.552850][T22692] r9:00000003 r8:850449c0 r7:20000140 r6:20000140 r5:c0186405 r4:850449c0 [ 3612.552870][T22692] [<807e4fd8>] (tomoyo_file_ioctl) from [<80791260>] (security_file_ioctl+0x64/0x1e4) [ 3612.552953][T22692] [<807911fc>] (security_file_ioctl) from [<80585ac4>] (sys_ioctl+0x4c/0xba0) [ 3612.553033][T22692] r7:20000140 r6:850449c0 r5:00000000 r4:c0186405 [ 3612.553054][T22692] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3612.553107][T22692] Exception stack(0xeab55fa8 to 0xeab55ff0) [ 3612.553252][T22692] 5fa0: 00000000 00000000 00000003 c0186405 20000140 00000000 [ 3612.553316][T22692] 5fc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76fce0bc [ 3612.553351][T22692] 5fe0: 76fcdec0 76fcdeb0 000192bc 00132360 [ 3612.553392][T22692] r10:00000036 r9:85b74800 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3612.553413][T22692] r4:00000000 [ 3612.553443][T22692] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3612.556832][ T29] audit: type=1400 audit(3612.460:28964): avc: denied { ioctl } for pid=22691 comm="syz.0.4284" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x6405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3613.003529][ T29] audit: type=1400 audit(3612.910:28965): avc: denied { read } for pid=22693 comm="syz.0.4285" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3613.005779][ T29] audit: type=1400 audit(3612.910:28966): avc: denied { read open } for pid=22693 comm="syz.0.4285" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3613.027692][ T29] audit: type=1400 audit(3612.930:28967): avc: denied { read } for pid=22693 comm="syz.0.4285" name="event0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3613.041917][ T29] audit: type=1400 audit(3612.950:28968): avc: denied { read open } for pid=22693 comm="syz.0.4285" path="/dev/input/event0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3613.060443][ T29] audit: type=1400 audit(3612.960:28969): avc: denied { ioctl } for pid=22693 comm="syz.0.4285" path="/dev/input/event0" dev="devtmpfs" ino=705 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3617.545047][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 3617.545827][ T29] audit: type=1400 audit(3617.450:29160): avc: denied { read } for pid=22703 comm="syz.0.4289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3617.567332][ T29] audit: type=1400 audit(3617.470:29161): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3617.577691][ T29] audit: type=1400 audit(3617.480:29162): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3617.881756][ T29] audit: type=1400 audit(3617.790:29163): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3617.886839][ T29] audit: type=1400 audit(3617.790:29164): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3617.929973][ T29] audit: type=1400 audit(3617.840:29165): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3617.973256][ T29] audit: type=1400 audit(3617.880:29166): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3618.013742][ T29] audit: type=1400 audit(3617.920:29167): avc: denied { write } for pid=22667 comm="syz.1.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3618.054892][ T29] audit: type=1400 audit(3617.960:29168): avc: denied { create } for pid=22708 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3618.091172][ T29] audit: type=1400 audit(3618.000:29169): avc: denied { write } for pid=22708 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3622.549634][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 3622.559623][ T29] audit: type=1400 audit(3622.440:29238): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3622.560364][ T29] audit: type=1400 audit(3622.460:29239): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3622.615711][ T29] audit: type=1400 audit(3622.520:29240): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3622.802308][ T29] audit: type=1400 audit(3622.710:29241): avc: denied { read } for pid=22720 comm="syz.0.4295" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3622.809031][ T29] audit: type=1400 audit(3622.710:29242): avc: denied { read open } for pid=22720 comm="syz.0.4295" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3622.842074][ T29] audit: type=1400 audit(3622.750:29243): avc: denied { create } for pid=22720 comm="syz.0.4295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3622.872105][ T29] audit: type=1400 audit(3622.770:29244): avc: denied { create } for pid=22720 comm="syz.0.4295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3622.949476][ T29] audit: type=1400 audit(3622.850:29245): avc: denied { create } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3623.021228][ T29] audit: type=1400 audit(3622.910:29246): avc: denied { write } for pid=22720 comm="syz.0.4295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3623.338023][ T29] audit: type=1400 audit(3623.240:29247): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3627.691851][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 3627.692527][ T29] audit: type=1400 audit(3627.600:29294): avc: denied { create } for pid=22732 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3627.713005][ T29] audit: type=1400 audit(3627.610:29295): avc: denied { write } for pid=22732 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3627.721222][ T29] audit: type=1400 audit(3627.630:29296): avc: denied { read } for pid=22732 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3627.731744][ T29] audit: type=1400 audit(3627.640:29297): avc: denied { read } for pid=22732 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3627.788184][ T29] audit: type=1400 audit(3627.690:29298): avc: denied { create } for pid=22732 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3627.806853][ T29] audit: type=1400 audit(3627.710:29299): avc: denied { write } for pid=22732 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3627.807260][ T29] audit: type=1400 audit(3627.710:29300): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3627.807360][ T29] audit: type=1400 audit(3627.710:29301): avc: denied { module_request } for pid=22732 comm="syz.0.4298" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3627.866630][ T29] audit: type=1400 audit(3627.770:29302): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3628.034533][ T29] audit: type=1400 audit(3627.940:29303): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.700908][ T29] kauditd_printk_skb: 409 callbacks suppressed [ 3632.703988][ T29] audit: type=1400 audit(3632.610:29713): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.721848][ T29] audit: type=1400 audit(3632.630:29714): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.727114][ T29] audit: type=1400 audit(3632.630:29715): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.751213][ T29] audit: type=1400 audit(3632.660:29716): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.766116][ T29] audit: type=1400 audit(3632.670:29717): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.793543][ T29] audit: type=1400 audit(3632.700:29718): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3632.984338][ T29] audit: type=1400 audit(3632.890:29719): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3633.012081][ T29] audit: type=1400 audit(3632.920:29720): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3633.040846][ T29] audit: type=1400 audit(3632.950:29721): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3633.046602][ T29] audit: type=1400 audit(3632.950:29722): avc: denied { write } for pid=22724 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3637.796587][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 3637.801152][ T29] audit: type=1400 audit(3637.700:29829): avc: denied { write } for pid=22782 comm="syz.0.4318" name="tcp6" dev="proc" ino=4026532785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3637.811526][ T29] audit: type=1400 audit(3637.720:29830): avc: denied { write } for pid=22782 comm="syz.0.4318" path="/proc/718/net/tcp6" dev="proc" ino=4026532785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3637.826871][ T29] audit: type=1400 audit(3637.730:29831): avc: denied { map } for pid=22782 comm="syz.0.4318" path="/proc/718/net/tcp6" dev="proc" ino=4026532785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3637.873084][ T29] audit: type=1400 audit(3637.780:29832): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3637.904687][ T29] audit: type=1400 audit(3637.790:29833): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3637.930259][ T29] audit: type=1400 audit(3637.840:29834): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3638.214160][ T29] audit: type=1400 audit(3638.120:29835): avc: denied { read write } for pid=22784 comm="syz.0.4320" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3638.216638][ T29] audit: type=1400 audit(3638.120:29836): avc: denied { read write open } for pid=22784 comm="syz.0.4320" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3638.592127][ T29] audit: type=1400 audit(3638.500:29837): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3638.595015][ T29] audit: type=1400 audit(3638.500:29838): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.386977][T22810] tap0: tun_chr_ioctl cmd 1074025677 [ 3641.393136][T22810] tap0: linktype set to 517 [ 3642.903960][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 3642.907824][ T29] audit: type=1400 audit(3642.810:29891): avc: denied { map_create } for pid=22822 comm="syz.0.4334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3642.957468][ T29] audit: type=1400 audit(3642.860:29892): avc: denied { map_read map_write } for pid=22822 comm="syz.0.4334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3642.976929][ T29] audit: type=1400 audit(3642.880:29893): avc: denied { prog_load } for pid=22822 comm="syz.0.4334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3642.982475][ T29] audit: type=1400 audit(3642.890:29894): avc: denied { bpf } for pid=22822 comm="syz.0.4334" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3643.056015][ T29] audit: type=1400 audit(3642.960:29895): avc: denied { read write } for pid=22828 comm="syz.1.4336" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3643.074681][ T29] audit: type=1400 audit(3642.980:29896): avc: denied { read write open } for pid=22828 comm="syz.1.4336" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3643.087272][ T29] audit: type=1400 audit(3642.990:29897): avc: denied { ioctl } for pid=22828 comm="syz.1.4336" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3643.133655][ T29] audit: type=1400 audit(3643.040:29898): avc: denied { map_create } for pid=22828 comm="syz.1.4336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3643.217217][ T29] audit: type=1400 audit(3643.120:29899): avc: denied { map_create } for pid=22828 comm="syz.1.4336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3643.227571][ T29] audit: type=1400 audit(3643.130:29900): avc: denied { bpf } for pid=22828 comm="syz.1.4336" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3643.296242][T22830] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 3647.910147][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 3647.911435][ T29] audit: type=1400 audit(3647.820:30019): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3648.413658][ T29] audit: type=1400 audit(3648.320:30020): avc: denied { prog_load } for pid=22864 comm="syz.0.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3648.505307][ T29] audit: type=1400 audit(3648.410:30021): avc: denied { bpf } for pid=22864 comm="syz.0.4348" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3648.979261][ T29] audit: type=1400 audit(3648.880:30022): avc: denied { map_create } for pid=22866 comm="syz.1.4347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3648.981973][ T29] audit: type=1400 audit(3648.880:30023): avc: denied { bpf } for pid=22866 comm="syz.1.4347" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3649.062179][ T29] audit: type=1400 audit(3648.970:30024): avc: denied { map_read map_write } for pid=22866 comm="syz.1.4347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3649.083974][ T29] audit: type=1400 audit(3648.990:30025): avc: denied { prog_load } for pid=22866 comm="syz.1.4347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3649.085702][ T29] audit: type=1400 audit(3648.990:30026): avc: denied { bpf } for pid=22866 comm="syz.1.4347" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3649.087253][ T29] audit: type=1400 audit(3648.990:30027): avc: denied { perfmon } for pid=22866 comm="syz.1.4347" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3649.318962][ T29] audit: type=1400 audit(3649.210:30028): avc: denied { map_create } for pid=22866 comm="syz.1.4347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3652.673068][T22883] .: renamed from macvtap0 (while UP) [ 3653.438185][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 3653.439232][ T29] audit: type=1400 audit(3653.340:30061): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3653.462645][ T29] audit: type=1400 audit(3653.370:30062): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3653.464534][ T29] audit: type=1400 audit(3653.370:30063): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3653.756996][ T29] audit: type=1400 audit(3653.650:30064): avc: denied { create } for pid=22886 comm="syz.0.4355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 3653.760137][ T29] audit: type=1400 audit(3653.650:30065): avc: denied { module_request } for pid=22886 comm="syz.0.4355" kmod="net-pf-35" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3654.586618][ T29] audit: type=1400 audit(3654.490:30066): avc: denied { read } for pid=22889 comm="syz.1.4356" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3654.590377][ T29] audit: type=1400 audit(3654.490:30067): avc: denied { read open } for pid=22889 comm="syz.1.4356" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3654.676188][ T29] audit: type=1400 audit(3654.580:30068): avc: denied { prog_load } for pid=22889 comm="syz.1.4356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3654.729824][ T29] audit: type=1400 audit(3654.640:30069): avc: denied { bpf } for pid=22889 comm="syz.1.4356" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3654.734965][ T29] audit: type=1400 audit(3654.640:30070): avc: denied { perfmon } for pid=22889 comm="syz.1.4356" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3657.278074][T22900] .: renamed from macvtap0 (while UP) [ 3658.379051][T17864] usb 1-1: new high-speed USB device number 55 using dummy_hcd [ 3658.463367][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 3658.466700][ T29] audit: type=1400 audit(3658.370:30146): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.489368][ T29] audit: type=1400 audit(3658.390:30147): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.525436][ T29] audit: type=1400 audit(3658.430:30148): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.655170][ T29] audit: type=1400 audit(3658.560:30149): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.732246][ T29] audit: type=1400 audit(3658.640:30150): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.759418][ T29] audit: type=1400 audit(3658.660:30151): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.882910][ T29] audit: type=1400 audit(3658.790:30152): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.950817][T17864] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 3658.951212][T17864] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 3658.951348][T17864] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 3658.951456][T17864] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3658.951510][T17864] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3658.953979][ T29] audit: type=1400 audit(3658.830:30153): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.969021][ T29] audit: type=1400 audit(3658.870:30154): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3658.971042][ T29] audit: type=1400 audit(3658.880:30155): avc: denied { ioctl } for pid=22905 comm="syz.0.4362" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3659.119783][T17864] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 3659.121130][T17864] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 3659.121494][T17864] usb 1-1: Product: syz [ 3659.121659][T17864] usb 1-1: Manufacturer: syz [ 3659.345791][T17864] cdc_wdm 1-1:1.0: skipping garbage [ 3659.346173][T17864] cdc_wdm 1-1:1.0: skipping garbage [ 3659.391403][T17864] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 3664.757826][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 3664.759367][ T29] audit: type=1400 audit(3664.660:30196): avc: denied { create } for pid=22927 comm="syz.1.4367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3664.798884][ T29] audit: type=1400 audit(3664.700:30197): avc: denied { ioctl } for pid=22927 comm="syz.1.4367" path="socket:[52235]" dev="sockfs" ino=52235 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3665.209659][ T29] audit: type=1400 audit(3665.120:30198): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3665.239686][ T29] audit: type=1400 audit(3665.150:30199): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3665.253280][ T29] audit: type=1400 audit(3665.150:30200): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3665.553548][ T29] audit: type=1400 audit(3665.460:30201): avc: denied { read write } for pid=22929 comm="syz.1.4368" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.556509][ T29] audit: type=1400 audit(3665.460:30202): avc: denied { read write open } for pid=22929 comm="syz.1.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.572451][ T29] audit: type=1400 audit(3665.480:30203): avc: denied { ioctl } for pid=22929 comm="syz.1.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.575997][ T29] audit: type=1400 audit(3665.480:30204): avc: denied { ioctl } for pid=22929 comm="syz.1.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.594469][ T29] audit: type=1400 audit(3665.500:30205): avc: denied { ioctl } for pid=22929 comm="syz.1.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.872091][T22899] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 3666.162976][T22899] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3666.163709][T22899] usb 2-1: New USB device found, idVendor=17ef, idProduct=6047, bcdDevice= 0.00 [ 3666.164308][T22899] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3666.225446][T22899] usb 2-1: config 0 descriptor?? [ 3666.822535][T22899] hid_parser_main: 5 callbacks suppressed [ 3666.823374][T22899] lenovo 0003:17EF:6047.000A: unknown main item tag 0x0 [ 3666.823973][T22899] lenovo 0003:17EF:6047.000A: unknown main item tag 0x0 [ 3666.824570][T22899] lenovo 0003:17EF:6047.000A: unknown main item tag 0x0 [ 3666.825069][T22899] lenovo 0003:17EF:6047.000A: unknown main item tag 0x0 [ 3666.825555][T22899] lenovo 0003:17EF:6047.000A: unknown main item tag 0x0 [ 3666.842198][T22899] lenovo 0003:17EF:6047.000A: hidraw0: USB HID v0.00 Device [HID 17ef:6047] on usb-dummy_hcd.1-1/input0 [ 3667.581473][T22899] lenovo 0003:17EF:6047.000A: Fn-lock setting failed: -71 [ 3667.586610][T22899] lenovo 0003:17EF:6047.000A: Sensitivity setting failed: -71 [ 3667.609649][T22899] usb 2-1: USB disconnect, device number 78 [ 3669.248057][T22952] syzkaller0: entered promiscuous mode [ 3669.258258][T22952] syzkaller0: entered allmulticast mode [ 3669.816454][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 3669.819917][ T29] audit: type=1400 audit(3669.720:30246): avc: denied { create } for pid=22957 comm="syz.1.4370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3669.824559][ T29] audit: type=1400 audit(3669.730:30247): avc: denied { write } for pid=22957 comm="syz.1.4370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3669.839136][ T29] audit: type=1400 audit(3669.740:30248): avc: denied { module_request } for pid=22957 comm="syz.1.4370" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3670.129807][ T29] audit: type=1400 audit(3670.030:30249): avc: denied { read } for pid=22957 comm="syz.1.4370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3670.149031][ T29] audit: type=1400 audit(3670.050:30250): avc: denied { create } for pid=22957 comm="syz.1.4370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3670.153347][ T29] audit: type=1400 audit(3670.060:30251): avc: denied { ioctl } for pid=22957 comm="syz.1.4370" path="socket:[52256]" dev="sockfs" ino=52256 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3670.179754][ T29] audit: type=1400 audit(3670.060:30252): avc: denied { module_request } for pid=22957 comm="syz.1.4370" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3670.489971][ T29] audit: type=1400 audit(3670.390:30253): avc: denied { sys_module } for pid=22957 comm="syz.1.4370" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3670.495223][ T29] audit: type=1400 audit(3670.400:30254): avc: denied { module_request } for pid=22957 comm="syz.1.4370" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3670.683759][ T29] audit: type=1400 audit(3670.590:30255): avc: denied { write } for pid=22957 comm="syz.1.4370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3672.960110][T22879] usb 1-1: USB disconnect, device number 55 [ 3674.774510][T22988] faux_driver vkms: [drm] Unknown color mode 6; guessing buffer size. [ 3674.819647][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 3674.825887][ T29] audit: type=1400 audit(3674.730:30300): avc: denied { read } for pid=22987 comm="syz.1.4377" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3674.840380][ T29] audit: type=1400 audit(3674.740:30301): avc: denied { read open } for pid=22987 comm="syz.1.4377" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3674.858114][ T29] audit: type=1400 audit(3674.760:30302): avc: denied { ioctl } for pid=22987 comm="syz.1.4377" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3674.872934][ T29] audit: type=1400 audit(3674.780:30303): avc: denied { ioctl } for pid=22987 comm="syz.1.4377" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3674.905373][ T29] audit: type=1400 audit(3674.810:30304): avc: denied { ioctl } for pid=22987 comm="syz.1.4377" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3675.051422][ T29] audit: type=1400 audit(3674.960:30305): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3675.057209][ T29] audit: type=1400 audit(3674.960:30306): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3675.073241][ T29] audit: type=1400 audit(3674.980:30307): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3675.307419][ T29] audit: type=1400 audit(3675.210:30308): avc: denied { write } for pid=22990 comm="syz.1.4378" name="tcp" dev="proc" ino=4026532679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3675.312446][ T29] audit: type=1400 audit(3675.220:30309): avc: denied { write } for pid=22990 comm="syz.1.4378" path="/proc/1261/net/tcp" dev="proc" ino=4026532679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3679.823174][T23004] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4383'. [ 3679.823975][T23004] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4383'. [ 3679.927358][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 3679.927757][ T29] audit: type=1400 audit(3679.830:30352): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3679.950706][ T29] audit: type=1400 audit(3679.860:30353): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3679.956740][ T29] audit: type=1400 audit(3679.860:30354): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3680.196410][ T29] audit: type=1400 audit(3680.100:30355): avc: denied { read } for pid=23005 comm="syz.1.4384" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3680.202817][ T29] audit: type=1400 audit(3680.110:30356): avc: denied { read open } for pid=23005 comm="syz.1.4384" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3680.223177][ T29] audit: type=1400 audit(3680.130:30357): avc: denied { create } for pid=23005 comm="syz.1.4384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3680.246706][ T29] audit: type=1400 audit(3680.150:30358): avc: denied { create } for pid=23005 comm="syz.1.4384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3680.262744][ T29] audit: type=1400 audit(3680.170:30359): avc: denied { write } for pid=23005 comm="syz.1.4384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3680.265713][ T29] audit: type=1400 audit(3680.170:30360): avc: denied { module_request } for pid=23005 comm="syz.1.4384" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3680.559242][ T29] audit: type=1400 audit(3680.460:30361): avc: denied { read } for pid=23005 comm="syz.1.4384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3681.864259][T23006] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4384'. [ 3685.125416][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 3685.126719][ T29] audit: type=1400 audit(3685.030:30405): avc: denied { module_request } for pid=23021 comm="syz.1.4387" kmod="crypto-hmac(sm3)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3685.688038][ T29] audit: type=1400 audit(3685.590:30406): avc: denied { unmount } for pid=20398 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3685.943434][ T29] audit: type=1400 audit(3685.850:30407): avc: denied { write } for pid=23032 comm="syz.0.4388" name="tcp" dev="proc" ino=4026532761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3685.946179][ T29] audit: type=1400 audit(3685.850:30408): avc: denied { write } for pid=23032 comm="syz.0.4388" path="/proc/785/net/tcp" dev="proc" ino=4026532761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3686.074972][ T29] audit: type=1400 audit(3685.980:30409): avc: denied { module_request } for pid=23021 comm="syz.1.4387" kmod="crypto-ecb(cipher_null)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3686.208016][ T29] audit: type=1400 audit(3686.110:30410): avc: denied { bpf } for pid=23035 comm="syz.0.4389" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3686.551091][ T29] audit: type=1400 audit(3686.460:30411): avc: denied { module_request } for pid=23021 comm="syz.1.4387" kmod="crypto-ecb(cipher_null)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3686.900411][ T29] audit: type=1400 audit(3686.810:30412): avc: denied { module_request } for pid=23021 comm="syz.1.4387" kmod="crypto-cbc(cast5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3686.919188][ T29] audit: type=1400 audit(3686.810:30413): avc: denied { module_request } for pid=23021 comm="syz.1.4387" kmod="crypto-cbc(cast5)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3686.954520][ T29] audit: type=1400 audit(3686.860:30414): avc: denied { module_request } for pid=23021 comm="syz.1.4387" kmod="crypto-cbc(serpent)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3688.345784][T23059] netlink: 76 bytes leftover after parsing attributes in process `syz.0.4391'. [ 3689.790048][T23068] syzkaller0: entered promiscuous mode [ 3689.790546][T23068] syzkaller0: entered allmulticast mode [ 3690.241092][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 3690.249334][ T29] audit: type=1400 audit(3690.150:30453): avc: denied { sys_module } for pid=23069 comm="syz.1.4395" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3690.249803][ T29] audit: type=1400 audit(3690.150:30454): avc: denied { module_request } for pid=23069 comm="syz.1.4395" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3690.528742][ T29] audit: type=1400 audit(3690.430:30455): avc: denied { write } for pid=23069 comm="syz.1.4395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3690.532131][ T29] audit: type=1400 audit(3690.440:30456): avc: denied { create } for pid=23069 comm="syz.1.4395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3690.542870][ T29] audit: type=1400 audit(3690.450:30457): avc: denied { ioctl } for pid=23069 comm="syz.1.4395" path="socket:[52419]" dev="sockfs" ino=52419 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3690.644902][ T29] audit: type=1400 audit(3690.550:30458): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3690.647057][ T29] audit: type=1400 audit(3690.550:30459): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3690.674014][ T29] audit: type=1400 audit(3690.580:30460): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3690.964803][ T29] audit: type=1400 audit(3690.870:30461): avc: denied { create } for pid=23081 comm="syz.1.4397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3690.986760][ T29] audit: type=1400 audit(3690.890:30462): avc: denied { bind } for pid=23081 comm="syz.1.4397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3691.709091][T22879] usb 2-1: new high-speed USB device number 79 using dummy_hcd [ 3691.875408][T22879] usb 2-1: config 0 has no interfaces? [ 3691.875614][T22879] usb 2-1: New USB device found, idVendor=413c, idProduct=8196, bcdDevice=1f.e0 [ 3691.875669][T22879] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3691.905515][T22879] usb 2-1: config 0 descriptor?? [ 3692.165169][T23087] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3692.166114][T23087] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3692.199206][T22879] usb 2-1: USB disconnect, device number 79 [ 3696.014400][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 3696.016489][ T29] audit: type=1400 audit(3695.920:30548): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3696.039873][ T29] audit: type=1400 audit(3695.930:30549): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3696.041100][ T29] audit: type=1400 audit(3695.940:30550): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3696.496026][ T29] audit: type=1400 audit(3696.400:30551): avc: denied { read write } for pid=23126 comm="syz.1.4409" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.497707][ T29] audit: type=1400 audit(3696.400:30552): avc: denied { read write open } for pid=23126 comm="syz.1.4409" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.505756][ T29] audit: type=1400 audit(3696.410:30553): avc: denied { ioctl } for pid=23126 comm="syz.1.4409" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.513934][ T29] audit: type=1400 audit(3696.410:30554): avc: denied { ioctl } for pid=23126 comm="syz.1.4409" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.602840][ T29] audit: type=1400 audit(3696.480:30555): avc: denied { ioctl } for pid=23126 comm="syz.1.4409" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.640323][ T29] audit: type=1400 audit(3696.550:30556): avc: denied { ioctl } for pid=23126 comm="syz.1.4409" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.685836][ T29] audit: type=1400 audit(3696.590:30557): avc: denied { ioctl } for pid=23126 comm="syz.1.4409" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3696.809514][T22899] usb 2-1: new high-speed USB device number 80 using dummy_hcd [ 3696.969735][T22899] usb 2-1: Using ep0 maxpacket: 8 [ 3697.022918][T22899] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 3697.024247][T22899] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 3697.025472][T22899] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3697.045970][T22899] usb 2-1: config 0 descriptor?? [ 3697.374343][T22899] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 3701.020325][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 3701.023869][ T29] audit: type=1400 audit(3700.920:30618): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.024372][ T29] audit: type=1400 audit(3700.920:30619): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.137470][ T29] audit: type=1400 audit(3701.040:30620): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.203347][ T29] audit: type=1400 audit(3701.110:30621): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.259297][T22899] usb 1-1: new full-speed USB device number 56 using dummy_hcd [ 3701.268993][ T29] audit: type=1400 audit(3701.170:30622): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.273935][ T29] audit: type=1400 audit(3701.180:30623): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.276364][ T29] audit: type=1400 audit(3701.180:30624): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.341754][ T29] audit: type=1400 audit(3701.250:30625): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.427642][ T29] audit: type=1400 audit(3701.330:30626): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.431421][ T29] audit: type=1400 audit(3701.340:30627): avc: denied { ioctl } for pid=23156 comm="syz.0.4415" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3701.461526][T22899] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 3701.462040][T22899] usb 1-1: New USB device found, idVendor=04f3, idProduct=0755, bcdDevice= 0.00 [ 3701.462327][T22899] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3701.495284][T22899] usb 1-1: config 0 descriptor?? [ 3701.570675][T23157] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 3702.124757][T22899] elan 0003:04F3:0755.000B: unknown main item tag 0x0 [ 3702.125317][T22899] elan 0003:04F3:0755.000B: unknown main item tag 0x0 [ 3702.132619][T22899] elan 0003:04F3:0755.000B: unknown main item tag 0x0 [ 3702.132906][T22899] elan 0003:04F3:0755.000B: unknown main item tag 0x0 [ 3702.133028][T22899] elan 0003:04F3:0755.000B: unknown main item tag 0x0 [ 3702.170119][T22899] elan 0003:04F3:0755.000B: hidraw0: USB HID v1.01 Device [HID 04f3:0755] on usb-dummy_hcd.0-1/input0 [ 3702.339797][T22879] usb 1-1: USB disconnect, device number 56 [ 3707.575734][T20818] usb 2-1: USB disconnect, device number 80 [ 3707.769506][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 3707.770627][ T29] audit: type=1400 audit(3707.670:30667): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3707.772467][ T29] audit: type=1400 audit(3707.670:30668): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3707.777261][ T29] audit: type=1400 audit(3707.670:30669): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3708.306059][ T29] audit: type=1400 audit(3708.210:30670): avc: denied { map_create } for pid=23199 comm="syz.1.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3708.362142][ T29] audit: type=1400 audit(3708.270:30671): avc: denied { map_read map_write } for pid=23199 comm="syz.1.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3708.563645][ T29] audit: type=1400 audit(3708.470:30672): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3708.570237][ T29] audit: type=1400 audit(3708.480:30673): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3708.582661][ T29] audit: type=1400 audit(3708.490:30674): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3708.903300][ T29] audit: type=1400 audit(3708.810:30675): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3708.909928][ T29] audit: type=1400 audit(3708.810:30676): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3710.221407][T23208] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4425'. [ 3712.899444][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 3712.901705][ T29] audit: type=1400 audit(3712.800:30726): avc: denied { sys_module } for pid=23215 comm="syz.1.4429" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3712.907728][ T29] audit: type=1400 audit(3712.810:30727): avc: denied { module_request } for pid=23215 comm="syz.1.4429" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3713.129839][ T29] audit: type=1400 audit(3713.030:30728): avc: denied { create } for pid=23215 comm="syz.1.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3713.171428][ T29] audit: type=1400 audit(3713.080:30729): avc: denied { bind } for pid=23215 comm="syz.1.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3713.188110][ T29] audit: type=1400 audit(3713.090:30730): avc: denied { setopt } for pid=23215 comm="syz.1.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3713.204790][ T29] audit: type=1400 audit(3713.110:30731): avc: denied { setopt } for pid=23215 comm="syz.1.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3713.231594][ T29] audit: type=1400 audit(3713.140:30732): avc: denied { write } for pid=23215 comm="syz.1.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3713.395975][ T29] audit: type=1400 audit(3713.300:30733): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3713.406325][ T29] audit: type=1400 audit(3713.300:30734): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3713.413552][ T29] audit: type=1400 audit(3713.320:30735): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3714.749660][T22879] usb 2-1: new high-speed USB device number 81 using dummy_hcd [ 3714.909007][T22879] usb 2-1: Using ep0 maxpacket: 32 [ 3714.956643][T22879] usb 2-1: New USB device found, idVendor=055f, idProduct=d001, bcdDevice=88.92 [ 3714.957801][T22879] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3714.987751][T22879] usb 2-1: config 0 descriptor?? [ 3717.760089][T22773] usb 1-1: new high-speed USB device number 57 using dummy_hcd [ 3717.909914][T22773] usb 1-1: Using ep0 maxpacket: 16 [ 3717.915714][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 3717.937912][ T29] audit: type=1400 audit(3717.820:30777): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3717.954503][ T29] audit: type=1400 audit(3717.860:30778): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.002062][ T29] audit: type=1400 audit(3717.890:30779): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.036881][ T29] audit: type=1400 audit(3717.940:30780): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.063418][ T29] audit: type=1400 audit(3717.960:30781): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.076635][T22773] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 129, using maximum allowed: 30 [ 3718.076930][T22773] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3718.077060][T22773] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3718.077177][T22773] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 129 [ 3718.077259][T22773] usb 1-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 3718.077336][T22773] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3718.104486][ T29] audit: type=1400 audit(3718.000:30782): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.112569][T22773] usb 1-1: config 0 descriptor?? [ 3718.159083][ T29] audit: type=1400 audit(3718.060:30783): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.228827][ T29] audit: type=1400 audit(3718.130:30784): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.284191][ T29] audit: type=1400 audit(3718.180:30785): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.329341][ T29] audit: type=1400 audit(3718.220:30786): avc: denied { ioctl } for pid=23235 comm="syz.0.4434" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3718.857142][T22773] input: HID 0458:5013 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0458:5013.000C/input/input24 [ 3718.973099][T22773] input: HID 0458:5013 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0458:5013.000C/input/input25 [ 3719.049976][T22773] kye 0003:0458:5013.000C: input,hiddev0,hidraw0: USB HID vff.fa Device [HID 0458:5013] on usb-dummy_hcd.0-1/input0 [ 3719.096893][T22773] usb 1-1: USB disconnect, device number 57 [ 3720.850836][T20941] usb 1-1: new high-speed USB device number 58 using dummy_hcd [ 3721.096935][T20941] usb 1-1: too many configurations: 17, using maximum allowed: 8 [ 3721.449019][T20941] usb 1-1: New USB device found, idVendor=0547, idProduct=0201, bcdDevice=11.64 [ 3721.449256][T20941] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3721.453972][T20941] usb 1-1: Product: syz [ 3721.454012][T20941] usb 1-1: Manufacturer: syz [ 3721.454028][T20941] usb 1-1: SerialNumber: syz [ 3721.472032][T20941] usb 1-1: config 0 descriptor?? [ 3725.276670][T22860] usb 2-1: USB disconnect, device number 81 [ 3725.436619][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 3725.440541][ T29] audit: type=1400 audit(3725.340:30865): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3725.461864][ T29] audit: type=1400 audit(3725.360:30866): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3725.486181][ T29] audit: type=1400 audit(3725.390:30867): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3726.063784][ T29] audit: type=1400 audit(3725.970:30868): avc: denied { read write } for pid=23291 comm="syz.1.4439" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3726.066624][ T29] audit: type=1400 audit(3725.970:30869): avc: denied { read write open } for pid=23291 comm="syz.1.4439" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3726.280834][ T29] audit: type=1400 audit(3726.190:30870): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3726.285109][ T29] audit: type=1400 audit(3726.190:30871): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3726.303975][ T29] audit: type=1400 audit(3726.210:30872): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3727.050790][ T29] audit: type=1400 audit(3726.960:30873): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3727.056781][ T29] audit: type=1400 audit(3726.960:30874): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3728.829655][T23277] i2c i2c-1: died at extended address code [ 3729.698881][T20818] usb 2-1: new high-speed USB device number 82 using dummy_hcd [ 3729.872951][T22879] usb 1-1: USB disconnect, device number 58 [ 3730.239814][T20818] usb 2-1: unable to get BOS descriptor or descriptor too short [ 3730.240458][T20818] usb 2-1: no configurations [ 3730.240550][T20818] usb 2-1: can't read configurations, error -22 [ 3730.451583][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 3730.455064][ T29] audit: type=1400 audit(3730.360:30905): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3730.489952][ T29] audit: type=1400 audit(3730.370:30906): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3730.495245][ T29] audit: type=1400 audit(3730.400:30907): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3730.933575][ T29] audit: type=1400 audit(3730.840:30908): avc: denied { name_bind } for pid=23317 comm="syz.1.4445" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3730.950816][ T29] audit: type=1400 audit(3730.860:30909): avc: denied { node_bind } for pid=23317 comm="syz.1.4445" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3731.182793][ T29] audit: type=1400 audit(3731.090:30910): avc: denied { read write } for pid=18735 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3731.204370][ T29] audit: type=1400 audit(3731.100:30911): avc: denied { read write open } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3731.230158][ T29] audit: type=1400 audit(3731.120:30912): avc: denied { ioctl } for pid=18735 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3731.244184][ T29] audit: type=1400 audit(3731.150:30913): avc: denied { read } for pid=23321 comm="syz.0.4447" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3731.249895][ T29] audit: type=1400 audit(3731.160:30914): avc: denied { read open } for pid=23321 comm="syz.0.4447" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.901975][T20941] usb 1-1: new high-speed USB device number 59 using dummy_hcd [ 3733.097120][T20941] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3733.098809][T20941] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 3733.100303][T20941] usb 1-1: New USB device found, idVendor=056e, idProduct=00fc, bcdDevice= 0.00 [ 3733.106511][T20941] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3733.124114][T20941] usb 1-1: config 0 descriptor?? [ 3733.655076][T20941] elecom 0003:056E:00FC.000D: unknown main item tag 0x0 [ 3733.659265][T20941] elecom 0003:056E:00FC.000D: unknown main item tag 0x0 [ 3733.661408][T20941] elecom 0003:056E:00FC.000D: unknown main item tag 0x0 [ 3733.662417][T20941] elecom 0003:056E:00FC.000D: unknown main item tag 0x0 [ 3733.663356][T20941] elecom 0003:056E:00FC.000D: unknown main item tag 0x0 [ 3733.685553][T20941] elecom 0003:056E:00FC.000D: hidraw0: USB HID v0.00 Device [HID 056e:00fc] on usb-dummy_hcd.0-1/input0 [ 3733.863631][T20941] usb 1-1: USB disconnect, device number 59 [ 3734.353732][T23360] hsr0: entered promiscuous mode [ 3734.362935][T23360] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4454'. [ 3734.370305][T23360] hsr_slave_0: left promiscuous mode [ 3734.391219][T23360] hsr_slave_1: left promiscuous mode [ 3734.405342][T23360] hsr0 (unregistering): left promiscuous mode [ 3734.923078][T23366] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4455'. [ 3735.587457][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 3735.591925][ T29] audit: type=1400 audit(3735.490:30997): avc: denied { create } for pid=23391 comm="syz.1.4458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.622771][ T29] audit: type=1400 audit(3735.520:30998): avc: denied { connect } for pid=23391 comm="syz.1.4458" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.669624][ T29] audit: type=1400 audit(3735.570:30999): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.680793][ T29] audit: type=1400 audit(3735.590:31000): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.693224][ T29] audit: type=1400 audit(3735.590:31001): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.702241][ T29] audit: type=1400 audit(3735.610:31002): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.731638][ T29] audit: type=1400 audit(3735.610:31003): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.772511][ T29] audit: type=1400 audit(3735.680:31004): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.778112][ T29] audit: type=1400 audit(3735.680:31005): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3735.790566][ T29] audit: type=1400 audit(3735.690:31006): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.590190][ T29] kauditd_printk_skb: 411 callbacks suppressed [ 3740.599636][ T29] audit: type=1400 audit(3740.470:31418): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.611210][ T29] audit: type=1400 audit(3740.490:31419): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.614781][ T29] audit: type=1400 audit(3740.520:31420): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.652162][ T29] audit: type=1400 audit(3740.560:31421): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.655949][ T29] audit: type=1400 audit(3740.560:31422): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.711428][ T29] audit: type=1400 audit(3740.620:31423): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.715534][ T29] audit: type=1400 audit(3740.620:31424): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.748059][ T29] audit: type=1400 audit(3740.620:31425): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.773541][ T29] audit: type=1400 audit(3740.680:31426): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3740.801311][ T29] audit: type=1400 audit(3740.710:31427): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3741.390659][T23410] process 'syz.0.4465' launched './file1' with NULL argv: empty string added [ 3741.849719][T21286] usb 1-1: new full-speed USB device number 60 using dummy_hcd [ 3742.141517][T21286] usb 1-1: not running at top speed; connect to a high speed hub [ 3742.283102][T21286] usb 1-1: config 1 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 3742.283386][T21286] usb 1-1: config 1 interface 0 has no altsetting 0 [ 3742.430234][T21286] usb 1-1: New USB device found, idVendor=05ac, idProduct=0236, bcdDevice= 0.40 [ 3742.430628][T21286] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3742.434547][T21286] usb 1-1: Product: syz [ 3742.434861][T21286] usb 1-1: Manufacturer: syz [ 3742.435057][T21286] usb 1-1: SerialNumber: syz [ 3742.832468][T21286] input: bcm5974 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/input/input26 [ 3742.856425][T21286] bcm5974 1-1:1.0: could not read from device [ 3742.929661][T21286] input: failed to attach handler mousedev to device input26, error: -5 [ 3743.019738][T21286] usb 1-1: USB disconnect, device number 60 [ 3745.600471][ T29] kauditd_printk_skb: 284 callbacks suppressed [ 3745.603109][ T29] audit: type=1400 audit(3745.510:31712): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.608158][ T29] audit: type=1400 audit(3745.510:31713): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.666785][ T29] audit: type=1400 audit(3745.570:31714): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.703551][ T29] audit: type=1400 audit(3745.610:31715): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.709104][ T29] audit: type=1400 audit(3745.610:31716): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.759000][ T29] audit: type=1400 audit(3745.660:31717): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.789310][ T29] audit: type=1400 audit(3745.690:31718): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.834712][ T29] audit: type=1400 audit(3745.740:31719): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.873844][ T29] audit: type=1400 audit(3745.780:31720): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3745.884318][ T29] audit: type=1400 audit(3745.790:31721): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.620503][ T29] kauditd_printk_skb: 364 callbacks suppressed [ 3750.625048][ T29] audit: type=1400 audit(3750.530:32086): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.625434][ T29] audit: type=1400 audit(3750.530:32087): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.660996][ T29] audit: type=1400 audit(3750.550:32088): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.661545][ T29] audit: type=1400 audit(3750.560:32089): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.664982][ T29] audit: type=1400 audit(3750.560:32090): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.665064][ T29] audit: type=1400 audit(3750.560:32091): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.675343][ T29] audit: type=1400 audit(3750.580:32092): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.681481][ T29] audit: type=1400 audit(3750.590:32093): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.689870][ T29] audit: type=1400 audit(3750.590:32094): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3750.696155][ T29] audit: type=1400 audit(3750.600:32095): avc: denied { write } for pid=23391 comm="syz.1.4458" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3752.239208][T20818] usb 2-1: new high-speed USB device number 84 using dummy_hcd [ 3752.438954][T20818] usb 2-1: Using ep0 maxpacket: 16 [ 3752.557583][T20818] usb 2-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 3752.558881][T20818] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 3752.559712][T20818] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 3752.755654][T23453] 8<--- cut here --- [ 3752.756304][T23453] Unable to handle kernel paging request at virtual address fee04f2a when write [ 3752.793525][T23453] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 3752.795341][T23453] Internal error: Oops: a06 [#1] SMP ARM [ 3752.798513][T23453] Modules linked in: [ 3752.799617][T23453] CPU: 1 UID: 0 PID: 23453 Comm: syz.0.4474 Tainted: G L syzkaller #0 PREEMPT [ 3752.800751][T23453] Tainted: [L]=SOFTLOCKUP [ 3752.801403][T23453] Hardware name: ARM-Versatile Express [ 3752.802321][T23453] PC is at subdev_8255_io+0x60/0x6c [ 3752.803689][T23453] LR is at subdev_8255_io+0x4c/0x6c [ 3752.804642][T23453] pc : [<8141653c>] lr : [<81416528>] psr: 60000013 [ 3752.805722][T23453] sp : eaf05cb0 ip : eaf05cb0 fp : eaf05ccc [ 3752.806925][T23453] r10: 00000001 r9 : 00000084 r8 : eaf05d9c [ 3752.807645][T23453] r7 : 00004f27 r6 : 0000009b r5 : 844d69c0 r4 : 00004f2a [ 3752.808629][T23453] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 844d69c0 [ 3752.809376][T23453] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 3752.810674][T23453] Control: 30c5387d Table: 8530a980 DAC: 00000000 [ 3752.811925][T23453] Register r0 information: slab kmalloc-192 start 844d69c0 pointer offset 0 size 192 [ 3752.814545][T23453] Register r1 information: non-paged memory [ 3752.816164][T23453] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 3752.817438][T23453] Register r3 information: non-paged memory [ 3752.818088][T23453] Register r4 information: non-paged memory [ 3752.818481][T23453] Register r5 information: slab kmalloc-192 start 844d69c0 pointer offset 0 size 192 [ 3752.819742][T23453] Register r6 information: non-paged memory [ 3752.820670][T23453] Register r7 information: non-paged memory [ 3752.821593][T23453] Register r8 information: 2-page vmalloc region starting at 0xeaf04000 allocated at kernel_clone+0xac/0x3ec [ 3752.823113][T23453] Register r9 information: non-paged memory [ 3752.824130][T23453] Register r10 information: non-paged memory [ 3752.825240][T23453] Register r11 information: 2-page vmalloc region starting at 0xeaf04000 allocated at kernel_clone+0xac/0x3ec [ 3752.827044][T23453] Register r12 information: 2-page vmalloc region starting at 0xeaf04000 allocated at kernel_clone+0xac/0x3ec [ 3752.828796][T23453] Process syz.0.4474 (pid: 23453, stack limit = 0xeaf04000) [ 3752.829527][T23453] Stack: (0xeaf05cb0 to 0xeaf06000) [ 3752.830280][T23453] 5ca0: 814164dc 844d69c0 00004f27 00004f27 [ 3752.831337][T23453] 5cc0: eaf05cec eaf05cd0 81416214 814164e8 00004f27 805153fc 851d2e00 851d2e00 [ 3752.832143][T23453] 5ce0: eaf05d0c eaf05cf0 814165d4 814161c8 844d69c0 00000000 851d2e00 00004f27 [ 3752.833651][T23453] 5d00: eaf05d4c eaf05d10 81416780 81416554 0000005f 8337f180 828215b0 00000000 [ 3752.834891][T23453] 5d20: 00000000 829d46a0 844d69c0 844d6a04 eaf05d88 844d69c0 00000000 82b28ad8 [ 3752.836219][T23453] 5d40: eaf05d84 eaf05d50 814052b4 81416718 844d69f0 00000000 eaf05d74 200000c0 [ 3752.837514][T23453] 5d60: 844d69c0 b5403587 844d69f0 84fba400 40946400 00000003 eaf05e44 eaf05d88 [ 3752.838509][T23453] 5d80: 81400c0c 814051b8 35353238 00000000 00000000 00000000 00000000 00004f27 [ 3752.839053][T23453] 5da0: 00000005 00000002 00000000 00000001 00000cc7 00000fff 5c95239c 00000005 [ 3752.840638][T23453] 5dc0: 000003ff 00000802 00001600 00000001 00000001 00000009 0000e1cb 00000006 [ 3752.841738][T23453] 5de0: 00000004 00000003 00000395 80000089 fffffffe 0000000b fffffff5 ffffeadb [ 3752.842830][T23453] 5e00: 00000003 0000003c 00000000 00000004 08000000 dffffffa 00000000 5d60e8f8 [ 3752.843845][T23453] 5e20: 00000000 853a9840 844d69c0 200000c0 844d69f0 84fba400 eaf05f14 eaf05e48 [ 3752.845081][T23453] 5e40: 81401c00 81400b18 00000000 00000000 00000000 eaf05e54 eaf05e54 5d60e8f8 [ 3752.846098][T23453] 5e60: 00000000 00000000 824a45ec 0000005f 84548448 00000064 844dcf84 84fba400 [ 3752.847371][T23453] 5e80: eaf05ee4 eaf05e90 807b85c0 807aeae4 00000064 00000001 00000000 eaf05eac [ 3752.848070][T23453] 5ea0: 852e3b50 834de6e8 00006400 0000000b eaf05ea0 00000000 eaf05d40 5d60e8f8 [ 3752.848988][T23453] 5ec0: 853a9840 40946400 200000c0 200000c0 853a9840 00000003 eaf05ef4 eaf05ee8 [ 3752.850032][T23453] 5ee0: 807b86e0 5d60e8f8 eaf05f14 40946400 00000000 853a9841 200000c0 853a9840 [ 3752.851337][T23453] 5f00: 00000003 84fba400 eaf05fa4 eaf05f18 80585ba8 81401650 ecac8b10 84fba400 [ 3752.852372][T23453] 5f20: eaf05f3c eaf05f30 81ab06a4 81ab0574 eaf05f54 eaf05f40 8025bcbc 8028e0c4 [ 3752.853562][T23453] 5f40: eaf05fb0 40000000 eaf05f84 eaf05f58 80221a38 8025bc78 00000000 8281cf7c [ 3752.855281][T23453] 5f60: eaf05fb0 0014c8c0 ecac8b10 8022198c 00000000 5d60e8f8 eaf05fac 00000000 [ 3752.856472][T23453] 5f80: 00000000 00326310 00000036 8020029c 84fba400 00000036 00000000 eaf05fa8 [ 3752.857800][T23453] 5fa0: 80200060 80585a84 00000000 00000000 00000003 40946400 200000c0 00000000 [ 3752.858572][T23453] 5fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76fce0bc [ 3752.859079][T23453] 5fe0: 76fcdec0 76fcdeb0 000192bc 00132360 60000010 00000003 00000000 00000000 [ 3752.860204][T23453] Call trace: [ 3752.860940][T23453] [<814164dc>] (subdev_8255_io) from [<81416214>] (subdev_8255_do_config+0x58/0x60) [ 3752.864337][T23453] r7:00004f27 r6:00004f27 r5:844d69c0 r4:814164dc [ 3752.865589][T23453] [<814161bc>] (subdev_8255_do_config) from [<814165d4>] (subdev_8255_io_init+0x8c/0x9c) [ 3752.867057][T23453] r4:851d2e00 [ 3752.867248][T23453] [<81416548>] (subdev_8255_io_init) from [<81416780>] (dev_8255_attach+0x74/0x120) [ 3752.868480][T23453] r7:00004f27 r6:851d2e00 r5:00000000 r4:844d69c0 [ 3752.868990][T23453] [<8141670c>] (dev_8255_attach) from [<814052b4>] (comedi_device_attach+0x108/0x250) [ 3752.870381][T23453] r10:82b28ad8 r9:00000000 r8:844d69c0 r7:eaf05d88 r6:844d6a04 r5:844d69c0 [ 3752.871601][T23453] r4:829d46a0 [ 3752.872000][T23453] [<814051ac>] (comedi_device_attach) from [<81400c0c>] (do_devconfig_ioctl+0x100/0x220) [ 3752.873247][T23453] r10:00000003 r9:40946400 r8:84fba400 r7:844d69f0 r6:b5403587 r5:844d69c0 [ 3752.874448][T23453] r4:200000c0 [ 3752.875126][T23453] [<81400b0c>] (do_devconfig_ioctl) from [<81401c00>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 3752.876561][T23453] r8:84fba400 r7:844d69f0 r6:200000c0 r5:844d69c0 r4:853a9840 [ 3752.877838][T23453] [<81401644>] (comedi_unlocked_ioctl) from [<80585ba8>] (sys_ioctl+0x130/0xba0) [ 3752.878651][T23453] r10:84fba400 r9:00000003 r8:853a9840 r7:200000c0 r6:853a9841 r5:00000000 [ 3752.879047][T23453] r4:40946400 [ 3752.879299][T23453] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3752.880244][T23453] Exception stack(0xeaf05fa8 to 0xeaf05ff0) [ 3752.881119][T23453] 5fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 3752.882175][T23453] 5fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76fce0bc [ 3752.883187][T23453] 5fe0: 76fcdec0 76fcdeb0 000192bc 00132360 [ 3752.883802][T23453] r10:00000036 r9:84fba400 r8:8020029c r7:00000036 r6:00326310 r5:00000000 [ 3752.884612][T23453] r4:00000000 [ 3752.885750][T23453] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 3752.890798][T23453] ---[ end trace 0000000000000000 ]--- [ 3752.941819][T20818] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 3752.942483][T20818] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3752.943064][T20818] usb 2-1: Product: syz [ 3752.943475][T20818] usb 2-1: Manufacturer: syz [ 3752.944100][T20818] usb 2-1: SerialNumber: syz [ 3753.019461][T23453] Kernel panic - not syncing: Fatal exception [ 3753.021436][T23453] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:31:00 Registers: info registers vcpu 0 CPU#0 R00=826b92c4 R01=5b70c000 R02=004f0a27 R03=81ab0ed8 R04=00000006 R05=828f7d88 R06=00000000 R07=828f7d80 R08=83212400 R09=00000028 R10=828f7d88 R11=df851e04 R12=df851e08 R13=df851df8 R14=80340d08 R15=81ab0ee8 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83e6b000 R01=0000003d R02=00000000 R03=0000003c R04=df95ddb0 R05=84567200 R06=00000010 R07=00000058 R08=00000058 R09=83e6b000 R10=83fabf00 R11=df95dcac R12=df95dc58 R13=df95dc70 R14=807cd278 R15=807cc310 PSR=20010013 --C- A S svc32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=65726566 s03=6620746e d01=6620746e65726566 s04=7375205d s05=2d322062 d02=2d3220627375205d s06=63203a31 s07=69666e6f d03=69666e6f63203a31 s08=20312067 s09=20736168 d04=2073616820312067 s10=69206e61 s11=6c61766e d05=6c61766e69206e61 s12=64206469 s13=72637365 d06=7263736564206469 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000