last executing test programs: 42.039321256s ago: executing program 0 (id=1495): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x85000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r0, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x9, 0x64}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004080}, 0x48081) r2 = openat$full(0xffffff9c, &(0x7f0000000180), 0x381c80, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r0, 0x4, 0x70bd26, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x65}}}}, ["", "", "", "", "", ""]}, 0x20}}, 0x8800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000300), 0x428001, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r5, 0x5000940f, &(0x7f0000000340)={{r3}, "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"}) openat$selinux_mls(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) (async) r6 = openat$selinux_mls(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) dup(r2) (async) r7 = dup(r2) r8 = syz_open_dev$vcsn(&(0x7f0000001380), 0x9, 0x800) getsockopt$nfc_llcp(r8, 0x118, 0x4, &(0x7f00000013c0)=""/124, 0x7c) (async) getsockopt$nfc_llcp(r8, 0x118, 0x4, &(0x7f00000013c0)=""/124, 0x7c) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000001480), r2) sendmsg$BATADV_CMD_SET_VLAN(r6, &(0x7f0000001540)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)={0x34, r9, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x915}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8ae}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x800}]}, 0x34}}, 0x44044) (async) sendmsg$BATADV_CMD_SET_VLAN(r6, &(0x7f0000001540)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)={0x34, r9, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x915}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8ae}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x800}]}, 0x34}}, 0x44044) r10 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x6) ioctl$PIO_UNISCRNMAP(r10, 0x4b6a, &(0x7f0000001580)="a9f341db7b663fafd5611a52ce77c33901b034bbbe2b1c5d3443") ioctl$TIOCSLCKTRMIOS(r10, 0x5457, &(0x7f00000015c0)) getsockname$packet(r2, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001640)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000001680)={0x0, 0x9, 0x2, [0xbb0, 0x7]}, 0xc) (async) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000001680)={0x0, 0x9, 0x2, [0xbb0, 0x7]}, 0xc) syz_genetlink_get_family_id$gtp(&(0x7f00000016c0), r5) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) (async) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001700)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x9, '\x00', 0x0, r2, 0x2, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) ioctl$BTRFS_IOC_SUBVOL_CREATE(r11, 0x5000940e, &(0x7f0000001780)={{r4}, "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"}) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE(r11, 0x5000940e, &(0x7f0000001780)={{r4}, "9e6893db823b54f026d824ddc94282b182869735c51c04e63126d9fbe2f32468f761d684c75ae38d221ae3714f7262f2b7a4f19c8732ebd956283719c7399841005429e97b7afeaa23f2f454271f2ba51dae840674606da6e459ff93ac0996e619144c48b3ab8f72830772fbf269557bdb47ba74a6d506ab17e2c249214cd177f6e49dfec203c4d54f64068e31be7b9d3843a1e9d7423295d1bb42d45dd91118d36ec55045af145b85a063cb5d56959ed7e5cfac02e127a74da24af2a6d038a8def84fdd6bfed2219b7486f92ceea2ff9a5695f7abfae5f50f14d460e62fee32f7bcdc6b5a9195b4bdf0ddf8e557b7d2228d364556e3ebe0f76e2c895c4754b9d6abf4ebb8e5e50f9191c425757df116dc313750ddc93ac0134e577198f782fe7a6d2e456adf5e4fbc195f7da7f61afc902d6cd776ca1c768e5e39fdaeeed4795cc047a771b0477bce42cc6a23a4119747f4297ca3194e059f1f5ac41e1e371759962163772d71ba82b4de6306de5441100c5206efcaa7f5ec2a56cccddfa1cf6e82f2b5d82fc823838035980184741982afe8aa198cef8d58dc7eaf817299f60378f2774bf295010c95f443849294cf44efcbfa945464f78225b858ec7f85a8044a53d1cc01d96716dbbc8cf7f87650447588aa1e9bda8977b23b132d330260c09f4550c48f6584334198459e9787c91c0641a7394677de035986e13194d14a1565e366de65efaadddb8a829f1eea6fb04c87d1784adee6de6479d0eec89a0a0f7dd95a7a9de07a1f227ec77681ca6f82bc8316247f671311bc571b8426b6ca4f4c86eb01a727f71fd19c69fff2d7eebcca3b7893d73e34c4ebe274ab4fd3afffdad0acb7f80974dec3fd2307a1d0ba9ef0cce7807c14a2e05bb0c1572a474ca3e7901a61d258ca0fcf9ba53e30d159745f1e79e8c4081f4bba9afcd299c6756dab9864241837137f4d30a6cfad17b7a4887e67d7b998795a0c28a04c1b79aee491387fa623c6e7fff421aac242fb60f0bebffaa6d2acf04ad824ddd9c8706c34e1744baee37129ed7d406cd2a9d13ba461891d93f725373f7516f61fb0b05a37e25687564da1fc7e6624e437c633a92fe412e648060d3c4d28ce3053d8c6c8680029f3cf4b6c795b645da6bf91c73560a47585555f93ef8ef48264f764b3c12b5e28dda7b9342404efb43c733bf9d9578592dccfed881e664b5bf8b153abae99b0b5f45e79e7cfc5881057f29d65afe0372bad75f1b91cc33534951b899f4b27cc3536c6dfccd0bc40d857b77227d77910be07e57d49e62848cc4a9413a92e1abc07902a2f40d7621824bda1e4310d6997273c7d721ed733da124fc407c5714dc6ecf69548731a2d38702f7fa15c8abb369728494d18b21256c0ee89641169e2e273972a6ef530717f7125624de2f21c1d8b8ed89e70c9056c2dc2df6ca0d4b396d8d41028f832cc33b99a89b37ff54a03ddebdbba45242236bf1163bd6f37f383b5dee7226d231809b5c529c9280a3ef1aa478ea9d4e32c97788bd9c2f287d5a6f53915bae3c630273920fc7f2ed0c86d0562231f97377d8ad1e5d145860e3f3bec7042be9866faf0cefb179cc35cfa20812e3f3c60c5333f59ff1f8ca7742db991a64b556cd93e41fdab17e5f92108abe359b62df3dd8d145c5d7e6e3c7624fffbbfae0c7568b8c4b2cc3c6c0165f955349a68686304c2448cd00c749330e83a43df3486e7fc9a30fd19f095c163611aad6d72a9eb5476defac85ac6ee00714c51f8faa1182782aefbff1e5bbe86c8015c5b5b338d41eb0c7b44bf28c24f9eb481b0a610b2f0173612fd6ff723455d32feb08da8a1523ff4d406b6036264868382830ea1a2451943e181535e1d5ff5b27e5bb09413b8fc3ce78e8e99365decb23c592affd3c1616c034b34aafe96e95ec389303af1233c461e58d1add966b21ef45bb0c51b169da16e09ac04eeb6f3512135764ffbe58ec82021d3dd642b5c24145079abb6bb2a91e51890e7c20719a23ee606de44facdc0a6f410cba7248031888b13eb52f7cd4150d099784894fbb6dccaac362adbb313bd6320e81a9a16ae4a93144f38298cd39c7e6d7224746714e8b9d0eda3ab31cec618a390e0e9309751744c3e7aa7944f35b23b819e671030533676448840704ef89012c88ad842cf91868a9c0aef590fc91c28f0362ce7c6f0fe23c4e7e5ca2986d7043568710b492893f801c3cf8bb02353a7138d1d9b1eabccd12753b49bd9326be665c70042694aa8caa6c584376d624adc708c527a784015f79bc9d92e8e2fe3b7d47fb12dc232d3b1296dbd56f5e1a80c50a224698f09cf16f6e93e4d5cb3d2c61b3be23aa8300957e47213ef448e49ebfbe7a31c076ba2fa4d8fe252a31dbedb826f97ad0fdc53a1eaa4752206e1a3733e9b6f928593acaaab22d0829e2722151f8787cfe7271e89459c24cb810ed4ffe34415bb97dd89cf74156c68e5d2bc0b14e7512ef9bb330f3dc6e1ed2e79ddfe9db2e89413f107a23f1c07bbf0acb42077f7c2670bf00142ebac4104231b35fc142e832e776af9efeea0cc34e6e0d691bc211f672aa525850ac08116c843766cc598ca8bb9b69a3ce35539ad85787d1a9513ff69ec16a56de94fd56297d951c6a4eb90029ec5a6db58e7b090b3b221739ec02a07fc28e625a98ce00f418b9fdadb19dde32b72c07c537cacb22bfb98ab6eb529a7ec121870b83b02822ede0630e47b3195b804e19e6a9c6e50d7d21ce32258d455596096a2ce0ff04f56ee5169d91959f571980d8e920de1bc415fb2504da44d8e86e14372c6c1c072f1a8d32604d67ad9f11c9e6e852a2bedeca3e1b1640fa039cfe8563486303ffd4dfe63a4cd1c01f46de0c111543794a293238aa8a5c2321a1d9f04f2f437ea490cc0452c680bf37844d69d386dc66054c2863b1d16af4432780a7e4927182c9fd1644d48b53089344fe4761228b5f250dce0e7074dafc861dc2e03d9b78bea89e337b3ffb8fd242fbd228ceaf629bf245b27ec1a517d2e6093255042e64841c05ad0da12aacba7f1f8fb4bab0c8f570a951890d4424c25260bbe6bc14022075cd57fa3ab398c504752b8e340c46dd6dcb499c46bf8e5bd9bdf61cf8763efd4dcb221ae8d6f74d34c956e58316ba73d7f7f3aa626e98b461b28454a36fb5064d69ee96c03f3720edd9856f7395c040f1d25c36eef62e610220afa7382e0991a6f7b368edd99072ca7a572e3a3c36883e31b0cdae61365ca10d0c181acb6ca5a9b843697c8431454b8adca4ab015c5ba88702ed665b3f0dbdaa0635fe2d59292e26396861e622c6adb0f02daf35e938012728d706230075e82ef82f4b3d90aa221cab9de84b93644dc52e4d043f6be47da3598582bf67a65301fbe657896372ee33f90230048d4aba5ca8d153fe2b27d27a030629633ca33d2961d81566b8ea51f4d0c85556d0cd8dfdda6fb4f167ad08dd5539938bf38f63c5ef826cc8f9acf6db60660695789e75c61863d286f1480888fd4944d4d9a7ccf747c9402bd4cb77e0a1f148140c66f718ee8c29db2a7028fd13694dbb81d19fbf0b0c7af745f863dfb2bf4536b947cc827eb99de1f4fe9f1429719b0356d5d85083b14b1b3b4b8dad16c76b3ff6c5a3ba9dd4f13b997879bfa3787e46d91a2db99f13d1072d537ab314455da3b2dc9ccf73ed1e40d007f7e854548eb2e02663ac4653660239e91ce11d5313e7e31fbcb62b19448eb6dac364554628446ec50617c57d7c57ae007549b7bc4c137e9f3aa06bcf7d23ef78cf0697bad3ab08c0724af49d73c570f514e8cee7917c6bcfe82b70c30a90b5ede81ff3414d205366eb40de180b2db0003b4c589525136e368b35febe21cf64fbf2a94a220b1e685e97b81b1c82370b0d4da5969e73f19f58b74cbc027a09114564d979af457ce65ed7b30f9a902bfba04d80e74e2ce6708646cb4d4f08c1c4b3b3bd6c097ec38292f5c2af673fdcdf42c9c13f024882508baf2f4606c8058f033371478935f3f45888381f3134b641e6e2585663a7a567c6f3a31902a991581f35c6f9f34b8c14b50d3c66bc1b27d2770fab41422e1f35aaa0bada709fac9a781acdaebbc45a34842cb8ce35d4b124508306cdc1da6989aa4fd2cc607ec8a3469788372e078b112c4930d659fcc65d0d9f087f0990f661a6816268a3d35d0d722c3dcfc50aa1e253fee05abbf09b4ae7fa83bdeb8ce084913c099dd24767122db384c1db449cc9c138872c46379542432ffbbb8a36886922ab40897f0abd5eed7740bbb001a094cc721924c16922e3734a35a1cf06163a644cb222b49c07c9047d92ba8ada1065e45c365daa17f26ecb9f241362aee751f8591e2671ee2114d7cbb71a83e7223a2d82e6e88632acc106f3e5728f9d326aeb7176c4390c5f266ae405c1a41f39770775febf9409ff89cbeef8863f29f4c3e1478be6049e0026719b292cdc5584f50e0b346c158bdae82815319509ebbb2fe84eba8dcf717e399e10368f4c18a373b753dee69d779c2c1e09abcd84d1ba57adebcd2df4aaccde44f5f35cfdbc812cd552c7c5dea61d461a633990e3bcedb1af1a29f9af3aa7760e4c4fd9d62feba58ab8f1870a29f56787777b410deec33bf4619446997a270e1159b7a68f253f58db7dafddfd348bb273c636285d3c7d707cf7f2ec2f622f10db833d76eeef697d15b52aca2de24c180440c637ef9e4856f11a4ae48f797cee5174d9561e710745f9b0742ab8b8f92e627d62558e75767af17a4ef9629f53f225d06d94b7fc8391429e7111646507ff73ebdb53ee8a9fcfcdd2b33dc855ceb34d794af20502bc97c9a3e6e325d17d42f032da3b756eb610943d414b342b1ade2b995cbacb0de013a8206debc275b3651bf666aa26e1806a775a7ce1902edfbb61e4f39f1900e67f64ea5289392c8d33ddf037458b1ce22bdd802d48658b408550e801e5553df171de57d86fde506f0809151a01a43fb995f56d7561f5d2cd4bff1fae9948890fef853547fe436fc724ad19c8c1478596e5ea4de653b15a420ddeb1960b32ff2ec17f5d42aeeccaad070b6f412903cf73faa92f42fd0184f479cb9902a18c7c68099f7846912c14cbc00e4d20638ca6ea39f13a39e3357617d6a5a33912573f1a42fd1a9f00629582c73c6b722caace36e7ddf4b135ad6c3e0c7d16a6563e0ef0742bf4206d55bac49a42619cbd90fc64b4e0d7da68d146e6451ea75d5e12a7a8e3a38b15d77dd0ec11d2010bec580d78cb951ee4a6e811ac2e4921b81ac9606887e0661a10eb9fb89b9a5a7b32c91dd4d7b6e0d057273952fedf072d13ab1011f02701fc42d4307368aa828d1bd1105de9b088e5a7e15c8a0d284f94562a47b360f9c45402d9920eeb45aaed236b02e0addb42534ca9003e1c2aa076c67dc8b26c48b213b509ce906c61184279c810a0cddb9956e1e99440bb534b391758ef750ea3aaa65d16f6fc8be146da00904fa85c7b33ced01b4322dd29c5f3bf88cc0fb5a7a1183727c1288bacebdb865ec4bf873aeff6ce6281a65e5a79e2611c044b5c9cf8beef27e974324d434e85f47655e19e66e8afe6c2a9260f2bb7bb3ea8325e6565028311da7548c2810cdbd399129a5de2848866d1d311e23fa5c3e8db9ebb6a1620490bf011100a1475a6956920266a93a3d266aa42f614e55c704585a59e7badd3f628948c4331a93292826120a62d785d206def1e9f02074d5829b134060a1e74a81d94b1a5f39ee9cb47aab22acb76a5f431b95d60c04"}) timer_create(0x6, &(0x7f0000003880)={0x0, 0x3e, 0x0, @thr={&(0x7f0000002780)="93542489c59d06d5ced5702856a6c290cac3fe442fbab8fe01299903f3d91b322024fe277dfe6e2973b352fb1ea039df4c98169cf074d32e71e757d962ee48d9ed3891f98a1cd9b92e6308ffef48bdff5c0642c634fdb4ff4cb025c8ff559d50804b4a292b7632f8f445218e22398af5847f929a11afbfb93540aeddc1fa4ece2e71df9990f8d645c40822fb37ca01b4bddb549fc9e36a07aa3a585dd4c2a8b00f99d2b448567b1a2fd6caa3a96764606b54d1ee9aafa8f07453a2b44c431434fdb014a00e0a01de39555927cd914fec56cc9b9b30ac7bba9b32ba0329290d5878183fa54e7cb3b7c1304092929366884f2d5bc25031339759101e5501b91e8b8ceb9b3b2fe83c18edec805a34307fb5bda91dc45c49974b377251a737f3ec03be64e3ecf889688b35b158a4e0a7ff50fdb028e0e92705db914f3f79bfa9c1752fe9821c6201f8facbf2f263b71c84b7f7867d9caebfd06b2fbd5a58ea29f323d1cc750a84496a550951abab90b2918b52357e77fbc8d66df181051de89c4a0d6700921b54df6d781e228ca75070fabab5568b457f3796fc56844dd8c50656efa63c7397c39e185366f2a0b677bb3032ae7cc464143a12f6cd1a59f08affb78d9288fb267ac2bf76adade5cc592a6b5cbb6acd46bf31045d1dc60e45de6ef4537c15cead9cd2f3d523f1c5bd69d3634b7ee3bc6e069dd17bbb198b9a7a4c71a5ebd87620f66bc45cc07f2329b7d83ef1916bdc842c4f5c119b8800c0bbd618c93797f43724953833ffb21e7353ee5e4b46d9f9baf9fc1d07ee7bc97dfd6384b816901469a1af4665f8c74e877886096809338ec131a931d375478b1a55135b180b1c104239b4949e419fe5b1feacbabee6cf10a4c43c476b7ea3549e84ace5b1b0515cfb766af14921437c24bd217b96a67e9c828f280ede6075fcee969949e8f34650166159f1c45f5f843c208206b2f6e802a794779d64038cba9f0c150cb17ef8a5efdb4732063cefa87c2914f43b0d24230dd63a7cf5b65c8ba7c7a7f99acd9a035e3e9577c8663fc2450fe022b22ed0b4979107d99e107c4f9a7f118373e4519705c582b7015186bc3402dfaddcf9bcc610cf9f5b39b063336f6dcb0d3ba1a60bea8e2d2d9567f5b0cd520ac26e95d33324e39f50d366bab5479c6146d763857e4837adb4de382f0d5b1164ebd3e57252649ad447a076171d4f4196119654a46fbdaa6ec21ec0f5a1c04bd5c819c128e06c8bd000cc1092461da5eaaf7922cabc082e2cc77c1dd647354684fce261d83146237c45839860bd3bcd7e97ab7f289aff838822dad152d9b30a1a50416f71e3fed531c42082bab76f6614a6d77e6cf386f1ffcca6b6ae374a529da15ee6fd70a0b8b1b52487410c901973215c3c9f4078ec43b39b184204dc17c162aef159df8295d492ce4db417874c65d0c9eea2687735a95a4090b033c656b04431efa8b5ac40d778851bab764734b96c3f65f5e341d38e1509e7962f8c9ad928c8a66fecca1c928b4b5c763a8e3b475e3f836481d0f7d77574c42c771e1b00acc5bb20f485e5092870f7c3ca88a88209d6ac5b9249d05f31071f9941d5278088a20130299b0c06805da7c0b55d97639e00b1b55f0502c304007e2f069a0c0436f6521c84b6054b34b6f7e6544598ca3c13727641d2f56ae13e4be6e835c2d7e7a0df0deacca8b45c97215d6c2ec666325c5d80b31cb36acf06bf686cb61b21d28ca78e11b8c3386b4b490b4cbcf6374f52af42f9e70aaafad6670465c9b2950ac7dad821d0a0fb22131114319a7561aa56f5416f41db8699f12dd1f1380a5318c6b2f04afdefd30e5dcc4b5040dc6362c22a959891f372ddb474c327a05b29f579638802b97c5084cc66723df6349373f563a9cd2b60945bf28a1ebc4a6f5ef98d1038fb12d7d07685f013c7f7309e7490165326b9079d0a79f6b4f8cc67555f0393736c62e82b99e16b5309afa135bc29490d1bb7c93a9ce752578d086759d134d3e5da43a552976bba3376a3fb52db997cd164bc63ba2a6de6054265a9849e2285c5dadca63d0a585568362accd36d3b444ecb943a6bd31c8dc31db8038f80f4843eed3fedb437e098068511a1cb9af55664973fe58bb5882291409240f319b12ae1891c63502d9337253f33484a408af075d7a558c2d5f365eac83cb5c6a219c8d8404572a0a71cace440584cb02a9633a5773bfcbc7ac40c0396a3de7ec148c09b355043a89665f6805441137c853119a400effd2feb9c0f6a4e55b89742644f422c63fff262a8a6a2a508af3f27e82f78af31bb3210063624da1da774d06339ccff6690802225246dfb2c86d394c5f876b440f0fe3480779adfa388c9fd629935d7374a5485f95d8ce6c84fc599559854b5d11b1ac65b97325291a3a81897ba71574ac58b2b2231b08deae8b35a4b7d180fab3cd74529f1973e5eaa54766e6c6de9d89bbbc87adc4220b41ba28f32a9e443ef03f2b5b50f9ea19115d7c2ed11db1a9d8b1a41ac6f76d7d85d7d068c276cb37e86458e787a205a020a30ea1f97da41805ab45af651d2198ea3e822ff997cf5f4b042a66784189b5c791f3cd225445e3a736707c3cf59bf8dda2dd0718bb98240fb3e7ffe695c4a07d61e44600a3b74a0ea1f42fcb04005c4b663ee37a6be8408ea99e4907a97dbaf5cc806d9d979769f04c98fdc528764b6800937faf8d15ef2d96e3596e94c0d57567c4df84dfa2f319075ca9af2b5911436fcbf600c676138cba647101719d755264852a98d94678ca2919fb76e5e29833017382feae02b5ee8cf0522d7297df54048b6edbeea7af7d6d5b9b07cfa46df93677ebf7b8725b31238a21bd1694a870eedd763178428e8429a5d6fe986429ce4f1703ebe76977e57b58728b2b2db815cfc9f8c5202495abc919de3e1b04a27d5786b2f6e636f7ceb2dd1e7ba6e8a1d1e23dca63d87bbe2a8e7223f6d0a2a3c2714149336bc8443c628f029550fecff80f4dffb5314d5e69028d1b623a990925117a834d6e2e0cd63bf13a8e7797dba8a587cb60fe604f7a991b69075baef2860865e397f50b4735b7e8e9ce0e82a42354252f7962e21a19b70d32c173d8e21d3dcad669c4ee92c607b11d905410a4aac79610ea339ca612a2e4eedb3bd2286954e3181223dc522beb398d6db497cd1f7007b72fbe946bcdf0af52a8fd35604c9d40daf64732a6bf60b55314b5c9ecfa890c917f553be7008983100a8b8329a4da74270b8cc56440308f5f4a23c18e544fd882bb015c05c0982d8b8d93f9cc434b7471da461ad853102bb8f7b1f0ff57c4ce6d79d583b0b37b4a7ad2ada23a6c0ae55868b8176bfd55d9d32de0e9c4013ea01256f50590f5d07d560a02de8497c8681076706935c2b1ea14cd67eab9bc23c36400f18623b82bdb6647b000720a2ac58163205dbb43950f83aa8101769479c58837ddd8b28db63425df59f75047005b4ddb0186f1ddf1a6f3d8961456440183cb8a110eed44ca378c21a0a05c1ad9ab007cd2741b5fa0fbec8858f6d7e4e9b280afa98ddcaec4e8feb5d3f00fddb2ffb744359dc202a14a1de779d2aad8016cc5aa993a4bae0c0a648e6dc71d5cb68f1d67f568b8a164fa9481a7f0e59e3a050d0051f59f9d6a3c06453cbbf49fd7d2c730bdb74a92c0fa4afe25635dd0ceba505071f59845aebb2388ac1ffa25cfb0c625ec30b4e43dad079177562319397116c0bb46ab95932cd87b920ab81318428bf9b06ceb1c5e52f87127cae45451c12d309b06050edc90283fd21a681132e6ba4a37f944e6953a571d2051d26437f53969eeee8839b5c906645d24c3f7d5b308f4001215150cc8d986de19ff6f94f0007f286ffff45b1d093e619f4967be84d139a82dd52935f4b5f3b97c4901a2a51c0eed11eeb46b19f338374b7cd05add4a85baf0c38497aeb70d3878235402d2791a265fa7790fe41b81c05bffe892e7d69a893c00536f29aab89f1261d4e2c76940f49b7b6b8653d5d063d06a3a71422730dcb4118ac6e799badd09db74978f0275d529753b421393482395afeb1199a0979328b4f8fb01cfd942890a833261301b61d3313e774da7832490fb0d9d608ca3961f86dc24f276fc3d106f07ebaafd8d55c63d8339d9d08c7af40e3fc8c39b735b7369252a8587da20c1623cdfa0608fcdf8acc031100d04bf6acded49905df1714adbde1388e6f75e11360297e819fe099117f59262c2dc5562b1c7c7a56680e85e22a1ee7fda71292b4b6d2b2285d2bfdbe60104ac3c75f43b8673c724084c5c985583b3feb48439addfe6a5e315286e7d7e79c8cd7e00f498cf23bf50bd7aa1182da92ff3bca1a6169ff16c6e61f7a97670ca8aeb4b4b68fb2d3b8fe3343bc51feb2c5772ec2ec73bc553ed01e1d0bea952e673c5ad6dbadce78e745ec33813972c1685500b1d2ace6db157e74449d1ded6b1035f803da06fd5c1024fc925842a84a6390bdf5f740a2f2502aa60de9925ace1082b47b3b831a036eaa2ebbb44a0590e8d84c805ffc8c4dcea29241d78f3b917d04e0e23fa2af721eda5c65cb082dcda6d38b1745ae283f75e606109381ce07efaebf488f216244e4523e1ca6af4ad66489ad3faa739b70388f4e60186ed6d0f4216afac8b813c8e53e57ccdcbf4c27b3b5bc96cd7d69fbe79008de73ad4d21b4cba6311b90da5b5a9aed7154a73828b32a2445c1af3f85423cfcfe5ea911c78b629222e40ef8e5e763d981a258e9fb6bf40df04c7b1fccfe09bf2215db3c456365aab237a341c202137879cc1723dfa852ac2d5e5ee30ea60ed78f987cb103c0aa0e1cb692aa6f0993e71dd75d23235eaae182f401234b8886b90bdc10f861b0a0eec332fee44a07729db4d82baa073d891d624bd83b647c5ed28b0d4b9ebab2210dcfbabafb3e6769ab0b7362dfcb419a02750ad04ae29931dc1383ff1b1441814bbd61555e01157eb03f728bef9057161e83199612e1ff932b13790a877e74029275eeea5698fd714784174f0128794c9f0d07dfdce1c2eb4653ab678b4f39b486088c795b3e95ec7020f3216a2e5a433a1b122ef003d9db3ace0a6526924ee058e99cedcbbc0098a40b8441d430af880aa4b498c5ca9710c1047e60b8fa462fbb6d3404e25c3e3e8e84eb9a3377844faded4d15a2ab203365fe60a3ffc06b8032bb77eb501e03b2e681a11a564302fc74287e2091c135f0b261b53e6accd2135f9812a6d5db4abcca765cdac3bed8df63da37ef53221b258fa99e6e5911439760f9101a5122aa699253c4800d060fb2d2df7ca09510bcdbad482960cef0013a9ddd7b082c5a0795c434552b4a7fa5ff7643fe0448ae2cbc8b9ad1cd5aff120c925906349a808b2d4edf5e7f9a7057c182f1717b38253b90b31e1453e07f2d5a2fdeafb652fabb1f51125cd8353222c4cccbb6b5b9d1259bfd03a2c1295add1a8bca3d7573d45517f8e17d553c8b1cfc1f025d375d044c4ef9bd7a5a11c8511983d35dc860aa08eedc9dc3cb886baf02c589eb9e00caed471d013238bce8432a80c97e2770fd460ea5b9a699ccb2ea8fc6f46bb771925b00b0442bb2e2e1a6951e5837760579240e7155b99f3ad6c0df03ac133173d3e509dedf519820272382919a7e78b15636939f5cc1c24d0264efc5bf57f328f73081f82ad07583ceb11ecf897226109fa4a3f984a64c842c9ae2bd91de9f54b4e1c0a1a0454d8cfa1f93c2a941e24f4f21ca7064c67cd49789306edd32419916df5db85c2afc394c9165903dac6db99f8ee69b26", &(0x7f0000003780)="1e21192fcf3aaffa98eb2c9832d41178ec77b36e822d2114b6cf4fd6da708f91518071fb9ea5604f567368812b72eb05d4b18dae710eedb3d05b7693d3100c7b828b15f1278ab239aa23964f4287054f1ac11f360a520246dc96b75d6711229c67172b7e4693f86e2a49d881dcb01fcd2c1b92427962e13674712b000c3486ffe2926ab03ad3f1fc419d8ae512f0b6719980057c4d38b1f68eb212748eca798510a576d170deb02123d28a9b920000c082b98296ab3daba8122ca91702994526b985ca25474da903e8458f5705aec311185640fa7acf38b37b9e71ab37fe7a080c65d9836efa9995056a75b1730ed3208e172eea"}}, &(0x7f00000038c0)=0x0) clock_gettime(0x0, &(0x7f0000003900)={0x0, 0x0}) timer_settime(r12, 0x1, &(0x7f0000003940)={{r13, r14+10000000}, {0x0, 0x3938700}}, &(0x7f0000003980)) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000003b00)={&(0x7f00000039c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003ac0)={&(0x7f0000003a00)={0xa0, r0, 0x800, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x7, 0x57}}}}, [@NL80211_ATTR_KEY={0x5c, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "8061d16259065b584817b245d6"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "989b52a74a"}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_MODE={0x5}]}, @NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "ab8661a84f"}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x885}, 0x20000002) socket$can_bcm(0x1d, 0x2, 0x2) (async) r15 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg(r15, &(0x7f0000003ec0)={0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003b40)=""/144, 0x90}, {&(0x7f0000003c00)=""/34, 0x22}, {&(0x7f0000003c40)=""/213, 0xd5}, {&(0x7f0000003d40)=""/23, 0x17}, {&(0x7f0000003d80)=""/212, 0xd4}], 0x5}, 0x2001) (async) recvmsg(r15, &(0x7f0000003ec0)={0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003b40)=""/144, 0x90}, {&(0x7f0000003c00)=""/34, 0x22}, {&(0x7f0000003c40)=""/213, 0xd5}, {&(0x7f0000003d40)=""/23, 0x17}, {&(0x7f0000003d80)=""/212, 0xd4}], 0x5}, 0x2001) close(0xffffffffffffffff) 39.264322803s ago: executing program 0 (id=1498): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80c00) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[], 0x60}], 0x1, 0x8001) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r1) 38.830531896s ago: executing program 0 (id=1499): openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) getpid() openat$selinux_user(0xffffff9c, &(0x7f0000000640), 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000000606000000000000000009000003"], 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x800) r5 = dup(0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0xfffffffffffffff3}, 0x1, 0x0, 0x0, 0x40040}, 0xc499cbdaea876ecc) r6 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) r7 = socket(0x1d, 0xa, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r7, &(0x7f00000004c0)={0x1d, r8, 0x3, {0x0, 0x0, 0x1}}, 0x18) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r7) sendmsg$NL80211_CMD_ASSOCIATE(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r9, @ANYBLOB="f8ac67bd7000fcdbdf252600000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x81) r10 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r10, &(0x7f0000000040)={0x1d, r11, 0x3}, 0x18) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x2, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="00022dbd7000fcdbdf251400000008000300", @ANYRES32=r12, @ANYBLOB="0c00990004630000770000000600ab0008000000"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000700)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, r9, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r12}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x7}, @chandef_params, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x401}]]}, 0x2c}, 0x1, 0x0, 0x0, 0x408c5}, 0x40) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000600)={0xffffffffffffffff, r1, 0x25, 0x4, @val=@netfilter={0xa, 0x1, 0x6, 0x1}}, 0x20) sendmmsg$inet(r0, &(0x7f0000000680), 0x0, 0x7c9ce320e125b00) r13 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$usbfs(r13, 0x0, 0x0) 36.891806024s ago: executing program 0 (id=1501): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TUNSETOFFLOAD(r1, 0x5450, 0xc) (fail_nth: 3) 36.574517894s ago: executing program 0 (id=1503): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x3e, &(0x7f0000000100)={0x16, 0x8, 0x6}) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000000)) r2 = fcntl$dupfd(r1, 0x0, r1) close(r2) openat$tun(0xffffff9c, &(0x7f0000000a40), 0x442, 0x0) ioctl$IOMMU_TEST_OP_MD_CHECK_MAP(r2, 0x3ba0, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mlockall(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x12, &(0x7f0000000040)=0x6, 0x4) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r4, &(0x7f0000000780)="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", 0x54e676f5, 0xc000, 0x0, 0xffffffffffffff59) write(r4, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000340)=0x7f, 0x12) r5 = syz_pidfd_open(r0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r5, 0xff08, 0x0) 32.940376824s ago: executing program 0 (id=1507): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0xc1, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.log\x00', 0x80002, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000080)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x7], [0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x176], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5c4]}, 0x45c) ioctl$UI_SET_PROPBIT(r2, 0x5501, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r3, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000580)=0x80) ioctl$int_in(r4, 0x5421, &(0x7f0000004800)) write$input_event(r2, &(0x7f00000005c0), 0x200005d8) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x37) r5 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x4040850) 10.614467315s ago: executing program 1 (id=1527): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/bnep\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, 0xa, 0x2}}) 9.271023439s ago: executing program 1 (id=1528): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r0, @ANYBLOB=',rootmode=0000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) rename(&(0x7f0000000100)='./file0/../file0/file0\x00', &(0x7f0000000140)='./file0/../file0/file0\x00') (fail_nth: 7) 6.510802854s ago: executing program 1 (id=1529): mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) r0 = socket(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_GET_KEY(r0, 0x0, 0x400c0d1) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r1, 0x0, 0x20000080) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000007c0)={'syztnl0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000840)={'gre0\x00', &(0x7f0000000800)={'syztnl2\x00', 0x0, 0x4e, 0x80, 0x9, 0x2, {{0x8, 0x4, 0x2, 0x3, 0x20, 0x66, 0x0, 0xd, 0x29, 0x0, @local, @local, {[@lsrr={0x83, 0x7, 0xa, [@loopback]}, @generic={0x83, 0x2}]}}}}}) r3 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, r4, 0x3}, 0x18) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000880)={'team0\x00', 0x0}) r6 = openat$selinux_status(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000001380)={'vcan0\x00', 0x0}) bind$can_j1939(r6, &(0x7f0000000080)={0x1d, r7, 0x2, {0x2}}, 0x18) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001440)={&(0x7f00000008c0)={0xb48, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x224, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9d0}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xc2b}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}, {{0x8}, {0x194, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x9, 0x40, 0x9}, {0x40, 0x3, 0x9, 0x7}, {0x4, 0x0, 0x0, 0x1}, {0x9, 0x5, 0xf, 0xc3f4}, {0x2, 0x5, 0x9, 0xfffffff9}, {0x8, 0x1, 0x42, 0x7}, {0x827c, 0x80, 0x4, 0x9}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}, {{0x8}, {0x10c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x9, 0x0, 0xc, 0x2}, {0x2, 0xfc, 0x7, 0xc}, {0x7fff, 0x81, 0x1, 0x3}, {0xfffe, 0x9, 0x72, 0x7}]}}}]}}, {{0x8}, {0x1dc, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xca0d}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}]}}, {{0x8}, {0x274, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe00}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x7454, 0x3, 0x19, 0xa1}, {0x5, 0xff, 0xfa, 0x9}, {0x7, 0x0, 0xab, 0x5}, {0x88, 0x1, 0x1, 0x8}]}}}]}}, {{0x8, 0x1, r5}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}}]}}]}, 0xb48}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) 4.322784999s ago: executing program 1 (id=1530): ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, 0x0) 4.150755172s ago: executing program 1 (id=1531): bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x4, 0x7920, 0x9aa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 0s ago: executing program 1 (id=1533): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) write$P9_RMKNOD(r4, &(0x7f0000022d00)={0x14}, 0x14) write$P9_RFSYNC(r3, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x40086610, &(0x7f0000000180)={@desc={0x1, 0x2000000, @desc3}}) kernel console output (not intermixed with test programs): 06128][ T31] audit: type=1400 audit(992.670:5315): avc: denied { mount } for pid=10958 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 992.807048][ T31] audit: type=1400 audit(992.680:5316): avc: denied { mounton } for pid=10958 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 992.811606][ T31] audit: type=1400 audit(992.680:5317): avc: denied { mount } for pid=10958 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 992.887070][ T31] audit: type=1400 audit(992.760:5318): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 992.891480][ T31] audit: type=1400 audit(992.760:5319): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 992.897165][ T31] audit: type=1400 audit(992.770:5320): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.739602][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 997.739724][ T31] audit: type=1400 audit(997.610:5428): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.742409][ T31] audit: type=1400 audit(997.610:5429): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.764127][ T31] audit: type=1400 audit(997.630:5430): avc: denied { ioctl } for pid=11522 comm="syz.0.1321" path="socket:[19482]" dev="sockfs" ino=19482 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 997.776281][ T31] audit: type=1400 audit(997.640:5431): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.779987][ T31] audit: type=1400 audit(997.650:5432): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 997.784837][ T31] audit: type=1400 audit(997.650:5433): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 997.806116][ T31] audit: type=1400 audit(997.660:5434): avc: denied { ioctl } for pid=11522 comm="syz.0.1321" path="socket:[19482]" dev="sockfs" ino=19482 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 997.807271][ T31] audit: type=1400 audit(997.670:5435): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 997.822540][ T31] audit: type=1400 audit(997.690:5436): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 997.823503][ T31] audit: type=1400 audit(997.690:5437): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.769154][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 1002.769245][ T31] audit: type=1400 audit(1002.640:5507): avc: denied { read write } for pid=10958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1002.774701][ T31] audit: type=1400 audit(1002.640:5508): avc: denied { read write open } for pid=10958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1002.786648][ T31] audit: type=1400 audit(1002.660:5509): avc: denied { ioctl } for pid=10958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1002.805797][ T31] audit: type=1400 audit(1002.670:5510): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1002.807536][ T31] audit: type=1400 audit(1002.670:5511): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1002.811427][ T31] audit: type=1400 audit(1002.680:5512): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.819434][ T31] audit: type=1400 audit(1002.680:5513): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.826055][ T31] audit: type=1400 audit(1002.690:5514): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1003.058271][ T31] audit: type=1400 audit(1002.930:5515): avc: denied { read } for pid=11559 comm="syz.0.1331" name="dsp" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1003.061090][ T31] audit: type=1400 audit(1002.930:5516): avc: denied { read open } for pid=11559 comm="syz.0.1331" path="/dev/dsp" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1007.487458][T11596] selinux_netlink_send: 56 callbacks suppressed [ 1007.487581][T11596] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11596 comm=syz.1.1345 [ 1008.057496][ T31] kauditd_printk_skb: 169 callbacks suppressed [ 1008.057609][ T31] audit: type=1400 audit(1007.930:5684): avc: denied { sys_module } for pid=11593 comm="syz.1.1345" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1008.060676][ T31] audit: type=1400 audit(1007.930:5685): avc: denied { module_request } for pid=11593 comm="syz.1.1345" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1008.149890][ T31] audit: type=1400 audit(1008.020:5686): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1008.153552][ T31] audit: type=1400 audit(1008.020:5687): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1008.172624][ T31] audit: type=1400 audit(1008.040:5688): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1008.183519][ T31] audit: type=1400 audit(1008.040:5689): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1008.186720][ T31] audit: type=1400 audit(1008.060:5690): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1008.337982][ T31] audit: type=1400 audit(1008.210:5691): avc: denied { create } for pid=11597 comm="syz.0.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1008.353428][ T31] audit: type=1400 audit(1008.220:5692): avc: denied { lock } for pid=11597 comm="syz.0.1346" path="socket:[19575]" dev="sockfs" ino=19575 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1008.369870][ T31] audit: type=1400 audit(1008.240:5693): avc: denied { create } for pid=11597 comm="syz.0.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1009.276081][ T1807] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 1009.529082][ T1807] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1009.529613][ T1807] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1009.529878][ T1807] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1009.530106][ T1807] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1009.530366][ T1807] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1009.530566][ T1807] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1009.539908][ T1807] usb 1-1: config 0 descriptor?? [ 1010.033863][ T1807] usbhid 1-1:0.0: can't add hid device: -71 [ 1010.034379][ T1807] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1010.050062][ T1807] usb 1-1: USB disconnect, device number 19 [ 1013.276492][ T31] kauditd_printk_skb: 114 callbacks suppressed [ 1013.276610][ T31] audit: type=1400 audit(1013.150:5808): avc: denied { write } for pid=11633 comm="syz.0.1355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1013.304543][ T31] audit: type=1400 audit(1013.170:5809): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1013.326217][ T31] audit: type=1400 audit(1013.190:5810): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.332685][ T31] audit: type=1400 audit(1013.200:5811): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1013.356523][ T31] audit: type=1400 audit(1013.220:5812): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1013.357442][ T31] audit: type=1400 audit(1013.220:5813): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1013.522778][ T31] audit: type=1400 audit(1013.390:5814): avc: denied { read write } for pid=11638 comm="syz.1.1357" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1013.525686][ T31] audit: type=1400 audit(1013.390:5815): avc: denied { mount } for pid=11638 comm="syz.1.1357" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1013.538297][ T31] audit: type=1400 audit(1013.410:5816): avc: denied { read write open } for pid=11638 comm="syz.1.1357" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1013.563503][ T31] audit: type=1400 audit(1013.430:5817): avc: denied { mounton } for pid=11638 comm="syz.1.1357" path="/54/file0" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 1018.297428][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 1018.297517][ T31] audit: type=1400 audit(1018.170:5972): avc: denied { read write } for pid=10958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1018.299525][ T31] audit: type=1400 audit(1018.170:5973): avc: denied { read write open } for pid=10958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1018.306102][ T31] audit: type=1400 audit(1018.170:5974): avc: denied { ioctl } for pid=10958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1018.322012][ T31] audit: type=1400 audit(1018.190:5975): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1018.335799][ T31] audit: type=1400 audit(1018.200:5976): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1018.339812][ T31] audit: type=1400 audit(1018.210:5977): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.348529][ T31] audit: type=1400 audit(1018.220:5978): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.353211][ T31] audit: type=1400 audit(1018.220:5979): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.468942][ T31] audit: type=1400 audit(1018.340:5980): avc: denied { map_create } for pid=11674 comm="syz.0.1370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1018.471333][ T31] audit: type=1400 audit(1018.340:5981): avc: denied { bpf } for pid=11674 comm="syz.0.1370" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1018.725727][ T3795] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 1018.945774][ T3795] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1018.946430][ T3795] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1018.946857][ T3795] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1018.947264][ T3795] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1018.947743][ T3795] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1018.948119][ T3795] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1018.966534][ T3795] usb 1-1: config 0 descriptor?? [ 1019.449059][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.449788][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.450202][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.450583][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.451000][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.451400][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.451780][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.452179][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.452566][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.452941][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.453309][ T3795] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1019.454098][ T3795] plantronics 0003:047F:FFFF.0005: No inputs registered, leaving [ 1019.531648][ T3795] plantronics 0003:047F:FFFF.0005: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1019.738201][ T3795] usb 1-1: USB disconnect, device number 20 [ 1023.757824][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 1023.757971][ T31] audit: type=1400 audit(1023.630:6055): avc: denied { create } for pid=11708 comm="syz.1.1374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1023.786313][ T31] audit: type=1400 audit(1023.650:6056): avc: denied { ioctl } for pid=11708 comm="syz.1.1374" path="socket:[19747]" dev="sockfs" ino=19747 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1023.787760][ T31] audit: type=1400 audit(1023.660:6057): avc: denied { ioctl } for pid=11708 comm="syz.1.1374" path="socket:[19747]" dev="sockfs" ino=19747 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1023.806168][ T31] audit: type=1400 audit(1023.660:6058): avc: denied { read write } for pid=11708 comm="syz.1.1374" name="system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1023.807368][ T31] audit: type=1400 audit(1023.670:6059): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1023.808103][ T31] audit: type=1400 audit(1023.670:6060): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1023.809528][ T31] audit: type=1400 audit(1023.680:6061): avc: denied { read open } for pid=11708 comm="syz.1.1374" path="/dev/dma_heap/system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1023.826097][ T31] audit: type=1400 audit(1023.690:6063): avc: denied { read } for pid=11708 comm="syz.1.1374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1023.832539][ T31] audit: type=1400 audit(1023.700:6064): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1023.833695][ T31] audit: type=1400 audit(1023.700:6065): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1024.500293][T11707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11707 comm=syz.0.1373 [ 1024.696047][ T49] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 1024.870339][ T49] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1024.871021][ T49] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1024.871419][ T49] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1024.871769][ T49] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1024.872435][ T49] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1024.872880][ T49] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1024.901720][ T49] usb 2-1: config 0 descriptor?? [ 1025.366188][ T49] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1025.366682][ T49] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1025.366959][ T49] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1025.367197][ T49] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1025.367421][ T49] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1025.367658][ T49] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1025.368093][ T49] plantronics 0003:047F:FFFF.0006: No inputs registered, leaving [ 1025.393637][ T49] plantronics 0003:047F:FFFF.0006: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1025.666952][ T49] usb 2-1: USB disconnect, device number 30 [ 1028.886867][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 1028.886989][ T31] audit: type=1400 audit(1028.760:6136): avc: denied { ioctl } for pid=11744 comm="syz.1.1378" path="socket:[19759]" dev="sockfs" ino=19759 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1028.914514][ T31] audit: type=1400 audit(1028.780:6137): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1028.918679][ T31] audit: type=1400 audit(1028.790:6138): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1028.921385][ T31] audit: type=1400 audit(1028.790:6139): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1028.924515][ T31] audit: type=1400 audit(1028.790:6140): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1028.936549][ T31] audit: type=1400 audit(1028.800:6141): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1030.367733][ T31] audit: type=1400 audit(1030.240:6142): avc: denied { write } for pid=11706 comm="syz.0.1373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1030.389243][ T31] audit: type=1400 audit(1030.250:6143): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1030.406311][ T31] audit: type=1400 audit(1030.270:6144): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1030.422496][ T31] audit: type=1400 audit(1030.290:6145): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1031.996160][ T49] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 1032.234198][ T49] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1032.234770][ T49] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1032.244354][ T49] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1032.244864][ T49] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1032.245997][ T49] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1032.246351][ T49] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1032.269105][ T49] usb 1-1: config 0 descriptor?? [ 1032.733651][ T49] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 1032.734257][ T49] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 1032.734787][ T49] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 1032.737844][ T49] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 1032.738707][ T49] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 1032.739143][ T49] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 1032.739907][ T49] plantronics 0003:047F:FFFF.0007: No inputs registered, leaving [ 1032.774301][ T49] plantronics 0003:047F:FFFF.0007: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1033.012057][ T1807] usb 1-1: USB disconnect, device number 21 [ 1033.438876][T11784] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11784 comm=syz.0.1383 [ 1034.049102][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 1034.049206][ T31] audit: type=1400 audit(1033.920:6236): avc: denied { read append } for pid=11789 comm="syz.1.1386" name="mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1034.055782][ T31] audit: type=1400 audit(1033.920:6237): avc: denied { read append open } for pid=11789 comm="syz.1.1386" path="/dev/input/mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1034.143798][ T31] audit: type=1400 audit(1034.010:6238): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1034.156169][ T31] audit: type=1400 audit(1034.020:6239): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1034.157279][ T31] audit: type=1400 audit(1034.020:6240): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1034.183839][ T31] audit: type=1400 audit(1034.050:6241): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1034.203036][ T31] audit: type=1400 audit(1034.070:6242): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1034.208513][ T31] audit: type=1400 audit(1034.080:6243): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1034.211292][ T31] audit: type=1400 audit(1034.080:6244): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1034.214474][ T31] audit: type=1400 audit(1034.080:6245): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1034.616049][ T1807] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 1034.807197][ T1807] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1034.808304][ T1807] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1034.808710][ T1807] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1034.809080][ T1807] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1034.809549][ T1807] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1034.810048][ T1807] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1034.828823][ T1807] usb 2-1: config 0 descriptor?? [ 1035.308152][ T1807] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1035.308803][ T1807] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1035.309169][ T1807] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1035.309510][ T1807] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1035.309845][ T1807] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1035.310202][ T1807] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1035.310945][ T1807] plantronics 0003:047F:FFFF.0008: No inputs registered, leaving [ 1035.339625][ T1807] plantronics 0003:047F:FFFF.0008: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1035.583427][ T1807] usb 2-1: USB disconnect, device number 31 [ 1039.058561][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 1039.058613][ T31] audit: type=1400 audit(1038.930:6339): avc: denied { write } for pid=11816 comm="syz.1.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1039.104266][ T31] audit: type=1400 audit(1038.970:6340): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1039.110077][ T31] audit: type=1400 audit(1038.980:6341): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1039.119607][ T31] audit: type=1400 audit(1038.990:6342): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1039.121923][ T31] audit: type=1400 audit(1038.990:6343): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1039.129556][ T31] audit: type=1400 audit(1039.000:6344): avc: denied { sys_module } for pid=11816 comm="syz.1.1388" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1039.138392][ T31] audit: type=1400 audit(1039.010:6345): avc: denied { module_request } for pid=11816 comm="syz.1.1388" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1039.146043][ T31] audit: type=1400 audit(1039.010:6346): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1039.165378][ T31] audit: type=1400 audit(1039.030:6347): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1039.175762][ T31] audit: type=1400 audit(1039.040:6348): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1040.498961][T11848] SELinux: Context system_u:object_r:dhcpd_exec_t:s0 is not valid (left unmapped). [ 1040.545750][ T1807] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 1040.773916][ T1807] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1040.774610][ T1807] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1040.776941][ T1807] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1040.777413][ T1807] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1040.777907][ T1807] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1040.778286][ T1807] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1040.803007][ T1807] usb 1-1: config 0 descriptor?? [ 1040.923589][T11852] FAULT_INJECTION: forcing a failure. [ 1040.923589][T11852] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.925996][T11852] CPU: 0 UID: 0 PID: 11852 Comm: syz.1.1394 Not tainted 6.12.0-rc4-syzkaller #0 [ 1040.927079][T11852] Hardware name: ARM-Versatile Express [ 1040.927790][T11852] Call trace: [ 1040.928308][T11852] [<819998f0>] (dump_backtrace) from [<819999ec>] (show_stack+0x18/0x1c) [ 1040.929342][T11852] r7:00000c40 r6:844de9e8 r5:60000013 r4:8203d844 [ 1040.930059][T11852] [<819999d4>] (show_stack) from [<819b7ea4>] (dump_stack_lvl+0x70/0x7c) [ 1040.930674][T11852] [<819b7e34>] (dump_stack_lvl) from [<819b7ec8>] (dump_stack+0x18/0x1c) [ 1040.931221][T11852] r5:00000000 r4:8271925c [ 1040.931435][T11852] [<819b7eb0>] (dump_stack) from [<808e54ec>] (should_fail_ex+0x18c/0x1dc) [ 1040.933136][T11852] [<808e5360>] (should_fail_ex) from [<804e82e0>] (should_failslab+0x6c/0x94) [ 1040.933775][T11852] r6:844de9e8 r5:00001000 r4:82c016c0 [ 1040.934061][T11852] [<804e8274>] (should_failslab) from [<804cd700>] (__kmalloc_noprof+0x9c/0x458) [ 1040.934490][T11852] [<804cd664>] (__kmalloc_noprof) from [<80751010>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1040.935119][T11852] r10:83e2e000 r9:82c9fc00 r8:00000000 r7:8321c088 r6:844de9e8 r5:00001000 [ 1040.935446][T11852] r4:00000000 [ 1040.935641][T11852] [<80750fd4>] (tomoyo_realpath_from_path) from [<8074d154>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1040.936198][T11852] r10:83e2e000 r9:00000000 r8:00000003 r7:00008933 r6:00000004 r5:81ad1868 [ 1040.936623][T11852] r4:844de9e8 r3:824ba340 [ 1040.936853][T11852] [<8074d088>] (tomoyo_path_number_perm) from [<80751a20>] (tomoyo_file_ioctl+0x1c/0x20) [ 1040.937313][T11852] r9:844de9c0 r8:00000003 r7:20000180 r6:20000180 r5:00008933 r4:844de9c0 [ 1040.937660][T11852] [<80751a04>] (tomoyo_file_ioctl) from [<8070006c>] (security_file_ioctl+0x64/0x1e4) [ 1040.938107][T11852] [<80700008>] (security_file_ioctl) from [<8052f6c8>] (sys_ioctl+0x50/0xda8) [ 1040.938496][T11852] r7:20000180 r6:844de9c1 r5:00000000 r4:00008933 [ 1040.939429][T11852] [<8052f678>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1040.939885][T11852] Exception stack(0xe0475fa8 to 0xe0475ff0) [ 1040.940336][T11852] 5fa0: 00000000 00000000 00000003 00008933 20000180 00000000 [ 1040.940654][T11852] 5fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b710bc [ 1040.940972][T11852] 5fe0: 76b70ec0 76b70eb0 00018af8 00132ec0 [ 1040.941261][T11852] r10:00000036 r9:83e2e000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 1040.941587][T11852] r4:00000000 [ 1040.946317][T11852] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1041.321932][ T1807] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 1041.322627][ T1807] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 1041.323033][ T1807] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 1041.323623][ T1807] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 1041.324390][ T1807] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 1041.324734][ T1807] plantronics 0003:047F:FFFF.0009: unknown main item tag 0x0 [ 1041.329600][ T1807] plantronics 0003:047F:FFFF.0009: No inputs registered, leaving [ 1041.361415][ T1807] plantronics 0003:047F:FFFF.0009: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1041.622933][ T1807] usb 1-1: USB disconnect, device number 22 [ 1042.561024][T11878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=11878 comm=syz.1.1397 [ 1044.116179][ T31] kauditd_printk_skb: 150 callbacks suppressed [ 1044.116272][ T31] audit: type=1400 audit(1043.980:6499): avc: denied { read } for pid=11880 comm="syz.1.1398" name="ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1044.129355][ T31] audit: type=1400 audit(1043.990:6500): avc: denied { read open } for pid=11880 comm="syz.1.1398" path="/dev/ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1044.148557][ T31] audit: type=1400 audit(1044.010:6501): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1044.155617][ T31] audit: type=1400 audit(1044.020:6502): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1044.156582][ T31] audit: type=1400 audit(1044.020:6503): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1044.176364][ T31] audit: type=1400 audit(1044.030:6504): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1044.177426][ T31] audit: type=1400 audit(1044.040:6505): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1044.197675][ T31] audit: type=1400 audit(1044.060:6506): avc: denied { read } for pid=11880 comm="syz.1.1398" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1044.207025][ T31] audit: type=1400 audit(1044.070:6507): avc: denied { read open } for pid=11880 comm="syz.1.1398" path="net:[4026532656]" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1044.718964][ T31] audit: type=1400 audit(1044.590:6508): avc: denied { read write } for pid=10958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1045.362007][ T3177] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1045.426765][ T3177] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1045.492837][ T3177] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1045.582331][ T3177] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1045.921638][T11903] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11903 comm=syz.1.1402 [ 1046.068431][ T3177] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1046.116123][ T3177] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1046.123521][ T3177] bond0 (unregistering): Released all slaves [ 1046.217140][ T3177] hsr_slave_0: left promiscuous mode [ 1046.221898][ T3177] hsr_slave_1: left promiscuous mode [ 1046.242562][ T3177] veth1_macvtap: left promiscuous mode [ 1046.243147][ T3177] veth0_macvtap: left promiscuous mode [ 1046.243560][ T3177] veth1_vlan: left promiscuous mode [ 1046.243901][ T3177] veth0_vlan: left promiscuous mode [ 1049.127657][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 1049.127742][ T31] audit: type=1400 audit(1049.000:6617): avc: denied { read open } for pid=11921 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.133372][ T31] audit: type=1400 audit(1049.000:6618): avc: denied { getattr } for pid=11921 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.140742][ T31] audit: type=1400 audit(1049.010:6619): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.143493][ T31] audit: type=1400 audit(1049.010:6620): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.146970][ T31] audit: type=1400 audit(1049.020:6621): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.149339][ T31] audit: type=1400 audit(1049.020:6622): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.156975][ T31] audit: type=1400 audit(1049.030:6623): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.158938][ T31] audit: type=1400 audit(1049.030:6624): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1049.160520][ T31] audit: type=1400 audit(1049.030:6625): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1049.161632][ T31] audit: type=1400 audit(1049.030:6626): avc: denied { search } for pid=11921 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1054.408699][ T31] kauditd_printk_skb: 172 callbacks suppressed [ 1054.408837][ T31] audit: type=1400 audit(1054.280:6799): avc: denied { module_request } for pid=11999 comm="syz.1.1407" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1054.459820][ T31] audit: type=1400 audit(1054.330:6800): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1054.485631][ T31] audit: type=1400 audit(1054.350:6801): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1054.493493][ T31] audit: type=1400 audit(1054.360:6802): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1054.494529][ T31] audit: type=1400 audit(1054.360:6803): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1054.519974][ T31] audit: type=1400 audit(1054.390:6804): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1054.593888][ T31] audit: type=1400 audit(1054.460:6805): avc: denied { module_request } for pid=11891 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1054.650093][ T31] audit: type=1400 audit(1054.520:6806): avc: denied { write } for pid=12012 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1054.653589][ T31] audit: type=1400 audit(1054.520:6807): avc: denied { write open } for pid=12012 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1054.666350][ T31] audit: type=1400 audit(1054.530:6808): avc: denied { getattr } for pid=12012 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1057.109594][T11891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1057.136016][T11891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1059.505932][ T31] kauditd_printk_skb: 228 callbacks suppressed [ 1059.506041][ T31] audit: type=1400 audit(1059.370:7037): avc: denied { write } for pid=12132 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1059.507753][ T31] audit: type=1400 audit(1059.380:7038): avc: denied { write open } for pid=12132 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1059.516265][ T31] audit: type=1400 audit(1059.380:7039): avc: denied { getattr } for pid=12132 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1059.517046][ T31] audit: type=1400 audit(1059.380:7040): avc: denied { ioctl } for pid=12132 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1059.555660][ T31] audit: type=1400 audit(1059.420:7041): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1059.556422][ T31] audit: type=1400 audit(1059.420:7042): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1059.585898][ T31] audit: type=1400 audit(1059.450:7043): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1059.586859][ T31] audit: type=1400 audit(1059.450:7044): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1059.587695][ T31] audit: type=1400 audit(1059.450:7045): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1059.626135][ T31] audit: type=1400 audit(1059.490:7046): avc: denied { search } for pid=12132 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1061.437302][T11891] hsr_slave_0: entered promiscuous mode [ 1061.446396][T11891] hsr_slave_1: entered promiscuous mode [ 1061.462051][T11891] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1061.462501][T11891] Cannot create hsr debugfs directory [ 1062.849512][T11891] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1062.868841][T11891] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1062.904746][T11891] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1062.956772][T11891] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1064.524844][ T31] kauditd_printk_skb: 381 callbacks suppressed [ 1064.537273][ T31] audit: type=1400 audit(1064.390:7428): avc: denied { search } for pid=12289 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.538177][ T31] audit: type=1400 audit(1064.410:7429): avc: denied { search } for pid=12289 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.541064][ T31] audit: type=1400 audit(1064.410:7430): avc: denied { search } for pid=12289 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.543460][ T31] audit: type=1400 audit(1064.410:7431): avc: denied { search } for pid=12289 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.575691][ T31] audit: type=1400 audit(1064.430:7432): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1064.581833][ T31] audit: type=1400 audit(1064.450:7433): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1064.595535][ T31] audit: type=1400 audit(1064.460:7434): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.596112][ T31] audit: type=1400 audit(1064.460:7435): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1064.596481][ T31] audit: type=1400 audit(1064.460:7436): avc: denied { search } for pid=12289 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.596867][ T31] audit: type=1400 audit(1064.460:7437): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1066.629221][T11891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1069.710220][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 1069.710328][ T31] audit: type=1400 audit(1069.580:7569): avc: denied { create } for pid=12321 comm="syz.1.1418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1069.740405][ T31] audit: type=1400 audit(1069.610:7570): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1069.765803][ T31] audit: type=1400 audit(1069.630:7571): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1069.770606][ T31] audit: type=1400 audit(1069.640:7572): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1069.772632][ T31] audit: type=1400 audit(1069.640:7573): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1069.819032][ T31] audit: type=1400 audit(1069.670:7574): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1069.895744][ T31] audit: type=1400 audit(1069.760:7575): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1069.906254][ T31] audit: type=1400 audit(1069.770:7576): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1069.907238][ T31] audit: type=1400 audit(1069.770:7577): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1069.907947][ T31] audit: type=1400 audit(1069.770:7578): avc: denied { sys_module } for pid=11891 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1074.779745][ T31] kauditd_printk_skb: 242 callbacks suppressed [ 1074.779878][ T31] audit: type=1400 audit(1074.650:7821): avc: denied { read append } for pid=12347 comm="syz.1.1421" name="mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.783158][ T31] audit: type=1400 audit(1074.650:7822): avc: denied { read append open } for pid=12347 comm="syz.1.1421" path="/dev/input/mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.812706][ T31] audit: type=1400 audit(1074.680:7823): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1074.820355][ T31] audit: type=1400 audit(1074.690:7824): avc: denied { write } for pid=12345 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.829200][ T31] audit: type=1400 audit(1074.700:7825): avc: denied { write open } for pid=12345 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.830310][ T31] audit: type=1400 audit(1074.700:7826): avc: denied { create } for pid=12347 comm="syz.1.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1074.834679][ T31] audit: type=1400 audit(1074.700:7827): avc: denied { getattr } for pid=12345 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.845758][ T31] audit: type=1400 audit(1074.710:7828): avc: denied { ioctl } for pid=12345 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.849165][ T31] audit: type=1400 audit(1074.720:7829): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1074.851753][ T31] audit: type=1400 audit(1074.720:7830): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1079.787313][ T31] kauditd_printk_skb: 287 callbacks suppressed [ 1079.787392][ T31] audit: type=1400 audit(1079.660:8118): avc: denied { search } for pid=12395 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1079.791836][ T31] audit: type=1400 audit(1079.660:8119): avc: denied { search } for pid=12395 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1079.815894][ T31] audit: type=1400 audit(1079.680:8120): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1079.817139][ T31] audit: type=1400 audit(1079.680:8121): avc: denied { read } for pid=12395 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1079.835881][ T31] audit: type=1400 audit(1079.700:8122): avc: denied { read open } for pid=12395 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1079.836910][ T31] audit: type=1400 audit(1079.700:8123): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1079.845760][ T31] audit: type=1400 audit(1079.710:8124): avc: denied { getattr } for pid=12395 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1079.860234][ T31] audit: type=1400 audit(1079.730:8125): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1079.871208][ T31] audit: type=1400 audit(1079.740:8126): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1079.872031][ T31] audit: type=1400 audit(1079.740:8127): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1084.796387][ T31] kauditd_printk_skb: 243 callbacks suppressed [ 1084.796475][ T31] audit: type=1400 audit(1084.670:8371): avc: denied { search } for pid=12411 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.836706][ T31] audit: type=1400 audit(1084.680:8372): avc: denied { search } for pid=12411 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.837645][ T31] audit: type=1400 audit(1084.680:8373): avc: denied { search } for pid=12411 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.838429][ T31] audit: type=1400 audit(1084.700:8374): avc: denied { search } for pid=12411 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.839215][ T31] audit: type=1400 audit(1084.710:8375): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1084.843112][ T31] audit: type=1400 audit(1084.710:8376): avc: denied { search } for pid=12411 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.856261][ T31] audit: type=1400 audit(1084.720:8377): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.857172][ T31] audit: type=1400 audit(1084.720:8378): avc: denied { search } for pid=12411 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1084.857936][ T31] audit: type=1400 audit(1084.720:8379): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1084.858706][ T31] audit: type=1400 audit(1084.720:8380): avc: denied { read } for pid=12411 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1085.053543][T11891] veth0_vlan: entered promiscuous mode [ 1085.150186][T11891] veth1_vlan: entered promiscuous mode [ 1085.539658][T11891] veth0_macvtap: entered promiscuous mode [ 1085.618377][T11891] veth1_macvtap: entered promiscuous mode [ 1086.053675][T11891] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.054260][T11891] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.054630][T11891] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.075676][T11891] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1087.726316][ T8] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 1087.986686][ T8] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1087.987341][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1087.987717][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1087.988061][ T8] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1087.988540][ T8] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1087.988932][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1088.022797][ T8] usb 1-1: config 0 descriptor?? [ 1088.526834][ T8] plantronics 0003:047F:FFFF.000A: unknown main item tag 0x0 [ 1088.527342][ T8] plantronics 0003:047F:FFFF.000A: unknown main item tag 0x0 [ 1088.527649][ T8] plantronics 0003:047F:FFFF.000A: unknown main item tag 0x0 [ 1088.528120][ T8] plantronics 0003:047F:FFFF.000A: unknown main item tag 0x0 [ 1088.528352][ T8] plantronics 0003:047F:FFFF.000A: unknown main item tag 0x0 [ 1088.528642][ T8] plantronics 0003:047F:FFFF.000A: unknown main item tag 0x0 [ 1088.529262][ T8] plantronics 0003:047F:FFFF.000A: No inputs registered, leaving [ 1088.556862][ T8] plantronics 0003:047F:FFFF.000A: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1088.812003][ T1807] usb 1-1: USB disconnect, device number 23 [ 1089.862134][ T31] kauditd_printk_skb: 348 callbacks suppressed [ 1089.862195][ T31] audit: type=1400 audit(1089.730:8729): avc: denied { search } for pid=12434 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1089.864576][ T31] audit: type=1400 audit(1089.730:8730): avc: denied { search } for pid=12434 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1089.883443][ T31] audit: type=1400 audit(1089.750:8731): avc: denied { search } for pid=12434 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1089.884490][ T31] audit: type=1400 audit(1089.750:8732): avc: denied { append } for pid=12434 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=87 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1089.892710][ T31] audit: type=1400 audit(1089.750:8733): avc: denied { append open } for pid=12434 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=87 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1089.893582][ T31] audit: type=1400 audit(1089.760:8734): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1089.900983][ T31] audit: type=1400 audit(1089.770:8735): avc: denied { create } for pid=12479 comm="syz.0.1433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1089.926670][ T31] audit: type=1400 audit(1089.800:8736): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1089.929046][ T31] audit: type=1400 audit(1089.800:8737): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1089.932097][ T31] audit: type=1400 audit(1089.800:8738): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1092.935960][ T1807] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 1093.138435][ T1807] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1093.145901][ T1807] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1093.147124][ T1807] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1093.147561][ T1807] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1093.148096][ T1807] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1093.148462][ T1807] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1093.168289][ T1807] usb 1-1: config 0 descriptor?? [ 1093.707936][ T1807] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1093.708564][ T1807] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1093.709017][ T1807] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1093.709376][ T1807] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1093.709732][ T1807] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1093.712521][ T1807] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1093.714119][ T1807] plantronics 0003:047F:FFFF.000B: No inputs registered, leaving [ 1093.772994][ T1807] plantronics 0003:047F:FFFF.000B: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1093.997503][ T8236] usb 1-1: USB disconnect, device number 24 [ 1094.871969][ T31] kauditd_printk_skb: 292 callbacks suppressed [ 1094.872083][ T31] audit: type=1400 audit(1094.740:9031): avc: denied { create } for pid=12525 comm="syz.1.1438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1094.911701][ T31] audit: type=1400 audit(1094.780:9032): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1094.940676][ T31] audit: type=1400 audit(1094.810:9033): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1094.956517][ T31] audit: type=1400 audit(1094.830:9034): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1094.965966][ T31] audit: type=1400 audit(1094.830:9035): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1094.975609][ T31] audit: type=1400 audit(1094.840:9036): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1095.027188][ T31] audit: type=1400 audit(1094.900:9037): avc: denied { read write } for pid=12527 comm="syz.0.1439" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1095.029003][ T31] audit: type=1400 audit(1094.900:9038): avc: denied { read write open } for pid=12527 comm="syz.0.1439" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1095.034633][ T31] audit: type=1400 audit(1094.900:9039): avc: denied { mounton } for pid=12527 comm="syz.0.1439" path="/6/file0" dev="tmpfs" ino=47 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1095.064443][ T31] audit: type=1400 audit(1094.930:9040): avc: denied { search } for pid=12522 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1095.417392][T12531] FAULT_INJECTION: forcing a failure. [ 1095.417392][T12531] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.420552][T12531] CPU: 1 UID: 0 PID: 12531 Comm: syz.0.1440 Not tainted 6.12.0-rc4-syzkaller #0 [ 1095.422999][T12531] Hardware name: ARM-Versatile Express [ 1095.423249][T12531] Call trace: [ 1095.423545][T12531] [<819998f0>] (dump_backtrace) from [<819999ec>] (show_stack+0x18/0x1c) [ 1095.424084][T12531] r7:00000d40 r6:eb0adf74 r5:60000013 r4:8203d844 [ 1095.424695][T12531] [<819999d4>] (show_stack) from [<819b7ea4>] (dump_stack_lvl+0x70/0x7c) [ 1095.425168][T12531] [<819b7e34>] (dump_stack_lvl) from [<819b7ec8>] (dump_stack+0x18/0x1c) [ 1095.425860][T12531] r5:00000000 r4:8271925c [ 1095.426128][T12531] [<819b7eb0>] (dump_stack) from [<808e54ec>] (should_fail_ex+0x18c/0x1dc) [ 1095.426544][T12531] [<808e5360>] (should_fail_ex) from [<804e82e0>] (should_failslab+0x6c/0x94) [ 1095.426963][T12531] r6:eb0adf74 r5:00000011 r4:82c01240 [ 1095.427233][T12531] [<804e8274>] (should_failslab) from [<804cd700>] (__kmalloc_noprof+0x9c/0x458) [ 1095.427680][T12531] [<804cd664>] (__kmalloc_noprof) from [<80750f18>] (tomoyo_encode2+0x64/0xf0) [ 1095.428244][T12531] r10:00000fff r9:85148c00 r8:00000000 r7:832e2110 r6:eb0adf74 r5:85960ffc [ 1095.428594][T12531] r4:85960ff6 [ 1095.428814][T12531] [<80750eb4>] (tomoyo_encode2) from [<80750fc8>] (tomoyo_encode+0x24/0x30) [ 1095.429254][T12531] r9:85148c00 r8:00000000 r7:832e2110 r6:eb0adf74 r5:00001000 r4:85960ff7 [ 1095.429935][T12531] [<80750fa4>] (tomoyo_encode) from [<80751054>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1095.430451][T12531] r5:00001000 r4:85960000 [ 1095.430677][T12531] [<80750fd4>] (tomoyo_realpath_from_path) from [<8074d154>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1095.431170][T12531] r10:00000000 r9:00000000 r8:833bd900 r7:00000000 r6:00000005 r5:81ad1868 [ 1095.431516][T12531] r4:eb0adf74 r3:824ba340 [ 1095.431705][T12531] [<8074d088>] (tomoyo_path_number_perm) from [<80751a00>] (tomoyo_path_chmod+0x20/0x24) [ 1095.432144][T12531] r9:fffff000 r8:833bd900 r7:00000000 r6:833bd980 r5:00000000 r4:eb0adf74 [ 1095.432480][T12531] [<807519e0>] (tomoyo_path_chmod) from [<8070a44c>] (security_path_chmod+0x68/0x1d4) [ 1095.432865][T12531] [<8070a3e4>] (security_path_chmod) from [<805120bc>] (chmod_common+0x78/0x174) [ 1095.433268][T12531] r5:eb0adf74 r4:00000000 [ 1095.433519][T12531] [<80512044>] (chmod_common) from [<805123b4>] (sys_fchmodat+0x64/0xb4) [ 1095.434028][T12531] r10:0000014d r9:83e29800 r8:00000002 r7:00000000 r6:ffffff9c r5:20000440 [ 1095.434782][T12531] r4:00000000 [ 1095.435076][T12531] [<80512350>] (sys_fchmodat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1095.435479][T12531] Exception stack(0xeb0adfa8 to 0xeb0adff0) [ 1095.435945][T12531] dfa0: 00000000 00000000 ffffff9c 20000440 00000000 00000000 [ 1095.436479][T12531] dfc0: 00000000 00000000 00130e70 0000014d 00000000 00006364 003d0f00 76b5b0bc [ 1095.436865][T12531] dfe0: 76b5aec0 76b5aeb0 00018af8 00132ec0 [ 1095.437309][T12531] r8:8020029c r7:0000014d r6:00130e70 r5:00000000 r4:00000000 [ 1095.445926][T12531] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1097.174426][T12544] input: syz0 as /devices/virtual/input/input21 [ 1097.778646][T12551] serio: Serial port pts0 [ 1099.842746][T12563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4879 sclass=netlink_route_socket pid=12563 comm=syz.0.1446 [ 1099.876271][ T31] kauditd_printk_skb: 294 callbacks suppressed [ 1099.876388][ T31] audit: type=1400 audit(1099.730:9335): avc: denied { ioctl } for pid=12562 comm="syz.0.1446" path="socket:[21316]" dev="sockfs" ino=21316 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1099.878256][ T31] audit: type=1400 audit(1099.740:9336): avc: denied { create } for pid=12562 comm="syz.0.1446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1099.887073][ T31] audit: type=1400 audit(1099.750:9337): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1099.896233][ T31] audit: type=1400 audit(1099.760:9338): avc: denied { search } for pid=12561 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1099.897070][ T31] audit: type=1400 audit(1099.760:9339): avc: denied { search } for pid=12561 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1099.897724][ T31] audit: type=1400 audit(1099.760:9340): avc: denied { search } for pid=12561 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1099.899536][ T31] audit: type=1400 audit(1099.770:9341): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1099.905718][ T31] audit: type=1400 audit(1099.770:9342): avc: denied { getattr } for pid=12561 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=89 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1099.916089][ T31] audit: type=1400 audit(1099.780:9343): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1099.917955][ T31] audit: type=1400 audit(1099.790:9344): avc: denied { read } for pid=12562 comm="syz.0.1446" name="card0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1103.386817][T11761] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 1103.577326][T11761] usb 1-1: Using ep0 maxpacket: 8 [ 1103.615510][T11761] usb 1-1: config 0 has no interfaces? [ 1103.687993][T11761] usb 1-1: New USB device found, idVendor=046d, idProduct=08dd, bcdDevice=ff.f4 [ 1103.690803][T11761] usb 1-1: New USB device strings: Mfr=8, Product=2, SerialNumber=3 [ 1103.727854][T11761] usb 1-1: Product: syz [ 1103.728171][T11761] usb 1-1: Manufacturer: syz [ 1103.728358][T11761] usb 1-1: SerialNumber: syz [ 1103.769991][T11761] usb 1-1: config 0 descriptor?? [ 1104.891530][ T31] kauditd_printk_skb: 352 callbacks suppressed [ 1104.891587][ T31] audit: type=1400 audit(1104.760:9697): avc: denied { search } for pid=12598 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.906303][ T31] audit: type=1400 audit(1104.770:9698): avc: denied { search } for pid=12598 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.907192][ T31] audit: type=1400 audit(1104.780:9699): avc: denied { search } for pid=12598 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.915842][ T31] audit: type=1400 audit(1104.780:9700): avc: denied { read } for pid=12598 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.918446][ T31] audit: type=1400 audit(1104.790:9701): avc: denied { read open } for pid=12598 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.928331][ T31] audit: type=1400 audit(1104.800:9702): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1104.936591][ T31] audit: type=1400 audit(1104.800:9703): avc: denied { getattr } for pid=12598 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.946108][ T31] audit: type=1400 audit(1104.810:9704): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1104.953423][ T31] audit: type=1400 audit(1104.820:9705): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1104.975372][ T31] audit: type=1400 audit(1104.840:9706): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1105.066556][T11761] usb 1-1: USB disconnect, device number 25 [ 1109.909355][ T31] kauditd_printk_skb: 268 callbacks suppressed [ 1109.909449][ T31] audit: type=1400 audit(1109.780:9975): avc: denied { search } for pid=12640 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.925684][ T31] audit: type=1400 audit(1109.790:9976): avc: denied { search } for pid=12640 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.926495][ T31] audit: type=1400 audit(1109.790:9977): avc: denied { search } for pid=12640 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.966019][ T31] audit: type=1400 audit(1109.820:9978): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1109.967014][ T31] audit: type=1400 audit(1109.820:9979): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.967703][ T31] audit: type=1400 audit(1109.820:9980): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1109.968384][ T31] audit: type=1400 audit(1109.830:9981): avc: denied { read } for pid=12640 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.969107][ T31] audit: type=1400 audit(1109.830:9982): avc: denied { read open } for pid=12640 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.969979][ T31] audit: type=1400 audit(1109.830:9983): avc: denied { getattr } for pid=12640 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1110.016191][ T31] audit: type=1400 audit(1109.880:9984): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1111.564714][T12652] FAULT_INJECTION: forcing a failure. [ 1111.564714][T12652] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.576096][T12652] CPU: 1 UID: 0 PID: 12652 Comm: syz.1.1459 Not tainted 6.12.0-rc4-syzkaller #0 [ 1111.576614][T12652] Hardware name: ARM-Versatile Express [ 1111.578403][T12652] Call trace: [ 1111.578668][T12652] [<819998f0>] (dump_backtrace) from [<819999ec>] (show_stack+0x18/0x1c) [ 1111.579810][T12652] r7:00000d40 r6:8576d0e8 r5:60000013 r4:8203d844 [ 1111.580139][T12652] [<819999d4>] (show_stack) from [<819b7ea4>] (dump_stack_lvl+0x70/0x7c) [ 1111.580543][T12652] [<819b7e34>] (dump_stack_lvl) from [<819b7ec8>] (dump_stack+0x18/0x1c) [ 1111.580950][T12652] r5:00000000 r4:8271925c [ 1111.581163][T12652] [<819b7eb0>] (dump_stack) from [<808e54ec>] (should_fail_ex+0x18c/0x1dc) [ 1111.581556][T12652] [<808e5360>] (should_fail_ex) from [<804e82e0>] (should_failslab+0x6c/0x94) [ 1111.581920][T12652] r6:8576d0e8 r5:00000019 r4:82c01240 [ 1111.582156][T12652] [<804e8274>] (should_failslab) from [<804cd700>] (__kmalloc_noprof+0x9c/0x458) [ 1111.582525][T12652] [<804cd664>] (__kmalloc_noprof) from [<80750f18>] (tomoyo_encode2+0x64/0xf0) [ 1111.582936][T12652] r10:00000fff r9:82c9fc00 r8:00000000 r7:8482a880 r6:8576d0e8 r5:85962ffd [ 1111.583256][T12652] r4:85962fef [ 1111.583442][T12652] [<80750eb4>] (tomoyo_encode2) from [<80750fc8>] (tomoyo_encode+0x24/0x30) [ 1111.583857][T12652] r9:82c9fc00 r8:00000000 r7:8482a880 r6:8576d0e8 r5:00001000 r4:85962ff0 [ 1111.584180][T12652] [<80750fa4>] (tomoyo_encode) from [<80751054>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1111.584572][T12652] r5:00001000 r4:85962000 [ 1111.584766][T12652] [<80750fd4>] (tomoyo_realpath_from_path) from [<8074d154>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1111.585937][T12652] r10:83436c00 r9:00000000 r8:00000004 r7:80045105 r6:00000004 r5:81ad1868 [ 1111.586369][T12652] r4:8576d0e8 r3:824ba340 [ 1111.586626][T12652] [<8074d088>] (tomoyo_path_number_perm) from [<80751a20>] (tomoyo_file_ioctl+0x1c/0x20) [ 1111.587190][T12652] r9:8576d0c0 r8:00000004 r7:00000000 r6:00000000 r5:80045105 r4:8576d0c0 [ 1111.587714][T12652] [<80751a04>] (tomoyo_file_ioctl) from [<8070006c>] (security_file_ioctl+0x64/0x1e4) [ 1111.588314][T12652] [<80700008>] (security_file_ioctl) from [<8052f6c8>] (sys_ioctl+0x50/0xda8) [ 1111.588736][T12652] r7:00000000 r6:8576d0c1 r5:00000000 r4:80045105 [ 1111.589104][T12652] [<8052f678>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1111.589484][T12652] Exception stack(0xeb8e9fa8 to 0xeb8e9ff0) [ 1111.589775][T12652] 9fa0: 00000000 00000000 00000004 80045105 00000000 00000000 [ 1111.590492][T12652] 9fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b2f0bc [ 1111.591176][T12652] 9fe0: 76b2eec0 76b2eeb0 00018af8 00132ec0 [ 1111.591468][T12652] r10:00000036 r9:83436c00 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 1111.591815][T12652] r4:00000000 [ 1111.611026][T12652] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1114.963250][ T31] kauditd_printk_skb: 168 callbacks suppressed [ 1114.963338][ T31] audit: type=1400 audit(1114.830:10153): avc: denied { ioctl } for pid=12666 comm="syz.1.1464" path="socket:[20316]" dev="sockfs" ino=20316 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1114.964561][ T31] audit: type=1400 audit(1114.830:10154): avc: denied { module_request } for pid=12666 comm="syz.1.1464" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1115.004312][ T31] audit: type=1400 audit(1114.870:10155): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1115.030540][ T31] audit: type=1400 audit(1114.900:10156): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1115.076195][ T31] audit: type=1400 audit(1114.940:10157): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1115.077258][ T31] audit: type=1400 audit(1114.940:10158): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1115.077998][ T31] audit: type=1400 audit(1114.940:10159): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1115.156043][ T31] audit: type=1400 audit(1115.000:10160): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1115.157242][ T31] audit: type=1400 audit(1115.030:10161): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1115.159954][ T31] audit: type=1400 audit(1115.030:10162): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1116.734026][T12690] SELinux: Context system_u:object_r:checkpolicy_exec_t:s0 is not valid (left unmapped). [ 1117.819280][T12692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12692 comm=syz.0.1468 [ 1118.091794][T12694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12694 comm=syz.0.1468 [ 1119.979350][ T31] kauditd_printk_skb: 375 callbacks suppressed [ 1119.979435][ T31] audit: type=1400 audit(1119.850:10538): avc: denied { read } for pid=12710 comm="syz.0.1471" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1119.983754][ T31] audit: type=1400 audit(1119.850:10539): avc: denied { read open } for pid=12710 comm="syz.0.1471" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1120.006098][ T31] audit: type=1400 audit(1119.870:10540): avc: denied { create } for pid=12710 comm="syz.0.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1120.011018][ T31] audit: type=1400 audit(1119.880:10541): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1120.021439][ T31] audit: type=1400 audit(1119.880:10542): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1120.036729][ T31] audit: type=1400 audit(1119.900:10543): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1120.037662][ T31] audit: type=1400 audit(1119.900:10544): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1120.046643][ T31] audit: type=1400 audit(1119.910:10545): avc: denied { create } for pid=12710 comm="syz.0.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1120.047494][ T31] audit: type=1400 audit(1119.910:10546): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1120.055653][ T31] audit: type=1400 audit(1119.920:10547): avc: denied { ioctl } for pid=12710 comm="syz.0.1471" path="socket:[21491]" dev="sockfs" ino=21491 ioctlcmd=0x6431 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1125.233599][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 1125.233645][ T31] audit: type=1400 audit(1125.100:10601): avc: denied { read write } for pid=11891 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.238491][ T31] audit: type=1400 audit(1125.110:10602): avc: denied { read write open } for pid=11891 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.245332][ T31] audit: type=1400 audit(1125.110:10603): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1125.246031][ T31] audit: type=1400 audit(1125.110:10604): avc: denied { ioctl } for pid=11891 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.265960][ T31] audit: type=1400 audit(1125.130:10605): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1125.268437][ T31] audit: type=1400 audit(1125.130:10606): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1125.283660][ T31] audit: type=1400 audit(1125.150:10607): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1125.288146][ T31] audit: type=1400 audit(1125.160:10608): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1125.442594][ T31] audit: type=1400 audit(1125.310:10609): avc: denied { read } for pid=12737 comm="syz.0.1476" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1125.456463][ T31] audit: type=1400 audit(1125.320:10610): avc: denied { read open } for pid=12737 comm="syz.0.1476" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1130.042382][T12759] FAULT_INJECTION: forcing a failure. [ 1130.042382][T12759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.043027][T12759] CPU: 0 UID: 0 PID: 12759 Comm: syz.0.1482 Not tainted 6.12.0-rc4-syzkaller #0 [ 1130.043377][T12759] Hardware name: ARM-Versatile Express [ 1130.043580][T12759] Call trace: [ 1130.043756][T12759] [<819998f0>] (dump_backtrace) from [<819999ec>] (show_stack+0x18/0x1c) [ 1130.044121][T12759] r7:b5403587 r6:00000000 r5:60000013 r4:8203d844 [ 1130.044340][T12759] [<819999d4>] (show_stack) from [<819b7ea4>] (dump_stack_lvl+0x70/0x7c) [ 1130.044666][T12759] [<819b7e34>] (dump_stack_lvl) from [<819b7ec8>] (dump_stack+0x18/0x1c) [ 1130.045141][T12759] r5:00000000 r4:8274e844 [ 1130.045354][T12759] [<819b7eb0>] (dump_stack) from [<808e54ec>] (should_fail_ex+0x18c/0x1dc) [ 1130.045796][T12759] [<808e5360>] (should_fail_ex) from [<808e5550>] (should_fail+0x14/0x18) [ 1130.046144][T12759] r6:00000000 r5:83e20820 r4:76b5acd8 [ 1130.046359][T12759] [<808e553c>] (should_fail) from [<808e5570>] (should_fail_usercopy+0x1c/0x20) [ 1130.046727][T12759] [<808e5554>] (should_fail_usercopy) from [<8020b4a4>] (preserve_vfp_context+0x78/0xc4) [ 1130.047155][T12759] [<8020b42c>] (preserve_vfp_context) from [<8020b86c>] (setup_sigframe+0x16c/0x1c4) [ 1130.047529][T12759] r5:83e20820 r4:76b5abf0 [ 1130.047803][T12759] [<8020b700>] (setup_sigframe) from [<8020bc8c>] (do_work_pending+0x2f4/0x4f8) [ 1130.048173][T12759] r10:003d0f00 r9:b5403587 r8:00000000 r7:83e20820 r6:76b5abf0 r5:ec4adfb0 [ 1130.048469][T12759] r4:83e20000 [ 1130.048632][T12759] [<8020b998>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 1130.049023][T12759] Exception stack(0xec4adfb0 to 0xec4adff8) [ 1130.049298][T12759] dfa0: 76b5bb10 00000000 0fffb0d6 00db9828 [ 1130.049623][T12759] dfc0: 00000001 00000005 00188c70 00188c78 00000000 00006364 003d0f00 76b5b0bc [ 1130.049945][T12759] dfe0: 76b5bb38 76b5aee8 0001cadc 0014d420 20000010 ffffffff [ 1130.050249][T12759] r10:003d0f00 r9:83e20000 r8:00000000 r7:83e20000 r6:ffffffff r5:20000010 [ 1130.050692][T12759] r4:0014d424 [ 1130.357062][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 1130.357144][ T31] audit: type=1400 audit(1130.230:10703): avc: denied { map_create } for pid=12760 comm="syz.1.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1130.359621][ T31] audit: type=1400 audit(1130.230:10704): avc: denied { bpf } for pid=12760 comm="syz.1.1483" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1130.378845][ T31] audit: type=1400 audit(1130.250:10705): avc: denied { read write } for pid=12760 comm="syz.1.1483" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.385558][ T31] audit: type=1400 audit(1130.250:10706): avc: denied { read write open } for pid=12760 comm="syz.1.1483" path="/dev/raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.386450][ T31] audit: type=1400 audit(1130.260:10707): avc: denied { ioctl } for pid=12760 comm="syz.1.1483" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.389409][ T31] audit: type=1400 audit(1130.260:10708): avc: denied { ioctl } for pid=12760 comm="syz.1.1483" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.418652][ T31] audit: type=1400 audit(1130.290:10709): avc: denied { ioctl } for pid=12760 comm="syz.1.1483" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.421609][ T31] audit: type=1400 audit(1130.290:10710): avc: denied { ioctl } for pid=12760 comm="syz.1.1483" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.500238][ T31] audit: type=1400 audit(1130.370:10711): avc: denied { ioctl } for pid=12760 comm="syz.1.1483" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.558120][ T31] audit: type=1400 audit(1130.430:10712): avc: denied { read write } for pid=11891 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.625900][ T24] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 1130.825600][ T24] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1130.826232][ T24] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1130.826635][ T24] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1130.827039][ T24] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1130.827594][ T24] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1130.829813][ T24] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1130.847143][ T24] usb 2-1: config 0 descriptor?? [ 1131.394845][ T24] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 1131.396835][ T24] plantronics 0003:047F:FFFF.000C: No inputs registered, leaving [ 1131.457720][ T24] plantronics 0003:047F:FFFF.000C: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1131.682525][ T3795] usb 2-1: USB disconnect, device number 32 [ 1132.531710][T12794] FAULT_INJECTION: forcing a failure. [ 1132.531710][T12794] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.539769][T12794] CPU: 0 UID: 0 PID: 12794 Comm: syz.1.1487 Not tainted 6.12.0-rc4-syzkaller #0 [ 1132.543316][T12794] Hardware name: ARM-Versatile Express [ 1132.545306][T12794] Call trace: [ 1132.546016][T12794] [<819998f0>] (dump_backtrace) from [<819999ec>] (show_stack+0x18/0x1c) [ 1132.546538][T12794] r7:8376a400 r6:00000d40 r5:60000013 r4:8203d844 [ 1132.546889][T12794] [<819999d4>] (show_stack) from [<819b7ea4>] (dump_stack_lvl+0x70/0x7c) [ 1132.547311][T12794] [<819b7e34>] (dump_stack_lvl) from [<819b7ec8>] (dump_stack+0x18/0x1c) [ 1132.547696][T12794] r5:00000000 r4:8271925c [ 1132.547917][T12794] [<819b7eb0>] (dump_stack) from [<808e54ec>] (should_fail_ex+0x18c/0x1dc) [ 1132.548522][T12794] [<808e5360>] (should_fail_ex) from [<804e82e0>] (should_failslab+0x6c/0x94) [ 1132.549422][T12794] r6:00000d40 r5:84888a80 r4:82ca86c0 [ 1132.549718][T12794] [<804e8274>] (should_failslab) from [<804cd37c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1132.550143][T12794] [<804cd330>] (kmem_cache_alloc_noprof) from [<80709750>] (security_inode_alloc+0x30/0x1e8) [ 1132.550578][T12794] r10:84888b88 r9:00000000 r8:00000000 r7:82c9fc00 r6:81a1cd84 r5:84888a80 [ 1132.550976][T12794] r4:84888a80 [ 1132.551169][T12794] [<80709720>] (security_inode_alloc) from [<80538590>] (inode_init_always_gfp+0x170/0x1c4) [ 1132.551669][T12794] r5:00000000 r4:84888a80 [ 1132.551875][T12794] [<80538420>] (inode_init_always_gfp) from [<8053a378>] (alloc_inode+0x40/0xcc) [ 1132.552318][T12794] r10:0000016e r9:84c84d80 r8:00000000 r7:00000000 r6:81c4a5c0 r5:82c9fc00 [ 1132.552618][T12794] r4:84888a80 [ 1132.552795][T12794] [<8053a338>] (alloc_inode) from [<8053c230>] (new_inode_pseudo+0x10/0x14) [ 1132.553192][T12794] r7:00000000 r6:00000000 r5:ec5bdf5c r4:84888c80 [ 1132.553460][T12794] [<8053c220>] (new_inode_pseudo) from [<814829e4>] (sock_alloc+0x20/0x70) [ 1132.553830][T12794] [<814829c4>] (sock_alloc) from [<81485df8>] (do_accept+0x8c/0x174) [ 1132.554190][T12794] r5:ec5bdf5c r4:84888c80 [ 1132.554397][T12794] [<81485d6c>] (do_accept) from [<81485f6c>] (__sys_accept4+0x8c/0xf8) [ 1132.554785][T12794] r10:0000016e r9:84c84d80 r8:00000000 r7:00000000 r6:00000000 r5:00000006 [ 1132.555517][T12794] r4:84c84d81 [ 1132.555740][T12794] [<81485ee0>] (__sys_accept4) from [<81485fe8>] (sys_accept4+0x10/0x14) [ 1132.556241][T12794] r9:8376a400 r8:8020029c r7:0000016e r6:00130e70 r5:00000000 r4:00000000 [ 1132.556681][T12794] [<81485fd8>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1132.557139][T12794] Exception stack(0xec5bdfa8 to 0xec5bdff0) [ 1132.557596][T12794] dfa0: 00000000 00000000 00000004 00000000 00000000 00000000 [ 1132.558161][T12794] dfc0: 00000000 00000000 00130e70 0000016e 00000000 00006364 003d0f00 76b710bc [ 1132.558503][T12794] dfe0: 76b70ec0 76b70eb0 00018af8 00132ec0 [ 1134.959571][T12811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12811 comm=syz.0.1494 [ 1135.547165][ T31] kauditd_printk_skb: 158 callbacks suppressed [ 1135.547286][ T31] audit: type=1400 audit(1135.420:10871): avc: denied { create } for pid=12817 comm="syz.1.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1135.554331][ T31] audit: type=1400 audit(1135.420:10872): avc: denied { ioctl } for pid=12817 comm="syz.1.1496" path="socket:[21591]" dev="sockfs" ino=21591 ioctlcmd=0x660c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1135.591519][ T31] audit: type=1400 audit(1135.460:10873): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1135.609739][ T31] audit: type=1400 audit(1135.480:10874): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1135.611488][ T31] audit: type=1400 audit(1135.480:10875): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1135.613908][ T31] audit: type=1400 audit(1135.480:10876): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1135.624326][ T31] audit: type=1400 audit(1135.490:10877): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1135.625545][ T31] audit: type=1400 audit(1135.490:10878): avc: denied { ioctl } for pid=12817 comm="syz.1.1496" path="socket:[21591]" dev="sockfs" ino=21591 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1135.639328][ T31] audit: type=1400 audit(1135.510:10879): avc: denied { create } for pid=12817 comm="syz.1.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1135.648079][ T31] audit: type=1400 audit(1135.520:10880): avc: denied { write } for pid=12817 comm="syz.1.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1135.773447][T12820] SELinux: Context u:r:untrusted_app:s0:c512,c768 is not valid (left unmapped). [ 1140.679739][ T31] kauditd_printk_skb: 101 callbacks suppressed [ 1140.679835][ T31] audit: type=1400 audit(1140.550:10982): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.684508][ T31] audit: type=1400 audit(1140.550:10983): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.689940][ T31] audit: type=1400 audit(1140.560:10984): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.712605][ T31] audit: type=1400 audit(1140.580:10985): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1140.739639][ T31] audit: type=1400 audit(1140.610:10986): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1140.742035][ T31] audit: type=1400 audit(1140.610:10987): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1140.744766][ T31] audit: type=1400 audit(1140.610:10988): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1140.765899][ T31] audit: type=1400 audit(1140.630:10989): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1140.871329][ T31] audit: type=1400 audit(1140.740:10990): avc: denied { read append } for pid=12854 comm="syz.0.1503" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1140.877032][ T31] audit: type=1400 audit(1140.750:10991): avc: denied { read append open } for pid=12854 comm="syz.0.1503" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1144.469817][T12876] input: syz0 as /devices/virtual/input/input22 [ 1145.843416][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 1145.843481][ T31] audit: type=1400 audit(1145.710:11075): avc: denied { sys_module } for pid=12885 comm="syz.1.1509" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1145.851447][ T31] audit: type=1400 audit(1145.720:11076): avc: denied { module_request } for pid=12885 comm="syz.1.1509" kmod="syztnl0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1145.863225][ T31] audit: type=1400 audit(1145.730:11077): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1145.889833][ T31] audit: type=1400 audit(1145.760:11078): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1145.893547][ T31] audit: type=1400 audit(1145.760:11079): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1145.900533][ T31] audit: type=1400 audit(1145.760:11080): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1145.937707][ T31] audit: type=1400 audit(1145.810:11081): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1145.938691][ T31] audit: type=1400 audit(1145.810:11082): avc: denied { ioctl } for pid=12885 comm="syz.1.1509" path="socket:[21640]" dev="sockfs" ino=21640 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1145.980377][ T31] audit: type=1400 audit(1145.840:11083): avc: denied { create } for pid=12885 comm="syz.1.1509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1145.988124][ T31] audit: type=1400 audit(1145.860:11084): avc: denied { ioctl } for pid=12885 comm="syz.1.1509" path="socket:[22595]" dev="sockfs" ino=22595 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1147.963140][T12899] FAULT_INJECTION: forcing a failure. [ 1147.963140][T12899] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.963539][T12899] CPU: 1 UID: 0 PID: 12899 Comm: syz.1.1511 Not tainted 6.12.0-rc4-syzkaller #0 [ 1147.963737][T12899] Hardware name: ARM-Versatile Express [ 1147.963871][T12899] Call trace: [ 1147.963984][T12899] [<819998f0>] (dump_backtrace) from [<819999ec>] (show_stack+0x18/0x1c) [ 1147.964275][T12899] r7:83763c00 r6:00000cc0 r5:60000013 r4:8203d844 [ 1147.964421][T12899] [<819999d4>] (show_stack) from [<819b7ea4>] (dump_stack_lvl+0x70/0x7c) [ 1147.964709][T12899] [<819b7e34>] (dump_stack_lvl) from [<819b7ec8>] (dump_stack+0x18/0x1c) [ 1147.964990][T12899] r5:00000000 r4:8271925c [ 1147.965126][T12899] [<819b7eb0>] (dump_stack) from [<808e54ec>] (should_fail_ex+0x18c/0x1dc) [ 1147.965480][T12899] [<808e5360>] (should_fail_ex) from [<804e82e0>] (should_failslab+0x6c/0x94) [ 1147.965741][T12899] r6:00000cc0 r5:76b70e38 r4:82ca8b40 [ 1147.965888][T12899] [<804e8274>] (should_failslab) from [<804cd37c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1147.966129][T12899] [<804cd330>] (kmem_cache_alloc_noprof) from [<8052508c>] (getname_flags.part.0+0x28/0x18c) [ 1147.966515][T12899] r10:00000142 r9:83763c00 r8:8020029c r7:00000000 r6:8223783c r5:76b70e38 [ 1147.966823][T12899] r4:76b70e38 [ 1147.967013][T12899] [<80525064>] (getname_flags.part.0) from [<8052a288>] (getname+0x38/0x4c) [ 1147.967390][T12899] r9:83763c00 r8:8020029c r7:ffffff9c r6:00000000 r5:ecbd1f58 r4:76b70e38 [ 1147.967708][T12899] [<8052a250>] (getname) from [<80512f94>] (do_sys_openat2+0x80/0xe4) [ 1147.968063][T12899] r5:ecbd1f58 r4:76b70e38 [ 1147.968259][T12899] [<80512f14>] (do_sys_openat2) from [<805133d8>] (sys_openat+0x98/0xd4) [ 1147.968800][T12899] r7:00000142 r6:00000000 r5:76b70e38 r4:ffffff9c [ 1147.969053][T12899] [<80513340>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1147.969411][T12899] Exception stack(0xecbd1fa8 to 0xecbd1ff0) [ 1147.969680][T12899] 1fa0: 00000002 76b70e38 ffffff9c 76b70e38 00000002 00000000 [ 1147.970035][T12899] 1fc0: 00000002 76b70e38 00000000 00000142 00000000 00006364 003d0f00 76b710bc [ 1147.970369][T12899] 1fe0: 7f030101 76b70df8 000d8408 00130cb8 [ 1147.970618][T12899] r5:76b70e38 r4:00000002 [ 1150.965943][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 1150.966033][ T31] audit: type=1400 audit(1150.830:11146): avc: denied { sys_module } for pid=12906 comm="syz.1.1514" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1150.970155][ T31] audit: type=1400 audit(1150.840:11147): avc: denied { module_request } for pid=12906 comm="syz.1.1514" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1151.009647][ T31] audit: type=1400 audit(1150.880:11148): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1151.020411][ T31] audit: type=1400 audit(1150.890:11149): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1151.039737][ T31] audit: type=1400 audit(1150.910:11150): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1151.046062][ T31] audit: type=1400 audit(1150.910:11151): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1151.055653][ T31] audit: type=1400 audit(1150.910:11152): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1151.538236][ T31] audit: type=1400 audit(1151.410:11153): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1151.542864][ T31] audit: type=1400 audit(1151.410:11154): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1151.558542][ T31] audit: type=1400 audit(1151.430:11155): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1156.444392][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 1156.444492][ T31] audit: type=1400 audit(1156.310:11186): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1156.459447][ T31] audit: type=1400 audit(1156.330:11187): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1156.486115][ T31] audit: type=1400 audit(1156.350:11188): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1156.487055][ T31] audit: type=1400 audit(1156.350:11189): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1156.496191][ T31] audit: type=1400 audit(1156.360:11190): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1156.500219][ T31] audit: type=1400 audit(1156.370:11191): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1156.503876][ T31] audit: type=1400 audit(1156.370:11192): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1156.524586][ T31] audit: type=1400 audit(1156.390:11193): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1156.729208][ T31] audit: type=1400 audit(1156.600:11194): avc: denied { create } for pid=12927 comm="syz.1.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1156.742170][ T31] audit: type=1400 audit(1156.610:11195): avc: denied { setopt } for pid=12927 comm="syz.1.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1161.645400][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 1161.645461][ T31] audit: type=1400 audit(1161.510:11223): avc: denied { unmount } for pid=10394 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1161.680740][ T31] audit: type=1400 audit(1161.550:11224): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1161.690222][ T31] audit: type=1400 audit(1161.560:11225): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1161.693414][ T31] audit: type=1400 audit(1161.560:11226): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1161.697584][ T31] audit: type=1400 audit(1161.570:11227): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1161.701356][ T31] audit: type=1400 audit(1161.570:11228): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.702783][ T31] audit: type=1400 audit(1161.570:11229): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.713074][ T31] audit: type=1400 audit(1161.570:11230): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.713890][ T31] audit: type=1400 audit(1161.580:11231): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1161.939678][ T31] audit: type=1400 audit(1161.810:11232): avc: denied { write } for pid=12941 comm="syz.1.1522" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.656149][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 1166.656231][ T31] audit: type=1400 audit(1166.530:11295): avc: denied { read } for pid=12960 comm="syz.1.1527" name="rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.660173][ T31] audit: type=1400 audit(1166.530:11296): avc: denied { read open } for pid=12960 comm="syz.1.1527" path="/dev/rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.671595][ T31] audit: type=1400 audit(1166.540:11297): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1166.674416][ T31] audit: type=1400 audit(1166.540:11298): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1166.696188][ T31] audit: type=1400 audit(1166.570:11299): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1166.697654][ T31] audit: type=1400 audit(1166.570:11300): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1166.699690][ T31] audit: type=1400 audit(1166.570:11301): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1166.704900][ T31] audit: type=1400 audit(1166.570:11302): avc: denied { create } for pid=12960 comm="syz.1.1527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1166.713433][ T31] audit: type=1400 audit(1166.580:11303): avc: denied { ioctl } for pid=12960 comm="syz.1.1527" path="socket:[22677]" dev="sockfs" ino=22677 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1166.720923][ T31] audit: type=1400 audit(1166.590:11304): avc: denied { module_request } for pid=12960 comm="syz.1.1527" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1171.866670][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 1171.866774][ T31] audit: type=1400 audit(1171.740:11332): avc: denied { bind } for pid=12968 comm="syz.1.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1171.879457][ T31] audit: type=1400 audit(1171.750:11333): avc: denied { ioctl } for pid=12968 comm="syz.1.1529" path="socket:[22690]" dev="sockfs" ino=22690 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1171.895834][ T31] audit: type=1400 audit(1171.750:11334): avc: denied { module_request } for pid=12968 comm="syz.1.1529" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1171.903629][ T31] audit: type=1400 audit(1171.770:11335): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1171.941786][ T31] audit: type=1400 audit(1171.800:11336): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1171.942667][ T31] audit: type=1400 audit(1171.810:11337): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1171.943292][ T31] audit: type=1400 audit(1171.810:11338): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1171.969791][ T31] audit: type=1400 audit(1171.840:11339): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1172.085914][ T31] audit: type=1400 audit(1171.960:11340): avc: denied { sys_module } for pid=12968 comm="syz.1.1529" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1172.088607][ T31] audit: type=1400 audit(1171.960:11341): avc: denied { module_request } for pid=12968 comm="syz.1.1529" kmod="vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1176.122919][ T3177] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1176.358881][ T3177] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1176.462047][ T3177] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1176.548904][ T3177] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1177.003581][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 1177.003661][ T31] audit: type=1400 audit(1176.870:11367): avc: denied { map_read map_write } for pid=12980 comm="syz.1.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1177.081871][ T31] audit: type=1400 audit(1176.940:11368): avc: denied { module_request } for pid=12983 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1177.291097][ T31] audit: type=1400 audit(1177.160:11369): avc: denied { read write } for pid=10394 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1177.305680][ T31] audit: type=1400 audit(1177.170:11370): avc: denied { read write open } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1177.308821][ T31] audit: type=1400 audit(1177.180:11371): avc: denied { ioctl } for pid=10394 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1177.375526][ T31] audit: type=1400 audit(1177.240:11372): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1177.376343][ T31] audit: type=1400 audit(1177.240:11373): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1177.376880][ T31] audit: type=1400 audit(1177.240:11374): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1177.390871][ T31] audit: type=1400 audit(1177.260:11375): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1177.391458][ T31] audit: type=1400 audit(1177.260:11376): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1178.887010][ T3177] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1179.058089][ T3177] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1179.071972][ T3177] bond0 (unregistering): Released all slaves [ 1179.143830][T13005] __find_get_block_slow() failed. block=144115188075855872, b_blocknr=0, b_state=0x00106019, b_size=4096, device vda blocksize: 4096 [ 1179.144577][T13005] grow_buffers: requested out-of-range block 144115188075855872 for device vda [ 1179.149098][T13005] EXT4-fs warning (device vda): ext4_resize_fs:2019: can't read last block, resize aborted [ 1179.228106][ T3177] hsr_slave_0: left promiscuous mode [ 1179.250077][ T3177] hsr_slave_1: left promiscuous mode SYZFAIL: bad allocate request [ 1179.346672][ T3177] veth1_macvtap: left promiscuous mode [ 1179.347208][ T3177] veth0_macvtap: left promiscuous mode [ 1179.347708][ T3177] veth1_vlan: left promiscuous mode [ 1179.348090][ T3177] veth0_vlan: left promiscuous mode allocated=0 size=4294966775/4294966776 (errno 9: Bad file descriptor) [ 1180.849041][ T3177] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1181.477739][ T3177] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1181.540289][ T3177] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1181.613729][ T3177] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1182.382834][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 1182.382955][ T31] audit: type=1400 audit(1182.250:11408): avc: denied { write } for pid=13009 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1182.402357][ T31] audit: type=1400 audit(1182.270:11409): avc: denied { write open } for pid=13009 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1182.403206][ T31] audit: type=1400 audit(1182.270:11410): avc: denied { getattr } for pid=13009 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1182.403907][ T31] audit: type=1400 audit(1182.270:11411): avc: denied { ioctl } for pid=13009 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1182.422839][ T3177] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1182.441196][ T31] audit: type=1400 audit(1182.310:11412): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1182.466410][ T31] audit: type=1400 audit(1182.340:11413): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1182.475572][ T31] audit: type=1400 audit(1182.340:11414): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1182.476740][ T31] audit: type=1400 audit(1182.340:11415): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1182.477435][ T31] audit: type=1400 audit(1182.340:11416): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1182.479334][ T3177] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1182.483528][ T3177] bond0 (unregistering): Released all slaves [ 1182.577783][ T3177] hsr_slave_0: left promiscuous mode [ 1182.579904][ T3177] hsr_slave_1: left promiscuous mode [ 1182.609867][ T3177] veth1_macvtap: left promiscuous mode [ 1182.610359][ T3177] veth0_macvtap: left promiscuous mode [ 1182.610736][ T3177] veth1_vlan: left promiscuous mode [ 1182.611076][ T3177] veth0_vlan: left promiscuous mode [ 1183.426762][ T31] audit: type=1400 audit(1183.290:11417): avc: denied { write } for pid=13023 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1187.386396][ T31] kauditd_printk_skb: 294 callbacks suppressed [ 1187.386478][ T31] audit: type=1400 audit(1187.260:11712): avc: denied { read } for pid=13031 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.388290][ T31] audit: type=1400 audit(1187.260:11713): avc: denied { read open } for pid=13031 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.390100][ T31] audit: type=1400 audit(1187.260:11714): avc: denied { getattr } for pid=13031 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.397706][ T31] audit: type=1400 audit(1187.260:11715): avc: denied { search } for pid=13031 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.398135][ T31] audit: type=1400 audit(1187.270:11716): avc: denied { search } for pid=13031 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.398466][ T31] audit: type=1400 audit(1187.270:11717): avc: denied { search } for pid=13031 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.405754][ T31] audit: type=1400 audit(1187.270:11718): avc: denied { search } for pid=13031 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.406617][ T31] audit: type=1400 audit(1187.270:11719): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1187.411908][ T31] audit: type=1400 audit(1187.280:11720): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1187.423971][ T31] audit: type=1400 audit(1187.290:11721): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1193.112423][ T31] kauditd_printk_skb: 268 callbacks suppressed [ 1193.112539][ T31] audit: type=1400 audit(1192.980:11990): avc: denied { write } for pid=13043 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1193.114777][ T31] audit: type=1400 audit(1192.980:11991): avc: denied { write open } for pid=13043 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1193.118512][ T31] audit: type=1400 audit(1192.990:11992): avc: denied { getattr } for pid=13043 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1193.125743][ T31] audit: type=1400 audit(1192.990:11993): avc: denied { ioctl } for pid=13043 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1193.138652][ T31] audit: type=1400 audit(1193.010:11994): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1193.142529][ T31] audit: type=1400 audit(1193.010:11995): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1193.154671][ T31] audit: type=1400 audit(1193.020:11996): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1193.165524][ T31] audit: type=1400 audit(1193.030:11997): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1193.166163][ T31] audit: type=1400 audit(1193.030:11998): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1193.175644][ T31] audit: type=1400 audit(1193.040:11999): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1198.121559][ T31] kauditd_printk_skb: 372 callbacks suppressed [ 1198.121622][ T31] audit: type=1400 audit(1197.990:12372): avc: denied { add_name search } for pid=13051 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1198.124013][ T31] audit: type=1400 audit(1197.990:12373): avc: denied { create } for pid=13051 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1198.129425][ T31] audit: type=1400 audit(1198.000:12374): avc: denied { write open } for pid=13051 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=97 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1198.147707][ T31] audit: type=1400 audit(1198.020:12375): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1198.152791][ T31] audit: type=1400 audit(1198.020:12376): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1198.156525][ T31] audit: type=1400 audit(1198.030:12377): avc: denied { search } for pid=13051 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1198.160003][ T31] audit: type=1400 audit(1198.030:12378): avc: denied { search } for pid=13051 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1198.163260][ T31] audit: type=1400 audit(1198.030:12379): avc: denied { search } for pid=13051 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1198.175929][ T31] audit: type=1400 audit(1198.040:12380): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1198.176752][ T31] audit: type=1400 audit(1198.040:12381): avc: denied { append } for pid=13051 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" dev="tmpfs" ino=97 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1203.298470][ T31] kauditd_printk_skb: 272 callbacks suppressed [ 1203.298559][ T31] audit: type=1400 audit(1203.170:12654): avc: denied { search } for pid=13062 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1203.302095][ T31] audit: type=1400 audit(1203.170:12655): avc: denied { search } for pid=13062 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1203.306550][ T31] audit: type=1400 audit(1203.180:12656): avc: denied { search } for pid=13062 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1203.326542][ T31] audit: type=1400 audit(1203.190:12657): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1203.332709][ T31] audit: type=1400 audit(1203.200:12658): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1203.343761][ T31] audit: type=1400 audit(1203.210:12659): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1203.348007][ T31] audit: type=1400 audit(1203.220:12660): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1203.351513][ T31] audit: type=1400 audit(1203.220:12661): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1204.531344][ T31] audit: type=1400 audit(1204.400:12662): avc: denied { write } for pid=13064 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1204.533729][ T31] audit: type=1400 audit(1204.400:12663): avc: denied { write open } for pid=13064 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1208.555501][ T31] kauditd_printk_skb: 242 callbacks suppressed [ 1208.555610][ T31] audit: type=1400 audit(1208.420:12906): avc: denied { write } for pid=13071 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1208.559602][ T31] audit: type=1400 audit(1208.430:12907): avc: denied { write open } for pid=13071 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1208.563923][ T31] audit: type=1400 audit(1208.430:12908): avc: denied { getattr } for pid=13071 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1208.569751][ T31] audit: type=1400 audit(1208.440:12909): avc: denied { ioctl } for pid=13071 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1208.595649][ T31] audit: type=1400 audit(1208.460:12910): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1208.596717][ T31] audit: type=1400 audit(1208.460:12911): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1208.615485][ T31] audit: type=1400 audit(1208.480:12912): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1208.616333][ T31] audit: type=1400 audit(1208.480:12913): avc: denied { append open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1208.617044][ T31] audit: type=1400 audit(1208.480:12914): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1209.067656][ T31] audit: type=1400 audit(1208.940:12915): avc: denied { write } for pid=13072 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 VM DIAGNOSIS: 22:08:50 Registers: info registers vcpu 0 CPU#0 R00=f269a000 R01=ff788000 R02=00000001 R03=802199d8 R04=df83f000 R05=00000001 R06=828c1b28 R07=df83f000 R08=ff788000 R09=8260cad0 R10=828c274c R11=ed11de8c R12=ed11de90 R13=ed11de60 R14=802109dc R15=802199f0 PSR=80000013 N--- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=bad23a78 s05=d882dd08 d02=d882dd08bad23a78 s06=00000000 s07=00000000 d03=0000000000000000 s08=633cda80 s09=b8e02b14 d04=b8e02b14633cda80 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=54822e4a s21=4e5589f4 d10=4e5589f454822e4a s22=6a579e6d s23=00000000 d11=000000006a579e6d s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=826292f0 R01=00000001 R02=00181ba1 R03=819b9cf8 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=ddde4400 R11=df805c44 R12=df805c48 R13=df805c38 R14=819b898c R15=819b9d08 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005a27e9 s17=00000000 d08=00000000005a27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=7001ffff s33=3174726f d16=3174726f7001ffff s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=9e8b0f00 s53=fffe5172 d26=fffe51729e8b0f00 s54=cee36f9f s55=a5f41fb8 d27=a5f41fb8cee36f9f s56=3f0aed98 s57=b5587966 d28=b55879663f0aed98 s58=ed6bf2d0 s59=292cd782 d29=292cd782ed6bf2d0 s60=d2727116 s61=4c74ea21 d30=4c74ea21d2727116 s62=468695f8 s63=cbcc70a8 d31=cbcc70a8468695f8 FPSCR: 00000000