last executing test programs: 21.283134616s ago: executing program 0 (id=1460): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmmsg$unix(r0, &(0x7f00000000c0), 0x3f, 0x0) 21.09764379s ago: executing program 0 (id=1461): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r4 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_setup(0x24fd, &(0x7f0000000080), 0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000440)=0x10001) preadv(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) syz_clone3(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) writev(0xffffffffffffffff, &(0x7f0000000500)=[{0x0}], 0x1) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x138, 0x4c, 0x1a, 0x138, 0x73, 0x208, 0x258, 0x258, 0x208, 0x258, 0x3, 0x0, {[{{@ipv6={@empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'wg2\x00', 'pim6reg0\x00'}, 0x0, 0x118, 0x138, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x1000000, 0x2, 0x0, 0x7}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@private2, @loopback, [], [], 'nr0\x00', 'batadv_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) sendmmsg$unix(r2, &(0x7f00000000c0), 0x3f, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000001800010000000000000000000a03000000000000000000000c0016000800010005000000080004", @ANYRES32=r1, @ANYBLOB="0600150007"], 0x38}}, 0x0) 20.807087625s ago: executing program 0 (id=1462): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0x11, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r4, &(0x7f00000002c0)={0x1d, r3, 0x2}, 0x18) bind$can_j1939(r4, &(0x7f00000003c0)={0x1d, r1}, 0x18) 20.494649653s ago: executing program 0 (id=1463): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'ovf\x00', 0x3f, 0x0, 0x4}, 0x2c) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r1) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac1414aa00000000000000001400020002000000e000000200000000000004000d0001007564703a73"], 0x54}}, 0x0) 19.903144323s ago: executing program 0 (id=1464): prlimit64(0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee6, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001fc0)=""/184, 0xb8) socket$nl_netfilter(0x10, 0x3, 0xc) open(&(0x7f0000000100)='./file0\x00', 0x80ff, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 11.70265129s ago: executing program 0 (id=1465): r0 = getpgid(0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x4051}, 0x0) r1 = syz_open_procfs(0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/4014, 0xfae) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(r0, 0x5, &(0x7f0000001140)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000046000000000000b3b4d9d100003fc7fac7d1bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r5, &(0x7f0000000180)={0x1a, 0x0, 0x80, 0x0, 0x0, 0x0, @multicast}, 0x10) r6 = syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000003240)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r6, 0xc05064a7, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, r7}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r6, 0xc01064ab, 0x0) sendmmsg(r5, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 6.584578613s ago: executing program 1 (id=1453): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x18, 0x1, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 6.262479093s ago: executing program 1 (id=1466): socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000008000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='contention_end\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) pselect6(0x40, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)='2', 0x1}], 0x1) 3.408893735s ago: executing program 1 (id=1467): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000140)) 2.731672031s ago: executing program 1 (id=1468): socket$kcm(0x10, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 2.14288691s ago: executing program 1 (id=1469): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) userfaultfd(0xedd2bfb1d32108e2) getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x208, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) uname(0x0) openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000100)="f257a8ea7bc273dfaeab", 0xa, 0x0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) 0s ago: executing program 1 (id=1470): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000011c0)={'vxcan0\x00', 0x0}) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f00000000c0)=0x1, 0x4) bind$can_j1939(r1, &(0x7f0000001200)={0x1d, r2, 0x0, {0x0, 0x0, 0x4}}, 0x18) connect$can_j1939(r1, &(0x7f0000000080)={0x1d, r2}, 0x18) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='h', 0xfdef}], 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@getchain={0x24, 0x11, 0x839, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) kernel console output (not intermixed with test programs): ]" dev="sockfs" ino=15109 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 788.554508][ T31] audit: type=1400 audit(788.470:5800): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 788.555189][ T31] audit: type=1400 audit(788.470:5801): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 788.555834][ T31] audit: type=1400 audit(788.470:5802): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 788.582015][ T31] audit: type=1400 audit(788.500:5803): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 793.347304][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 793.347397][ T31] audit: type=1400 audit(793.270:5843): avc: denied { read write } for pid=9045 comm="syz.0.1256" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 793.382362][ T31] audit: type=1400 audit(793.310:5844): avc: denied { read write open } for pid=9045 comm="syz.0.1256" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 793.402840][ T31] audit: type=1400 audit(793.330:5845): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 793.406856][ T9046] fuse: Bad value for 'fd' [ 793.407612][ T31] audit: type=1400 audit(793.330:5846): avc: denied { mounton } for pid=9045 comm="syz.0.1256" path="/58/file0" dev="tmpfs" ino=321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 793.408318][ T31] audit: type=1400 audit(793.330:5847): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 793.442179][ T31] audit: type=1400 audit(793.370:5848): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 793.445337][ T31] audit: type=1400 audit(793.370:5849): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 793.448883][ T31] audit: type=1400 audit(793.370:5850): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 793.780174][ T31] audit: type=1400 audit(793.700:5851): avc: denied { module_request } for pid=9010 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 793.909063][ T31] audit: type=1400 audit(793.830:5852): avc: denied { write } for pid=9044 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 794.156688][ T9049] FAULT_INJECTION: forcing a failure. [ 794.156688][ T9049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 794.157458][ T9049] CPU: 0 UID: 0 PID: 9049 Comm: syz.0.1257 Not tainted 6.11.0-syzkaller #0 [ 794.157830][ T9049] Hardware name: ARM-Versatile Express [ 794.158082][ T9049] Call trace: [ 794.158364][ T9049] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 794.158770][ T9049] r7:20000400 r6:df975e30 r5:60000013 r4:8200e404 [ 794.160786][ T9049] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 794.161454][ T9049] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 794.161860][ T9049] r5:00000000 r4:8274ae84 [ 794.162081][ T9049] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 794.162533][ T9049] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 794.162944][ T9049] r6:df975e30 r5:00000000 r4:df975f38 [ 794.163212][ T9049] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 794.163624][ T9049] [<808bf938>] (should_fail_usercopy) from [<81455330>] (copy_msghdr_from_user+0x50/0x130) [ 794.164090][ T9049] [<814552e0>] (copy_msghdr_from_user) from [<81455488>] (___sys_sendmsg+0x78/0xd0) [ 794.164568][ T9049] r8:00000000 r7:00000000 r6:8326c280 r5:df975f38 r4:df975e74 [ 794.164897][ T9049] [<81455410>] (___sys_sendmsg) from [<814559c4>] (sys_sendmsg+0x78/0xbc) [ 794.165361][ T9049] r10:00000128 r9:85463c00 r8:8020029c r7:00000000 r6:20000400 r5:8326c280 [ 794.165728][ T9049] r4:00000000 [ 794.165930][ T9049] [<8145594c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 794.166368][ T9049] Exception stack(0xdf975fa8 to 0xdf975ff0) [ 794.166672][ T9049] 5fa0: 00000000 00000000 00000003 20000400 00000000 00000000 [ 794.167065][ T9049] 5fc0: 00000000 00000000 00130d50 00000128 00000000 00006364 003d0f00 76b6d0bc [ 794.167465][ T9049] 5fe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 794.167761][ T9049] r7:00000128 r6:00130d50 r5:00000000 r4:00000000 [ 796.912361][ T9093] fuse: Invalid rootmode [ 798.352624][ T31] kauditd_printk_skb: 209 callbacks suppressed [ 798.352723][ T31] audit: type=1400 audit(798.280:6062): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 798.365025][ T31] audit: type=1400 audit(798.290:6063): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.368761][ T31] audit: type=1400 audit(798.290:6064): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 798.390477][ T31] audit: type=1400 audit(798.310:6065): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 798.391992][ T31] audit: type=1400 audit(798.310:6066): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 798.457760][ T31] audit: type=1400 audit(798.380:6067): avc: denied { read } for pid=9129 comm="syz.0.1262" name="fb0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 798.465291][ T31] audit: type=1400 audit(798.390:6068): avc: denied { read open } for pid=9129 comm="syz.0.1262" path="/dev/fb0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 798.496132][ T31] audit: type=1400 audit(798.420:6069): avc: denied { read } for pid=9129 comm="syz.0.1262" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 798.497573][ T31] audit: type=1400 audit(798.420:6070): avc: denied { read open } for pid=9129 comm="syz.0.1262" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 798.518545][ T31] audit: type=1400 audit(798.440:6071): avc: denied { ioctl } for pid=9129 comm="syz.0.1262" path="/dev/fb0" dev="devtmpfs" ino=617 ioctlcmd=0x534b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 799.182019][ T9140] fuse: Invalid rootmode [ 802.552199][ T9010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 802.585124][ T9010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 803.216677][ T9256] fuse: Invalid rootmode [ 803.360979][ T31] kauditd_printk_skb: 213 callbacks suppressed [ 803.361056][ T31] audit: type=1400 audit(803.290:6285): avc: denied { module_request } for pid=9010 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 803.363005][ T31] audit: type=1400 audit(803.290:6286): avc: denied { search } for pid=9240 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 803.369259][ T31] audit: type=1400 audit(803.290:6287): avc: denied { read } for pid=9240 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 803.373803][ T31] audit: type=1400 audit(803.300:6288): avc: denied { read open } for pid=9240 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 803.400469][ T31] audit: type=1400 audit(803.310:6289): avc: denied { search } for pid=9240 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 803.404340][ T31] audit: type=1400 audit(803.330:6290): avc: denied { search } for pid=9240 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 803.408011][ T31] audit: type=1400 audit(803.330:6291): avc: denied { search } for pid=9240 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 803.422453][ T31] audit: type=1400 audit(803.350:6292): avc: denied { read } for pid=9240 comm="cmp" name="resolv.conf.eth2.link" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 803.426468][ T31] audit: type=1400 audit(803.350:6293): avc: denied { read open } for pid=9240 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 803.431928][ T31] audit: type=1400 audit(803.360:6294): avc: denied { getattr } for pid=9240 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 807.784133][ T9010] hsr_slave_0: entered promiscuous mode [ 807.797411][ T9010] hsr_slave_1: entered promiscuous mode [ 807.808726][ T9010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 807.809180][ T9010] Cannot create hsr debugfs directory [ 808.371321][ T31] kauditd_printk_skb: 211 callbacks suppressed [ 808.371366][ T31] audit: type=1400 audit(808.300:6506): avc: denied { search } for pid=9309 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 808.373210][ T31] audit: type=1400 audit(808.300:6507): avc: denied { search } for pid=9309 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 808.376320][ T31] audit: type=1400 audit(808.300:6508): avc: denied { search } for pid=9309 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 808.380229][ T31] audit: type=1400 audit(808.300:6509): avc: denied { append } for pid=9309 comm="dhcpcd-run-hook" name="resolv.conf.eth3.link" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 808.380751][ T31] audit: type=1400 audit(808.300:6510): avc: denied { append open } for pid=9309 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 808.391643][ T31] audit: type=1400 audit(808.320:6511): avc: denied { search } for pid=9309 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 808.394118][ T31] audit: type=1400 audit(808.320:6512): avc: denied { search } for pid=9309 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 808.400399][ T31] audit: type=1400 audit(808.320:6513): avc: denied { search } for pid=9309 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 808.401028][ T31] audit: type=1400 audit(808.320:6514): avc: denied { append } for pid=9309 comm="dhcpcd-run-hook" name="resolv.conf.eth3.link" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 808.402094][ T31] audit: type=1400 audit(808.330:6515): avc: denied { append open } for pid=9309 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 809.306129][ T9010] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 809.323678][ T9010] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 809.347204][ T9010] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 809.380445][ T9010] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 813.380133][ T31] kauditd_printk_skb: 218 callbacks suppressed [ 813.380206][ T31] audit: type=1400 audit(813.300:6734): avc: denied { search } for pid=9449 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.380866][ T31] audit: type=1400 audit(813.300:6735): avc: denied { search } for pid=9449 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.381306][ T31] audit: type=1400 audit(813.300:6736): avc: denied { search } for pid=9449 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.381818][ T31] audit: type=1400 audit(813.300:6737): avc: denied { read } for pid=9449 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.382494][ T31] audit: type=1400 audit(813.300:6738): avc: denied { read open } for pid=9449 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.382977][ T31] audit: type=1400 audit(813.300:6739): avc: denied { getattr } for pid=9449 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.398239][ T31] audit: type=1400 audit(813.320:6740): avc: denied { search } for pid=9449 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.401782][ T31] audit: type=1400 audit(813.330:6741): avc: denied { search } for pid=9449 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.404052][ T31] audit: type=1400 audit(813.330:6742): avc: denied { search } for pid=9449 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 813.413507][ T31] audit: type=1400 audit(813.340:6743): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 813.437062][ T9010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 815.416340][ T9465] FAULT_INJECTION: forcing a failure. [ 815.416340][ T9465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 815.416752][ T9465] CPU: 1 UID: 0 PID: 9465 Comm: syz.0.1280 Not tainted 6.11.0-syzkaller #0 [ 815.416938][ T9465] Hardware name: ARM-Versatile Express [ 815.417064][ T9465] Call trace: [ 815.417240][ T9465] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 815.417567][ T9465] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 815.417771][ T9465] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 815.418066][ T9465] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 815.418346][ T9465] r5:00000000 r4:8274ae84 [ 815.418477][ T9465] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 815.418813][ T9465] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 815.419115][ T9465] r6:00000000 r5:e0361f68 r4:00000002 [ 815.419279][ T9465] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 815.419546][ T9465] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 815.420002][ T9465] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 815.420434][ T9465] r10:00000001 r9:805b50cc r8:00000002 r7:e0361f68 r6:0000000f r5:76b6cf30 [ 815.420626][ T9465] r4:852b3c00 r3:e0361e9f [ 815.420743][ T9465] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 815.421012][ T9465] r8:76b6cf30 r7:e0361f68 r6:852b3c00 r5:0000000f r4:85355780 [ 815.421189][ T9465] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 815.421402][ T9465] r10:00000003 r9:852b3c00 r8:8020029c r7:00000000 r6:00000000 r5:85355780 [ 815.421588][ T9465] r4:85355783 [ 815.421683][ T9465] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 815.421908][ T9465] r7:00000003 r6:00000003 r5:76b6cf30 r4:0000000f [ 815.422077][ T9465] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 815.422340][ T9465] Exception stack(0xe0361fa8 to 0xe0361ff0) [ 815.422493][ T9465] 1fa0: 0000000f 76b6cf30 00000003 76b6cf30 0000000f 00000000 [ 815.422739][ T9465] 1fc0: 0000000f 76b6cf30 00000003 00000003 00000000 00006364 003d0f00 76b6d0bc [ 815.422942][ T9465] 1fe0: 00000158 76b6ced0 000d82e0 00130c74 [ 818.409895][ T31] kauditd_printk_skb: 314 callbacks suppressed [ 818.409951][ T31] audit: type=1400 audit(818.330:7058): avc: denied { search } for pid=9479 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.411394][ T31] audit: type=1400 audit(818.340:7059): avc: denied { search } for pid=9479 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.412745][ T31] audit: type=1400 audit(818.340:7060): avc: denied { search } for pid=9479 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.416447][ T31] audit: type=1400 audit(818.340:7061): avc: denied { getattr } for pid=9479 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=51 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 818.431399][ T31] audit: type=1400 audit(818.350:7062): avc: denied { search } for pid=9479 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.433924][ T31] audit: type=1400 audit(818.360:7063): avc: denied { search } for pid=9479 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.446634][ T31] audit: type=1400 audit(818.370:7064): avc: denied { search } for pid=9479 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.457298][ T31] audit: type=1400 audit(818.370:7065): avc: denied { write search } for pid=9479 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.458103][ T31] audit: type=1400 audit(818.380:7066): avc: denied { remove_name search } for pid=9479 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=51 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.458821][ T31] audit: type=1400 audit(818.380:7067): avc: denied { unlink } for pid=9479 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=51 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 823.494240][ T31] kauditd_printk_skb: 246 callbacks suppressed [ 823.494384][ T31] audit: type=1400 audit(823.420:7314): avc: denied { sys_module } for pid=9487 comm="syz.0.1283" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 823.496851][ T31] audit: type=1400 audit(823.420:7315): avc: denied { module_request } for pid=9487 comm="syz.0.1283" kmod="wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 823.517614][ T31] audit: type=1400 audit(823.440:7316): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 823.560159][ T31] audit: type=1400 audit(823.480:7317): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 823.561177][ T31] audit: type=1400 audit(823.480:7318): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 823.602812][ T31] audit: type=1400 audit(823.530:7319): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 823.630309][ T31] audit: type=1400 audit(823.540:7320): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 823.685224][ T31] audit: type=1400 audit(823.610:7321): avc: denied { sys_module } for pid=9010 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 823.696117][ T31] audit: type=1400 audit(823.610:7322): avc: denied { module_request } for pid=9010 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 823.785062][ T31] audit: type=1400 audit(823.710:7323): avc: denied { read } for pid=9487 comm="syz.0.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.639059][ T31] kauditd_printk_skb: 244 callbacks suppressed [ 828.639137][ T31] audit: type=1400 audit(828.560:7568): avc: denied { read } for pid=9544 comm="syz.0.1287" name="fb0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 828.654060][ T31] audit: type=1400 audit(828.580:7569): avc: denied { read open } for pid=9544 comm="syz.0.1287" path="/dev/fb0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 828.775388][ T31] audit: type=1400 audit(828.700:7570): avc: denied { sys_module } for pid=9010 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 828.778110][ T31] audit: type=1400 audit(828.700:7571): avc: denied { module_request } for pid=9010 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 828.793750][ T31] audit: type=1400 audit(828.720:7572): avc: denied { write } for pid=9543 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 828.802005][ T31] audit: type=1400 audit(828.720:7573): avc: denied { write open } for pid=9543 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 828.802967][ T31] audit: type=1400 audit(828.720:7574): avc: denied { getattr } for pid=9543 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 828.812635][ T31] audit: type=1400 audit(828.740:7575): avc: denied { ioctl } for pid=9543 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 828.890194][ T31] audit: type=1400 audit(828.810:7576): avc: denied { search } for pid=9543 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 828.891076][ T31] audit: type=1400 audit(828.810:7577): avc: denied { search } for pid=9543 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 830.914864][ T9010] veth0_vlan: entered promiscuous mode [ 831.023892][ T9010] veth1_vlan: entered promiscuous mode [ 831.266155][ T9010] veth0_macvtap: entered promiscuous mode [ 831.343448][ T9010] veth1_macvtap: entered promiscuous mode [ 831.556808][ T9010] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 831.557341][ T9010] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 831.557660][ T9010] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 831.557979][ T9010] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.647576][ T31] kauditd_printk_skb: 386 callbacks suppressed [ 833.647624][ T31] audit: type=1400 audit(833.570:7964): avc: denied { search } for pid=9570 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.655893][ T31] audit: type=1400 audit(833.580:7965): avc: denied { search } for pid=9570 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.656375][ T31] audit: type=1400 audit(833.580:7966): avc: denied { search } for pid=9570 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.656800][ T31] audit: type=1400 audit(833.580:7967): avc: denied { getattr } for pid=9570 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.dhcp" dev="tmpfs" ino=55 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 833.661393][ T31] audit: type=1400 audit(833.590:7968): avc: denied { search } for pid=9570 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.663420][ T31] audit: type=1400 audit(833.590:7969): avc: denied { search } for pid=9570 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.665384][ T31] audit: type=1400 audit(833.590:7970): avc: denied { search } for pid=9570 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.666558][ T31] audit: type=1400 audit(833.590:7971): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 833.678899][ T31] audit: type=1400 audit(833.590:7972): avc: denied { write search } for pid=9570 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 833.689291][ T31] audit: type=1400 audit(833.610:7973): avc: denied { remove_name search } for pid=9570 comm="rm" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=55 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 836.084494][ T9594] fuse: Unknown parameter 'use00000000000000000000' [ 837.106359][ T9608] fuse: Unknown parameter 'user_i00000000000000000000' [ 838.087842][ T9617] fuse: Unknown parameter 'user_i00000000000000000000' [ 839.014651][ T31] kauditd_printk_skb: 308 callbacks suppressed [ 839.014758][ T31] audit: type=1400 audit(838.940:8282): avc: denied { ioctl } for pid=9623 comm="syz.0.1312" path="socket:[15708]" dev="sockfs" ino=15708 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 839.423813][ T31] audit: type=1400 audit(839.350:8283): avc: denied { read write } for pid=9010 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 839.430350][ T31] audit: type=1400 audit(839.350:8284): avc: denied { read write open } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 839.451849][ T31] audit: type=1400 audit(839.370:8285): avc: denied { ioctl } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 839.461458][ T31] audit: type=1400 audit(839.390:8286): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 839.467005][ T31] audit: type=1400 audit(839.390:8287): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 839.480381][ T31] audit: type=1400 audit(839.390:8288): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 839.481530][ T31] audit: type=1400 audit(839.400:8289): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 839.482389][ T31] audit: type=1400 audit(839.400:8290): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 839.749479][ T31] audit: type=1400 audit(839.670:8291): avc: denied { read write } for pid=9010 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 840.770431][ T9631] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 841.126505][ T9636] fuse: Unknown parameter 'user_i00000000000000000000' [ 842.187956][ T9648] FAULT_INJECTION: forcing a failure. [ 842.187956][ T9648] name failslab, interval 1, probability 0, space 0, times 0 [ 842.188364][ T9648] CPU: 1 UID: 0 PID: 9648 Comm: syz.1.1322 Not tainted 6.11.0-syzkaller #0 [ 842.188583][ T9648] Hardware name: ARM-Versatile Express [ 842.188697][ T9648] Call trace: [ 842.188791][ T9648] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 842.188979][ T9648] r7:00000d40 r6:8557faa8 r5:60000013 r4:8200e404 [ 842.189115][ T9648] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 842.189390][ T9648] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 842.189971][ T9648] r5:00000000 r4:8271619c [ 842.190090][ T9648] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 842.190552][ T9648] [<808bf744>] (should_fail_ex) from [<804db268>] (should_failslab+0x6c/0x94) [ 842.190816][ T9648] r6:8557faa8 r5:00000019 r4:82c01240 [ 842.191106][ T9648] [<804db1fc>] (should_failslab) from [<804c1018>] (__kmalloc_noprof+0x9c/0x458) [ 842.191493][ T9648] [<804c0f7c>] (__kmalloc_noprof) from [<8072bf9c>] (tomoyo_encode2+0x64/0xf0) [ 842.191720][ T9648] r10:00000fff r9:82c9bc00 r8:00000000 r7:830967f8 r6:8557faa8 r5:846e3ffd [ 842.191903][ T9648] r4:846e3fef [ 842.192000][ T9648] [<8072bf38>] (tomoyo_encode2) from [<8072c04c>] (tomoyo_encode+0x24/0x30) [ 842.192209][ T9648] r9:82c9bc00 r8:00000000 r7:830967f8 r6:8557faa8 r5:00001000 r4:846e3ff0 [ 842.192386][ T9648] [<8072c028>] (tomoyo_encode) from [<8072c0d8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 842.192619][ T9648] r5:00001000 r4:846e3000 [ 842.192781][ T9648] [<8072c058>] (tomoyo_realpath_from_path) from [<807281d8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 842.193072][ T9648] r10:84ad6000 r9:00000000 r8:8557fa80 r7:00008953 r6:00000004 r5:81ad10a8 [ 842.193323][ T9648] r4:8557faa8 r3:824b71c0 [ 842.193458][ T9648] [<8072810c>] (tomoyo_path_number_perm) from [<8072caa4>] (tomoyo_file_ioctl+0x1c/0x20) [ 842.193685][ T9648] r9:00000003 r8:8557fa80 r7:8557fa80 r6:00008953 r5:20000bc0 r4:822091e8 [ 842.193868][ T9648] [<8072ca88>] (tomoyo_file_ioctl) from [<806efa58>] (security_file_ioctl+0x40/0x5c) [ 842.194083][ T9648] [<806efa18>] (security_file_ioctl) from [<8052134c>] (sys_ioctl+0x50/0xd94) [ 842.194360][ T9648] r7:20000bc0 r6:8557fa81 r5:00000000 r4:00008953 [ 842.194511][ T9648] [<805212fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 842.194718][ T9648] Exception stack(0xe85b9fa8 to 0xe85b9ff0) [ 842.194867][ T9648] 9fa0: 00000000 00000000 00000003 00008953 20000bc0 00000000 [ 842.195062][ T9648] 9fc0: 00000000 00000000 00130d50 00000036 00000000 00006364 003d0f00 76b880bc [ 842.195262][ T9648] 9fe0: 76b87ec0 76b87eb0 000189d0 00132da0 [ 842.195410][ T9648] r10:00000036 r9:84ad6000 r8:8020029c r7:00000036 r6:00130d50 r5:00000000 [ 842.195594][ T9648] r4:00000000 [ 842.197213][ T9648] ERROR: Out of memory at tomoyo_realpath_from_path. [ 842.983602][ T9660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5134 sclass=netlink_route_socket pid=9660 comm=syz.1.1327 [ 843.009025][ T9659] FAULT_INJECTION: forcing a failure. [ 843.009025][ T9659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 843.010422][ T9659] CPU: 1 UID: 0 PID: 9659 Comm: syz.0.1328 Not tainted 6.11.0-syzkaller #0 [ 843.010684][ T9659] Hardware name: ARM-Versatile Express [ 843.010839][ T9659] Call trace: [ 843.010992][ T9659] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 843.011238][ T9659] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 843.011408][ T9659] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 843.011632][ T9659] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 843.011918][ T9659] r5:00000000 r4:8274ae84 [ 843.012086][ T9659] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 843.012382][ T9659] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 843.012672][ T9659] r6:00000000 r5:eabe1f68 r4:00000002 [ 843.013286][ T9659] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 843.013580][ T9659] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 843.013892][ T9659] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 843.014231][ T9659] r10:00000001 r9:805b50cc r8:00000002 r7:eabe1f68 r6:0000000f r5:76b6cf30 [ 843.014547][ T9659] r4:85463000 r3:eabe1e9f [ 843.014712][ T9659] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 843.015006][ T9659] r8:76b6cf30 r7:eabe1f68 r6:85463000 r5:0000000f r4:8557fe40 [ 843.015236][ T9659] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 843.015528][ T9659] r10:00000003 r9:85463000 r8:8020029c r7:00000000 r6:00000000 r5:8557fe40 [ 843.015774][ T9659] r4:8557fe43 [ 843.015921][ T9659] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 843.016190][ T9659] r7:00000003 r6:00000005 r5:76b6cf30 r4:0000000f [ 843.016398][ T9659] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 843.016706][ T9659] Exception stack(0xeabe1fa8 to 0xeabe1ff0) [ 843.016934][ T9659] 1fa0: 0000000f 76b6cf30 00000005 76b6cf30 0000000f 00000000 [ 843.017316][ T9659] 1fc0: 0000000f 76b6cf30 00000005 00000003 00000000 00006364 003d0f00 76b6d0bc [ 843.017605][ T9659] 1fe0: 00000158 76b6ced0 000d82e0 00130c74 [ 844.235544][ T31] kauditd_printk_skb: 111 callbacks suppressed [ 844.235639][ T31] audit: type=1400 audit(844.160:8403): avc: denied { create } for pid=9675 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 844.256861][ T31] audit: type=1400 audit(844.180:8404): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 844.270638][ T31] audit: type=1400 audit(844.190:8405): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 844.272131][ T31] audit: type=1400 audit(844.190:8406): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 844.280294][ T31] audit: type=1400 audit(844.200:8407): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 844.282123][ T31] audit: type=1400 audit(844.200:8408): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 844.455988][ T31] audit: type=1400 audit(844.370:8409): avc: denied { ioctl } for pid=9675 comm="syz.0.1334" path="socket:[16641]" dev="sockfs" ino=16641 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 844.456998][ T31] audit: type=1400 audit(844.380:8410): avc: denied { module_request } for pid=9675 comm="syz.0.1334" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 844.646754][ T31] audit: type=1400 audit(844.570:8411): avc: denied { read write } for pid=9010 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 844.660493][ T31] audit: type=1400 audit(844.580:8412): avc: denied { read write open } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 847.894597][ T9697] FAULT_INJECTION: forcing a failure. [ 847.894597][ T9697] name failslab, interval 1, probability 0, space 0, times 0 [ 847.895236][ T9697] CPU: 0 UID: 0 PID: 9697 Comm: syz.0.1343 Not tainted 6.11.0-syzkaller #0 [ 847.895551][ T9697] Hardware name: ARM-Versatile Express [ 847.895766][ T9697] Call trace: [ 847.895969][ T9697] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 847.896400][ T9697] r7:00000c40 r6:eae15f14 r5:60000013 r4:8200e404 [ 847.896746][ T9697] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 847.897062][ T9697] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 847.897390][ T9697] r5:00000000 r4:8271619c [ 847.897572][ T9697] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 847.897906][ T9697] [<808bf744>] (should_fail_ex) from [<804db268>] (should_failslab+0x6c/0x94) [ 847.898294][ T9697] r6:eae15f14 r5:00001000 r4:82c016c0 [ 847.898501][ T9697] [<804db1fc>] (should_failslab) from [<804c1018>] (__kmalloc_noprof+0x9c/0x458) [ 847.898846][ T9697] [<804c0f7c>] (__kmalloc_noprof) from [<8072c094>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 847.899241][ T9697] r10:00000143 r9:84162800 r8:00000000 r7:832fed48 r6:eae15f14 r5:00001000 [ 847.899612][ T9697] r4:00000000 [ 847.899870][ T9697] [<8072c058>] (tomoyo_realpath_from_path) from [<807281d8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 847.900532][ T9697] r10:00000143 r9:00000000 r8:00000003 r7:000001c0 r6:00000001 r5:81ad10a8 [ 847.900943][ T9697] r4:eae15f14 r3:824b71c0 [ 847.901147][ T9697] [<8072810c>] (tomoyo_path_number_perm) from [<8072cae8>] (tomoyo_path_mkdir+0x40/0x64) [ 847.901565][ T9697] r9:00000002 r8:00000003 r7:000001c0 r6:832fed48 r5:eae15f5c r4:00000000 [ 847.901886][ T9697] [<8072caa8>] (tomoyo_path_mkdir) from [<806f0b64>] (security_path_mkdir+0x54/0x70) [ 847.902313][ T9697] r4:8220915c [ 847.902451][ T9697] [<806f0b10>] (security_path_mkdir) from [<8051dc90>] (do_mkdirat+0x84/0x150) [ 847.902668][ T9697] r7:000001ff r6:82e49000 r5:832fed48 r4:00000003 [ 847.902817][ T9697] [<8051dc0c>] (do_mkdirat) from [<8051dd90>] (sys_mkdirat+0x34/0x38) [ 847.903020][ T9697] r9:84ad6000 r8:8020029c r7:00000143 r6:00130d50 r5:000001ff r4:00000003 [ 847.903216][ T9697] [<8051dd5c>] (sys_mkdirat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 847.903413][ T9697] Exception stack(0xeae15fa8 to 0xeae15ff0) [ 847.903582][ T9697] 5fa0: 00000000 00000000 00000003 20000000 000001ff 00000000 [ 847.903793][ T9697] 5fc0: 00000000 00000000 00130d50 00000143 00000000 00006364 003d0f00 76b6d0bc [ 847.904058][ T9697] 5fe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 847.904258][ T9697] r5:00000000 r4:00000000 [ 847.905960][ T9697] ERROR: Out of memory at tomoyo_realpath_from_path. [ 848.786752][ T9717] FAULT_INJECTION: forcing a failure. [ 848.786752][ T9717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 848.787469][ T9717] CPU: 0 UID: 0 PID: 9717 Comm: syz.0.1353 Not tainted 6.11.0-syzkaller #0 [ 848.787802][ T9717] Hardware name: ARM-Versatile Express [ 848.788101][ T9717] Call trace: [ 848.788320][ T9717] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 848.788702][ T9717] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 848.788950][ T9717] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 848.789299][ T9717] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 848.789879][ T9717] r5:00000000 r4:8274ae84 [ 848.790183][ T9717] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 848.790752][ T9717] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 848.791128][ T9717] r6:00000000 r5:eaf21f68 r4:00000002 [ 848.791380][ T9717] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 848.791759][ T9717] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 848.792169][ T9717] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 848.792575][ T9717] r10:00000001 r9:805b50cc r8:00000002 r7:eaf21f68 r6:0000000f r5:76b6cf30 [ 848.792897][ T9717] r4:84ad5400 r3:eaf21e9f [ 848.793108][ T9717] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 848.793489][ T9717] r8:76b6cf30 r7:eaf21f68 r6:84ad5400 r5:0000000f r4:8438b540 [ 848.793770][ T9717] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 848.794137][ T9717] r10:00000003 r9:84ad5400 r8:8020029c r7:00000000 r6:00000000 r5:8438b540 [ 848.794521][ T9717] r4:8438b543 [ 848.794705][ T9717] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 848.795035][ T9717] r7:00000003 r6:00000003 r5:76b6cf30 r4:0000000f [ 848.795311][ T9717] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 848.795661][ T9717] Exception stack(0xeaf21fa8 to 0xeaf21ff0) [ 848.795938][ T9717] 1fa0: 0000000f 76b6cf30 00000003 76b6cf30 0000000f 00000000 [ 848.796531][ T9717] 1fc0: 0000000f 76b6cf30 00000003 00000003 00000000 00006364 003d0f00 76b6d0bc [ 848.796966][ T9717] 1fe0: 00000158 76b6ced0 000d82e0 00130c74 [ 849.330423][ T31] kauditd_printk_skb: 121 callbacks suppressed [ 849.330486][ T31] audit: type=1400 audit(849.250:8532): avc: denied { create } for pid=9724 comm="syz.1.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 849.340394][ T31] audit: type=1400 audit(849.260:8533): avc: denied { create } for pid=9724 comm="syz.1.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 849.348155][ T31] audit: type=1400 audit(849.270:8534): avc: denied { create } for pid=9724 comm="syz.1.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 849.355271][ T31] audit: type=1400 audit(849.280:8535): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 849.359951][ T31] audit: type=1400 audit(849.280:8536): avc: denied { ioctl } for pid=9724 comm="syz.1.1356" path="socket:[15903]" dev="sockfs" ino=15903 ioctlcmd=0x4101 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 849.361732][ T31] audit: type=1400 audit(849.290:8537): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 849.365965][ T31] audit: type=1400 audit(849.290:8538): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 849.369384][ T31] audit: type=1400 audit(849.290:8539): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 849.374147][ T31] audit: type=1400 audit(849.300:8540): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 849.383352][ T31] audit: type=1400 audit(849.310:8541): avc: denied { setopt } for pid=9724 comm="syz.1.1356" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 849.401297][ T9725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9725 comm=syz.1.1356 [ 851.031448][ T9743] sctp: [Deprecated]: syz.1.1364 (pid 9743) Use of struct sctp_assoc_value in delayed_ack socket option. [ 851.031448][ T9743] Use struct sctp_sack_info instead [ 852.246798][ T9758] block device autoloading is deprecated and will be removed. [ 852.830439][ T9770] FAULT_INJECTION: forcing a failure. [ 852.830439][ T9770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 852.831148][ T9770] CPU: 1 UID: 0 PID: 9770 Comm: syz.1.1373 Not tainted 6.11.0-syzkaller #0 [ 852.831515][ T9770] Hardware name: ARM-Versatile Express [ 852.831851][ T9770] Call trace: [ 852.832048][ T9770] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 852.832431][ T9770] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 852.832652][ T9770] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 852.832975][ T9770] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 852.833314][ T9770] r5:00000000 r4:8274ae84 [ 852.833496][ T9770] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 852.833832][ T9770] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 852.834286][ T9770] r6:00000000 r5:eb135f68 r4:00000002 [ 852.834555][ T9770] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 852.834934][ T9770] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 852.835462][ T9770] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 852.836142][ T9770] r10:00000001 r9:805b50cc r8:00000002 r7:eb135f68 r6:0000000f r5:76b87f30 [ 852.836658][ T9770] r4:85466000 r3:eb135e9f [ 852.836959][ T9770] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 852.837523][ T9770] r8:76b87f30 r7:eb135f68 r6:85466000 r5:0000000f r4:8557f6c0 [ 852.837987][ T9770] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 852.838527][ T9770] r10:00000003 r9:85466000 r8:8020029c r7:00000000 r6:00000000 r5:8557f6c0 [ 852.838862][ T9770] r4:8557f6c3 [ 852.839039][ T9770] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 852.839416][ T9770] r7:00000003 r6:00000003 r5:76b87f30 r4:0000000f [ 852.839864][ T9770] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 852.840589][ T9770] Exception stack(0xeb135fa8 to 0xeb135ff0) [ 852.840853][ T9770] 5fa0: 0000000f 76b87f30 00000003 76b87f30 0000000f 00000000 [ 852.841263][ T9770] 5fc0: 0000000f 76b87f30 00000003 00000003 00000000 00006364 003d0f00 76b880bc [ 852.841924][ T9770] 5fe0: 00000158 76b87ed0 000d82e0 00130c74 [ 854.245448][ T9789] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9789 comm=syz.0.1382 [ 854.511653][ T31] kauditd_printk_skb: 182 callbacks suppressed [ 854.511738][ T31] audit: type=1400 audit(854.440:8720): avc: denied { read write } for pid=9010 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 854.514889][ T31] audit: type=1400 audit(854.440:8721): avc: denied { read write open } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 854.521122][ T31] audit: type=1400 audit(854.440:8722): avc: denied { ioctl } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 854.542998][ T31] audit: type=1400 audit(854.470:8723): avc: denied { prog_load } for pid=9792 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 854.556000][ T31] audit: type=1400 audit(854.480:8724): avc: denied { bpf } for pid=9792 comm="syz.0.1384" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 854.556694][ T31] audit: type=1400 audit(854.480:8725): avc: denied { perfmon } for pid=9792 comm="syz.0.1384" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 854.567533][ T31] audit: type=1400 audit(854.490:8726): avc: denied { create } for pid=9792 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 854.592876][ T31] audit: type=1400 audit(854.520:8727): avc: denied { write } for pid=9792 comm="syz.0.1384" path="socket:[16868]" dev="sockfs" ino=16868 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 854.603046][ T31] audit: type=1400 audit(854.530:8728): avc: denied { write } for pid=9792 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 854.610438][ T31] audit: type=1400 audit(854.530:8729): avc: denied { map_create } for pid=9792 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 859.670277][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 859.670362][ T31] audit: type=1400 audit(859.590:8784): avc: denied { create } for pid=9811 comm="syz.1.1391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 859.747631][ T31] audit: type=1400 audit(859.670:8785): avc: denied { setattr } for pid=9811 comm="syz.1.1391" name="NETLINK" dev="sockfs" ino=16891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 859.773275][ T31] audit: type=1400 audit(859.700:8786): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 859.790313][ T31] audit: type=1400 audit(859.700:8787): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 859.803633][ T31] audit: type=1400 audit(859.730:8788): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 859.806309][ T31] audit: type=1400 audit(859.730:8789): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 859.810142][ T31] audit: type=1400 audit(859.730:8790): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 859.845823][ T31] audit: type=1400 audit(859.760:8791): avc: denied { module_request } for pid=9811 comm="syz.1.1391" kmod="crypto-tgr160" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 860.857901][ T31] audit: type=1400 audit(860.780:8792): avc: denied { module_request } for pid=9811 comm="syz.1.1391" kmod="crypto-tgr160-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 860.923060][ T31] audit: type=1400 audit(860.850:8793): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 861.524736][ T9820] FAULT_INJECTION: forcing a failure. [ 861.524736][ T9820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 861.528420][ T9820] CPU: 0 UID: 0 PID: 9820 Comm: syz.0.1394 Not tainted 6.11.0-syzkaller #0 [ 861.529934][ T9820] Hardware name: ARM-Versatile Express [ 861.530307][ T9820] Call trace: [ 861.530460][ T9820] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 861.530947][ T9820] r7:84470d00 r6:20001480 r5:60000013 r4:8200e404 [ 861.531513][ T9820] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 861.531818][ T9820] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 861.532027][ T9820] r5:00000000 r4:8274ae84 [ 861.532131][ T9820] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 861.532339][ T9820] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 861.532555][ T9820] r6:20001480 r5:eb469e28 r4:00000000 [ 861.532679][ T9820] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 861.532954][ T9820] [<808bf938>] (should_fail_usercopy) from [<81452ef4>] (get_user_ifreq+0x1c/0xa0) [ 861.533217][ T9820] [<81452ed8>] (get_user_ifreq) from [<81682948>] (inet_ioctl+0x198/0x268) [ 861.533537][ T9820] r7:84470d00 r6:20001480 r5:84ae0c00 r4:00008934 [ 861.534164][ T9820] [<816827b0>] (inet_ioctl) from [<81453b34>] (sock_ioctl+0x450/0x608) [ 861.534627][ T9820] r7:8326c280 r6:84470d00 r5:20001480 r4:00008934 [ 861.534875][ T9820] [<814536e4>] (sock_ioctl) from [<80521430>] (sys_ioctl+0x134/0xd94) [ 861.536150][ T9820] r9:00000003 r8:850fc9c0 r7:20001480 r6:850fc9c1 r5:00000000 r4:00008934 [ 861.538353][ T9820] [<805212fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 861.539844][ T9820] Exception stack(0xeb469fa8 to 0xeb469ff0) [ 861.540270][ T9820] 9fa0: 00000000 00000000 00000003 00008934 20001480 00000000 [ 861.540586][ T9820] 9fc0: 00000000 00000000 00130d50 00000036 00000000 00006364 003d0f00 76b6d0bc [ 861.542626][ T9820] 9fe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 861.543598][ T9820] r10:00000036 r9:85462400 r8:8020029c r7:00000036 r6:00130d50 r5:00000000 [ 861.543899][ T9820] r4:00000000 [ 865.165738][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 865.165836][ T31] audit: type=1400 audit(865.090:8846): avc: denied { read } for pid=9836 comm="syz.1.1400" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 865.166890][ T31] audit: type=1400 audit(865.090:8847): avc: denied { read open } for pid=9836 comm="syz.1.1400" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 865.179445][ T31] audit: type=1400 audit(865.100:8848): avc: denied { create } for pid=9836 comm="syz.1.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 865.180994][ T31] audit: type=1400 audit(865.100:8849): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 865.188047][ T31] audit: type=1400 audit(865.110:8850): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 865.200167][ T31] audit: type=1400 audit(865.120:8851): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 865.210158][ T31] audit: type=1400 audit(865.130:8852): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 865.211007][ T31] audit: type=1400 audit(865.130:8853): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 865.217309][ T31] audit: type=1400 audit(865.140:8854): avc: denied { write } for pid=9836 comm="syz.1.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 865.324638][ T31] audit: type=1400 audit(865.250:8855): avc: denied { unmount } for pid=9010 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 866.082523][ T9852] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=10716 sclass=netlink_audit_socket pid=9852 comm=syz.1.1404 [ 870.815907][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 870.816003][ T31] audit: type=1400 audit(870.740:8932): avc: denied { map_create } for pid=9861 comm="syz.0.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 870.855211][ T31] audit: type=1400 audit(870.780:8933): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 870.859097][ T31] audit: type=1400 audit(870.780:8934): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 870.901369][ T31] audit: type=1400 audit(870.830:8935): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 870.902958][ T31] audit: type=1400 audit(870.830:8936): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 870.905330][ T31] audit: type=1400 audit(870.830:8937): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 870.961764][ T31] audit: type=1400 audit(870.880:8938): avc: denied { read write } for pid=9861 comm="syz.0.1408" name="uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 871.055654][ T31] audit: type=1400 audit(870.980:8939): avc: denied { read write open } for pid=9861 comm="syz.0.1408" path="/dev/uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 871.134633][ T31] audit: type=1400 audit(871.050:8940): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 871.142922][ T31] audit: type=1400 audit(871.050:8941): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 877.461109][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 877.461207][ T31] audit: type=1400 audit(877.380:8946): avc: denied { read write } for pid=9010 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 877.464182][ T31] audit: type=1400 audit(877.390:8947): avc: denied { read write open } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 877.467547][ T31] audit: type=1400 audit(877.390:8948): avc: denied { ioctl } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 877.507965][ T31] audit: type=1400 audit(877.430:8949): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 877.540181][ T31] audit: type=1400 audit(877.460:8950): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 877.540889][ T31] audit: type=1400 audit(877.460:8951): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.541407][ T31] audit: type=1400 audit(877.460:8952): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.552806][ T31] audit: type=1400 audit(877.480:8953): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.753669][ T31] audit: type=1400 audit(877.680:8954): avc: denied { create } for pid=9869 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 877.766190][ T31] audit: type=1400 audit(877.690:8955): avc: denied { prog_load } for pid=9869 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 882.524844][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 882.524919][ T31] audit: type=1400 audit(882.450:8977): avc: denied { unmount } for pid=8077 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 882.577714][ T31] audit: type=1400 audit(882.500:8978): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 882.606186][ T31] audit: type=1400 audit(882.530:8979): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 882.609931][ T31] audit: type=1400 audit(882.530:8980): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 882.644559][ T31] audit: type=1400 audit(882.570:8981): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 882.648498][ T31] audit: type=1400 audit(882.570:8982): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 883.225249][ T9875] netlink: 'syz.0.1410': attribute type 3 has an invalid length. [ 883.225766][ T9875] netlink: 666 bytes leftover after parsing attributes in process `syz.0.1410'. [ 883.277878][ T31] audit: type=1400 audit(883.200:8983): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 883.310381][ T31] audit: type=1400 audit(883.230:8984): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 883.312131][ T31] audit: type=1400 audit(883.230:8985): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 883.336856][ T31] audit: type=1400 audit(883.260:8986): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 887.736809][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 887.736896][ T31] audit: type=1400 audit(887.660:9009): avc: denied { prog_load } for pid=9887 comm="syz.0.1413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 887.745925][ T31] audit: type=1400 audit(887.670:9011): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 887.748412][ T31] audit: type=1400 audit(887.670:9012): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 887.750163][ T31] audit: type=1400 audit(887.670:9013): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 887.751453][ T31] audit: type=1400 audit(887.660:9010): avc: denied { bpf } for pid=9887 comm="syz.0.1413" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 887.762166][ T31] audit: type=1400 audit(887.690:9014): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 887.772426][ T31] audit: type=1400 audit(887.690:9015): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 887.800147][ T31] audit: type=1400 audit(887.720:9016): avc: denied { create } for pid=9887 comm="syz.0.1413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 887.806070][ T31] audit: type=1400 audit(887.730:9017): avc: denied { mounton } for pid=9887 comm="syz.0.1413" path="/152/file0" dev="tmpfs" ino=808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 887.827280][ T31] audit: type=1400 audit(887.750:9018): avc: denied { mount } for pid=9887 comm="syz.0.1413" name="/" dev="ramfs" ino=16155 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 889.076739][ T9890] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1414'. [ 889.078579][ T9890] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1414'. [ 889.079021][ T9890] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1414'. [ 890.086121][ T9899] netlink: 'syz.1.1416': attribute type 4 has an invalid length. [ 890.122943][ T9899] netlink: 'syz.1.1416': attribute type 4 has an invalid length. [ 890.674896][ T9900] binder: 9895:9900 ioctl c0306201 0 returned -14 [ 892.323277][ T9905] netlink: 'syz.1.1418': attribute type 4 has an invalid length. [ 892.343935][ T9905] netlink: 'syz.1.1418': attribute type 4 has an invalid length. [ 892.956549][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 892.956633][ T31] audit: type=1400 audit(892.880:9116): avc: denied { create } for pid=9907 comm="syz.1.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 892.962383][ T31] audit: type=1400 audit(892.880:9117): avc: denied { write } for pid=9907 comm="syz.1.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 892.997528][ T31] audit: type=1400 audit(892.910:9118): avc: denied { module_request } for pid=9907 comm="syz.1.1419" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 893.473737][ T31] audit: type=1400 audit(893.400:9119): avc: denied { create } for pid=9907 comm="syz.1.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 893.496106][ T31] audit: type=1400 audit(893.420:9120): avc: denied { write } for pid=9907 comm="syz.1.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 893.531504][ T31] audit: type=1400 audit(893.460:9121): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 893.536509][ T31] audit: type=1400 audit(893.460:9122): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 893.539011][ T31] audit: type=1400 audit(893.460:9123): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 893.563869][ T31] audit: type=1400 audit(893.490:9124): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 893.567196][ T31] audit: type=1400 audit(893.490:9125): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 897.751118][ T8583] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 897.946387][ T8583] usb 2-1: Using ep0 maxpacket: 8 [ 897.970459][ T8583] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 897.971795][ T8583] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 897.972362][ T8583] usb 2-1: New USB device found, idVendor=046d, idProduct=c24f, bcdDevice= 0.00 [ 897.972625][ T8583] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 897.974728][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 897.974914][ T31] audit: type=1400 audit(897.880:9174): avc: denied { ioctl } for pid=9921 comm="syz.1.1422" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 897.976073][ T31] audit: type=1400 audit(897.890:9175): avc: denied { ioctl } for pid=9921 comm="syz.1.1422" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 897.976871][ T31] audit: type=1400 audit(897.890:9176): avc: denied { ioctl } for pid=9921 comm="syz.1.1422" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.007511][ T31] audit: type=1400 audit(897.920:9177): avc: denied { ioctl } for pid=9921 comm="syz.1.1422" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.016951][ T8583] usb 2-1: config 0 descriptor?? [ 898.104455][ T31] audit: type=1400 audit(898.030:9178): avc: denied { ioctl } for pid=9921 comm="syz.1.1422" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.115537][ T31] audit: type=1400 audit(898.040:9179): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 898.129851][ T31] audit: type=1400 audit(898.050:9180): avc: denied { ioctl } for pid=9921 comm="syz.1.1422" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.148422][ T31] audit: type=1400 audit(898.060:9181): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 898.171181][ T31] audit: type=1400 audit(898.080:9183): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 898.174079][ T31] audit: type=1400 audit(898.080:9184): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 898.830989][ T8583] logitech 0003:046D:C24F.0002: hidraw0: USB HID v0.00 Device [HID 046d:c24f] on usb-dummy_hcd.1-1/input0 [ 898.832013][ T8583] logitech 0003:046D:C24F.0002: no inputs found [ 898.968069][ T8583] usb 2-1: USB disconnect, device number 10 [ 907.414816][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 907.414866][ T31] audit: type=1400 audit(907.340:9208): avc: denied { write } for pid=9945 comm="syz.0.1424" name="audio" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.416937][ T31] audit: type=1400 audit(907.340:9209): avc: denied { write open } for pid=9945 comm="syz.0.1424" path="/dev/audio" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.423210][ T31] audit: type=1400 audit(907.350:9210): avc: denied { ioctl } for pid=9945 comm="syz.0.1424" path="/dev/audio" dev="devtmpfs" ino=733 ioctlcmd=0x5006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.442704][ T31] audit: type=1400 audit(907.370:9211): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 907.452665][ T31] audit: type=1400 audit(907.380:9212): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 907.461958][ T31] audit: type=1400 audit(907.390:9213): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 907.464355][ T31] audit: type=1400 audit(907.390:9214): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 907.467133][ T31] audit: type=1400 audit(907.390:9215): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 908.273373][ T31] audit: type=1400 audit(908.200:9216): avc: denied { prog_load } for pid=9947 comm="syz.0.1425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 908.275106][ T31] audit: type=1400 audit(908.200:9217): avc: denied { bpf } for pid=9947 comm="syz.0.1425" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 914.293210][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 914.293297][ T31] audit: type=1400 audit(914.220:9262): avc: denied { create } for pid=9956 comm="syz.0.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 914.320283][ T31] audit: type=1400 audit(914.240:9263): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 914.337935][ T31] audit: type=1400 audit(914.260:9264): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 914.344374][ T31] audit: type=1400 audit(914.270:9265): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 914.360270][ T31] audit: type=1400 audit(914.280:9266): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 914.365075][ T31] audit: type=1400 audit(914.290:9267): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 914.430148][ T31] audit: type=1400 audit(914.350:9268): avc: denied { module_request } for pid=9956 comm="syz.0.1428" kmod="fs-autofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.015593][ T31] audit: type=1400 audit(914.940:9269): avc: denied { create } for pid=9956 comm="syz.0.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 915.184533][ T31] audit: type=1400 audit(915.110:9270): avc: denied { bind } for pid=9956 comm="syz.0.1428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 915.250499][ T31] audit: type=1400 audit(915.170:9271): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 919.454355][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 919.454404][ T31] audit: type=1400 audit(919.380:9288): avc: denied { read write } for pid=9010 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 919.456583][ T31] audit: type=1400 audit(919.380:9289): avc: denied { read write open } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 919.458897][ T31] audit: type=1400 audit(919.380:9290): avc: denied { ioctl } for pid=9010 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 919.480444][ T31] audit: type=1400 audit(919.400:9291): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 919.483834][ T31] audit: type=1400 audit(919.410:9292): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 919.492050][ T31] audit: type=1400 audit(919.410:9293): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 919.492603][ T31] audit: type=1400 audit(919.410:9294): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 919.510322][ T31] audit: type=1400 audit(919.430:9295): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 919.648822][ T31] audit: type=1400 audit(919.570:9296): avc: denied { map_create } for pid=9968 comm="syz.1.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 919.654432][ T31] audit: type=1400 audit(919.580:9297): avc: denied { bpf } for pid=9968 comm="syz.1.1432" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 921.700397][ T9906] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 921.995864][ T9906] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 922.156225][ T9906] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 922.156783][ T9906] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 922.157112][ T9906] usb 2-1: Product: syz [ 922.157326][ T9906] usb 2-1: Manufacturer: syz [ 922.157568][ T9906] usb 2-1: SerialNumber: syz [ 924.631713][ T31] kauditd_printk_skb: 373 callbacks suppressed [ 924.632010][ T31] audit: type=1400 audit(924.550:9671): avc: denied { read write } for pid=9982 comm="syz.0.1436" name="vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.636102][ T31] audit: type=1400 audit(924.560:9672): avc: denied { read write open } for pid=9982 comm="syz.0.1436" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.657708][ T31] audit: type=1400 audit(924.560:9673): avc: denied { ioctl } for pid=9982 comm="syz.0.1436" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 ioctlcmd=0xaf20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.672363][ T31] audit: type=1400 audit(924.570:9674): avc: denied { read write } for pid=9982 comm="syz.0.1436" name="vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.675030][ T31] audit: type=1400 audit(924.570:9675): avc: denied { read write open } for pid=9982 comm="syz.0.1436" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.677390][ T31] audit: type=1400 audit(924.580:9676): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 924.678794][ T31] audit: type=1400 audit(924.590:9677): avc: denied { ioctl } for pid=9982 comm="syz.0.1436" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.681835][ T31] audit: type=1400 audit(924.590:9678): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 924.683708][ T31] audit: type=1400 audit(924.590:9679): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 924.685710][ T31] audit: type=1400 audit(924.590:9680): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 925.726128][ T9906] cdc_ncm 2-1:1.0: bind() failure [ 925.752947][ T9906] cdc_ncm 2-1:1.1: probe with driver cdc_ncm failed with error -71 [ 925.755216][ T9906] cdc_mbim 2-1:1.1: probe with driver cdc_mbim failed with error -71 [ 925.757914][ T9906] usbtest 2-1:1.1: probe with driver usbtest failed with error -71 [ 925.777297][ T9906] usb 2-1: USB disconnect, device number 11 [ 928.296233][ T9999] input: syz1 as /devices/virtual/input/input12 [ 933.761384][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 933.761492][ T31] audit: type=1400 audit(933.690:9716): avc: denied { read write } for pid=10007 comm="syz.0.1439" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 933.765949][ T31] audit: type=1400 audit(933.690:9717): avc: denied { read write open } for pid=10007 comm="syz.0.1439" path="/dev/raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 933.786816][ T31] audit: type=1400 audit(933.710:9718): avc: denied { ioctl } for pid=10007 comm="syz.0.1439" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 933.788343][ T31] audit: type=1400 audit(933.710:9719): avc: denied { ioctl } for pid=10007 comm="syz.0.1439" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 933.789127][ T31] audit: type=1400 audit(933.710:9720): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 933.809353][ T31] audit: type=1400 audit(933.730:9721): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 933.811912][ T31] audit: type=1400 audit(933.730:9722): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 933.812704][ T31] audit: type=1400 audit(933.730:9723): avc: denied { ioctl } for pid=10007 comm="syz.0.1439" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 933.813823][ T31] audit: type=1400 audit(933.730:9724): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 933.814617][ T31] audit: type=1400 audit(933.730:9725): avc: denied { ioctl } for pid=10007 comm="syz.0.1439" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 934.050373][ T8583] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 934.356409][ T8583] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 934.356772][ T8583] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 934.356975][ T8583] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 934.387800][ T8583] usb 1-1: config 0 descriptor?? [ 935.140436][T10016] input: syz0 as /devices/virtual/input/input13 [ 935.733060][T10026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6419 sclass=netlink_route_socket pid=10026 comm=syz.1.1442 [ 935.757141][T10026] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1442'. [ 941.674142][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 941.674209][ T31] audit: type=1400 audit(941.600:9825): avc: denied { ioctl } for pid=10007 comm="syz.0.1439" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 941.691555][ T31] audit: type=1400 audit(941.610:9826): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 941.697619][ T31] audit: type=1400 audit(941.620:9827): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 941.698452][ T31] audit: type=1400 audit(941.620:9828): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 941.700205][ T31] audit: type=1400 audit(941.620:9829): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 941.716914][ T31] audit: type=1400 audit(941.640:9830): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 944.665290][ T8583] usb 1-1: USB disconnect, device number 13 [ 944.696016][ T31] audit: type=1400 audit(944.620:9831): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 944.750340][ T31] audit: type=1400 audit(944.670:9832): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 944.752481][ T31] audit: type=1400 audit(944.670:9833): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 944.753454][ T31] audit: type=1400 audit(944.670:9834): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 947.386841][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 947.386960][ T31] audit: type=1400 audit(947.310:9844): avc: denied { read write } for pid=10048 comm="syz.0.1446" name="sequencer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 947.416776][ T31] audit: type=1400 audit(947.340:9845): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 947.420545][ T31] audit: type=1400 audit(947.340:9846): avc: denied { read write open } for pid=10048 comm="syz.0.1446" path="/dev/sequencer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 947.440665][ T31] audit: type=1400 audit(947.360:9847): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.460624][ T31] audit: type=1400 audit(947.370:9848): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 947.461524][ T31] audit: type=1400 audit(947.380:9849): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 947.474580][ T31] audit: type=1400 audit(947.400:9850): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.367498][ T31] audit: type=1400 audit(953.290:9851): avc: denied { create } for pid=10054 comm="syz.0.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 953.386102][ T31] audit: type=1400 audit(953.310:9852): avc: denied { create } for pid=10054 comm="syz.0.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 953.400710][ T31] audit: type=1400 audit(953.320:9853): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 953.402116][ T31] audit: type=1400 audit(953.320:9854): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.402860][ T31] audit: type=1400 audit(953.320:9855): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.403577][ T31] audit: type=1400 audit(953.320:9856): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.430848][ T31] audit: type=1400 audit(953.340:9857): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.432181][ T31] audit: type=1400 audit(953.350:9858): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 953.434953][ T31] audit: type=1400 audit(953.360:9859): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.441719][ T31] audit: type=1400 audit(953.370:9860): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 959.913805][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 959.913868][ T31] audit: type=1400 audit(959.840:9879): avc: denied { create } for pid=10058 comm="syz.0.1449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 959.918567][ T31] audit: type=1400 audit(959.840:9880): avc: denied { getopt } for pid=10058 comm="syz.0.1449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 959.955697][ T31] audit: type=1400 audit(959.880:9881): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 959.973395][ T31] audit: type=1400 audit(959.900:9882): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 959.976232][ T31] audit: type=1400 audit(959.900:9883): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 959.979264][ T31] audit: type=1400 audit(959.900:9884): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 959.996009][ T31] audit: type=1400 audit(959.920:9885): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 960.098876][ T31] audit: type=1400 audit(960.020:9886): avc: denied { read } for pid=10060 comm="syz.0.1450" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 960.105779][ T31] audit: type=1400 audit(960.030:9887): avc: denied { read open } for pid=10060 comm="syz.0.1450" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 960.115538][ T31] audit: type=1400 audit(960.040:9888): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 965.333723][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 965.333833][ T31] audit: type=1400 audit(965.260:9915): avc: denied { map_create } for pid=10070 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 965.340304][ T31] audit: type=1400 audit(965.260:9916): avc: denied { bpf } for pid=10070 comm="syz.0.1452" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 965.341260][ T31] audit: type=1400 audit(965.260:9917): avc: denied { map_read map_write } for pid=10070 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 965.358630][ T31] audit: type=1400 audit(965.280:9918): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 965.367935][ T31] audit: type=1400 audit(965.290:9919): avc: denied { prog_load } for pid=10070 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 965.368802][ T31] audit: type=1400 audit(965.290:9920): avc: denied { bpf } for pid=10070 comm="syz.0.1452" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 965.380443][ T31] audit: type=1400 audit(965.300:9921): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 965.381624][ T31] audit: type=1400 audit(965.300:9922): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 965.388939][ T31] audit: type=1400 audit(965.310:9923): avc: denied { perfmon } for pid=10070 comm="syz.0.1452" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 965.400279][ T31] audit: type=1400 audit(965.320:9924): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 971.018489][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 971.034039][ T31] audit: type=1400 audit(970.940:9951): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 971.066290][ T31] audit: type=1400 audit(970.980:9952): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 971.093986][ T31] audit: type=1400 audit(971.020:9953): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 971.097245][ T31] audit: type=1400 audit(971.020:9954): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 971.098123][ T31] audit: type=1400 audit(971.020:9955): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 971.130697][ T31] audit: type=1400 audit(971.050:9956): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 971.170358][ T31] audit: type=1400 audit(971.090:9957): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 971.171306][ T31] audit: type=1400 audit(971.090:9958): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 971.172337][ T31] audit: type=1400 audit(971.090:9959): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 971.210201][ T31] audit: type=1400 audit(971.130:9960): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 976.117377][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 976.117474][ T31] audit: type=1400 audit(976.040:9967): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 976.170875][ T31] audit: type=1400 audit(976.090:9968): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 976.171735][ T31] audit: type=1400 audit(976.090:9969): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 976.172353][ T31] audit: type=1400 audit(976.090:9970): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 976.183474][ T31] audit: type=1400 audit(976.110:9971): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 976.194387][ T31] audit: type=1400 audit(976.120:9972): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 976.561059][ T31] audit: type=1400 audit(976.490:9973): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 976.563730][ T31] audit: type=1400 audit(976.490:9974): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 977.499268][ T31] audit: type=1400 audit(977.420:9975): avc: denied { read write } for pid=10075 comm="syz-executor" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 977.504205][ T31] audit: type=1400 audit(977.430:9976): avc: denied { read write open } for pid=10075 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 981.329936][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 981.329991][ T31] audit: type=1400 audit(981.250:9990): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 981.331809][ T31] audit: type=1400 audit(981.260:9991): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 981.368045][ T31] audit: type=1400 audit(981.290:9992): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 981.395057][ T31] audit: type=1400 audit(981.320:9993): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 981.401994][ T31] audit: type=1400 audit(981.330:9994): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 981.427146][ T31] audit: type=1400 audit(981.340:9995): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 981.427718][ T31] audit: type=1400 audit(981.350:9996): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 981.768548][ T31] audit: type=1400 audit(981.690:9997): avc: denied { read } for pid=10149 comm="syz.0.1454" name="ubi_ctrl" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 981.792766][ T31] audit: type=1400 audit(981.720:9998): avc: denied { read open } for pid=10149 comm="syz.0.1454" path="/dev/ubi_ctrl" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 981.798295][ T31] audit: type=1400 audit(981.720:9999): avc: denied { ioctl } for pid=10149 comm="syz.0.1454" path="/dev/ubi_ctrl" dev="devtmpfs" ino=689 ioctlcmd=0x6f40 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 981.817913][T10204] ubi0: attaching mtd0 [ 981.860662][T10204] ubi0: scanning is finished [ 981.862325][T10204] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 981.865087][T10204] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 983.915628][T10075] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 983.953459][T10075] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 986.568961][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 986.569089][ T31] audit: type=1400 audit(986.490:10021): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 986.600407][ T31] audit: type=1400 audit(986.520:10022): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 986.630351][ T31] audit: type=1400 audit(986.540:10023): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 986.633237][ T31] audit: type=1400 audit(986.560:10024): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 986.635514][ T31] audit: type=1400 audit(986.560:10025): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 986.642826][ T31] audit: type=1400 audit(986.570:10026): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 987.300475][ T31] audit: type=1400 audit(987.210:10027): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 987.301382][ T31] audit: type=1400 audit(987.220:10028): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 987.328471][ T31] audit: type=1400 audit(987.250:10029): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 987.355274][ T31] audit: type=1400 audit(987.280:10030): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 989.622875][T10075] hsr_slave_0: entered promiscuous mode [ 989.626389][T10075] hsr_slave_1: entered promiscuous mode [ 989.631374][T10075] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 989.631820][T10075] Cannot create hsr debugfs directory [ 990.652742][T10075] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.716760][T10075] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.803418][T10075] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.887524][T10075] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 991.205817][T10075] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 991.237161][T10075] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 991.269236][T10075] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 991.311370][T10075] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 991.804080][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 991.804161][ T31] audit: type=1400 audit(991.730:10070): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 991.805693][ T31] audit: type=1400 audit(991.730:10071): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 992.064539][ T31] audit: type=1400 audit(991.990:10072): avc: denied { create } for pid=10399 comm="syz.0.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 992.097245][ T31] audit: type=1400 audit(992.020:10073): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 992.103620][ T31] audit: type=1400 audit(992.020:10074): avc: denied { bind } for pid=10399 comm="syz.0.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 992.113734][ T31] audit: type=1400 audit(992.030:10075): avc: denied { setopt } for pid=10399 comm="syz.0.1455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 992.114206][ T31] audit: type=1400 audit(992.040:10076): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 992.114646][ T31] audit: type=1400 audit(992.040:10077): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 992.121890][ T31] audit: type=1400 audit(992.050:10078): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 992.132843][ T31] audit: type=1400 audit(992.050:10079): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 994.534375][ T7100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 994.557414][ T7100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 994.565399][ T7100] bond0 (unregistering): Released all slaves [ 994.643309][ T7100] hsr_slave_0: left promiscuous mode [ 994.647321][ T7100] hsr_slave_1: left promiscuous mode [ 994.666283][ T7100] veth1_macvtap: left promiscuous mode [ 994.666769][ T7100] veth0_macvtap: left promiscuous mode [ 994.667124][ T7100] veth1_vlan: left promiscuous mode [ 994.667465][ T7100] veth0_vlan: left promiscuous mode [ 995.581729][T10075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 995.807440][T10420] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1461'. [ 997.026483][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 997.026567][ T31] audit: type=1400 audit(996.950:10134): avc: denied { map_create } for pid=10429 comm="syz.0.1464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 997.050196][ T31] audit: type=1400 audit(996.970:10135): avc: denied { execmem } for pid=10429 comm="syz.0.1464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 997.051085][ T31] audit: type=1400 audit(996.970:10136): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 997.060254][ T31] audit: type=1400 audit(996.970:10137): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 997.062126][ T31] audit: type=1400 audit(996.990:10138): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 997.065403][ T31] audit: type=1400 audit(996.990:10139): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 997.100239][ T31] audit: type=1400 audit(997.010:10140): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 997.101202][ T31] audit: type=1400 audit(997.010:10141): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 997.101889][ T31] audit: type=1400 audit(997.010:10142): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 997.122971][ T31] audit: type=1400 audit(997.050:10143): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1002.162859][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 1002.162909][ T31] audit: type=1400 audit(1002.090:10165): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1002.163634][ T31] audit: type=1400 audit(1002.090:10166): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1002.199164][ T31] audit: type=1400 audit(1002.120:10167): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1002.201228][ T31] audit: type=1400 audit(1002.120:10168): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1002.202283][ T31] audit: type=1400 audit(1002.120:10169): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.202861][ T31] audit: type=1400 audit(1002.120:10170): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.203344][ T31] audit: type=1400 audit(1002.120:10171): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.482981][ T31] audit: type=1400 audit(1002.410:10172): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1002.703062][ T31] audit: type=1400 audit(1002.630:10173): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1002.703598][ T31] audit: type=1400 audit(1002.630:10174): avc: denied { module_request } for pid=10075 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1007.217143][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 1007.217231][ T31] audit: type=1400 audit(1007.140:10197): avc: denied { read } for pid=10452 comm="syz.0.1465" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1007.225968][ T31] audit: type=1400 audit(1007.150:10198): avc: denied { read open } for pid=10452 comm="syz.0.1465" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1007.226587][ T31] audit: type=1400 audit(1007.150:10199): avc: denied { create } for pid=10452 comm="syz.0.1465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1007.247714][ T31] audit: type=1400 audit(1007.170:10200): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1007.265678][ T31] audit: type=1400 audit(1007.190:10201): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1007.268644][ T31] audit: type=1400 audit(1007.190:10202): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1007.280449][ T31] audit: type=1400 audit(1007.200:10203): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1007.285647][ T31] audit: type=1400 audit(1007.210:10204): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1007.293348][ T31] audit: type=1400 audit(1007.220:10205): avc: denied { connect } for pid=10452 comm="syz.0.1465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1007.404770][ T31] audit: type=1400 audit(1007.330:10206): avc: denied { sys_module } for pid=10075 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1008.867039][T10075] veth0_vlan: entered promiscuous mode [ 1008.923487][T10075] veth1_vlan: entered promiscuous mode [ 1009.131246][T10075] veth0_macvtap: entered promiscuous mode [ 1009.176644][T10075] veth1_macvtap: entered promiscuous mode [ 1009.405622][T10075] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1009.406552][T10075] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1009.407094][T10075] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1009.407457][T10075] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1011.364526][T10468] syz.1.1466 (10468): drop_caches: 2 [ 1013.318002][ T31] kauditd_printk_skb: 1083 callbacks suppressed [ 1013.318100][ T31] audit: type=1400 audit(1013.240:11290): avc: denied { read write } for pid=10075 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1013.340268][ T31] audit: type=1400 audit(1013.260:11291): avc: denied { read write open } for pid=10075 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1013.341260][ T31] audit: type=1400 audit(1013.260:11292): avc: denied { ioctl } for pid=10075 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1013.443239][ T31] audit: type=1400 audit(1013.370:11293): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1013.450428][ T31] audit: type=1400 audit(1013.370:11294): avc: denied { search } for pid=2926 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.470408][ T31] audit: type=1400 audit(1013.380:11295): avc: denied { append } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1013.471583][ T31] audit: type=1400 audit(1013.390:11296): avc: denied { append open } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1013.472567][ T31] audit: type=1400 audit(1013.400:11297): avc: denied { getattr } for pid=2926 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1013.831335][ T31] audit: type=1400 audit(1013.750:11298): avc: denied { read } for pid=10469 comm="syz.1.1467" name="uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1013.866155][ T31] audit: type=1400 audit(1013.790:11299): avc: denied { read open } for pid=10469 comm="syz.1.1467" path="/dev/uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1017.464131][ C1] ------------[ cut here ]------------ [ 1017.464615][ C1] WARNING: CPU: 1 PID: 3810 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 1017.464964][ C1] refcount_t: underflow; use-after-free. [ 1017.465214][ C1] Modules linked in: [ 1017.466184][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1017.466818][ C1] CPU: 1 UID: 0 PID: 3810 Comm: kworker/1:4 Not tainted 6.11.0-syzkaller #0 [ 1017.467315][ C1] Hardware name: ARM-Versatile Express [ 1017.467931][ C1] Workqueue: events nsim_dev_trap_report_work [ 1017.474043][ C1] Call trace: frame pointer underflow [ 1017.478118][ C1] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 1017.478617][ C1] r7:00000000 r6:826228c4 r5:00000000 r4:8200e404 [ 1017.478883][ C1] [<81966d9c>] (show_stack) from [<81984a58>] (dump_stack_lvl+0x54/0x7c) [ 1017.479225][ C1] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 1017.479721][ C1] r5:00000000 r4:8286ed18 [ 1017.479948][ C1] [<81984a80>] (dump_stack) from [<8196785c>] (panic+0x120/0x368) [ 1017.480281][ C1] [<8196773c>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 1017.480640][ C1] r3:8260c5c4 r2:00000001 r1:81ff6c38 r0:81ffea04 [ 1017.480903][ C1] r7:8081a110 [ 1017.481132][ C1] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 1017.481485][ C1] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1017.481841][ C1] r8:00000009 r7:8205cdc4 r6:df805c64 r5:8487e000 r4:00000000 [ 1017.482105][ C1] [<80242430>] (warn_slowpath_fmt) from [<8081a110>] (refcount_warn_saturate+0x13c/0x174) [ 1017.482539][ C1] r10:20000113 r9:85256d5c r8:8435bcc0 r7:00000000 r6:817f7394 r5:00000002 [ 1017.482952][ C1] r4:8435bcc0 [ 1017.483118][ C1] [<80819fd4>] (refcount_warn_saturate) from [<8146782c>] (sk_skb_reason_drop+0x1d8/0x248) [ 1017.483521][ C1] [<81467654>] (sk_skb_reason_drop) from [<817f7394>] (j1939_xtp_rx_cts+0x220/0x3d0) [ 1017.483865][ C1] r9:85256d5c r8:8435bcc0 r7:84864b58 r6:00000df2 r5:85256d00 r4:85256d14 [ 1017.484163][ C1] [<817f7174>] (j1939_xtp_rx_cts) from [<817f8308>] (j1939_tp_recv+0x3f4/0x530) [ 1017.484565][ C1] r10:ddde4ec8 r9:00000040 r8:84864b50 r7:846e3000 r6:846e3008 r5:846e3000 [ 1017.484842][ C1] r4:843a2e40 [ 1017.485000][ C1] [<817f7f14>] (j1939_tp_recv) from [<817f1da0>] (j1939_can_recv+0x1e4/0x2dc) [ 1017.485368][ C1] r7:846e3000 r6:846e3008 r5:846e3810 r4:843a2e40 [ 1017.485626][ C1] [<817f1bbc>] (j1939_can_recv) from [<817e7b6c>] (can_rcv_filter+0x9c/0x218) [ 1017.485982][ C1] r9:00000040 r8:847786a0 r7:98c80000 r6:843a2d80 r5:00000001 r4:85122e70 [ 1017.486507][ C1] [<817e7ad0>] (can_rcv_filter) from [<817e8510>] (can_receive+0xb4/0xf0) [ 1017.486855][ C1] r9:00000040 r8:00000000 r7:84778000 r6:841a8c80 r5:84471a00 r4:843a2d80 [ 1017.487156][ C1] [<817e845c>] (can_receive) from [<817e85d0>] (can_rcv+0x84/0xac) [ 1017.487506][ C1] r9:00000040 r8:00000002 r7:00000000 r6:00000000 r5:817e854c r4:843a2d80 [ 1017.487802][ C1] [<817e854c>] (can_rcv) from [<814886a4>] (__netif_receive_skb_one_core+0x5c/0x80) [ 1017.488166][ C1] r5:817e854c r4:84778000 [ 1017.488524][ C1] [<81488648>] (__netif_receive_skb_one_core) from [<81488710>] (__netif_receive_skb+0x18/0x5c) [ 1017.489510][ C1] r5:ddde4fb0 r4:843a2d80 [ 1017.490169][ C1] [<814886f8>] (__netif_receive_skb) from [<81488a00>] (process_backlog+0x88/0x15c) [ 1017.490667][ C1] r5:ddde4fb0 r4:843a2d80 [ 1017.492737][ C1] [<81488978>] (process_backlog) from [<81489904>] (__napi_poll+0x34/0x240) [ 1017.499806][ C1] r10:ddde4ec0 r9:ddde5100 r8:df805ea0 r7:df805e9b r6:00000040 r5:ddde4fb0 [ 1017.500262][ C1] r4:00000001 [ 1017.500423][ C1] [<814898d0>] (__napi_poll) from [<8148a13c>] (net_rx_action+0x338/0x420) [ 1017.500866][ C1] r9:ddde5100 r8:df805ea0 r7:0000012c r6:0001183d r5:ddde4fb0 r4:00000000 [ 1017.501596][ C1] [<81489e04>] (net_rx_action) from [<8024b5d8>] (handle_softirqs+0x15c/0x468) [ 1017.501968][ C1] r10:00000008 r9:8487e000 r8:00000101 r7:04208060 r6:00000003 r5:00000004 [ 1017.502298][ C1] r4:8260408c [ 1017.502490][ C1] [<8024b47c>] (handle_softirqs) from [<8024b9d4>] (__irq_exit_rcu+0xa4/0x164) [ 1017.502853][ C1] r10:00000000 r9:8487e000 r8:00000000 r7:e0221d58 r6:821af29c r5:821ef71c [ 1017.503155][ C1] r4:8487e000 [ 1017.503354][ C1] [<8024b930>] (__irq_exit_rcu) from [<8024bcd4>] (irq_exit+0x10/0x18) [ 1017.503693][ C1] r5:821ef71c r4:824b8b5c [ 1017.503894][ C1] [<8024bcc4>] (irq_exit) from [<81985354>] (generic_handle_arch_irq+0x7c/0x80) [ 1017.504295][ C1] [<819852d8>] (generic_handle_arch_irq) from [<81936768>] (call_with_stack+0x1c/0x20) [ 1017.504714][ C1] r9:8487e000 r8:80000013 r7:e0221d8c r6:ffffffff r5:20000013 r4:809c4ce4 [ 1017.505011][ C1] [<8193674c>] (call_with_stack) from [<80200bcc>] (__irq_svc+0x8c/0xbc) [ 1017.505341][ C1] Exception stack(0xe0221d58 to 0xe0221da0) [ 1017.505659][ C1] 1d40: 00000001 8200e404 [ 1017.505989][ C1] 1d60: 00000000 00000001 ddde246c 00000006 e0221dd4 841b2000 80000013 82902580 [ 1017.506329][ C1] 1d80: 00000000 e0221dcc e0221d98 e0221da8 81985f90 809c4ce4 20000013 ffffffff [ 1017.506656][ C1] [<809c4c74>] (crng_make_state) from [<809c4e38>] (_get_random_bytes+0x94/0x124) [ 1017.507031][ C1] r9:841b2000 r8:00000006 r7:e0221e14 r6:e0221dd4 r5:841b2000 r4:00000006 [ 1017.507326][ C1] [<809c4da4>] (_get_random_bytes) from [<809c4ed8>] (get_random_bytes+0x10/0x14) [ 1017.507698][ C1] r8:00000060 r7:8465ac80 r6:81b8f548 r5:8465a4e0 r4:843a20c0 [ 1017.507965][ C1] [<809c4ec8>] (get_random_bytes) from [<80d6ed9c>] (nsim_dev_trap_report_work+0x10c/0x33c) [ 1017.508359][ C1] [<80d6ec90>] (nsim_dev_trap_report_work) from [<80265ef4>] (process_one_work+0x1b4/0x4f4) [ 1017.508750][ C1] r10:82c16205 r9:8487e000 r8:01800000 r7:ddde3f40 r6:82c16200 r5:8465ac80 [ 1017.509141][ C1] r4:85278600 [ 1017.509318][ C1] [<80265d40>] (process_one_work) from [<80266ad8>] (worker_thread+0x1ec/0x3bc) [ 1017.510090][ C1] r10:8487e000 r9:8527862c r8:61c88647 r7:ddde3f60 r6:82604d40 r5:ddde3f40 [ 1017.511135][ C1] r4:85278600 [ 1017.511517][ C1] [<802668ec>] (worker_thread) from [<8026faf4>] (kthread+0x104/0x134) [ 1017.519618][ C1] r10:00000000 r9:df95de78 r8:8524d280 r7:85278600 r6:802668ec r5:8487e000 [ 1017.520061][ C1] r4:8527ff80 [ 1017.520235][ C1] [<8026f9f0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1017.520823][ C1] Exception stack(0xe0221fb0 to 0xe0221ff8) [ 1017.521083][ C1] 1fa0: 00000000 00000000 00000000 00000000 [ 1017.521851][ C1] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1017.522532][ C1] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1017.522820][ C1] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026f9f0 r4:8527ff80 [ 1017.524216][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 22:22:08 Registers: info registers vcpu 0 CPU#0 R00=b07a6000 R01=ec673000 R02=00000001 R03=802199f8 R04=7f00b000 R05=00000001 R06=828bef68 R07=7f00b000 R08=ec673000 R09=8260cad0 R10=828bfb8c R11=dfa59dbc R12=dfa59dc0 R13=dfa59d90 R14=802109dc R15=80219a10 PSR=80000013 N--- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=d29be83c s05=4e0de37b d02=4e0de37bd29be83c s06=00000000 s07=00000000 d03=0000000000000000 s08=cba65d40 s09=d1415bce d04=d1415bcecba65d40 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=471d534e s21=952722a1 d10=952722a1471d534e s22=4b129b63 s23=00000000 d11=000000004b129b63 s24=10203246 s25=00000000 d12=0000000010203246 s26=74000000 s27=fff8c4e2 d13=fff8c4e274000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=017a0a36 s33=ff542fc2 d16=ff542fc2017a0a36 s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=022ef429 s43=00000000 d21=00000000022ef429 s44=00000004 s45=00000000 d22=0000000000000004 s46=00ba5163 s47=00000000 d23=0000000000ba5163 s48=ff18f08c s49=f5fd0327 d24=f5fd0327ff18f08c s50=0dd40a59 s51=00000000 d25=000000000dd40a59 s52=ffa71af8 s53=ffd6dcd4 d26=ffd6dcd4ffa71af8 s54=fe699a51 s55=ffbd8682 d27=ffbd8682fe699a51 s56=00adadc1 s57=ffcbc8cc d28=ffcbc8cc00adadc1 s58=ffe5e466 s59=fe699a51 d29=fe699a51ffe5e466 s60=72f26a18 s61=fff8c4e2 d30=fff8c4e272f26a18 s62=984c27ed s63=00771216 d31=00771216984c27ed FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00001b93 R03=dddd9400 R04=00000000 R05=828711f8 R06=00000000 R07=df805a20 R08=828711f8 R09=df805a1f R10=81ff9258 R11=df805a0c R12=df8059a0 R13=df8059a0 R14=802bd7a8 R15=802bd7a8 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004c27e9 s17=004ca335 d08=004ca335004c27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=080001c8 s33=01d00300 d16=01d00300080001c8 s34=03000800 s35=040001d8 d17=040001d803000800 s36=01dc0300 s37=03000400 d18=0300040001dc0300 s38=bf0801e0 s39=ffffffff d19=ffffffffbf0801e0 s40=ffffffff s41=00000001 d20=00000001ffffffff s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=1fa7d724 s53=238e37ad d26=238e37ad1fa7d724 s54=17a84c4a s55=2304db81 d27=2304db8117a84c4a s56=b8eb0689 s57=f27bf830 d28=f27bf830b8eb0689 s58=95c12f04 s59=cd431262 d29=cd43126295c12f04 s60=8339e552 s61=1606e0ed d30=1606e0ed8339e552 s62=617cbe3b s63=c65ae8c7 d31=c65ae8c7617cbe3b FPSCR: 00000000