last executing test programs: 11m9.017381556s ago: executing program 0 (id=1774): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000100)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r2, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r2, 0x8, 0x2, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_DEVKEY={0x18, 0x2f, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xffffff4f}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x4000041) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r1) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r5, 0x8, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40080}, 0x24008094) (async) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) (async) r6 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f00000004c0)) (async) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) (async) preadv(r6, &(0x7f0000001b40)=[{&(0x7f0000000600)=""/128, 0x80}, {&(0x7f0000000680)=""/180, 0xb4}, {&(0x7f0000000740)=""/176, 0xb0}, {&(0x7f0000000800)=""/253, 0xfd}, {&(0x7f0000000900)}, {&(0x7f0000000940)=""/156, 0x9c}, {&(0x7f0000000a00)=""/80, 0x50}, {&(0x7f0000000a80)=""/143, 0x8f}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x9, 0x1ff, 0x81) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000001bc0)={"94719a37b7255897d3e360499620b725", 0x0, 0x0, {0xb377, 0x5}, {0x6, 0xff}, 0x0, [0x1, 0x1, 0x6, 0x1, 0xffffffffffffffff, 0x9, 0x8, 0x2c78, 0x6, 0x4, 0x40, 0x3, 0x101, 0x9d85, 0x7]}) ioctl$BTRFS_IOC_WAIT_SYNC(r6, 0x40089416, &(0x7f0000001cc0)=r7) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001d40), r0) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001e00)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001dc0)={&(0x7f0000001d80)={0x1c, r8, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_LBT_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c004}, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000001f00)={&(0x7f0000001e40)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e80)={0x1c, r2, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_LBT_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x200088b4) (async) r9 = syz_socket_connect_nvme_tcp() recvmsg$inet_nvme(r9, &(0x7f0000002040)={&(0x7f0000001f40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001fc0)=""/58, 0x3a}], 0x1}, 0x40000000) finit_module(r9, &(0x7f0000002080)='NLBL_UNLBL\x00', 0x0) (async) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f0000002180)={&(0x7f00000020c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002140)={&(0x7f0000002100)={0x14, r5, 0x200, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004800}, 0x20000010) openat$null(0xffffff9c, &(0x7f00000021c0), 0x100, 0x0) r10 = openat$cgroup_root(0xffffff9c, &(0x7f0000002200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r10, &(0x7f0000002240)='devices.allow\x00', 0x2, 0x0) (async) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r1, &(0x7f0000002340)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002300)={&(0x7f00000022c0)={0x3c, r8, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_OUT_KEY_ID={0x28, 0x2b, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}]}]}]}, 0x3c}}, 0x20004001) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_MODE(r11, &(0x7f0000002440)={&(0x7f0000002380)={0x10, 0x0, 0x0, 0x141000}, 0xc, &(0x7f0000002400)={&(0x7f00000023c0)={0x38, r2, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x3}, @NL802154_ATTR_CCA_MODE={0x8, 0xc, 0x6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x80000000}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 11m6.497368524s ago: executing program 0 (id=1776): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$xdp(r0, &(0x7f0000001500)={&(0x7f0000000040)={0x2c, 0x5, r1, 0x2a}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000080)="08ea1f26b0456ccbb6ce4ceff33fd43c0d1b2fceb64cb4cd53f03efbc13bc3269772c19935d181fb997ac437eedc1bc74a73583a01b8c1df", 0x38}, {&(0x7f00000000c0)="24cee84d651f1374cd742215fc174fbd597789c8a0fdfb97f2be74b2fcbc98f72923a8543ef68d04325da7fa03b2db6e9effdf96bc248c758af6bbb54332934bfa7eaecda6b18d55add83465e02d2f21cc9bb784dc87dbf19b85506f8285e74871bc8120fb2296badeafcd35be81f9063406e344ab11e44acec2", 0x7a}, {&(0x7f0000000140)='ks', 0x2}, {&(0x7f0000000240)="bc1af460247e85f9e3f27a9daa2ff1b6aadfc24e7cb36f8a1ea66400e846f54d174748e67bd3c64921b09acd4af8f3acdadcd407121f16a4e6cc4c5c1bb3a44f3541d7ba45860ab6ce9416e22aef7479c576425b3de80014ba9c5ff2c10c46eabbb8dedbfb91abb012c5349e11247398f5a87a8546fd9fba1c97b97abd71a9207fb5dec0a7ae7253a97f0a91345b964cf157caf6f8ebfde0e0fcef719abfd95399ba", 0xa2}, {&(0x7f0000000180)="a19eb0e999d637592a80936dc3376689a4e4c9c4e29999bc0f15a1db90982ad146b517630c8d1a51a885d701fc2c1822c77dc0c4af2f467fa9fec9eb5045f9239a48beac03956efe686db06acf5d24dd8ab697751222bdb1187ded2ab4281d5566a69ba82d12f802a66b4dc845ddabff3b0aa8536e553c", 0x77}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000340)="69dd050bc604df870fa01d53e4d91ad84a49dc", 0x13}, {&(0x7f00000003c0)='d', 0x1}, {&(0x7f0000001440)="69925b693ffd7a039ebd8502e8f0ccd1cb0f115b9489ef2691f724eddfce75307ee4a08912511efba3b2f65c074fbbc4c71042c35f935d53c85b1d740aa5ad9c", 0x40}], 0x9, 0x0, 0x0, 0xc000}, 0x4000) bind$can_j1939(r0, &(0x7f0000000200)={0x1d, r1, 0x8000000000000003, {}, 0xfd}, 0x18) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)={0x14, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x80) 11m5.138124315s ago: executing program 0 (id=1778): syz_genetlink_get_family_id$devlink(&(0x7f00000013c0), 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {{}, {}, {0x18, 0x17, {0xc, 0x4, @udp='udp:syz2\x00'}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20040810}, 0x8802) 11m4.884191196s ago: executing program 0 (id=1779): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x1a, &(0x7f000000ddc0)=""/4096, &(0x7f000000edc0)=0x1000) r2 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', r2, &(0x7f0000000240)='./file0/file0\x00', 0x276) 11m4.268036284s ago: executing program 0 (id=1780): r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000023c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x5}, 0x1c, 0x0}}], 0x1, 0xc090) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) 11m2.494187498s ago: executing program 0 (id=1781): timer_create(0x7, &(0x7f0000000200)={0x0, 0x11}, &(0x7f00000000c0)) r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x33fe0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x405) 11m2.468018371s ago: executing program 32 (id=1781): timer_create(0x7, &(0x7f0000000200)={0x0, 0x11}, &(0x7f00000000c0)) r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x33fe0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x5}, 0x405) 25.038067973s ago: executing program 1 (id=2973): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r2, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) r3 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x700, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1006}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x440b0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x1, {0x0, 0x0, 0x0, r5, {}, {0x0, 0x5}}}, 0x24}}, 0x10) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) 23.920601547s ago: executing program 1 (id=2974): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x4}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_newaddr={0x3c, 0x14, 0x503, 0x800000, 0x25dfdbff, {0x2, 0x7, 0x51, 0xff, r4}, [@IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_BROADCAST={0x8, 0x4, @multicast2}, @IFA_LABEL={0x14, 0x3, 'veth0_to_bridge\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc090}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x4e21, @empty=0x7f000000}}) 23.752939858s ago: executing program 1 (id=2975): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0xffff0000}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 23.580095641s ago: executing program 1 (id=2976): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='c *:4\t', @ANYRESHEX=r1], 0xa) 23.371883038s ago: executing program 1 (id=2977): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setpriority(0x2, 0x0, 0x7) 19.0084741s ago: executing program 2 (id=2986): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d0101100000000904000003fe03010009cd8d1f0002000000090505020000fcffff09058b1e20"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000480)={0x34, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, 0x0, 0x62) 18.488886317s ago: executing program 2 (id=2987): openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080001}, 0x4048806) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000a00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000340)='percpu_alloc_percpu\x00', r0}, 0x18) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x4001af84, &(0x7f0000000000)) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) close(0x3) unshare(0x2040400) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x26, 0x0, @void}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 17.938393688s ago: executing program 2 (id=2988): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x50) r1 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x1, 0x0) fchdir(r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) bind$unix(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=@newtaction={0x18, 0x30, 0x100, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 17.289086322s ago: executing program 2 (id=2989): r0 = socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r2, 0x3ba0, &(0x7f0000000100)={0x48, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_GET_HW_INFO(r2, 0x3b8a, &(0x7f0000000380)={0x28, 0x0, r3, 0x0, 0x0}) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r6 = socket(0x2c, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r7, &(0x7f0000000580), &(0x7f0000000080)=@udp6=r6}, 0x20) timer_settime(0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 2.809320748s ago: executing program 1 (id=2990): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='sched_switch\x00', r3}, 0x18) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x7e0, 0x628, 0x3f8, 0x3f8, 0x0, 0x628, 0x710, 0x710, 0x710, 0x710, 0x710, 0x6, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @mcast1, [], [], 'veth1\x00', 'syz_tun\x00'}, 0x11e, 0xa8, 0x1d0, 0x1f000000, {0x0, 0x7}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'unconfined\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x7400, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@dev, @empty, @remote, @private2, @private1, @dev, @loopback, @mcast2, @local, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @loopback, @local, @private1, @dev]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'nr0\x00'}}}, {{@ipv6={@empty, @private0, [], [], 'sit0\x00', 'sit0\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@dst={{0x48}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x68}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x840) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x3c}}, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000280)={{0xfffe, 0x60}, 'syz0\x00', 0x19}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f00000028c0)={0x2020}, 0x2020) 208.503513ms ago: executing program 2 (id=2991): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e22, 0x9, @loopback, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x23, @loopback, 0x23}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 0s ago: executing program 2 (id=2992): close(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r3}, 0x10) r4 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000180)='/dev/comedi3\x00', 0xc00, 0x0) ioctl$COMEDI_DEVCONFIG(r4, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r4, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x40404f26, 0x5, 0x2, 0xf0000, 0xc, 0x9, 0xfff, 0x5c95238c, 0xa, 0x3bf, 0x802, 0x1600, 0x5, 0x20000001, 0x809, 0x400e1c8, 0x6, 0x7, 0x402, 0x199, 0x6, 0x4, 0xb, 0x402, 0x0, 0x3, 0xef, 0x0, 0xa, 0x8000003, 0xdffffffd]}) kernel console output (not intermixed with test programs): [ 1345.397295][T14654] r7:20000500 r6:00000010 r5:85bb5cc1 r4:00000003 [ 1345.397482][T14654] [<81558f04>] (__sys_connect) from [<81558fdc>] (sys_connect+0x10/0x14) [ 1345.397627][T14654] r7:0000011b r6:00130918 r5:00000000 r4:00000000 [ 1345.397786][T14654] [<81558fcc>] (sys_connect) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1345.398037][T14654] Exception stack(0xe0065fa8 to 0xe0065ff0) [ 1345.398090][T14654] 5fa0: 00000000 00000000 00000003 20000500 00000010 00000000 [ 1345.398241][T14654] 5fc0: 00000000 00000000 00130918 0000011b 00300000 00000000 00006364 76f670bc [ 1345.398333][T14654] 5fe0: 76f66ec0 76f66eb0 00019294 00132970 [ 1346.692771][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 1346.693343][ T29] audit: type=1400 audit(1346.610:32251): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1346.724273][ T29] audit: type=1400 audit(1346.640:32252): avc: denied { write } for pid=14664 comm="syz.2.2709" name="nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1346.724590][ T29] audit: type=1400 audit(1346.640:32254): avc: denied { write open } for pid=14664 comm="syz.2.2709" path="/dev/nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1346.724836][ T29] audit: type=1400 audit(1346.640:32253): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1346.751283][ T29] audit: type=1400 audit(1346.660:32255): avc: denied { recv } for pid=12681 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1346.751534][ T29] audit: type=1400 audit(1346.660:32256): avc: denied { create } for pid=14664 comm="syz.2.2709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1346.751651][ T29] audit: type=1400 audit(1346.670:32257): avc: denied { recv } for pid=2913 comm="klogd" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1346.761419][ T29] audit: type=1400 audit(1346.670:32258): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1346.761708][ T29] audit: type=1400 audit(1346.670:32259): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1346.763888][ T29] audit: type=1400 audit(1346.680:32260): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1349.259804][T14686] FAULT_INJECTION: forcing a failure. [ 1349.259804][T14686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1349.260801][T14686] CPU: 1 UID: 0 PID: 14686 Comm: syz.2.2714 Not tainted syzkaller #0 PREEMPT [ 1349.260855][T14686] Hardware name: ARM-Versatile Express [ 1349.260868][T14686] Call trace: [ 1349.260890][T14686] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1349.261156][T14686] r7:00006364 r6:00000000 r5:60000013 r4:82252738 [ 1349.261186][T14686] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1349.261247][T14686] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1349.261332][T14686] r5:83f76000 r4:8294f5d0 [ 1349.261346][T14686] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1349.261504][T14686] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1349.261585][T14686] r8:00000000 r7:00006364 r6:76f670bc r5:83f76830 r4:76f66bb8 [ 1349.261599][T14686] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1349.261645][T14686] [<80987274>] (should_fail_usercopy) from [<8022b414>] (setup_sigframe+0xe4/0x1c4) [ 1349.261707][T14686] [<8022b330>] (setup_sigframe) from [<8022babc>] (do_work_pending+0x2e4/0x4e8) [ 1349.261758][T14686] r10:00000077 r9:b5403587 r8:00000000 r7:83f76830 r6:76f66bb8 r5:ea525fb0 [ 1349.261774][T14686] r4:83f76000 [ 1349.261785][T14686] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 1349.261822][T14686] Exception stack(0xea525fb0 to 0xea525ff8) [ 1349.261889][T14686] 5fa0: fffffffc 00000463 00000000 41000004 [ 1349.261936][T14686] 5fc0: 00000000 00000000 00130918 00000118 00300000 00000000 00006364 76f670bc [ 1349.261990][T14686] 5fe0: 76f66ec0 76f66eb0 00019294 00132970 60000010 00000011 [ 1349.262050][T14686] r10:00000077 r9:83f76000 r8:00000000 r7:00000077 r6:00130918 r5:00000000 [ 1349.262065][T14686] r4:00000000 [ 1351.777483][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 1351.778244][ T29] audit: type=1400 audit(1351.660:32405): avc: denied { open } for pid=14714 comm="syz.1.2720" path="net:[4026532743]" dev="nsfs" ino=4026532743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1351.779088][ T29] audit: type=1400 audit(1351.690:32406): avc: denied { create } for pid=14714 comm="syz.1.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1351.803156][ T29] audit: type=1400 audit(1351.720:32407): avc: denied { write } for pid=14714 comm="syz.1.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1351.808291][ T29] audit: type=1400 audit(1351.720:32408): avc: denied { read write } for pid=14714 comm="syz.1.2720" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1351.824174][ T29] audit: type=1400 audit(1351.740:32409): avc: denied { open } for pid=14714 comm="syz.1.2720" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1351.871106][ T29] audit: type=1400 audit(1351.780:32410): avc: granted { setsecparam } for pid=14714 comm="syz.1.2720" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1351.911524][ T29] audit: type=1400 audit(1351.820:32411): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1351.912473][ T29] audit: type=1400 audit(1351.830:32412): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1351.946169][ T29] audit: type=1400 audit(1351.860:32413): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1351.985874][ T29] audit: type=1400 audit(1351.900:32414): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1352.346093][T14719] FAULT_INJECTION: forcing a failure. [ 1352.346093][T14719] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.346492][T14719] CPU: 0 UID: 0 PID: 14719 Comm: syz.2.2722 Not tainted syzkaller #0 PREEMPT [ 1352.346547][T14719] Hardware name: ARM-Versatile Express [ 1352.346614][T14719] Call trace: [ 1352.346664][T14719] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1352.346734][T14719] r7:00000000 r6:00000000 r5:60000013 r4:82252738 [ 1352.346744][T14719] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1352.346775][T14719] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1352.346807][T14719] r5:849d3000 r4:82918840 [ 1352.346816][T14719] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1352.346851][T14719] [<80987034>] (should_fail_ex) from [<8052f600>] (should_failslab+0x6c/0x94) [ 1352.346895][T14719] r8:849d3000 r7:00000000 r6:00400cc0 r5:ffffffff r4:832ca240 [ 1352.346905][T14719] [<8052f594>] (should_failslab) from [<8050f890>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 1352.346939][T14719] [<8050f840>] (kmem_cache_alloc_node_noprof) from [<81564bb4>] (__alloc_skb+0x138/0x160) [ 1352.346981][T14719] r10:ea711d18 r9:00000000 r8:00400cc0 r7:00000000 r6:832ca240 r5:ffffffff [ 1352.346991][T14719] r4:828060c0 [ 1352.347000][T14719] [<81564a7c>] (__alloc_skb) from [<8156cd64>] (alloc_skb_with_frags+0x44/0x1ec) [ 1352.347037][T14719] r8:802c118c r7:ea711cc4 r6:00000000 r5:00001000 r4:00000003 [ 1352.347046][T14719] [<8156cd20>] (alloc_skb_with_frags) from [<8155d64c>] (sock_alloc_send_pskb+0x1f4/0x228) [ 1352.347087][T14719] r10:ea711d18 r9:00000000 r8:802c118c r7:ea711cc4 r6:849d3000 r5:7fffffff [ 1352.347098][T14719] r4:8b4b6d80 [ 1352.347107][T14719] [<8155d458>] (sock_alloc_send_pskb) from [<8183a470>] (unix_dgram_sendmsg+0x124/0x720) [ 1352.347147][T14719] r10:00000000 r9:ea711dc4 r8:849d3000 r7:8b4b6d80 r6:00000000 r5:00000000 [ 1352.347158][T14719] r4:ea711f20 [ 1352.347167][T14719] [<8183a34c>] (unix_dgram_sendmsg) from [<8183aab0>] (unix_seqpacket_sendmsg+0x44/0x84) [ 1352.347201][T14719] r10:00000000 r9:ea711dc4 r8:ea711dc4 r7:00000000 r6:8512b680 r5:ea711f20 [ 1352.347211][T14719] r4:00000000 [ 1352.347220][T14719] [<8183aa6c>] (unix_seqpacket_sendmsg) from [<815573a4>] (__sock_sendmsg+0x44/0x78) [ 1352.347249][T14719] r5:ea711f20 r4:00000000 [ 1352.347277][T14719] [<81557360>] (__sock_sendmsg) from [<81557b6c>] (____sys_sendmsg+0x298/0x2cc) [ 1352.347375][T14719] r7:00000000 r6:8512b680 r5:00000810 r4:ea711f20 [ 1352.347437][T14719] [<815578d4>] (____sys_sendmsg) from [<81559b34>] (___sys_sendmsg+0x9c/0xd0) [ 1352.347557][T14719] r10:ea711e24 r9:20000780 r8:00000810 r7:00000000 r6:8512b680 r5:ea711f20 [ 1352.347855][T14719] r4:00000000 [ 1352.348057][T14719] [<81559a98>] (___sys_sendmsg) from [<81559fcc>] (__sys_sendmsg+0x8c/0xe0) [ 1352.348149][T14719] r10:00000128 r9:849d3000 r8:85bb59c0 r7:00000810 r6:20000780 r5:85bb59c1 [ 1352.348162][T14719] r4:00000005 [ 1352.348403][T14719] [<81559f40>] (__sys_sendmsg) from [<8155a034>] (sys_sendmsg+0x14/0x18) [ 1352.348692][T14719] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 1352.348781][T14719] [<8155a020>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1352.348905][T14719] Exception stack(0xea711fa8 to 0xea711ff0) [ 1352.348932][T14719] 1fa0: 00000000 00000000 00000005 20000780 00000810 00000000 [ 1352.348952][T14719] 1fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f670bc [ 1352.348967][T14719] 1fe0: 76f66ec0 76f66eb0 00019294 00132970 [ 1356.889139][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 1356.889970][ T29] audit: type=1400 audit(1356.800:32532): avc: denied { create } for pid=14743 comm="syz.1.2729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1357.089570][ T29] audit: type=1400 audit(1356.980:32533): avc: denied { ioctl } for pid=14725 comm="syz.2.2724" path="socket:[31093]" dev="sockfs" ino=31093 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1357.196129][ T29] audit: type=1400 audit(1357.100:32534): avc: denied { read append } for pid=14725 comm="syz.2.2724" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1357.218141][ T29] audit: type=1400 audit(1357.120:32535): avc: denied { open } for pid=14725 comm="syz.2.2724" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1357.695606][ T29] audit: type=1400 audit(1357.610:32536): avc: denied { ioctl } for pid=14725 comm="syz.2.2724" path="/dev/fb0" dev="devtmpfs" ino=616 ioctlcmd=0x4525 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1357.799765][ T29] audit: type=1400 audit(1357.700:32537): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.800203][ T29] audit: type=1400 audit(1357.710:32538): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.810610][ T29] audit: type=1400 audit(1357.720:32539): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.811071][ T29] audit: type=1400 audit(1357.720:32540): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.824487][ T29] audit: type=1400 audit(1357.740:32541): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1361.918275][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 1361.919043][ T29] audit: type=1400 audit(1361.830:32599): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1361.929665][ T29] audit: type=1400 audit(1361.840:32600): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1361.972389][ T29] audit: type=1400 audit(1361.890:32601): avc: denied { recv } for pid=1235 comm="kworker/u8:7" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1361.985146][ T29] audit: type=1400 audit(1361.890:32602): avc: denied { recv } for pid=1235 comm="kworker/u8:7" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1361.988355][ T29] audit: type=1400 audit(1361.900:32603): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1362.001044][ T29] audit: type=1400 audit(1361.900:32604): avc: denied { recv } for pid=14758 comm="syz.1.2733" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1362.003768][ T29] audit: type=1400 audit(1361.900:32605): avc: denied { recv } for pid=14758 comm="syz.1.2733" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1362.006097][ T29] audit: type=1400 audit(1361.910:32606): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1362.011501][ T29] audit: type=1400 audit(1361.910:32607): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1362.056603][ T29] audit: type=1400 audit(1361.970:32608): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1362.526736][T14766] FAULT_INJECTION: forcing a failure. [ 1362.526736][T14766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1362.527323][T14766] CPU: 0 UID: 0 PID: 14766 Comm: syz.2.2736 Not tainted syzkaller #0 PREEMPT [ 1362.527422][T14766] Hardware name: ARM-Versatile Express [ 1362.527451][T14766] Call trace: [ 1362.527498][T14766] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1362.527673][T14766] r7:dfa3de20 r6:00000000 r5:60000013 r4:82252738 [ 1362.528287][T14766] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1362.528480][T14766] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1362.528594][T14766] r5:849d3000 r4:8294f5d0 [ 1362.528868][T14766] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1362.529122][T14766] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1362.529215][T14766] r8:04040000 r7:dfa3de20 r6:200009c0 r5:00000000 r4:dfa3df20 [ 1362.529236][T14766] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1362.529286][T14766] [<80987274>] (should_fail_usercopy) from [<815599b8>] (copy_msghdr_from_user+0x50/0x130) [ 1362.529346][T14766] [<81559968>] (copy_msghdr_from_user) from [<81559b10>] (___sys_sendmsg+0x78/0xd0) [ 1362.529520][T14766] r8:04040000 r7:00000000 r6:8512a280 r5:dfa3df20 r4:dfa3de64 [ 1362.529550][T14766] [<81559a98>] (___sys_sendmsg) from [<81559fcc>] (__sys_sendmsg+0x8c/0xe0) [ 1362.529626][T14766] r10:00000128 r9:849d3000 r8:85bb56c0 r7:04040000 r6:200009c0 r5:85bb56c1 [ 1362.529661][T14766] r4:00000003 [ 1362.529683][T14766] [<81559f40>] (__sys_sendmsg) from [<8155a034>] (sys_sendmsg+0x14/0x18) [ 1362.529749][T14766] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 1362.529770][T14766] [<8155a020>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1362.529826][T14766] Exception stack(0xdfa3dfa8 to 0xdfa3dff0) [ 1362.530414][T14766] dfa0: 00000000 00000000 00000003 200009c0 04040000 00000000 [ 1362.530612][T14766] dfc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f670bc [ 1362.530843][T14766] dfe0: 76f66ec0 76f66eb0 00019294 00132970 [ 1363.404515][T14778] FAULT_INJECTION: forcing a failure. [ 1363.404515][T14778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1363.404998][T14778] CPU: 0 UID: 0 PID: 14778 Comm: syz.1.2742 Not tainted syzkaller #0 PREEMPT [ 1363.405105][T14778] Hardware name: ARM-Versatile Express [ 1363.405136][T14778] Call trace: [ 1363.405237][T14778] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1363.405358][T14778] r7:83f70000 r6:00000000 r5:60000013 r4:82252738 [ 1363.405383][T14778] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1363.405492][T14778] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1363.405565][T14778] r5:83f70000 r4:8294f5d0 [ 1363.405584][T14778] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1363.405722][T14778] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1363.405964][T14778] r8:857d6000 r7:83f70000 r6:00000000 r5:00000000 r4:00000000 [ 1363.406032][T14778] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1363.406340][T14778] [<80987274>] (should_fail_usercopy) from [<80479310>] (sys_cachestat+0x3d8/0x4d8) [ 1363.406462][T14778] [<80478f38>] (sys_cachestat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1363.406550][T14778] Exception stack(0xdfb1dfa8 to 0xdfb1dff0) [ 1363.406727][T14778] dfa0: 00000000 00000000 00000003 20001840 20001880 00000000 [ 1363.406879][T14778] dfc0: 00000000 00000000 00130918 000001c3 00300000 00000000 00006364 76f260bc [ 1363.406919][T14778] dfe0: 76f25ec0 76f25eb0 00019294 00132970 [ 1363.406961][T14778] r10:000001c3 r9:83f70000 r8:8020029c r7:000001c3 r6:00130918 r5:00000000 [ 1363.406986][T14778] r4:00000000 [ 1364.757028][T14803] random: crng reseeded on system resumption [ 1366.951758][ T29] kauditd_printk_skb: 389 callbacks suppressed [ 1366.958263][ T29] audit: type=1400 audit(1366.870:32998): avc: denied { read } for pid=14794 comm="syz.1.2749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1366.959566][ T29] audit: type=1400 audit(1366.870:32999): avc: denied { create } for pid=14794 comm="syz.1.2749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1366.959900][ T29] audit: type=1400 audit(1366.870:33000): avc: denied { write } for pid=14794 comm="syz.1.2749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1366.960099][ T29] audit: type=1400 audit(1366.870:33001): avc: denied { module_request } for pid=14794 comm="syz.1.2749" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1367.050439][ T29] audit: type=1400 audit(1366.950:33002): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1367.058180][ T29] audit: type=1400 audit(1366.970:33003): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1367.090804][ T29] audit: type=1400 audit(1367.000:33004): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1367.091439][ T29] audit: type=1400 audit(1367.000:33005): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1367.091539][ T29] audit: type=1400 audit(1367.010:33006): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1367.106717][ T29] audit: type=1400 audit(1367.020:33007): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1367.917832][ C0] vkms_vblank_simulate: vblank timer overrun [ 1372.149513][ T29] kauditd_printk_skb: 114 callbacks suppressed [ 1372.149936][ T29] audit: type=1400 audit(1372.060:33122): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.163577][ T29] audit: type=1400 audit(1372.070:33123): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.182810][ T29] audit: type=1400 audit(1372.100:33124): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1372.183343][ T29] audit: type=1400 audit(1372.100:33125): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1372.193662][ T29] audit: type=1400 audit(1372.110:33126): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.194095][ T29] audit: type=1400 audit(1372.110:33127): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1372.194452][ T29] audit: type=1400 audit(1372.110:33128): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.203032][ T29] audit: type=1400 audit(1372.110:33129): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.217426][ T29] audit: type=1400 audit(1372.130:33130): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.234141][ T29] audit: type=1400 audit(1372.150:33131): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1372.778256][T14850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=14850 comm=syz.1.2760 [ 1377.929062][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 1377.931889][ T29] audit: type=1400 audit(1377.840:33248): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1377.940899][ T29] audit: type=1400 audit(1377.860:33249): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1377.969069][ T29] audit: type=1400 audit(1377.880:33250): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1377.971644][ T29] audit: type=1400 audit(1377.880:33251): avc: denied { read write open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1377.992338][ T29] audit: type=1400 audit(1377.880:33252): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1378.055736][ T29] audit: type=1400 audit(1377.890:33253): avc: denied { recv } for pid=6873 comm="kworker/u8:5" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1378.082356][ T29] audit: type=1400 audit(1377.890:33254): avc: denied { recv } for pid=6873 comm="kworker/u8:5" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1378.085810][ T29] audit: type=1400 audit(1377.890:33255): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1378.099267][ T29] audit: type=1400 audit(1377.890:33256): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1378.104150][ T29] audit: type=1400 audit(1377.900:33257): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1379.229217][ T5825] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 1379.379211][ T5825] usb 2-1: Using ep0 maxpacket: 32 [ 1379.389339][ T5825] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 129, changing to 11 [ 1379.389763][ T5825] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 1379.389831][ T5825] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1023 [ 1379.424273][ T5825] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1379.424519][ T5825] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1379.424767][ T5825] usb 2-1: Product: 䀊 [ 1379.424855][ T5825] usb 2-1: Manufacturer: ⠁ [ 1379.424886][ T5825] usb 2-1: SerialNumber: 첣䫣ꟗஈ媹﫦㠿耀鵹쐇㏯䂙䘬⊌᥈鮘硦₧굱뗃郭갶灘⡆眯蠺俒ﭤ怸䵒鴵蜡䈨钀菧莏뱅솠ᥦц푯늯叝얭雼尕鬛앲糊뻷⤭뤦䘬騦糍㒄ᬌ삍禋隴㢅Ꙟ㙌湾Ĺ৵畎廞Ć䴡햲紻涗∪鲚ᾁ乬ꞛᇴ曬㬩⏆냶懮胦鶤嫗뱜䙒Ⓙ罇᱃댗ퟻ섧䒵뫣ῂ칵㒁胫㲪ᑝ螕쮣 [ 1379.695689][T14884] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1379.717844][T14884] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1380.079082][T14876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1380.097681][T14876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1380.170928][T14876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1380.195048][T14884] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1380.196687][T14884] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1380.200823][T14876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1380.305377][T14876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1380.322910][T14876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1380.438086][T14876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1380.446820][T14876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1381.099805][ T5825] cdc_ncm 2-1:1.0: bind() failure [ 1381.106902][ T5825] cdc_ncm 2-1:1.1: probe with driver cdc_ncm failed with error -71 [ 1381.111085][ T5825] cdc_mbim 2-1:1.1: probe with driver cdc_mbim failed with error -71 [ 1381.113393][ T5825] usbtest 2-1:1.1: probe with driver usbtest failed with error -71 [ 1381.148091][ T5825] usb 2-1: USB disconnect, device number 13 [ 1382.978250][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 1382.979055][ T29] audit: type=1400 audit(1382.890:33456): avc: denied { read write } for pid=14925 comm="syz.1.2779" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1382.983128][ T29] audit: type=1400 audit(1382.900:33457): avc: denied { open } for pid=14925 comm="syz.1.2779" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1382.986684][T14930] ucma_write: process 679 (syz.1.2779) changed security contexts after opening file descriptor, this is not allowed. [ 1383.493863][ T29] audit: type=1400 audit(1383.410:33458): avc: denied { write } for pid=14925 comm="syz.1.2779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1383.669321][ T29] audit: type=1400 audit(1383.580:33459): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1383.676490][ T29] audit: type=1400 audit(1383.590:33460): avc: denied { recv } for pid=2822 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1383.711018][ T29] audit: type=1400 audit(1383.630:33461): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1383.712965][ T29] audit: type=1400 audit(1383.630:33462): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1383.718213][ T29] audit: type=1400 audit(1383.630:33463): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1383.723188][ T29] audit: type=1400 audit(1383.630:33464): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1383.730619][ T29] audit: type=1400 audit(1383.640:33465): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1387.984805][ T29] kauditd_printk_skb: 230 callbacks suppressed [ 1387.985184][ T29] audit: type=1400 audit(1387.900:33696): avc: denied { ioctl } for pid=14977 comm="syz.2.2798" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1388.002994][ T29] audit: type=1400 audit(1387.920:33697): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.052758][ T29] audit: type=1400 audit(1387.970:33698): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.053137][ T29] audit: type=1400 audit(1387.970:33699): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.074288][ T29] audit: type=1400 audit(1387.970:33700): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.074775][ T29] audit: type=1400 audit(1387.980:33701): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.075168][ T29] audit: type=1400 audit(1387.980:33702): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.075238][ T29] audit: type=1400 audit(1387.990:33703): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1388.114132][ T29] audit: type=1400 audit(1388.030:33704): avc: denied { read append } for pid=14979 comm="syz.2.2799" name="mouse0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1388.115375][ T29] audit: type=1400 audit(1388.030:33705): avc: denied { open } for pid=14979 comm="syz.2.2799" path="/dev/input/mouse0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1388.227498][T14982] FAULT_INJECTION: forcing a failure. [ 1388.227498][T14982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1388.230951][T14982] CPU: 1 UID: 0 PID: 14982 Comm: syz.2.2800 Not tainted syzkaller #0 PREEMPT [ 1388.231050][T14982] Hardware name: ARM-Versatile Express [ 1388.231084][T14982] Call trace: [ 1388.231127][T14982] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1388.231195][T14982] r7:00000000 r6:00000000 r5:60000013 r4:82252738 [ 1388.231206][T14982] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1388.231240][T14982] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1388.231275][T14982] r5:84ff2400 r4:8294f5d0 [ 1388.231301][T14982] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1388.231343][T14982] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1388.231380][T14982] r8:76f66f30 r7:00000000 r6:00000000 r5:eacd5f68 r4:00000002 [ 1388.231390][T14982] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1388.231415][T14982] [<80987274>] (should_fail_usercopy) from [<8059a72c>] (simple_read_from_buffer+0x80/0x13c) [ 1388.231448][T14982] [<8059a6ac>] (simple_read_from_buffer) from [<80616894>] (proc_fail_nth_read+0xb8/0x108) [ 1388.231491][T14982] r10:00000001 r9:806167dc r8:00000002 r7:eacd5f68 r6:0000000f r5:76f66f30 [ 1388.231504][T14982] r4:84ff2400 r3:eacd5e9f [ 1388.231513][T14982] [<806167dc>] (proc_fail_nth_read) from [<8055f634>] (vfs_read+0x98/0x324) [ 1388.231552][T14982] r8:76f66f30 r7:eacd5f68 r6:84ff2400 r5:0000000f r4:8481a3c0 [ 1388.231563][T14982] [<8055f59c>] (vfs_read) from [<80560344>] (ksys_read+0x74/0xe8) [ 1388.231602][T14982] r10:00000003 r9:84ff2400 r8:8020029c r7:00000000 r6:00000000 r5:8481a3c0 [ 1388.231613][T14982] r4:8481a3c3 [ 1388.231622][T14982] [<805602d0>] (ksys_read) from [<805603c8>] (sys_read+0x10/0x14) [ 1388.231672][T14982] r7:00000003 r6:00000005 r5:76f66f30 r4:0000000f [ 1388.231682][T14982] [<805603b8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1388.231713][T14982] Exception stack(0xeacd5fa8 to 0xeacd5ff0) [ 1388.231736][T14982] 5fa0: 0000000f 76f66f30 00000005 76f66f30 0000000f 00000000 [ 1388.231757][T14982] 5fc0: 0000000f 76f66f30 00000005 00000003 00300000 00000000 00006364 76f670bc [ 1388.231774][T14982] 5fe0: 00000158 76f66ed0 000d8634 0013083c [ 1388.647682][T14988] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=19549 sclass=netlink_xfrm_socket pid=14988 comm=syz.2.2803 [ 1389.200548][T14989] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1792 sclass=netlink_xfrm_socket pid=14989 comm=syz.2.2803 [ 1392.993827][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 1392.994281][ T29] audit: type=1400 audit(1392.910:33834): avc: denied { recv } for pid=12681 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1393.004040][ T29] audit: type=1400 audit(1392.920:33835): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1393.009937][ T29] audit: type=1400 audit(1392.920:33836): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1393.010439][ T29] audit: type=1400 audit(1392.920:33837): avc: denied { read write open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1393.010513][ T29] audit: type=1400 audit(1392.920:33838): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1393.010559][ T29] audit: type=1400 audit(1392.920:33839): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1393.089687][ T29] audit: type=1400 audit(1393.000:33840): avc: denied { read } for pid=15012 comm="syz.1.2809" dev="nsfs" ino=4026532743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1393.093180][ T29] audit: type=1400 audit(1393.010:33841): avc: denied { open } for pid=15012 comm="syz.1.2809" path="net:[4026532743]" dev="nsfs" ino=4026532743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1393.097359][ T29] audit: type=1400 audit(1393.010:33842): avc: denied { create } for pid=15012 comm="syz.1.2809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1393.107914][ T29] audit: type=1400 audit(1393.020:33843): avc: denied { create } for pid=15012 comm="syz.1.2809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1396.095602][T15050] FAULT_INJECTION: forcing a failure. [ 1396.095602][T15050] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.095990][T15050] CPU: 1 UID: 0 PID: 15050 Comm: syz.2.2816 Not tainted syzkaller #0 PREEMPT [ 1396.096047][T15050] Hardware name: ARM-Versatile Express [ 1396.096083][T15050] Call trace: [ 1396.096133][T15050] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1396.096195][T15050] r7:00000000 r6:00000000 r5:60000113 r4:82252738 [ 1396.096204][T15050] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1396.096231][T15050] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1396.096260][T15050] r5:85b28000 r4:82918840 [ 1396.096268][T15050] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1396.096301][T15050] [<80987034>] (should_fail_ex) from [<8052f600>] (should_failslab+0x6c/0x94) [ 1396.096341][T15050] r8:85b28000 r7:00000000 r6:00000cc0 r5:84f0f900 r4:83002e40 [ 1396.096350][T15050] [<8052f594>] (should_failslab) from [<8050f000>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 1396.096380][T15050] [<8050efb4>] (kmem_cache_alloc_noprof) from [<804e63ac>] (__anon_vma_prepare+0x34/0x1b0) [ 1396.096418][T15050] r10:eb745eb0 r9:84f0f900 r8:82aca598 r7:84bd6700 r6:84f0f900 r5:84f0f900 [ 1396.096429][T15050] r4:eb745d88 [ 1396.096437][T15050] [<804e6378>] (__anon_vma_prepare) from [<804cd130>] (__vmf_anon_prepare+0x5c/0xcc) [ 1396.096475][T15050] r10:eb745eb0 r9:84f0f900 r8:00000001 r7:00000000 r6:20000000 r5:84f0f900 [ 1396.096487][T15050] r4:eb745d88 r3:00000215 [ 1396.096495][T15050] [<804cd0d4>] (__vmf_anon_prepare) from [<804d0d24>] (handle_mm_fault+0xcac/0x14e0) [ 1396.096529][T15050] r7:00000000 r6:20000000 r5:85b28000 r4:00000215 [ 1396.096537][T15050] [<804d0078>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 1396.096572][T15050] r10:00000002 r9:84bd6700 r8:00000215 r7:20000000 r6:00000a06 r5:20000340 [ 1396.096582][T15050] r4:eb745eb0 [ 1396.096590][T15050] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 1396.096623][T15050] r10:000000ea r9:85b28000 r8:80234648 r7:eb745eb0 r6:20000340 r5:00000a06 [ 1396.096633][T15050] r4:8281d0b8 [ 1396.096650][T15050] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 1396.096683][T15050] r9:85b28000 r8:80234648 r7:eb745eb0 r6:20000340 r5:00000a06 r4:8281d0b8 [ 1396.096692][T15050] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 1396.096715][T15050] Exception stack(0xeb745eb0 to 0xeb745ef8) [ 1396.096734][T15050] 5ea0: 20000340 85664420 ffffff86 75636573 [ 1396.096753][T15050] 5ec0: 79746972 6c65732e 78756e69 8502de58 73797300 2e6d6574 000000ea eb745f4c [ 1396.096768][T15050] 5ee0: 6b636f73 eb745f04 746f7270 81a314c0 a0000013 ffffffff [ 1396.096785][T15050] r8:73797300 r7:eb745ee4 r6:ffffffff r5:a0000013 r4:81a314c0 [ 1396.096793][T15050] [<80596b40>] (listxattr) from [<80596d6c>] (path_listxattrat+0x120/0x168) [ 1396.096827][T15050] r9:85b28000 r8:20000340 r7:00000003 r6:8481a9c0 r5:85b28000 r4:8481a9c1 [ 1396.096836][T15050] [<80596c4c>] (path_listxattrat) from [<80598a9c>] (sys_flistxattr+0x24/0x2c) [ 1396.096868][T15050] r9:85b28000 r8:8020029c r7:000000ea r6:00130918 r5:00000000 r4:00000000 [ 1396.096877][T15050] [<80598a78>] (sys_flistxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1396.096900][T15050] Exception stack(0xeb745fa8 to 0xeb745ff0) [ 1396.096916][T15050] 5fa0: 00000000 00000000 00000003 20000340 000000c7 00000000 [ 1396.096934][T15050] 5fc0: 00000000 00000000 00130918 000000ea 00300000 00000000 00006364 76f670bc [ 1396.096948][T15050] 5fe0: 76f66ec0 76f66eb0 00019294 00132970 [ 1396.299740][ T5640] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 1396.461795][ T5640] usb 2-1: device descriptor read/64, error -71 [ 1396.699885][ T5640] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 1396.830305][ T5640] usb 2-1: device descriptor read/64, error -71 [ 1396.942590][ T5640] usb usb2-port1: attempt power cycle [ 1397.280280][ T5640] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 1397.311789][ T5640] usb 2-1: device descriptor read/8, error -71 [ 1397.550126][ T5640] usb 2-1: new high-speed USB device number 17 using dummy_hcd [ 1397.574803][ T5640] usb 2-1: device descriptor read/8, error -71 [ 1397.679618][ T5640] usb usb2-port1: unable to enumerate USB device [ 1399.744792][ T29] kauditd_printk_skb: 177 callbacks suppressed [ 1399.745515][ T29] audit: type=1400 audit(1399.660:34021): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.787027][ T29] audit: type=1400 audit(1399.690:34022): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.801594][ T29] audit: type=1400 audit(1399.710:34023): avc: denied { recv } for pid=10898 comm="napi/wg2-0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.829090][ T29] audit: type=1400 audit(1399.720:34024): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.832725][ T29] audit: type=1400 audit(1399.730:34025): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.838321][ T29] audit: type=1400 audit(1399.750:34026): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.906206][ T29] audit: type=1400 audit(1399.820:34027): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.906640][ T29] audit: type=1400 audit(1399.820:34028): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1399.943829][ T29] audit: type=1400 audit(1399.860:34029): avc: denied { read write } for pid=15070 comm="syz.2.2820" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1399.949469][ T29] audit: type=1400 audit(1399.860:34030): avc: denied { open } for pid=15070 comm="syz.2.2820" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1404.037010][T15095] FAULT_INJECTION: forcing a failure. [ 1404.037010][T15095] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.037400][T15095] CPU: 1 UID: 0 PID: 15095 Comm: syz.2.2826 Not tainted syzkaller #0 PREEMPT [ 1404.037524][T15095] Hardware name: ARM-Versatile Express [ 1404.037625][T15095] Call trace: [ 1404.037689][T15095] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1404.037863][T15095] r7:00000820 r6:00000000 r5:60000013 r4:82252738 [ 1404.037965][T15095] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1404.038034][T15095] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1404.038141][T15095] r5:85b2c800 r4:82918840 [ 1404.038164][T15095] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1404.038266][T15095] [<80987034>] (should_fail_ex) from [<8052f600>] (should_failslab+0x6c/0x94) [ 1404.038404][T15095] r8:00000000 r7:00000820 r6:00000017 r5:eb881c9c r4:83001240 [ 1404.038428][T15095] [<8052f594>] (should_failslab) from [<805118d8>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 1404.038492][T15095] [<80511838>] (__kmalloc_node_track_caller_noprof) from [<804a4a74>] (kmemdup_noprof+0x28/0x44) [ 1404.038569][T15095] r10:0000005f r9:84b2cc04 r8:eb881ca4 r7:83397000 r6:84979398 r5:eb881c9c [ 1404.038588][T15095] r4:00000017 [ 1404.038604][T15095] [<804a4a4c>] (kmemdup_noprof) from [<807b22c8>] (sidtab_sid2str_get+0x54/0xa4) [ 1404.038670][T15095] r7:83397000 r6:eb881ca4 r5:eb881c9c r4:841da0c0 [ 1404.038690][T15095] [<807b2274>] (sidtab_sid2str_get) from [<807b97e4>] (sidtab_entry_to_string+0x34/0x94) [ 1404.038752][T15095] r7:83397000 r6:841da0c0 r5:eb881c9c r4:0000005f [ 1404.038770][T15095] [<807b97b0>] (sidtab_entry_to_string) from [<807b995c>] (security_sid_to_context_core+0x118/0x17c) [ 1404.038864][T15095] r9:00000000 r8:83397000 r7:84b2cc04 r6:eb881ca4 r5:eb881c9c r4:0000005f [ 1404.038936][T15095] [<807b9844>] (security_sid_to_context_core) from [<807bc970>] (security_sid_to_context+0x1c/0x24) [ 1404.039009][T15095] r8:8079cacc r7:8079dad0 r6:85b2c800 r5:847a43b8 r4:eb881d30 [ 1404.039026][T15095] [<807bc954>] (security_sid_to_context) from [<8079db18>] (avc_audit_post_callback+0x48/0x2f4) [ 1404.039116][T15095] [<8079dad0>] (avc_audit_post_callback) from [<807c4f2c>] (common_lsm_audit+0x104/0x148) [ 1404.039231][T15095] r10:0000005f r9:00000000 r8:8079cacc r7:8079dad0 r6:eb881eac r5:847a43b8 [ 1404.039272][T15095] r4:85b2cff0 [ 1404.039289][T15095] [<807c4e28>] (common_lsm_audit) from [<8079dfdc>] (slow_avc_audit+0xbc/0x114) [ 1404.039388][T15095] r8:00000048 r7:00000000 r6:00000001 r5:0000005f r4:0000005f [ 1404.039407][T15095] [<8079df20>] (slow_avc_audit) from [<8079e390>] (avc_has_extended_perms+0x208/0x6a8) [ 1404.039498][T15095] r5:00000053 r4:0000005f [ 1404.039521][T15095] [<8079e188>] (avc_has_extended_perms) from [<807a7d9c>] (ioctl_has_perm.constprop.0+0xe4/0x160) [ 1404.039594][T15095] r10:85b2c800 r9:85b96204 r8:00000048 r7:834aa300 r6:0000005f r5:824625b4 [ 1404.039616][T15095] r4:0000000e [ 1404.039668][T15095] [<807a7cb8>] (ioctl_has_perm.constprop.0) from [<807a7ebc>] (selinux_file_ioctl+0xa4/0x134) [ 1404.039737][T15095] r9:00000003 r8:8481a180 r7:00000000 r6:00000000 r5:8004480e r4:8481a180 [ 1404.039778][T15095] [<807a7e18>] (selinux_file_ioctl) from [<80780c84>] (security_file_ioctl+0x90/0x1e4) [ 1404.039902][T15095] [<80780bf4>] (security_file_ioctl) from [<80578e1c>] (sys_ioctl+0x4c/0xba0) [ 1404.039982][T15095] r7:00000000 r6:8481a181 r5:00000000 r4:8004480e [ 1404.040034][T15095] [<80578dd0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1404.040167][T15095] Exception stack(0xeb881fa8 to 0xeb881ff0) [ 1404.040226][T15095] 1fa0: 00000000 00000000 00000003 8004480e 00000000 00000000 [ 1404.040319][T15095] 1fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f670bc [ 1404.040351][T15095] 1fe0: 76f66ec0 76f66eb0 00019294 00132970 [ 1404.040388][T15095] r10:00000036 r9:85b2c800 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 1404.040408][T15095] r4:00000000 [ 1404.771768][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 1404.772301][ T29] audit: type=1400 audit(1404.690:34140): avc: denied { create } for pid=15100 comm="syz.2.2828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1404.786087][ T29] audit: type=1400 audit(1404.700:34141): avc: denied { ioctl } for pid=15100 comm="syz.2.2828" path="socket:[31687]" dev="sockfs" ino=31687 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1404.804166][ T29] audit: type=1400 audit(1404.720:34142): avc: denied { bind } for pid=15100 comm="syz.2.2828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1404.816150][ T29] audit: type=1400 audit(1404.730:34143): avc: denied { write } for pid=15100 comm="syz.2.2828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1405.839589][ T29] audit: type=1400 audit(1405.750:34144): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1405.849698][ T29] audit: type=1400 audit(1405.760:34145): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1405.884251][ T29] audit: type=1400 audit(1405.800:34146): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1405.884936][ T29] audit: type=1400 audit(1405.800:34147): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1405.897941][ T29] audit: type=1400 audit(1405.810:34148): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1405.915454][ T29] audit: type=1400 audit(1405.830:34149): avc: denied { recv } for pid=15102 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.850052][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 1409.850473][ T29] audit: type=1400 audit(1409.760:34259): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.850764][ T29] audit: type=1400 audit(1409.760:34260): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.856889][ T29] audit: type=1400 audit(1409.770:34261): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1409.857419][ T29] audit: type=1400 audit(1409.770:34262): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1409.857757][ T29] audit: type=1400 audit(1409.770:34263): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1409.891567][ T29] audit: type=1400 audit(1409.810:34264): avc: denied { recv } for pid=12681 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.893732][ T29] audit: type=1400 audit(1409.810:34265): avc: denied { recv } for pid=12681 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.898180][ T29] audit: type=1400 audit(1409.810:34266): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.911621][ T29] audit: type=1400 audit(1409.830:34267): avc: denied { recv } for pid=14677 comm="kworker/0:0" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1409.923794][ T29] audit: type=1400 audit(1409.840:34268): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1413.636753][T15167] FAULT_INJECTION: forcing a failure. [ 1413.636753][T15167] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1413.637760][T15167] CPU: 1 UID: 0 PID: 15167 Comm: syz.1.2848 Not tainted syzkaller #0 PREEMPT [ 1413.637827][T15167] Hardware name: ARM-Versatile Express [ 1413.637840][T15167] Call trace: [ 1413.637863][T15167] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1413.637924][T15167] r7:ebbf9e20 r6:00000000 r5:60000013 r4:82252738 [ 1413.637935][T15167] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1413.637962][T15167] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1413.637989][T15167] r5:84ff6c00 r4:8294f5d0 [ 1413.637996][T15167] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1413.638029][T15167] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1413.638060][T15167] r8:00008802 r7:ebbf9e20 r6:20000280 r5:00000000 r4:ebbf9f20 [ 1413.638068][T15167] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1413.638090][T15167] [<80987274>] (should_fail_usercopy) from [<815599b8>] (copy_msghdr_from_user+0x50/0x130) [ 1413.638120][T15167] [<81559968>] (copy_msghdr_from_user) from [<81559b10>] (___sys_sendmsg+0x78/0xd0) [ 1413.638151][T15167] r8:00008802 r7:00000000 r6:834aac80 r5:ebbf9f20 r4:ebbf9e64 [ 1413.638159][T15167] [<81559a98>] (___sys_sendmsg) from [<81559fcc>] (__sys_sendmsg+0x8c/0xe0) [ 1413.638191][T15167] r10:00000128 r9:84ff6c00 r8:8481a300 r7:00008802 r6:20000280 r5:8481a301 [ 1413.638202][T15167] r4:00000003 [ 1413.638209][T15167] [<81559f40>] (__sys_sendmsg) from [<8155a034>] (sys_sendmsg+0x14/0x18) [ 1413.638240][T15167] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 1413.638249][T15167] [<8155a020>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1413.638272][T15167] Exception stack(0xebbf9fa8 to 0xebbf9ff0) [ 1413.638291][T15167] 9fa0: 00000000 00000000 00000003 20000280 00008802 00000000 [ 1413.638308][T15167] 9fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f260bc [ 1413.638321][T15167] 9fe0: 76f25ec0 76f25eb0 00019294 00132970 [ 1414.987046][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 1414.991024][ T29] audit: type=1400 audit(1414.900:34484): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.005030][ T29] audit: type=1400 audit(1414.920:34485): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.035702][ T29] audit: type=1400 audit(1414.950:34486): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.038362][ T29] audit: type=1400 audit(1414.950:34487): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.042767][ T29] audit: type=1400 audit(1414.960:34488): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.061367][ T29] audit: type=1400 audit(1414.980:34489): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.078204][ T29] audit: type=1400 audit(1414.990:34490): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.082517][ T29] audit: type=1400 audit(1414.990:34491): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1415.131011][ T29] audit: type=1400 audit(1415.050:34492): avc: denied { create } for pid=15175 comm="syz.2.2850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1415.133743][ T29] audit: type=1400 audit(1415.050:34493): avc: denied { create } for pid=15175 comm="syz.2.2850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1416.608374][T15181] FAULT_INJECTION: forcing a failure. [ 1416.608374][T15181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1416.623535][T15181] CPU: 1 UID: 0 PID: 15181 Comm: syz.2.2852 Not tainted syzkaller #0 PREEMPT [ 1416.623704][T15181] Hardware name: ARM-Versatile Express [ 1416.623732][T15181] Call trace: [ 1416.623778][T15181] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1416.623891][T15181] r7:00000000 r6:00000000 r5:60000013 r4:82252738 [ 1416.623921][T15181] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1416.623980][T15181] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1416.624039][T15181] r5:85b2bc00 r4:8294f5d0 [ 1416.624056][T15181] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1416.624123][T15181] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1416.624186][T15181] r8:76f66f30 r7:00000000 r6:00000000 r5:ebc1df68 r4:00000002 [ 1416.624206][T15181] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1416.624251][T15181] [<80987274>] (should_fail_usercopy) from [<8059a72c>] (simple_read_from_buffer+0x80/0x13c) [ 1416.624308][T15181] [<8059a6ac>] (simple_read_from_buffer) from [<80616894>] (proc_fail_nth_read+0xb8/0x108) [ 1416.624381][T15181] r10:00000001 r9:806167dc r8:00000002 r7:ebc1df68 r6:0000000f r5:76f66f30 [ 1416.624404][T15181] r4:85b2bc00 r3:ebc1de9f [ 1416.624422][T15181] [<806167dc>] (proc_fail_nth_read) from [<8055f634>] (vfs_read+0x98/0x324) [ 1416.624484][T15181] r8:76f66f30 r7:ebc1df68 r6:85b2bc00 r5:0000000f r4:849c9180 [ 1416.624505][T15181] [<8055f59c>] (vfs_read) from [<80560344>] (ksys_read+0x74/0xe8) [ 1416.624572][T15181] r10:00000003 r9:85b2bc00 r8:8020029c r7:00000000 r6:00000000 r5:849c9180 [ 1416.624593][T15181] r4:849c9183 [ 1416.624612][T15181] [<805602d0>] (ksys_read) from [<805603c8>] (sys_read+0x10/0x14) [ 1416.624674][T15181] r7:00000003 r6:00000004 r5:76f66f30 r4:0000000f [ 1416.624693][T15181] [<805603b8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1416.624741][T15181] Exception stack(0xebc1dfa8 to 0xebc1dff0) [ 1416.624780][T15181] dfa0: 0000000f 76f66f30 00000004 76f66f30 0000000f 00000000 [ 1416.624817][T15181] dfc0: 0000000f 76f66f30 00000004 00000003 00300000 00000000 00006364 76f670bc [ 1416.624845][T15181] dfe0: 00000158 76f66ed0 000d8634 0013083c [ 1420.087206][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 1420.087691][ T29] audit: type=1400 audit(1420.000:34720): avc: denied { read } for pid=15219 comm="syz.2.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1420.102792][ T29] audit: type=1400 audit(1420.020:34721): avc: denied { setattr } for pid=15219 comm="syz.2.2865" name="vsock" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1420.133702][ T29] audit: type=1400 audit(1420.050:34722): avc: denied { create } for pid=15219 comm="syz.2.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1420.142659][ T29] audit: type=1400 audit(1420.050:34723): avc: denied { write } for pid=15219 comm="syz.2.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1420.152982][ T29] audit: type=1400 audit(1420.070:34724): avc: denied { module_request } for pid=15219 comm="syz.2.2865" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1420.293493][ T29] audit: type=1400 audit(1420.210:34725): avc: denied { read } for pid=15219 comm="syz.2.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1420.298432][ T29] audit: type=1400 audit(1420.210:34726): avc: denied { write } for pid=15219 comm="syz.2.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1420.366563][ T29] audit: type=1400 audit(1420.280:34727): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1420.367117][ T29] audit: type=1400 audit(1420.280:34728): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1420.383491][ T29] audit: type=1400 audit(1420.290:34729): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.071036][T15264] FAULT_INJECTION: forcing a failure. [ 1425.071036][T15264] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1425.071528][T15264] CPU: 0 UID: 0 PID: 15264 Comm: syz.2.2879 Not tainted syzkaller #0 PREEMPT [ 1425.071635][T15264] Hardware name: ARM-Versatile Express [ 1425.071661][T15264] Call trace: [ 1425.071708][T15264] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1425.071899][T15264] r7:b5403587 r6:00000000 r5:60000013 r4:82252738 [ 1425.071924][T15264] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1425.072053][T15264] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1425.072120][T15264] r5:84ff0000 r4:8294f5d0 [ 1425.072158][T15264] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1425.072312][T15264] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1425.072380][T15264] r8:00000000 r7:b5403587 r6:76f66bb8 r5:00000000 r4:ebeb1fb0 [ 1425.072454][T15264] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1425.072500][T15264] [<80987274>] (should_fail_usercopy) from [<8022b588>] (restore_sigframe+0x94/0x210) [ 1425.072554][T15264] [<8022b4f4>] (restore_sigframe) from [<8022b744>] (sys_sigreturn+0x40/0x60) [ 1425.072621][T15264] r7:00000077 r6:00130918 r5:00000000 r4:ebeb1fb0 [ 1425.072640][T15264] [<8022b704>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1425.072690][T15264] Exception stack(0xebeb1fa8 to 0xebeb1ff0) [ 1425.072732][T15264] 1fa0: 00000000 00000000 00000011 20000240 00000000 00000000 [ 1425.072815][T15264] 1fc0: 00000000 00000000 00130918 00000077 00300000 00000000 00006364 76f670bc [ 1425.072856][T15264] 1fe0: 76f66ec0 76f66bb8 000efa30 000efa38 [ 1425.072887][T15264] r5:00000000 r4:00000000 [ 1425.247149][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 1425.247672][ T29] audit: type=1400 audit(1425.160:34972): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.264070][ T29] audit: type=1400 audit(1425.170:34973): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.293414][ T29] audit: type=1400 audit(1425.210:34974): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.293901][ T29] audit: type=1400 audit(1425.210:34975): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.305645][ T29] audit: type=1400 audit(1425.210:34976): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.317713][ T29] audit: type=1400 audit(1425.230:34977): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1425.416461][ T29] audit: type=1400 audit(1425.330:34978): avc: denied { create } for pid=15268 comm="syz.2.2881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1425.434737][ T29] audit: type=1400 audit(1425.350:34979): avc: denied { ioctl } for pid=15268 comm="syz.2.2881" path="socket:[32511]" dev="sockfs" ino=32511 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1425.446101][ T29] audit: type=1400 audit(1425.360:34980): avc: denied { bind } for pid=15268 comm="syz.2.2881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1425.486368][ T29] audit: type=1400 audit(1425.400:34981): avc: denied { write } for pid=15268 comm="syz.2.2881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1430.254982][ T29] kauditd_printk_skb: 284 callbacks suppressed [ 1430.255554][ T29] audit: type=1400 audit(1430.170:35266): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1430.255797][ T29] audit: type=1400 audit(1430.170:35267): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1430.543493][ T29] audit: type=1400 audit(1430.460:35268): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1430.544016][ T29] audit: type=1400 audit(1430.460:35269): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1430.579052][ T29] audit: type=1400 audit(1430.490:35270): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1430.609048][ T29] audit: type=1400 audit(1430.520:35271): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1430.609519][ T29] audit: type=1400 audit(1430.520:35272): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1430.609727][ T29] audit: type=1400 audit(1430.520:35273): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1430.621320][ T29] audit: type=1400 audit(1430.540:35274): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1430.645657][ T29] audit: type=1400 audit(1430.560:35275): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1432.271638][T15332] FAULT_INJECTION: forcing a failure. [ 1432.271638][T15332] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1432.272145][T15332] CPU: 0 UID: 0 PID: 15332 Comm: syz.2.2907 Not tainted syzkaller #0 PREEMPT [ 1432.272220][T15332] Hardware name: ARM-Versatile Express [ 1432.272288][T15332] Call trace: [ 1432.272340][T15332] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1432.272504][T15332] r7:ec4b5e20 r6:00000000 r5:60000013 r4:82252738 [ 1432.272593][T15332] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1432.272746][T15332] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1432.272836][T15332] r5:84ff6c00 r4:8294f5d0 [ 1432.272925][T15332] [<8021f904>] (dump_stack) from [<809871f8>] (should_fail_ex+0x1c4/0x228) [ 1432.273012][T15332] [<80987034>] (should_fail_ex) from [<80987270>] (should_fail+0x14/0x18) [ 1432.273109][T15332] r8:00040084 r7:ec4b5e20 r6:20000240 r5:00000000 r4:ec4b5f20 [ 1432.273132][T15332] [<8098725c>] (should_fail) from [<80987290>] (should_fail_usercopy+0x1c/0x20) [ 1432.273180][T15332] [<80987274>] (should_fail_usercopy) from [<815599b8>] (copy_msghdr_from_user+0x50/0x130) [ 1432.273269][T15332] [<81559968>] (copy_msghdr_from_user) from [<81559b10>] (___sys_sendmsg+0x78/0xd0) [ 1432.273348][T15332] r8:00040084 r7:00000000 r6:850dd180 r5:ec4b5f20 r4:ec4b5e64 [ 1432.273416][T15332] [<81559a98>] (___sys_sendmsg) from [<81559fcc>] (__sys_sendmsg+0x8c/0xe0) [ 1432.273583][T15332] r10:00000128 r9:84ff6c00 r8:857d6480 r7:00040084 r6:20000240 r5:857d6481 [ 1432.273618][T15332] r4:00000003 [ 1432.273638][T15332] [<81559f40>] (__sys_sendmsg) from [<8155a034>] (sys_sendmsg+0x14/0x18) [ 1432.273756][T15332] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 1432.273842][T15332] [<8155a020>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1432.273941][T15332] Exception stack(0xec4b5fa8 to 0xec4b5ff0) [ 1432.274029][T15332] 5fa0: 00000000 00000000 00000003 20000240 00040084 00000000 [ 1432.274118][T15332] 5fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f670bc [ 1432.274201][T15332] 5fe0: 76f66ec0 76f66eb0 00019294 00132970 [ 1433.042326][T15351] netlink: 'syz.1.2914': attribute type 10 has an invalid length. [ 1433.050054][T15351] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2914'. [ 1435.274567][ T29] kauditd_printk_skb: 293 callbacks suppressed [ 1435.279779][ T29] audit: type=1400 audit(1435.190:35567): avc: denied { read } for pid=15354 comm="syz.1.2916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1435.281951][ T29] audit: type=1400 audit(1435.190:35568): avc: denied { write } for pid=15354 comm="syz.1.2916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1435.294700][ T29] audit: type=1400 audit(1435.210:35569): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1435.296637][ T29] audit: type=1400 audit(1435.210:35570): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1435.302032][ T29] audit: type=1400 audit(1435.210:35571): avc: denied { create } for pid=15354 comm="syz.1.2916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1435.309956][ T29] audit: type=1400 audit(1435.220:35572): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1435.316904][ T29] audit: type=1400 audit(1435.230:35573): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1435.325375][ T29] audit: type=1400 audit(1435.240:35574): avc: denied { write } for pid=15354 comm="syz.1.2916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1435.325781][ T29] audit: type=1400 audit(1435.240:35575): avc: denied { module_request } for pid=15354 comm="syz.1.2916" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1435.325855][ T29] audit: type=1400 audit(1435.240:35576): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.890256][ T29] kauditd_printk_skb: 223 callbacks suppressed [ 1440.890453][ T29] audit: type=1400 audit(1440.810:35800): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.909671][ T29] audit: type=1400 audit(1440.810:35801): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.942197][ T29] audit: type=1400 audit(1440.860:35802): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.942587][ T29] audit: type=1400 audit(1440.860:35803): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.948299][ T29] audit: type=1400 audit(1440.860:35804): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.949173][ T29] audit: type=1400 audit(1440.860:35805): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.955682][ T29] audit: type=1400 audit(1440.870:35806): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1440.956184][ T29] audit: type=1400 audit(1440.870:35807): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1441.016104][ T29] audit: type=1400 audit(1440.930:35808): avc: denied { map_create } for pid=15436 comm="syz.2.2935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1441.017864][ T29] audit: type=1400 audit(1440.930:35809): avc: denied { bpf } for pid=15436 comm="syz.2.2935" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1441.267962][T15442] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1441.270356][T15442] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1446.382853][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 1446.383930][ T29] audit: type=1400 audit(1446.300:35833): avc: denied { prog_load } for pid=15440 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1446.385600][ T29] audit: type=1400 audit(1446.300:35834): avc: denied { bpf } for pid=15440 comm="syz.1.2936" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1446.387337][ T29] audit: type=1400 audit(1446.300:35835): avc: denied { perfmon } for pid=15440 comm="syz.1.2936" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1446.389721][ T29] audit: type=1400 audit(1446.300:35836): avc: denied { prog_run } for pid=15440 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1449.535539][ T29] audit: type=1400 audit(1449.450:35837): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1449.574017][ T29] audit: type=1400 audit(1449.490:35838): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1449.615504][ T29] audit: type=1400 audit(1449.510:35839): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1449.615961][ T29] audit: type=1400 audit(1449.510:35840): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1449.616294][ T29] audit: type=1400 audit(1449.510:35841): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1449.616483][ T29] audit: type=1400 audit(1449.510:35842): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.433490][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1452.433924][ T29] audit: type=1400 audit(1452.350:35848): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.457384][ T29] audit: type=1400 audit(1452.370:35849): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.493711][ T29] audit: type=1400 audit(1452.410:35850): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.494254][ T29] audit: type=1400 audit(1452.410:35851): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.525522][ T29] audit: type=1400 audit(1452.440:35852): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.527014][ T29] audit: type=1400 audit(1452.440:35853): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.537302][ T29] audit: type=1400 audit(1452.450:35854): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.537891][ T29] audit: type=1400 audit(1452.450:35855): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1452.695358][ T29] audit: type=1400 audit(1452.610:35856): avc: denied { prog_load } for pid=15450 comm="syz.2.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1452.695654][ T29] audit: type=1400 audit(1452.610:35857): avc: denied { bpf } for pid=15450 comm="syz.2.2939" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1457.649411][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1457.650191][ T29] audit: type=1400 audit(1457.540:35863): avc: denied { ioctl } for pid=15450 comm="syz.2.2939" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5437 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1463.957719][ T29] audit: type=1400 audit(1463.870:35864): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1463.958813][ T29] audit: type=1400 audit(1463.870:35865): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1463.972371][ T29] audit: type=1400 audit(1463.890:35866): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1463.987031][ T29] audit: type=1400 audit(1463.900:35867): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1464.019415][ T29] audit: type=1400 audit(1463.930:35868): avc: denied { recv } for pid=5857 comm="kworker/0:9" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1464.026383][ T29] audit: type=1400 audit(1463.940:35869): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1464.027108][ T29] audit: type=1400 audit(1463.940:35870): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1464.035948][ T29] audit: type=1400 audit(1463.950:35871): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1464.040554][ T29] audit: type=1400 audit(1463.960:35872): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1464.050845][ T29] audit: type=1400 audit(1463.970:35873): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1465.008225][T15455] comedi: valid board names for 8255 driver are: [ 1465.010850][T15455] 8255 [ 1465.011753][T15455] comedi: valid board names for vmk80xx driver are: [ 1465.012566][T15455] vmk80xx [ 1465.013136][T15455] comedi: valid board names for usbduxsigma driver are: [ 1465.014095][T15455] usbduxsigma [ 1465.014711][T15455] comedi: valid board names for usbduxfast driver are: [ 1465.015483][T15455] usbduxfast [ 1465.016086][T15455] comedi: valid board names for usbdux driver are: [ 1465.018288][T15455] usbdux [ 1465.019459][T15455] comedi: valid board names for ni6501 driver are: [ 1465.028053][T15455] ni6501 [ 1465.031914][T15455] comedi: valid board names for dt9812 driver are: [ 1465.032990][T15455] dt9812 [ 1465.033753][T15455] comedi: valid board names for ni_labpc_cs driver are: [ 1465.034565][T15455] ni_labpc_cs [ 1465.035210][T15455] comedi: valid board names for ni_daq_700 driver are: [ 1465.036000][T15455] ni_daq_700 [ 1465.037114][T15455] comedi: valid board names for labpc_pci driver are: [ 1465.037992][T15455] labpc_pci [ 1465.039410][T15455] comedi: valid board names for adl_pci9118 driver are: [ 1465.040368][T15455] pci9118dg [ 1465.041043][T15455] pci9118hg [ 1465.041719][T15455] pci9118hr [ 1465.043192][T15455] comedi: valid board names for 8255_pci driver are: [ 1465.044120][T15455] 8255_pci [ 1465.044843][T15455] comedi: valid board names for comedi_parport driver are: [ 1465.045780][T15455] comedi_parport [ 1465.046419][T15455] comedi: valid board names for comedi_test driver are: [ 1465.048195][T15455] comedi_test [ 1465.049490][T15455] comedi: valid board names for comedi_bond driver are: [ 1465.050861][T15455] comedi_bond [ 1471.706053][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 1471.706749][ T29] audit: type=1400 audit(1471.620:35925): avc: denied { allowed } for pid=15464 comm="syz.1.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1471.738108][ T29] audit: type=1400 audit(1471.650:35926): avc: denied { create } for pid=15464 comm="syz.1.2944" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1471.782348][ T29] audit: type=1400 audit(1471.670:35927): avc: denied { map } for pid=15464 comm="syz.1.2944" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=33160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1471.782934][ T29] audit: type=1400 audit(1471.670:35928): avc: denied { read write } for pid=15464 comm="syz.1.2944" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=33160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1471.783202][ T29] audit: type=1400 audit(1471.690:35929): avc: denied { create } for pid=15464 comm="syz.1.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1477.639608][ T29] audit: type=1400 audit(1477.550:35930): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.711900][ T29] audit: type=1400 audit(1477.610:35931): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.729303][ T29] audit: type=1400 audit(1477.610:35932): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.729774][ T29] audit: type=1400 audit(1477.610:35933): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.729988][ T29] audit: type=1400 audit(1477.620:35934): avc: denied { recv } for pid=12681 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.730191][ T29] audit: type=1400 audit(1477.640:35935): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.759723][ T29] audit: type=1400 audit(1477.640:35936): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.923674][ T29] audit: type=1400 audit(1477.840:35937): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.933092][ T29] audit: type=1400 audit(1477.850:35938): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1477.970169][ T29] audit: type=1400 audit(1477.890:35939): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1478.691167][T15475] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2948'. [ 1479.611664][T15483] netlink: 'syz.2.2950': attribute type 10 has an invalid length. [ 1483.545948][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 1483.549671][ T29] audit: type=1400 audit(1483.460:36011): avc: denied { name_bind } for pid=15487 comm="syz.2.2952" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1483.559268][ T29] audit: type=1400 audit(1483.470:36012): avc: denied { node_bind } for pid=15487 comm="syz.2.2952" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1483.567047][ T29] audit: type=1400 audit(1483.480:36013): avc: denied { recv } for pid=15487 comm="syz.2.2952" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1483.571024][ T29] audit: type=1400 audit(1483.490:36014): avc: denied { recv } for pid=15487 comm="syz.2.2952" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1483.620065][ T29] audit: type=1400 audit(1483.540:36015): avc: denied { recv } for pid=15487 comm="syz.2.2952" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1483.644828][ T29] audit: type=1400 audit(1483.560:36016): avc: denied { recv } for pid=15487 comm="syz.2.2952" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1483.880826][ T29] audit: type=1400 audit(1483.790:36017): avc: denied { recv } for pid=15464 comm="syz.1.2944" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1483.930737][ T29] audit: type=1400 audit(1483.850:36018): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1484.171725][ T29] audit: type=1400 audit(1484.090:36019): avc: denied { recv } for pid=15487 comm="syz.2.2952" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1484.622079][ T29] audit: type=1400 audit(1484.540:36020): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=20004 daddr=127.0.0.1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1486.740182][T14677] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 1487.019235][T14677] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1487.025421][T14677] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1487.032766][T14677] usb 2-1: Product: syz [ 1487.035034][T14677] usb 2-1: Manufacturer: syz [ 1487.036799][T14677] usb 2-1: SerialNumber: syz [ 1492.589318][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 1492.590701][ T29] audit: type=1400 audit(1492.500:36038): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.592952][ T29] audit: type=1400 audit(1492.500:36039): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.631006][ T29] audit: type=1400 audit(1492.550:36040): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.634277][ T29] audit: type=1400 audit(1492.550:36041): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.647108][ T29] audit: type=1400 audit(1492.550:36042): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.657895][ T29] audit: type=1400 audit(1492.560:36043): avc: denied { recv } for pid=2913 comm="klogd" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.663153][ T29] audit: type=1400 audit(1492.560:36044): avc: denied { recv } for pid=2913 comm="klogd" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.667223][ T29] audit: type=1400 audit(1492.560:36045): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.673348][ T29] audit: type=1400 audit(1492.560:36046): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1493.789733][ T29] audit: type=1400 audit(1493.700:36047): avc: denied { prog_load } for pid=15499 comm="syz.2.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1496.490305][ T5857] usb 2-1: USB disconnect, device number 18 [ 1501.658085][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 1501.658935][ T29] audit: type=1400 audit(1501.480:36068): avc: denied { map_create } for pid=15509 comm="syz.1.2955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1501.659171][ T29] audit: type=1400 audit(1501.490:36069): avc: denied { bpf } for pid=15509 comm="syz.1.2955" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1501.659436][ T29] audit: type=1400 audit(1501.490:36070): avc: denied { map_read map_write } for pid=15509 comm="syz.1.2955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1501.659725][ T29] audit: type=1400 audit(1501.530:36071): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1501.694009][ T29] audit: type=1400 audit(1501.590:36072): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1502.013108][ T29] audit: type=1400 audit(1501.930:36073): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1502.031879][ T29] audit: type=1400 audit(1501.950:36074): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1502.146373][ T29] audit: type=1400 audit(1502.060:36075): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1502.211859][ T29] audit: type=1400 audit(1502.130:36076): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1502.261318][ T29] audit: type=1400 audit(1502.170:36077): avc: denied { execute } for pid=15509 comm="syz.1.2955" name="file0" dev="tmpfs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1509.265955][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 1509.268043][ T29] audit: type=1400 audit(1509.180:36104): avc: denied { create } for pid=15515 comm="syz.2.2957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1509.294061][ T29] audit: type=1400 audit(1509.200:36105): avc: denied { map_create } for pid=15515 comm="syz.2.2957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1513.424753][ T29] audit: type=1400 audit(1513.340:36106): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1513.455274][ T29] audit: type=1400 audit(1513.360:36107): avc: denied { recv } for pid=5857 comm="kworker/0:9" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1513.471126][ T29] audit: type=1400 audit(1513.390:36108): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1513.489948][ T29] audit: type=1400 audit(1513.390:36109): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1513.497928][ T29] audit: type=1400 audit(1513.410:36110): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.502279][ T29] audit: type=1400 audit(1513.420:36111): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1513.512953][ T29] audit: type=1400 audit(1513.430:36112): avc: denied { read write open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.521154][ T29] audit: type=1400 audit(1513.440:36113): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1515.405006][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 1515.407887][ T29] audit: type=1400 audit(1515.320:36127): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1515.412923][ T29] audit: type=1400 audit(1515.320:36128): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1515.423153][ T29] audit: type=1400 audit(1515.340:36129): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1515.579120][ T29] audit: type=1400 audit(1515.490:36130): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1515.579475][ T29] audit: type=1400 audit(1515.490:36131): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1515.579709][ T29] audit: type=1400 audit(1515.490:36132): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1515.591386][ T29] audit: type=1400 audit(1515.500:36133): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1515.768931][ T29] audit: type=1400 audit(1515.680:36134): avc: denied { read } for pid=15521 comm="syz.1.2959" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1515.770815][ T29] audit: type=1400 audit(1515.680:36135): avc: denied { open } for pid=15521 comm="syz.1.2959" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1515.773849][ T29] audit: type=1400 audit(1515.680:36136): avc: denied { prog_load } for pid=15521 comm="syz.1.2959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1525.346401][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1525.346730][ T29] audit: type=1400 audit(1525.260:36144): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.348184][ T29] audit: type=1400 audit(1525.260:36145): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.363675][ T29] audit: type=1400 audit(1525.280:36146): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.369967][ T29] audit: type=1400 audit(1525.290:36147): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.386601][ T29] audit: type=1400 audit(1525.300:36148): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.405314][ T29] audit: type=1400 audit(1525.320:36149): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.407502][ T29] audit: type=1400 audit(1525.320:36150): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1525.451600][ T29] audit: type=1400 audit(1525.370:36151): avc: denied { read write } for pid=15525 comm="syz.2.2960" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1525.453727][ T29] audit: type=1400 audit(1525.370:36152): avc: denied { open } for pid=15525 comm="syz.2.2960" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1525.455630][ T29] audit: type=1400 audit(1525.370:36153): avc: denied { ioctl } for pid=15525 comm="syz.2.2960" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1525.457318][T15526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1525.461114][T15526] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1530.562187][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 1530.562689][ T29] audit: type=1400 audit(1530.480:36203): avc: denied { prog_load } for pid=15536 comm="syz.1.2964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1530.580380][ T29] audit: type=1400 audit(1530.500:36204): avc: denied { bpf } for pid=15536 comm="syz.1.2964" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1530.592558][ T29] audit: type=1400 audit(1530.510:36205): avc: denied { read write } for pid=15536 comm="syz.1.2964" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1530.599218][ T29] audit: type=1400 audit(1530.510:36206): avc: denied { open } for pid=15536 comm="syz.1.2964" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1530.603962][ T29] audit: type=1400 audit(1530.520:36207): avc: denied { module_request } for pid=15536 comm="syz.1.2964" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1535.764055][ T29] audit: type=1400 audit(1535.680:36208): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1535.811910][ T29] audit: type=1400 audit(1535.730:36209): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1535.813800][ T29] audit: type=1400 audit(1535.730:36210): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1535.823110][ T29] audit: type=1400 audit(1535.730:36211): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1535.829375][ T29] audit: type=1400 audit(1535.740:36212): avc: denied { recv } for pid=15536 comm="syz.1.2964" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1535.842254][ T29] audit: type=1400 audit(1535.750:36213): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1535.842701][ T29] audit: type=1400 audit(1535.750:36214): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1536.000419][ T29] audit: type=1400 audit(1535.910:36215): avc: denied { prog_load } for pid=15542 comm="syz.2.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1536.102328][ T29] audit: type=1400 audit(1536.020:36216): avc: denied { bpf } for pid=15542 comm="syz.2.2965" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1536.175877][ T29] audit: type=1400 audit(1536.090:36217): avc: denied { perfmon } for pid=15542 comm="syz.2.2965" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1543.512615][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 1543.512913][ T29] audit: type=1400 audit(1543.430:36241): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1543.520088][ T29] audit: type=1400 audit(1543.440:36242): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1543.557211][ T29] audit: type=1400 audit(1543.470:36243): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.559216][ T29] audit: type=1400 audit(1543.470:36244): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.560560][ T29] audit: type=1400 audit(1543.480:36245): avc: denied { recv } for pid=2822 comm="pr/ttyAMA-1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1543.561037][ T29] audit: type=1400 audit(1543.480:36246): avc: denied { recv } for pid=2822 comm="pr/ttyAMA-1" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1543.565926][ T29] audit: type=1400 audit(1543.480:36247): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1543.579144][ T29] audit: type=1400 audit(1543.490:36248): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.579684][ T29] audit: type=1400 audit(1543.500:36249): avc: denied { recv } for pid=15550 comm="syz.2.2968" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1543.603031][ T29] audit: type=1400 audit(1543.510:36250): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1544.547208][T15562] netlink: 'syz.1.2973': attribute type 1 has an invalid length. [ 1544.650561][T15562] bond1: entered promiscuous mode [ 1544.651427][T15562] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1545.019907][T15562] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2973'. [ 1545.039988][T15562] bond1 (unregistering): Released all slaves [ 1548.543217][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 1548.543642][ T29] audit: type=1400 audit(1548.460:36395): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.543888][ T29] audit: type=1400 audit(1548.460:36396): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.570488][ T29] audit: type=1400 audit(1548.490:36397): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.570947][ T29] audit: type=1400 audit(1548.490:36398): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.779487][ T29] audit: type=1400 audit(1548.670:36399): avc: denied { module_request } for pid=15648 comm="syz.2.2983" kmod=7463702D756C702DFA scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1548.934264][ T29] audit: type=1400 audit(1548.850:36400): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.934563][ T29] audit: type=1400 audit(1548.850:36401): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.939410][ T29] audit: type=1400 audit(1548.860:36402): avc: denied { recv } for pid=10589 comm="syz-executor" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.960444][ T29] audit: type=1400 audit(1548.870:36403): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1548.960884][ T29] audit: type=1400 audit(1548.870:36404): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1550.581723][T15660] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1550.588016][T15660] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1552.200484][T15670] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1556.315008][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 1556.315440][ T29] audit: type=1400 audit(1556.230:36471): avc: denied { create } for pid=15669 comm="syz.2.2989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1556.334808][ T29] audit: type=1400 audit(1556.250:36472): avc: denied { map_create } for pid=15669 comm="syz.2.2989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1556.345911][ T29] audit: type=1400 audit(1556.260:36473): avc: denied { map_read map_write } for pid=15669 comm="syz.2.2989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1566.270234][ T29] audit: type=1400 audit(1566.190:36474): avc: denied { read write } for pid=12681 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1566.271216][ T29] audit: type=1400 audit(1566.190:36475): avc: denied { open } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1566.276916][ T29] audit: type=1400 audit(1566.190:36476): avc: denied { ioctl } for pid=12681 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1566.323129][ T29] audit: type=1400 audit(1566.240:36477): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1566.323638][ T29] audit: type=1400 audit(1566.240:36478): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1566.335904][ T29] audit: type=1400 audit(1566.250:36479): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1566.357434][ T29] audit: type=1400 audit(1566.270:36480): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1566.374441][ T29] audit: type=1400 audit(1566.290:36481): avc: denied { recv } for pid=2913 comm="klogd" saddr=10.0.2.2 src=35876 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1566.387531][ T29] audit: type=1400 audit(1566.300:36482): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=55238 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1566.391325][ T29] audit: type=1400 audit(1566.300:36483): avc: denied { recv } for pid=3095 comm="sshd-session" saddr=127.0.0.1 src=55238 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1570.426909][T15686] comedi comedi3: 8255: I/O port conflict (0x40404f26,4) [ 1570.432430][T15686] 8<--- cut here --- [ 1570.432644][T15686] Unable to handle kernel paging request at virtual address fee00008 when write [ 1570.432815][T15686] [fee00008] *pgd=80000080007003, *pmd=00000000 [ 1570.433831][T15686] Internal error: Oops: a06 [#1] SMP ARM [ 1570.438126][T15686] Modules linked in: [ 1570.438818][T15686] CPU: 1 UID: 0 PID: 15686 Comm: syz.2.2992 Not tainted syzkaller #0 PREEMPT [ 1570.439371][T15686] Hardware name: ARM-Versatile Express [ 1570.439837][T15686] PC is at subdev_8255_io+0x60/0x6c [ 1570.440380][T15686] LR is at subdev_8255_io+0x4c/0x6c [ 1570.440820][T15686] pc : [<813dbc68>] lr : [<813dbc54>] psr: 60000013 [ 1570.441282][T15686] sp : e0081cb8 ip : e0081cb8 fp : e0081cd4 [ 1570.441738][T15686] r10: 00000001 r9 : 00000000 r8 : 00000084 [ 1570.442518][T15686] r7 : 00000005 r6 : 0000009b r5 : 840a7780 r4 : 00000008 [ 1570.443431][T15686] r3 : 0000009b r2 : fee00008 r1 : 00000001 r0 : 840a7780 [ 1570.444138][T15686] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1570.445469][T15686] Control: 30c5387d Table: 849a57c0 DAC: 00000000 [ 1570.445990][T15686] Register r0 information: slab kmalloc-192 start 840a7780 pointer offset 0 size 192 [ 1570.448373][T15686] Register r1 information: non-paged memory [ 1570.448821][T15686] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1570.449956][T15686] Register r3 information: non-paged memory [ 1570.450612][T15686] Register r4 information: non-paged memory [ 1570.451088][T15686] Register r5 information: slab kmalloc-192 start 840a7780 pointer offset 0 size 192 [ 1570.451989][T15686] Register r6 information: non-paged memory [ 1570.452678][T15686] Register r7 information: non-paged memory [ 1570.453257][T15686] Register r8 information: non-paged memory [ 1570.453792][T15686] Register r9 information: NULL pointer [ 1570.454223][T15686] Register r10 information: non-paged memory [ 1570.454735][T15686] Register r11 information: 2-page vmalloc region starting at 0xe0080000 allocated at kernel_clone+0xac/0x3ec [ 1570.456634][T15686] Register r12 information: 2-page vmalloc region starting at 0xe0080000 allocated at kernel_clone+0xac/0x3ec [ 1570.457735][T15686] Process syz.2.2992 (pid: 15686, stack limit = 0xe0080000) [ 1570.458783][T15686] Stack: (0xe0081cb8 to 0xe0082000) [ 1570.458980][T15686] 1ca0: 813dbc08 840a7780 [ 1570.459204][T15686] 1cc0: 00000005 00000005 e0081cf4 e0081cd8 813db940 813dbc14 00000005 8050a7fc [ 1570.459695][T15686] 1ce0: 85567084 85567084 e0081d14 e0081cf8 813dbd00 813db8f4 85567084 840a7780 [ 1570.460102][T15686] 1d00: e0081da8 00000005 e0081d54 e0081d18 813dbef4 813dbc80 82af1fe0 84226280 [ 1570.460643][T15686] 1d20: 828215f0 00000000 00000000 829d23cc 840a7780 840a77c4 e0081d90 840a7780 [ 1570.461196][T15686] 1d40: 00000000 82b25910 e0081d8c e0081d58 813cadec 813dbe44 200000c0 00000000 [ 1570.461879][T15686] 1d60: e0081d7c 200000c0 840a7780 b5403587 200000c0 83ad6000 40946400 00000003 [ 1570.462514][T15686] 1d80: e0081e4c e0081d90 813c6938 813cacf0 35353238 00000000 00000000 00000000 [ 1570.463159][T15686] 1da0: 00000000 40404f26 00000005 00000002 000f0000 0000000c 00000009 00000fff [ 1570.463991][T15686] 1dc0: 5c95238c 0000000a 000003bf 00000802 00001600 00000005 20000001 00000809 [ 1570.464826][T15686] 1de0: 0400e1c8 00000006 00000007 00000402 00000199 00000006 00000004 0000000b [ 1570.465629][T15686] 1e00: 00000402 00000000 00000003 000000ef 00000000 0000000a 08000003 dffffffd [ 1570.466720][T15686] 1e20: 00000000 021e2cde 00000000 85bb5480 840a7780 200000c0 200000c0 83ad6000 [ 1570.467967][T15686] 1e40: e0081f14 e0081e50 813c7904 813c6844 00000000 00000000 00000000 021e2cde [ 1570.468509][T15686] 1e60: 00000000 00000000 824625b4 0000005f 84202250 840a77b0 840e0c6c 83ad6000 [ 1570.468874][T15686] 1e80: e0081ee4 e0081e90 807a7d9c 8079e194 00000064 00000001 00000000 e0081eac [ 1570.469220][T15686] 1ea0: 85a2cc10 8342ccc0 00006400 0000000b e0081ea0 00000000 00000000 021e2cde [ 1570.469533][T15686] 1ec0: 85bb5480 40946400 200000c0 200000c0 85bb5480 00000007 e0081ef4 e0081ee8 [ 1570.469746][T15686] 1ee0: 807a7ebc 021e2cde e0081f14 40946400 00000000 85bb5481 200000c0 85bb5480 [ 1570.469941][T15686] 1f00: 00000007 83ad6000 e0081fa4 e0081f18 80578f00 813c7334 ecac8b10 83ad6000 [ 1570.470127][T15686] 1f20: e0081f3c e0081f30 81a61760 81a61630 e0081f54 e0081f40 8025c484 8028d914 [ 1570.470303][T15686] 1f40: e0081fb0 40000000 e0081f84 e0081f58 802229ec 8025c440 00000000 8281cfb4 [ 1570.470489][T15686] 1f60: e0081fb0 0014ced0 ecac8b10 80222940 00000000 021e2cde e0081fac 00000000 [ 1570.470681][T15686] 1f80: 00000000 00316448 00000036 8020029c 83ad6000 00000036 00000000 e0081fa8 [ 1570.470867][T15686] 1fa0: 80200060 80578ddc 00000000 00000000 00000007 40946400 200000c0 00000000 [ 1570.471049][T15686] 1fc0: 00000000 00000000 00316448 00000036 00300000 00000000 00006364 76f250bc [ 1570.471232][T15686] 1fe0: 76f24ec0 76f24eb0 00019294 00132970 60000010 00000007 00000000 00000000 [ 1570.471459][T15686] Call trace: [ 1570.471586][T15686] [<813dbc08>] (subdev_8255_io) from [<813db940>] (subdev_8255_do_config+0x58/0x60) [ 1570.471832][T15686] r7:00000005 r6:00000005 r5:840a7780 r4:813dbc08 [ 1570.471972][T15686] [<813db8e8>] (subdev_8255_do_config) from [<813dbd00>] (subdev_8255_io_init+0x8c/0x9c) [ 1570.472184][T15686] r4:85567084 [ 1570.472263][T15686] [<813dbc74>] (subdev_8255_io_init) from [<813dbef4>] (dev_8255_attach+0xbc/0x114) [ 1570.472564][T15686] r7:00000005 r6:e0081da8 r5:840a7780 r4:85567084 [ 1570.472733][T15686] [<813dbe38>] (dev_8255_attach) from [<813cadec>] (comedi_device_attach+0x108/0x250) [ 1570.472965][T15686] r10:82b25910 r9:00000000 r8:840a7780 r7:e0081d90 r6:840a77c4 r5:840a7780 [ 1570.473137][T15686] r4:829d23cc [ 1570.473264][T15686] [<813cace4>] (comedi_device_attach) from [<813c6938>] (do_devconfig_ioctl+0x100/0x220) [ 1570.473760][T15686] r10:00000003 r9:40946400 r8:83ad6000 r7:200000c0 r6:b5403587 r5:840a7780 [ 1570.474153][T15686] r4:200000c0 [ 1570.474331][T15686] [<813c6838>] (do_devconfig_ioctl) from [<813c7904>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 1570.474804][T15686] r8:83ad6000 r7:200000c0 r6:200000c0 r5:840a7780 r4:85bb5480 [ 1570.475110][T15686] [<813c7328>] (comedi_unlocked_ioctl) from [<80578f00>] (sys_ioctl+0x130/0xba0) [ 1570.475533][T15686] r10:83ad6000 r9:00000007 r8:85bb5480 r7:200000c0 r6:85bb5481 r5:00000000 [ 1570.475817][T15686] r4:40946400 [ 1570.475961][T15686] [<80578dd0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1570.476257][T15686] Exception stack(0xe0081fa8 to 0xe0081ff0) [ 1570.476486][T15686] 1fa0: 00000000 00000000 00000007 40946400 200000c0 00000000 [ 1570.476790][T15686] 1fc0: 00000000 00000000 00316448 00000036 00300000 00000000 00006364 76f250bc [ 1570.477066][T15686] 1fe0: 76f24ec0 76f24eb0 00019294 00132970 [ 1570.477285][T15686] r10:00000036 r9:83ad6000 r8:8020029c r7:00000036 r6:00316448 r5:00000000 [ 1570.477564][T15686] r4:00000000 [ 1570.478007][T15686] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 1570.478772][T15686] ---[ end trace 0000000000000000 ]--- [ 1570.479497][T15686] Kernel panic - not syncing: Fatal exception [ 1570.482040][T15686] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:35:02 Registers: info registers vcpu 0 CPU#0 R00=829c8b10 R01=98f46000 R02=00000000 R03=81a61f98 R04=82abd340 R05=8b4ad400 R06=0004c848 R07=0000016d R08=00000038 R09=84f487c0 R10=00000007 R11=df8019ec R12=df8019f0 R13=df8019e0 R14=8130ae30 R15=81a61fa8 PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84b64840 R01=00000030 R02=eade7000 R03=eade7018 R04=83a8e034 R05=84b64840 R06=80a8f3a4 R07=83a8e038 R08=82827128 R09=00000000 R10=00001bab R11=e0081924 R12=00000002 R13=e0081918 R14=829594c4 R15=80a8f3b4 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000