last executing test programs: 24m13.756892704s ago: executing program 1 (id=2490): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) syz_io_uring_setup(0x4974, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) 24m12.859577109s ago: executing program 1 (id=2492): r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000009000000440003800800010002000000140002007663616e3000000000000000000000020800"], 0x58}}, 0x0) 24m11.08458064s ago: executing program 1 (id=2495): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x5}]}], {0x14}}, 0x64}}, 0x0) 24m10.01836449s ago: executing program 1 (id=2497): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x69) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000c000000160000000000000079000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000001e0000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r3}, 0x18) syz_io_uring_setup(0x10d, &(0x7f0000000400)={0x0, 0x0, 0x200}, &(0x7f0000000040), &(0x7f0000000280)) socket$igmp(0x2, 0x3, 0x2) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x1000000000006005, 0x1) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x7, 0xffc, 0x0, 0xffffffffffffffff}) 23m46.859694165s ago: executing program 1 (id=2522): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 23m46.102330866s ago: executing program 1 (id=2524): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r0, &(0x7f00000003c0)='./file0\x00') r1 = syz_io_uring_setup(0xe42, &(0x7f0000000140)={0x0, 0x2119, 0x400}, &(0x7f0000000240)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x18}) io_uring_enter(r1, 0x47f6, 0x0, 0x0, 0x0, 0x0) 23m0.968175677s ago: executing program 32 (id=2524): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r0, &(0x7f00000003c0)='./file0\x00') r1 = syz_io_uring_setup(0xe42, &(0x7f0000000140)={0x0, 0x2119, 0x400}, &(0x7f0000000240)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x18}) io_uring_enter(r1, 0x47f6, 0x0, 0x0, 0x0, 0x0) 17m30.866378459s ago: executing program 2 (id=2961): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000540)="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", 0x595}], 0x1}, 0x4004000) 17m30.257700845s ago: executing program 2 (id=2963): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x2, 0x9, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000380)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0x98, 0x30, 0x9, 0x0, 0x0, {}, [{0x84, 0x1, [@m_bpf={0x80, 0x1, 0x0, 0x0, {{0x8}, {0x58, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x6}, @TCA_ACT_BPF_OPS={0x34, 0x4, [{}, {}, {0x3}, {}, {}, {}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 17m29.437262087s ago: executing program 2 (id=2965): r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r1}, 0x10) write$selinux_access(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="73797374656d5f753a6ff18582626a6563745f723a6661696c6c6f675f743a733020756e636f6e66696e6564203030"], 0x3f) 17m28.768193995s ago: executing program 2 (id=2967): socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000100)=r3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) 17m27.327103154s ago: executing program 2 (id=2969): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010b00000000000000000e"], 0x1c}}, 0x0) 17m25.337773816s ago: executing program 2 (id=2972): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 16m39.909547485s ago: executing program 33 (id=2972): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000e868495fb58d00b6ad1f50ad32d6ad25dfd73a015e0ca6a0f68a7d007dc6751dfb265a0e3ccae669e173a64bc1cfd514600650a58f145ff1205fc9ddaa275e687d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983cd44c05bd0a48dfe3e26e7a23129d6606ed28a69989d552af6d9a9df2c3af36e0360070011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a1a83109753f54b21cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b81a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a928903000000cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba739cd0c31b05c00fba8a4aee676d7caa2e53b91a68ff2e60da7b01a2e5785a238afa4aba70c08b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf78b04963d679d5a5d07e618a1ef9057fec00f9e93021f5a8d30e716de8cde9c6000000000c3b64d10f0939b42b33ab2a8717096c58bb3bb1d457d8bb96870f5a7e2ba31fd69bb80235d957eaa9a40b764e5381ffa604aaafb76a980e72b408f686b185736693089213b4e140f8f38e5589663115093889deb646122a5dc5a9e5ba4d37749a36b880110e2bf524b79bc91105f1d3f7d0de694a9417d68694f17ba5e27ea1cec518b93fadcfe0de010ae9be3273ff73c34b5695080a35bfa5c69e3b533e1b939c81b3beda037b7191cb0000000000000000000010e5d683b8938db5c305cf7e6e62a6890ba9e1f4ee64f8202b59de5036569febfaa95f4633db108b2f786333ec7bacc927f4a1785165b5d2444b4c022bb5cff472e6a0c8ee9d6d8df83b704669147b732ac508c9b9f0ca0a1ce45319d43d4643eb285835daf2065b57bebd61ad6671296c27253a5f9688d57c91ccd40ffe2dbc5dd1613a2e6f5b363cc8d205ce6ef3c3c6ded7dd3dfdb39008d8997213f68cdc971c1d6fdacb7729a5560880a77525e9cfb94ef1735dfe74e6b948697f7e3580436b532a82e315d56b17a5dba98436cc24babaae409f0aab0b40af116001bc85492455956e853ead08b5793d4ecf72378a3dfd9cc837b1c66212d9a2be8fd6341c2f837c7fe09924a51ec42912856cce3d3b2d092c80813aad03e1e63a655f4138730f302df339f30a4fbd453c9a0fba381d071ad7cb80a52bec572e29b0b9b55c235806b97e166609f8083ce776075c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 43.478400241s ago: executing program 3 (id=4013): r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @initdev}, &(0x7f0000000080)=0xc) read$usbmon(r0, &(0x7f00000000c0)=""/163, 0xa3) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vxcan1\x00', 0x0}) fcntl$setlease(r0, 0x400, 0x2) splice(r1, &(0x7f00000001c0)=0x8, r0, &(0x7f0000000200)=0x10000, 0x800, 0x0) ioctl$SNDCTL_TMR_CONTINUE(r0, 0x5404) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000240), &(0x7f0000000280), 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'vcan0\x00', {0x2, 0x4e22, @rand_addr=0x64010102}}) r4 = accept$alg(r0, 0x0, 0x0) close(r4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e21, @loopback}, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r5, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x5}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x7f}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x401}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44080}, 0x80) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000003) r6 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), r0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000500)={0x0, @multicast2, @empty}, &(0x7f0000000540)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000fc0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x801800}, 0xc, &(0x7f0000000f80)={&(0x7f0000000600)={0x954, r6, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x1e0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x95c}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8, 0x7, 0x101}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r7}, {0x260, 0x2, 0x0, 0x1, [{0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x0, 0x7, 0x2}, {0xfffe, 0x6, 0xf}, {0x3, 0x1, 0x3, 0x2}, {0x9, 0xf7, 0x4, 0xfffffff4}, {0x6, 0xeb, 0x0, 0x339}, {0xfff8, 0x3, 0xd, 0x8}, {0x5, 0xe5, 0x8, 0xfffffffe}, {0x5, 0x7, 0x30, 0x8d76}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1fffc00}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x688, 0x5, 0x6}]}}}]}}, {{0x8, 0x1, r2}, {0x128, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r2}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x532}}}]}}, {{0x8, 0x1, r9}, {0xcc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r2}, {0x128, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4795}}, {0x8, 0x6, r3}}}]}}]}, 0x954}}, 0x4804) fcntl$addseals(r0, 0x409, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001000)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001040)) openat$tun(0xffffff9c, &(0x7f0000001080), 0x108200, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f00000010c0)='ext4_ext_convert_to_initialized_enter\x00', r0, 0x0, 0x4}, 0x18) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000001140)=0xf) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001200)={{r0, 0xffffffffffffffff}, &(0x7f0000001180), &(0x7f00000011c0)='%pS \x00'}, 0x20) syz_genetlink_get_family_id$tipc2(&(0x7f0000001240), r10) 40.88538537s ago: executing program 3 (id=4016): getitimer(0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='veth0_to_hsr\x00', 0x10) connect$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @local, 0x80000001}, 0x10) listen(r1, 0x1) read$midi(r2, &(0x7f0000000900)=""/39, 0x27) r3 = eventfd2(0x0, 0x0) write$rfkill(r3, &(0x7f0000002180), 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x8, 0x80, 0x200, 0x7f, 0x100, 0x8, 0x93d, 0x80000000}, 0x20) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1d) r5 = dup(r4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, 0x0) 36.968688165s ago: executing program 3 (id=4018): sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00'}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) fspick(0xffffffffffffff9c, 0x0, 0x0) 36.517942118s ago: executing program 3 (id=4019): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x2, r1, 0xee00, 0xee01, r2, 0x2, 0x2}, 0x0, 0x0, 0x1, 0x5, 0x1, 0x0, 0x0, 0xfffe, 0x1b}) 34.93476295s ago: executing program 3 (id=4022): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) socket$netlink(0x10, 0x3, 0x0) r2 = gettid() timer_create(0x2, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) 8.097020652s ago: executing program 0 (id=4043): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a11820fffff5bab4e210000000058000b4824ca945f6400940f6a0325010ebc000000000000008007f0fffeffe809005300fff5dd00000010000100090c100000000000224e0000", 0x58}], 0x1) 7.327624073s ago: executing program 0 (id=4044): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000120000000000000000000000850000006d00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) set_tid_address(0x0) 6.409601038s ago: executing program 0 (id=4045): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) 5.244937559s ago: executing program 0 (id=4046): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) 2.038584556s ago: executing program 0 (id=4047): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r0}, 0x10) fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) 1.026316293s ago: executing program 0 (id=4048): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e1d113c812e5d6000"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0, 0x0, 0x900}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETA(r1, 0x402c542d, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "dac7a15f305b57a3"}) 0s ago: executing program 3 (id=4049): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000740)={0x0}) kernel console output (not intermixed with test programs): pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2748.152371][ T31] audit: type=1400 audit(2748.000:42705): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2748.153172][ T31] audit: type=1400 audit(2748.000:42706): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2748.154205][ T31] audit: type=1400 audit(2748.040:42707): avc: denied { read write open } for pid=21439 comm="syz.0.3747" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2748.155156][ T31] audit: type=1400 audit(2748.040:42708): avc: denied { read write } for pid=21439 comm="syz.0.3747" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2753.240734][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 2753.240846][ T31] audit: type=1400 audit(2753.150:42755): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2753.259333][ T31] audit: type=1400 audit(2753.160:42756): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2753.260418][ T31] audit: type=1400 audit(2753.160:42757): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2753.264524][ T31] audit: type=1400 audit(2753.170:42758): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2753.278976][ T31] audit: type=1400 audit(2753.180:42759): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2753.331472][ T31] audit: type=1400 audit(2753.240:42760): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2753.342669][ T31] audit: type=1400 audit(2753.250:42761): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2753.349016][ T31] audit: type=1400 audit(2753.250:42762): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2753.479078][ T31] audit: type=1400 audit(2753.370:42763): avc: denied { read } for pid=21473 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2753.792999][ T31] audit: type=1400 audit(2753.700:42764): avc: denied { read } for pid=21475 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2758.576544][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 2758.576642][ T31] audit: type=1400 audit(2758.480:42831): avc: denied { write } for pid=21492 comm="syz.3.3759" path="socket:[46630]" dev="sockfs" ino=46630 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2758.595171][ T31] audit: type=1400 audit(2758.500:42832): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2758.607102][ T31] audit: type=1400 audit(2758.510:42833): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2758.611692][ T31] audit: type=1400 audit(2758.520:42834): avc: denied { write } for pid=21492 comm="syz.3.3759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2758.619971][ T31] audit: type=1400 audit(2758.530:42835): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2758.628952][ T31] audit: type=1400 audit(2758.530:42836): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2758.630065][ T31] audit: type=1400 audit(2758.530:42837): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2759.816910][ T31] audit: type=1400 audit(2759.720:42838): avc: denied { read } for pid=21497 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2759.834122][ T31] audit: type=1400 audit(2759.740:42839): avc: denied { create } for pid=21497 comm="syz.3.3760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2759.842674][ T31] audit: type=1400 audit(2759.750:42840): avc: denied { bind } for pid=21497 comm="syz.3.3760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2763.950945][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 2763.951096][ T31] audit: type=1400 audit(2763.860:42887): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2763.956520][ T31] audit: type=1400 audit(2763.860:42888): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2763.970826][ T31] audit: type=1400 audit(2763.880:42889): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2763.989116][ T31] audit: type=1400 audit(2763.890:42890): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2763.990092][ T31] audit: type=1400 audit(2763.890:42891): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2764.003057][ T31] audit: type=1400 audit(2763.910:42892): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2764.006933][ T31] audit: type=1400 audit(2763.910:42893): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2764.029181][ T31] audit: type=1400 audit(2763.930:42894): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2764.293450][ T31] audit: type=1400 audit(2764.200:42895): avc: denied { read } for pid=21515 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2764.319010][ T31] audit: type=1400 audit(2764.220:42896): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2766.753433][T21533] FAULT_INJECTION: forcing a failure. [ 2766.753433][T21533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2766.754204][T21533] CPU: 0 UID: 0 PID: 21533 Comm: syz.3.3769 Not tainted 6.12.0-syzkaller #0 [ 2766.754566][T21533] Hardware name: ARM-Versatile Express [ 2766.754921][T21533] Call trace: [ 2766.755166][T21533] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 2766.755673][T21533] r7:b5403587 r6:00000000 r5:60000013 r4:820413b8 [ 2766.756160][T21533] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 2766.756669][T21533] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 2766.757076][T21533] r5:00000000 r4:82751908 [ 2766.757305][T21533] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 2766.757722][T21533] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 2766.759217][T21533] r6:00000000 r5:8535c420 r4:76b87bb8 [ 2766.760599][T21533] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 2766.761062][T21533] [<808f19d4>] (should_fail_usercopy) from [<8020b844>] (setup_sigframe+0x124/0x1c4) [ 2766.761567][T21533] [<8020b720>] (setup_sigframe) from [<8020bcac>] (do_work_pending+0x2f4/0x4f8) [ 2766.762170][T21533] r10:00000077 r9:b5403587 r8:00000000 r7:8535c420 r6:76b87bb8 r5:dfc99fb0 [ 2766.762963][T21533] r4:8535bc00 [ 2766.763443][T21533] [<8020b9b8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 2766.764486][T21533] Exception stack(0xdfc99fb0 to 0xdfc99ff8) [ 2766.765245][T21533] 9fa0: fffffffc 200001c0 00000880 00000000 [ 2766.765892][T21533] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b880bc [ 2766.766269][T21533] 9fe0: 76b87ec0 76b87eb0 00018af0 00133450 60000010 00000011 [ 2766.767023][T21533] r10:00000077 r9:8535bc00 r8:00000000 r7:00000077 r6:00131400 r5:00000000 [ 2766.767991][T21533] r4:00000000 [ 2769.289168][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 2769.289268][ T31] audit: type=1400 audit(2769.190:42973): avc: denied { read } for pid=21554 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2769.315514][ T31] audit: type=1400 audit(2769.220:42974): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2769.329243][ T31] audit: type=1400 audit(2769.230:42975): avc: denied { create } for pid=21554 comm="syz.3.3776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2769.332049][ T31] audit: type=1400 audit(2769.240:42976): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2769.359673][ T31] audit: type=1400 audit(2769.240:42977): avc: denied { write } for pid=21554 comm="syz.3.3776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2769.360702][ T31] audit: type=1400 audit(2769.250:42978): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2769.362066][ T31] audit: type=1400 audit(2769.250:42979): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2769.363025][ T31] audit: type=1400 audit(2769.250:42980): avc: denied { read } for pid=21554 comm="syz.3.3776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2769.364921][ T31] audit: type=1400 audit(2769.260:42981): avc: denied { read write } for pid=21545 comm="syz.0.3774" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2769.366101][ T31] audit: type=1400 audit(2769.260:42982): avc: denied { read write open } for pid=21545 comm="syz.0.3774" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2774.109440][T21590] fuse: Bad value for 'rootmode' [ 2774.829334][ T31] kauditd_printk_skb: 163 callbacks suppressed [ 2774.829408][ T31] audit: type=1400 audit(2774.740:43146): avc: denied { read write } for pid=21591 comm="syz.3.3787" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2774.832295][ T31] audit: type=1400 audit(2774.740:43147): avc: denied { read write open } for pid=21591 comm="syz.3.3787" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2774.920750][ T31] audit: type=1400 audit(2774.820:43148): avc: denied { create } for pid=21591 comm="syz.3.3787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2774.921368][ T31] audit: type=1400 audit(2774.820:43149): avc: denied { getopt } for pid=21591 comm="syz.3.3787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2775.001479][ T31] audit: type=1400 audit(2774.910:43150): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2775.005250][ T31] audit: type=1400 audit(2774.910:43151): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2775.019228][ T31] audit: type=1400 audit(2774.920:43152): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2775.193762][ T31] audit: type=1400 audit(2775.100:43153): avc: denied { read } for pid=21597 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2775.210805][ T31] audit: type=1400 audit(2775.120:43154): avc: denied { create } for pid=21597 comm="syz.0.3788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2775.220818][ T31] audit: type=1400 audit(2775.120:43155): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2779.942884][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 2779.942977][ T31] audit: type=1400 audit(2779.850:43243): avc: denied { read } for pid=21625 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2779.977553][ T31] audit: type=1400 audit(2779.880:43244): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2779.994480][ T31] audit: type=1400 audit(2779.890:43245): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2780.019093][ T31] audit: type=1400 audit(2779.900:43246): avc: denied { create } for pid=21625 comm="syz.0.3798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2780.019993][ T31] audit: type=1400 audit(2779.900:43247): avc: denied { ioctl } for pid=21625 comm="syz.0.3798" path="socket:[45818]" dev="sockfs" ino=45818 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2780.021948][ T31] audit: type=1400 audit(2779.910:43248): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2780.022826][ T31] audit: type=1400 audit(2779.920:43249): avc: denied { bind } for pid=21625 comm="syz.0.3798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2780.023491][ T31] audit: type=1400 audit(2779.920:43250): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2780.029774][ T31] audit: type=1400 audit(2779.930:43251): avc: denied { write } for pid=21625 comm="syz.0.3798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2780.030678][ T31] audit: type=1400 audit(2779.930:43252): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2780.322080][T21628] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21628 comm=syz.3.3799 [ 2780.755239][T21631] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=21631 comm=syz.3.3800 [ 2783.329330][T21639] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21639 comm=syz.0.3803 [ 2785.046860][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 2785.046975][ T31] audit: type=1400 audit(2784.950:43328): avc: denied { write } for pid=21635 comm="syz.3.3802" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2785.049262][ T31] audit: type=1400 audit(2784.950:43329): avc: denied { write open } for pid=21635 comm="syz.3.3802" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2785.066671][ T31] audit: type=1400 audit(2784.970:43330): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2785.075312][ T31] audit: type=1400 audit(2784.980:43331): avc: denied { ioctl } for pid=21635 comm="syz.3.3802" path="socket:[46838]" dev="sockfs" ino=46838 ioctlcmd=0x4b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2785.082727][ T31] audit: type=1400 audit(2784.990:43332): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2785.086018][ T31] audit: type=1400 audit(2784.990:43333): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2785.107458][ T31] audit: type=1400 audit(2785.000:43334): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2785.109122][ T31] audit: type=1400 audit(2785.010:43335): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2785.112857][ T31] audit: type=1400 audit(2785.020:43336): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2785.117601][ T31] audit: type=1400 audit(2785.020:43337): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2790.154518][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 2790.154622][ T31] audit: type=1400 audit(2790.060:43381): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2790.180070][ T31] audit: type=1400 audit(2790.070:43382): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2790.181052][ T31] audit: type=1400 audit(2790.080:43383): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2790.181732][ T31] audit: type=1400 audit(2790.080:43384): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2790.182506][ T31] audit: type=1400 audit(2790.080:43385): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2790.183200][ T31] audit: type=1400 audit(2790.080:43386): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2790.184053][ T31] audit: type=1400 audit(2790.080:43387): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2790.184827][ T31] audit: type=1400 audit(2790.080:43388): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2790.359365][ T31] audit: type=1400 audit(2790.260:43389): avc: denied { read } for pid=21666 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2790.375406][ T31] audit: type=1400 audit(2790.280:43390): avc: denied { bpf } for pid=21666 comm="syz.0.3811" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2796.340677][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 2796.340806][ T31] audit: type=1400 audit(2796.250:43467): avc: denied { read } for pid=21697 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2796.367024][ T31] audit: type=1400 audit(2796.270:43468): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2796.393096][ T31] audit: type=1400 audit(2796.290:43469): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2796.393913][ T31] audit: type=1400 audit(2796.300:43470): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2796.395878][ T31] audit: type=1400 audit(2796.300:43471): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2796.404854][ T31] audit: type=1400 audit(2796.310:43472): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2796.426262][ T31] audit: type=1400 audit(2796.330:43473): avc: denied { bpf } for pid=21697 comm="syz.3.3822" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2796.440035][ T31] audit: type=1400 audit(2796.340:43474): avc: denied { create } for pid=21697 comm="syz.3.3822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2796.927233][ T31] audit: type=1400 audit(2796.830:43475): avc: denied { read } for pid=21699 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2797.155799][ T31] audit: type=1400 audit(2797.060:43476): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2802.167023][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 2802.167122][ T31] audit: type=1400 audit(2802.070:43513): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2802.170884][ T31] audit: type=1400 audit(2802.080:43514): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2802.173961][ T31] audit: type=1400 audit(2802.080:43515): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2802.208874][ T31] audit: type=1400 audit(2802.110:43516): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2802.209601][ T31] audit: type=1400 audit(2802.110:43517): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2802.210052][ T31] audit: type=1400 audit(2802.110:43518): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2802.220709][ T31] audit: type=1400 audit(2802.130:43519): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2802.224553][ T31] audit: type=1400 audit(2802.130:43520): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2802.292658][ T31] audit: type=1400 audit(2802.200:43521): avc: denied { read } for pid=21720 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2802.397676][ T31] audit: type=1400 audit(2802.300:43522): avc: denied { read } for pid=21722 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2807.402860][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 2807.402982][ T31] audit: type=1400 audit(2807.310:43592): avc: denied { write } for pid=21739 comm="syz.0.3833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2807.427618][ T31] audit: type=1400 audit(2807.320:43593): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2807.453881][ T31] audit: type=1400 audit(2807.320:43594): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2807.466114][ T31] audit: type=1400 audit(2807.370:43595): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2807.513816][ T31] audit: type=1400 audit(2807.410:43596): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2807.514939][ T31] audit: type=1400 audit(2807.420:43597): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2807.682736][ T31] audit: type=1400 audit(2807.580:43598): avc: denied { create } for pid=21749 comm="syz.3.3836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2807.736427][ T31] audit: type=1400 audit(2807.640:43599): avc: denied { sys_module } for pid=21749 comm="syz.3.3836" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2807.746908][ T31] audit: type=1400 audit(2807.650:43600): avc: denied { module_request } for pid=21749 comm="syz.3.3836" kmod="syztnl0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2808.436943][ T31] audit: type=1400 audit(2808.340:43601): avc: denied { read } for pid=21755 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2812.476404][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 2812.476522][ T31] audit: type=1400 audit(2812.380:43648): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2812.500054][ T31] audit: type=1400 audit(2812.380:43649): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2812.500904][ T31] audit: type=1400 audit(2812.390:43650): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2812.508947][ T31] audit: type=1400 audit(2812.410:43651): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2812.509423][ T31] audit: type=1400 audit(2812.410:43652): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2812.509885][ T31] audit: type=1400 audit(2812.410:43653): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2812.510604][ T31] audit: type=1400 audit(2812.410:43654): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2812.512568][ T31] audit: type=1400 audit(2812.420:43655): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2812.579405][ T31] audit: type=1400 audit(2812.490:43656): avc: denied { ioctl } for pid=21773 comm="syz.3.3842" path="socket:[47072]" dev="sockfs" ino=47072 ioctlcmd=0x5406 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2812.633692][ T31] audit: type=1400 audit(2812.540:43657): avc: denied { read } for pid=21776 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.497678][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 2817.497801][ T31] audit: type=1400 audit(2817.400:43695): avc: denied { ioctl } for pid=21788 comm="syz.3.3847" path="socket:[47112]" dev="sockfs" ino=47112 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2817.518952][ T31] audit: type=1400 audit(2817.420:43696): avc: denied { ioctl } for pid=21788 comm="syz.3.3847" path="socket:[47112]" dev="sockfs" ino=47112 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2817.524160][ T31] audit: type=1400 audit(2817.430:43697): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2817.528962][ T31] audit: type=1400 audit(2817.430:43698): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2817.529885][ T31] audit: type=1400 audit(2817.430:43699): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2817.531852][ T31] audit: type=1400 audit(2817.440:43700): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2817.535117][ T31] audit: type=1400 audit(2817.440:43701): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2817.546983][ T31] audit: type=1400 audit(2817.440:43702): avc: denied { module_request } for pid=21788 comm="syz.3.3847" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2818.062186][ T31] audit: type=1400 audit(2817.970:43703): avc: denied { sys_module } for pid=21788 comm="syz.3.3847" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2818.065995][ T31] audit: type=1400 audit(2817.970:43704): avc: denied { module_request } for pid=21788 comm="syz.3.3847" kmod="syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2822.625613][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 2822.625712][ T31] audit: type=1400 audit(2822.530:43748): avc: denied { read } for pid=21818 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2822.645568][ T31] audit: type=1400 audit(2822.550:43749): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2822.651544][ T31] audit: type=1400 audit(2822.560:43750): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2822.653990][ T31] audit: type=1400 audit(2822.560:43751): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2822.668120][ T31] audit: type=1400 audit(2822.570:43752): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2822.676996][ T31] audit: type=1400 audit(2822.580:43753): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2822.707672][ T31] audit: type=1400 audit(2822.610:43754): avc: denied { create } for pid=21818 comm="syz.3.3854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2822.713547][ T31] audit: type=1400 audit(2822.620:43755): avc: denied { create } for pid=21818 comm="syz.3.3854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2822.717719][ T31] audit: type=1400 audit(2822.620:43756): avc: denied { ioctl } for pid=21818 comm="syz.3.3854" path="socket:[47144]" dev="sockfs" ino=47144 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2822.741230][T21819] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21819 comm=syz.3.3854 [ 2822.745906][ T31] audit: type=1400 audit(2822.650:43757): avc: denied { write } for pid=21818 comm="syz.3.3854" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 2827.888100][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2827.889719][ T31] audit: type=1400 audit(2827.790:43819): avc: denied { ioctl } for pid=21840 comm="syz.0.3861" path="socket:[48152]" dev="sockfs" ino=48152 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2827.905586][ T31] audit: type=1400 audit(2827.810:43820): avc: denied { ioctl } for pid=21840 comm="syz.0.3861" path="socket:[48152]" dev="sockfs" ino=48152 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2827.909705][ T31] audit: type=1400 audit(2827.810:43821): avc: denied { module_request } for pid=21840 comm="syz.0.3861" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2827.919360][ T31] audit: type=1400 audit(2827.820:43822): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2827.922610][ T31] audit: type=1400 audit(2827.830:43823): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2827.939206][ T31] audit: type=1400 audit(2827.840:43824): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2827.959070][ T31] audit: type=1400 audit(2827.850:43825): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2827.960222][ T31] audit: type=1400 audit(2827.850:43826): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2828.507102][ T31] audit: type=1400 audit(2828.410:43827): avc: denied { sys_module } for pid=21840 comm="syz.0.3861" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2828.513034][ T31] audit: type=1400 audit(2828.420:43828): avc: denied { module_request } for pid=21840 comm="syz.0.3861" kmod="syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2832.386879][T21860] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1540 sclass=netlink_audit_socket pid=21860 comm=syz.3.3865 [ 2832.982235][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 2832.982320][ T31] audit: type=1400 audit(2832.890:43879): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2832.989262][ T31] audit: type=1400 audit(2832.890:43880): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2832.992232][ T31] audit: type=1400 audit(2832.900:43881): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2833.192842][ T31] audit: type=1400 audit(2833.100:43882): avc: denied { read } for pid=21867 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2833.224995][ T31] audit: type=1400 audit(2833.130:43883): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2833.229948][ T31] audit: type=1400 audit(2833.140:43884): avc: denied { create } for pid=21867 comm="syz.0.3867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2833.258820][ T31] audit: type=1400 audit(2833.160:43885): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2833.260054][ T31] audit: type=1400 audit(2833.160:43886): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2833.260703][ T31] audit: type=1400 audit(2833.160:43887): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2833.269949][ T31] audit: type=1400 audit(2833.160:43888): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2838.357916][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 2838.358055][ T31] audit: type=1400 audit(2838.260:43925): avc: denied { ioctl } for pid=21883 comm="syz.0.3870" path="socket:[48197]" dev="sockfs" ino=48197 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2838.384962][ T31] audit: type=1400 audit(2838.290:43926): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2838.389418][ T31] audit: type=1400 audit(2838.290:43927): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2838.400454][ T31] audit: type=1400 audit(2838.300:43928): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2838.404612][ T31] audit: type=1400 audit(2838.300:43929): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2838.405632][ T31] audit: type=1400 audit(2838.310:43930): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2838.496258][ T31] audit: type=1400 audit(2838.400:43931): avc: denied { ioctl } for pid=21880 comm="syz.3.3869" path="socket:[47248]" dev="sockfs" ino=47248 ioctlcmd=0x6414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2838.900338][ T31] audit: type=1400 audit(2838.810:43932): avc: denied { ioctl } for pid=21883 comm="syz.0.3870" path="socket:[48197]" dev="sockfs" ino=48197 ioctlcmd=0x64a6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2839.004268][ T31] audit: type=1400 audit(2838.910:43933): avc: denied { ioctl } for pid=21880 comm="syz.3.3869" path="socket:[47248]" dev="sockfs" ino=47248 ioctlcmd=0x5760 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2839.410820][ T31] audit: type=1400 audit(2839.310:43934): avc: denied { ioctl } for pid=21883 comm="syz.0.3870" path="socket:[48197]" dev="sockfs" ino=48197 ioctlcmd=0x5730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2841.150647][T21893] block nbd3: shutting down sockets [ 2843.483912][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 2843.484044][ T31] audit: type=1400 audit(2843.390:43989): avc: denied { create } for pid=21908 comm="syz.3.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2843.487020][ T31] audit: type=1400 audit(2843.390:43990): avc: denied { write } for pid=21908 comm="syz.3.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2843.519275][ T31] audit: type=1400 audit(2843.410:43991): avc: denied { read } for pid=21908 comm="syz.3.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2843.520274][ T31] audit: type=1400 audit(2843.410:43992): avc: denied { read } for pid=21908 comm="syz.3.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2843.521117][ T31] audit: type=1400 audit(2843.420:43993): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2843.522090][ T31] audit: type=1400 audit(2843.420:43994): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2843.539114][ T31] audit: type=1400 audit(2843.440:43995): avc: denied { read } for pid=21908 comm="syz.3.3877" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2843.565961][ T31] audit: type=1400 audit(2843.450:43996): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2843.572694][ T31] audit: type=1400 audit(2843.450:43997): avc: denied { read open } for pid=21908 comm="syz.3.3877" path="/dev/ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2843.587285][ T31] audit: type=1400 audit(2843.460:43998): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2848.557835][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 2848.557965][ T31] audit: type=1400 audit(2848.460:44058): avc: denied { write } for pid=21928 comm="syz.3.3882" path="socket:[48267]" dev="sockfs" ino=48267 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2848.579533][ T31] audit: type=1400 audit(2848.480:44059): avc: denied { write } for pid=21928 comm="syz.3.3882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2848.580589][ T31] audit: type=1400 audit(2848.480:44060): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2848.589379][ T31] audit: type=1400 audit(2848.490:44061): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2848.590581][ T31] audit: type=1400 audit(2848.490:44062): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2848.591478][ T31] audit: type=1400 audit(2848.490:44063): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2848.596104][ T31] audit: type=1400 audit(2848.500:44064): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2848.945593][ T31] audit: type=1400 audit(2848.850:44065): avc: denied { ioctl } for pid=21933 comm="syz.0.3884" path="socket:[48271]" dev="sockfs" ino=48271 ioctlcmd=0x54d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2849.067353][ T31] audit: type=1400 audit(2848.970:44066): avc: denied { setopt } for pid=21928 comm="syz.3.3882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2849.465458][ T31] audit: type=1400 audit(2849.370:44067): avc: denied { write } for pid=21933 comm="syz.0.3884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2853.634491][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 2853.634612][ T31] audit: type=1400 audit(2853.540:44116): avc: denied { ioctl } for pid=21951 comm="syz.3.3887" path="socket:[47362]" dev="sockfs" ino=47362 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2853.642003][ T31] audit: type=1400 audit(2853.550:44117): avc: denied { module_request } for pid=21951 comm="syz.3.3887" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2853.662808][ T31] audit: type=1400 audit(2853.570:44118): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2853.665349][ T31] audit: type=1400 audit(2853.570:44119): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2853.685564][ T31] audit: type=1400 audit(2853.580:44120): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2853.686590][ T31] audit: type=1400 audit(2853.590:44121): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2853.687534][ T31] audit: type=1400 audit(2853.590:44122): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2854.120078][ T31] audit: type=1400 audit(2854.030:44123): avc: denied { sys_module } for pid=21951 comm="syz.3.3887" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2854.125105][ T31] audit: type=1400 audit(2854.030:44124): avc: denied { module_request } for pid=21951 comm="syz.3.3887" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2854.146603][ T31] audit: type=1400 audit(2854.050:44125): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2858.641983][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2858.642143][ T31] audit: type=1400 audit(2858.550:44187): avc: denied { create } for pid=21975 comm="syz.0.3894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2858.664512][ T31] audit: type=1400 audit(2858.570:44188): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2858.686611][ T31] audit: type=1400 audit(2858.590:44189): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2858.702310][ T31] audit: type=1400 audit(2858.610:44190): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2858.703257][ T31] audit: type=1400 audit(2858.610:44191): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2858.707213][ T31] audit: type=1400 audit(2858.610:44192): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2858.740313][ T31] audit: type=1400 audit(2858.640:44193): avc: denied { setopt } for pid=21975 comm="syz.0.3894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2858.755521][ T31] audit: type=1400 audit(2858.660:44194): avc: denied { connect } for pid=21975 comm="syz.0.3894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2858.979475][ T31] audit: type=1400 audit(2858.880:44195): avc: denied { read } for pid=21977 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2859.027115][ T31] audit: type=1400 audit(2858.930:44196): avc: denied { read write } for pid=21977 comm="syz.3.3895" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2863.729812][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 2863.730285][ T31] audit: type=1400 audit(2863.640:44247): avc: denied { ioctl } for pid=21984 comm="syz.0.3897" path="socket:[48368]" dev="sockfs" ino=48368 ioctlcmd=0x5011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2863.747178][ T31] audit: type=1400 audit(2863.650:44248): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2863.761390][ T31] audit: type=1400 audit(2863.670:44249): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2863.762371][ T31] audit: type=1400 audit(2863.670:44250): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2863.763706][ T31] audit: type=1400 audit(2863.670:44251): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2863.765281][ T31] audit: type=1400 audit(2863.670:44252): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2864.050681][ T31] audit: type=1400 audit(2863.960:44253): avc: denied { setopt } for pid=21996 comm="syz.3.3901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2864.241083][ T31] audit: type=1400 audit(2864.140:44254): avc: denied { setopt } for pid=21984 comm="syz.0.3897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2864.259418][ T31] audit: type=1400 audit(2864.160:44255): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2864.270341][ T31] audit: type=1400 audit(2864.170:44256): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2869.136346][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 2869.136399][ T31] audit: type=1400 audit(2869.040:44294): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2869.149053][ T31] audit: type=1400 audit(2869.050:44295): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2869.159156][ T31] audit: type=1400 audit(2869.060:44296): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2869.161546][ T31] audit: type=1400 audit(2869.070:44297): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2869.180825][ T31] audit: type=1400 audit(2869.090:44298): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2869.189205][ T31] audit: type=1400 audit(2869.090:44299): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2869.195081][ T31] audit: type=1400 audit(2869.100:44300): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2869.195736][ T31] audit: type=1400 audit(2869.100:44301): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2869.284045][ T31] audit: type=1400 audit(2869.190:44302): avc: denied { read } for pid=22014 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2869.303674][ T31] audit: type=1400 audit(2869.210:44303): avc: denied { read } for pid=22014 comm="syz.0.3905" name="controlC0" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2874.144633][ T31] kauditd_printk_skb: 81 callbacks suppressed [ 2874.144748][ T31] audit: type=1400 audit(2874.050:44385): avc: denied { create } for pid=22039 comm="syz.3.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2874.164966][ T31] audit: type=1400 audit(2874.070:44386): avc: denied { write } for pid=22039 comm="syz.3.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2874.169946][ T31] audit: type=1400 audit(2874.080:44387): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2874.173991][ T31] audit: type=1400 audit(2874.080:44388): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2874.177271][ T31] audit: type=1400 audit(2874.080:44389): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2874.193107][ T31] audit: type=1400 audit(2874.100:44390): avc: denied { write } for pid=22039 comm="syz.3.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2874.197176][ T31] audit: type=1400 audit(2874.100:44391): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2874.201072][ T31] audit: type=1400 audit(2874.110:44392): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2874.211974][ T31] audit: type=1400 audit(2874.120:44393): avc: denied { write } for pid=22039 comm="syz.3.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2874.228799][ T31] audit: type=1400 audit(2874.130:44394): avc: denied { write } for pid=22039 comm="syz.3.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2875.061982][T22050] FAULT_INJECTION: forcing a failure. [ 2875.061982][T22050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2875.063328][T22050] CPU: 1 UID: 0 PID: 22050 Comm: syz.3.3916 Not tainted 6.12.0-syzkaller #0 [ 2875.063731][T22050] Hardware name: ARM-Versatile Express [ 2875.063876][T22050] Call trace: [ 2875.064017][T22050] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 2875.064371][T22050] r7:830b5180 r6:00000008 r5:60000013 r4:820413b8 [ 2875.064602][T22050] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 2875.064863][T22050] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 2875.065118][T22050] r5:00000000 r4:82751908 [ 2875.065254][T22050] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 2875.065522][T22050] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 2875.065780][T22050] r6:00000008 r5:00000000 r4:00000000 [ 2875.065953][T22050] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 2875.066172][T22050] [<808f19d4>] (should_fail_usercopy) from [<81496278>] (do_sock_getsockopt+0x1a8/0x29c) [ 2875.066464][T22050] [<814960d0>] (do_sock_getsockopt) from [<81497f88>] (__sys_getsockopt+0x94/0xcc) [ 2875.066978][T22050] r9:84b59800 r8:84bad000 r7:eb719f50 r6:00000008 r5:eb719f58 r4:84bad001 [ 2875.067320][T22050] [<81497ef4>] (__sys_getsockopt) from [<81497fdc>] (sys_getsockopt+0x1c/0x24) [ 2875.067840][T22050] r8:8020029c r7:00000127 r6:00131400 r5:00000000 r4:200001c0 [ 2875.068438][T22050] [<81497fc0>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2875.068783][T22050] Exception stack(0xeb719fa8 to 0xeb719ff0) [ 2875.069103][T22050] 9fa0: 200001c0 00000000 00000003 00000000 00000008 00000000 [ 2875.069415][T22050] 9fc0: 200001c0 00000000 00131400 00000127 00000000 00006364 003d0f00 76ba90bc [ 2875.069729][T22050] 9fe0: 76ba8ec0 76ba8eb0 00018af0 00133450 [ 2879.182114][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 2879.182208][ T31] audit: type=1400 audit(2879.090:44513): avc: denied { read } for pid=22067 comm="syz.3.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2879.207844][ T31] audit: type=1400 audit(2879.100:44514): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2879.215395][ T31] audit: type=1400 audit(2879.120:44515): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2879.233079][ T31] audit: type=1400 audit(2879.140:44516): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2879.236627][ T31] audit: type=1400 audit(2879.140:44517): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2879.249349][ T31] audit: type=1400 audit(2879.150:44518): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2879.474238][ T31] audit: type=1400 audit(2879.380:44519): avc: denied { read } for pid=22071 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2879.490355][ T31] audit: type=1400 audit(2879.400:44520): avc: denied { read } for pid=22061 comm="syz.0.3918" name="iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2879.507402][ T31] audit: type=1400 audit(2879.410:44521): avc: denied { read open } for pid=22061 comm="syz.0.3918" path="/dev/iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2879.515805][ T31] audit: type=1400 audit(2879.420:44522): avc: denied { ioctl } for pid=22061 comm="syz.0.3918" path="/dev/iommu" dev="devtmpfs" ino=612 ioctlcmd=0x3b84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2884.292877][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 2884.292993][ T31] audit: type=1400 audit(2884.200:44572): avc: denied { read } for pid=22090 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2884.316638][ T31] audit: type=1400 audit(2884.220:44573): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2884.349429][ T31] audit: type=1400 audit(2884.250:44574): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2884.350974][ T31] audit: type=1400 audit(2884.250:44575): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2884.362867][ T31] audit: type=1400 audit(2884.270:44576): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2884.370899][ T31] audit: type=1400 audit(2884.270:44577): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2884.444969][ T31] audit: type=1400 audit(2884.350:44578): avc: denied { read } for pid=22087 comm="syz.0.3924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2884.449678][ T31] audit: type=1400 audit(2884.360:44579): avc: denied { read write } for pid=22090 comm="syz.3.3925" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2884.452794][ T31] audit: type=1400 audit(2884.360:44580): avc: denied { read write open } for pid=22090 comm="syz.3.3925" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2884.479842][ T31] audit: type=1400 audit(2884.380:44581): avc: denied { create } for pid=22090 comm="syz.3.3925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2889.523366][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 2889.523467][ T31] audit: type=1400 audit(2889.420:44630): avc: denied { module_request } for pid=22101 comm="syz.3.3929" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2889.543555][ T31] audit: type=1400 audit(2889.450:44631): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2889.548726][ T31] audit: type=1400 audit(2889.450:44632): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2889.576632][ T31] audit: type=1400 audit(2889.480:44633): avc: denied { sys_module } for pid=22101 comm="syz.3.3929" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2889.577572][ T31] audit: type=1400 audit(2889.480:44634): avc: denied { module_request } for pid=22101 comm="syz.3.3929" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2889.580531][ T31] audit: type=1400 audit(2889.490:44635): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2889.588755][ T31] audit: type=1400 audit(2889.490:44636): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2889.601967][ T31] audit: type=1400 audit(2889.510:44637): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2889.679006][ T31] audit: type=1400 audit(2889.570:44638): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2889.689040][ T31] audit: type=1400 audit(2889.590:44639): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2894.692450][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 2894.692571][ T31] audit: type=1400 audit(2894.600:44700): avc: denied { write } for pid=22130 comm="syz.3.3935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2894.720136][ T31] audit: type=1400 audit(2894.610:44701): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2894.724966][ T31] audit: type=1400 audit(2894.630:44702): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2894.727109][ T31] audit: type=1400 audit(2894.630:44703): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2894.743760][ T31] audit: type=1400 audit(2894.650:44704): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2894.746813][ T31] audit: type=1400 audit(2894.650:44705): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2895.087585][ T31] audit: type=1400 audit(2894.990:44706): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2895.093768][ T31] audit: type=1400 audit(2895.000:44707): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2895.097880][ T31] audit: type=1400 audit(2895.000:44708): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2895.120651][ T31] audit: type=1400 audit(2895.020:44709): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2898.273334][T22149] FAULT_INJECTION: forcing a failure. [ 2898.273334][T22149] name failslab, interval 1, probability 0, space 0, times 0 [ 2898.273775][T22149] CPU: 0 UID: 0 PID: 22149 Comm: syz.3.3939 Not tainted 6.12.0-syzkaller #0 [ 2898.273941][T22149] Hardware name: ARM-Versatile Express [ 2898.274178][T22149] Call trace: [ 2898.274317][T22149] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 2898.274668][T22149] r7:00000c40 r6:84bad1a8 r5:60000013 r4:820413b8 [ 2898.274799][T22149] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 2898.275149][T22149] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 2898.275438][T22149] r5:00000000 r4:8271b79c [ 2898.275560][T22149] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 2898.275881][T22149] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 2898.276104][T22149] r6:84bad1a8 r5:00001000 r4:82c016c0 [ 2898.276317][T22149] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 2898.276614][T22149] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 2898.276940][T22149] r10:84b5a400 r9:851c5c00 r8:00000000 r7:832eee58 r6:84bad1a8 r5:00001000 [ 2898.277207][T22149] r4:00000000 [ 2898.277311][T22149] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 2898.277834][T22149] r10:84b5a400 r9:00000000 r8:84bad180 r7:00005450 r6:00000004 r5:81ad1efc [ 2898.278095][T22149] r4:84bad1a8 r3:824bb340 [ 2898.278279][T22149] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 2898.278718][T22149] r9:00000003 r8:84bad180 r7:00000000 r6:00000000 r5:00005450 r4:84bad180 [ 2898.279069][T22149] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 2898.279455][T22149] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 2898.279821][T22149] r7:00000000 r6:84bad181 r5:00000000 r4:00005450 [ 2898.279996][T22149] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2898.280240][T22149] Exception stack(0xebaadfa8 to 0xebaadff0) [ 2898.280396][T22149] dfa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 2898.280666][T22149] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76ba90bc [ 2898.280960][T22149] dfe0: 76ba8ec0 76ba8eb0 00018af0 00133450 [ 2898.281143][T22149] r10:00000036 r9:84b5a400 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 2898.281384][T22149] r4:00000000 [ 2898.282784][T22149] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2899.706463][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 2899.706577][ T31] audit: type=1400 audit(2899.610:44773): avc: denied { read } for pid=22160 comm="syz.3.3943" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.716459][ T31] audit: type=1400 audit(2899.620:44774): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2899.727925][ T31] audit: type=1400 audit(2899.630:44775): avc: denied { read open } for pid=22160 comm="syz.3.3943" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.729348][ T31] audit: type=1400 audit(2899.630:44776): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2899.729918][ T31] audit: type=1400 audit(2899.630:44777): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2899.737872][ T31] audit: type=1400 audit(2899.640:44778): avc: denied { ioctl } for pid=22160 comm="syz.3.3943" path="/dev/mixer" dev="devtmpfs" ino=721 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.739244][ T31] audit: type=1400 audit(2899.640:44779): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2899.739755][ T31] audit: type=1400 audit(2899.640:44780): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2899.740135][ T31] audit: type=1400 audit(2899.640:44781): avc: denied { ioctl } for pid=22160 comm="syz.3.3943" path="/dev/mixer" dev="devtmpfs" ino=721 ioctlcmd=0x5404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.752797][ T31] audit: type=1400 audit(2899.660:44782): avc: denied { ioctl } for pid=22160 comm="syz.3.3943" path="/dev/mixer" dev="devtmpfs" ino=721 ioctlcmd=0x4b4a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2904.846160][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 2904.846231][ T31] audit: type=1400 audit(2904.750:44818): avc: denied { bind } for pid=22178 comm="syz.3.3948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2904.857934][ T31] audit: type=1400 audit(2904.760:44819): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2904.868800][ T31] audit: type=1400 audit(2904.770:44820): avc: denied { accept } for pid=22178 comm="syz.3.3948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2904.876768][ T31] audit: type=1400 audit(2904.780:44821): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2904.887413][ T31] audit: type=1400 audit(2904.790:44822): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2904.890439][ T31] audit: type=1400 audit(2904.800:44823): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2904.893522][ T31] audit: type=1400 audit(2904.800:44824): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2904.900816][ T31] audit: type=1400 audit(2904.810:44825): avc: denied { write } for pid=22178 comm="syz.3.3948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2905.132895][ T31] audit: type=1400 audit(2905.040:44826): avc: denied { module_request } for pid=22167 comm="syz.0.3946" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2905.158625][ T31] audit: type=1400 audit(2905.060:44827): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2906.612741][T22188] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22188 comm=syz.0.3950 [ 2910.096827][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 2910.096903][ T31] audit: type=1400 audit(2910.000:44879): avc: denied { ioctl } for pid=22198 comm="syz.3.3953" path="socket:[47727]" dev="sockfs" ino=47727 ioctlcmd=0x6210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2910.105975][ T31] audit: type=1400 audit(2910.010:44880): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2910.118882][ T31] audit: type=1400 audit(2910.020:44881): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2910.122244][ T31] audit: type=1400 audit(2910.030:44882): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2910.137091][ T31] audit: type=1400 audit(2910.040:44883): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2910.141626][ T31] audit: type=1400 audit(2910.040:44884): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2910.357304][ T31] audit: type=1400 audit(2910.260:44885): avc: denied { write } for pid=22200 comm="syz.0.3954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2910.606747][ T31] audit: type=1400 audit(2910.510:44886): avc: denied { write } for pid=22198 comm="syz.3.3953" path="socket:[47727]" dev="sockfs" ino=47727 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2910.615678][ T31] audit: type=1400 audit(2910.520:44887): avc: denied { write } for pid=22198 comm="syz.3.3953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2910.871003][ T31] audit: type=1400 audit(2910.780:44888): avc: denied { write } for pid=22200 comm="syz.0.3954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2913.635221][T22220] FAULT_INJECTION: forcing a failure. [ 2913.635221][T22220] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2913.635970][T22220] CPU: 0 UID: 0 PID: 22220 Comm: syz.0.3958 Not tainted 6.12.0-syzkaller #0 [ 2913.636319][T22220] Hardware name: ARM-Versatile Express [ 2913.636564][T22220] Call trace: [ 2913.636764][T22220] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 2913.637180][T22220] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 2913.637439][T22220] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 2913.637793][T22220] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 2913.638478][T22220] r5:00000000 r4:82751908 [ 2913.638737][T22220] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 2913.639162][T22220] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 2913.639627][T22220] r6:00000000 r5:ec711f68 r4:00000002 [ 2913.639874][T22220] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 2913.640260][T22220] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 2913.640623][T22220] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 2913.641070][T22220] r10:00000001 r9:805cc9a0 r8:00000002 r7:ec711f68 r6:0000000f r5:76b8ff30 [ 2913.641425][T22220] r4:85341800 r3:ec711e9f [ 2913.641633][T22220] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 2913.642027][T22220] r8:76b8ff30 r7:ec711f68 r6:85341800 r5:0000000f r4:87719e40 [ 2913.642337][T22220] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 2913.642706][T22220] r10:00000003 r9:85341800 r8:8020029c r7:00000000 r6:00000000 r5:87719e40 [ 2913.643095][T22220] r4:87719e43 [ 2913.643276][T22220] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 2913.643791][T22220] r7:00000003 r6:00000005 r5:76b8ff30 r4:0000000f [ 2913.644100][T22220] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2913.644484][T22220] Exception stack(0xec711fa8 to 0xec711ff0) [ 2913.644767][T22220] 1fa0: 0000000f 76b8ff30 00000005 76b8ff30 0000000f 00000000 [ 2913.645155][T22220] 1fc0: 0000000f 76b8ff30 00000005 00000003 00000000 00006364 003d0f00 76b900bc [ 2913.645516][T22220] 1fe0: 00000158 76b8fed0 000d8998 00131324 [ 2915.205614][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 2915.205740][ T31] audit: type=1400 audit(2915.110:44943): avc: denied { create } for pid=22223 comm="syz.0.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2915.223506][ T31] audit: type=1400 audit(2915.130:44944): avc: denied { write } for pid=22223 comm="syz.0.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2915.240363][ T31] audit: type=1400 audit(2915.140:44945): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2915.249094][ T31] audit: type=1400 audit(2915.150:44946): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2915.253039][ T31] audit: type=1400 audit(2915.160:44947): avc: denied { ioctl } for pid=22223 comm="syz.0.3959" path="socket:[47778]" dev="sockfs" ino=47778 ioctlcmd=0x6210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2915.261827][ T31] audit: type=1400 audit(2915.170:44948): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2915.279124][ T31] audit: type=1400 audit(2915.180:44949): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2915.280535][ T31] audit: type=1400 audit(2915.180:44950): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2915.372413][ T31] audit: type=1400 audit(2915.280:44951): avc: denied { sys_module } for pid=22225 comm="syz.3.3960" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2915.378892][ T31] audit: type=1400 audit(2915.280:44952): avc: denied { module_request } for pid=22225 comm="syz.3.3960" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2920.587283][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 2920.587335][ T31] audit: type=1400 audit(2920.490:44994): avc: denied { read } for pid=22252 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2920.602919][ T31] audit: type=1400 audit(2920.510:44995): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2920.607927][ T31] audit: type=1400 audit(2920.510:44996): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2920.616046][ T31] audit: type=1400 audit(2920.520:44997): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2920.616620][ T31] audit: type=1400 audit(2920.520:44998): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2920.628083][ T31] audit: type=1400 audit(2920.530:44999): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2920.643354][ T31] audit: type=1400 audit(2920.550:45000): avc: denied { create } for pid=22252 comm="syz.3.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2920.657904][ T31] audit: type=1400 audit(2920.560:45001): avc: denied { setopt } for pid=22252 comm="syz.3.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2920.662694][ T31] audit: type=1400 audit(2920.570:45002): avc: denied { connect } for pid=22252 comm="syz.3.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2920.727964][ T31] audit: type=1400 audit(2920.630:45003): avc: denied { module_request } for pid=22237 comm="syz.0.3962" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2925.707949][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 2925.708065][ T31] audit: type=1400 audit(2925.610:45049): avc: denied { write } for pid=22274 comm="syz.3.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2925.714445][ T31] audit: type=1400 audit(2925.620:45050): avc: denied { write } for pid=22274 comm="syz.3.3971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2925.737469][ T31] audit: type=1400 audit(2925.640:45051): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2925.761170][ T31] audit: type=1400 audit(2925.660:45052): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2925.762052][ T31] audit: type=1400 audit(2925.660:45053): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2925.764357][ T31] audit: type=1400 audit(2925.670:45054): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2925.774295][ T31] audit: type=1400 audit(2925.680:45055): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2925.804958][ T31] audit: type=1400 audit(2925.710:45056): avc: denied { sys_module } for pid=22274 comm="syz.3.3971" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2925.812045][ T31] audit: type=1400 audit(2925.720:45057): avc: denied { module_request } for pid=22274 comm="syz.3.3971" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2926.235912][ T31] audit: type=1400 audit(2926.140:45058): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2930.981326][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 2930.981456][ T31] audit: type=1400 audit(2930.890:45107): avc: denied { create } for pid=22297 comm="syz.0.3977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2931.006322][ T31] audit: type=1400 audit(2930.910:45108): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2931.013962][ T31] audit: type=1400 audit(2930.920:45109): avc: denied { setopt } for pid=22297 comm="syz.0.3977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2931.047546][ T31] audit: type=1400 audit(2930.950:45110): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2931.064373][ T31] audit: type=1400 audit(2930.950:45111): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2931.065111][ T31] audit: type=1400 audit(2930.960:45112): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2931.065611][ T31] audit: type=1400 audit(2930.960:45113): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2931.066110][ T31] audit: type=1400 audit(2930.970:45114): avc: denied { connect } for pid=22297 comm="syz.0.3977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2931.114270][ T31] audit: type=1400 audit(2931.020:45115): avc: denied { read } for pid=22301 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2931.125544][ T31] audit: type=1400 audit(2931.030:45116): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2936.023962][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 2936.024087][ T31] audit: type=1400 audit(2935.930:45191): avc: denied { setopt } for pid=22328 comm="syz.0.3986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2936.049657][ T31] audit: type=1400 audit(2935.950:45192): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2936.054084][ T31] audit: type=1400 audit(2935.960:45193): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2936.056804][ T31] audit: type=1400 audit(2935.960:45194): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2936.079244][ T31] audit: type=1400 audit(2935.980:45195): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2936.079939][ T31] audit: type=1400 audit(2935.980:45196): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2936.084919][ T31] audit: type=1400 audit(2935.990:45197): avc: denied { create } for pid=22330 comm="syz.3.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2936.097843][ T31] audit: type=1400 audit(2936.000:45198): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2936.102474][ T31] audit: type=1400 audit(2936.010:45199): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2936.106987][ T31] audit: type=1400 audit(2936.010:45200): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2941.029435][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 2941.029554][ T31] audit: type=1400 audit(2940.910:45300): avc: denied { write } for pid=22360 comm="syz.0.3995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2941.035690][ T31] audit: type=1400 audit(2940.940:45301): avc: denied { write } for pid=22360 comm="syz.0.3995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2941.084410][ T31] audit: type=1400 audit(2940.990:45302): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2941.096949][ T31] audit: type=1400 audit(2941.000:45303): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2941.109105][ T31] audit: type=1400 audit(2941.010:45304): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2941.113323][ T31] audit: type=1400 audit(2941.020:45305): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2941.116520][ T31] audit: type=1400 audit(2941.020:45306): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2941.134596][ T31] audit: type=1400 audit(2941.030:45307): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2941.135526][ T31] audit: type=1400 audit(2941.040:45308): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2941.138040][ T31] audit: type=1400 audit(2941.040:45309): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2946.277488][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2946.277601][ T31] audit: type=1400 audit(2946.180:45383): avc: denied { write } for pid=22383 comm="syz.3.4001" path="socket:[48027]" dev="sockfs" ino=48027 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2946.286978][ T31] audit: type=1400 audit(2946.190:45384): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2946.299621][ T31] audit: type=1400 audit(2946.200:45385): avc: denied { write } for pid=22383 comm="syz.3.4001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2946.301210][ T31] audit: type=1400 audit(2946.210:45386): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2946.302447][ T31] audit: type=1400 audit(2946.210:45387): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2946.310768][ T31] audit: type=1400 audit(2946.210:45388): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2946.312445][ T31] audit: type=1400 audit(2946.210:45389): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2948.107472][ T31] audit: type=1400 audit(2948.010:45390): avc: denied { read } for pid=22396 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2948.125711][ T31] audit: type=1400 audit(2948.030:45391): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2948.137690][ T31] audit: type=1400 audit(2948.040:45392): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2951.286095][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 2951.286208][ T31] audit: type=1400 audit(2951.190:45450): avc: denied { write } for pid=22409 comm="syz.0.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2951.313802][ T31] audit: type=1400 audit(2951.220:45451): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2951.339173][ T31] audit: type=1400 audit(2951.230:45452): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2951.340129][ T31] audit: type=1400 audit(2951.240:45453): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2951.346566][ T31] audit: type=1400 audit(2951.240:45454): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2951.352640][ T31] audit: type=1400 audit(2951.240:45455): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2951.377077][ T31] audit: type=1400 audit(2951.280:45456): avc: denied { create } for pid=22409 comm="syz.0.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2951.401517][ T31] audit: type=1400 audit(2951.310:45457): avc: denied { create } for pid=22409 comm="syz.0.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2951.408125][ T31] audit: type=1400 audit(2951.310:45458): avc: denied { write } for pid=22409 comm="syz.0.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2951.413517][ T31] audit: type=1400 audit(2951.320:45459): avc: denied { module_request } for pid=22409 comm="syz.0.4008" kmod="net-pf-16-proto-16-family-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2956.363228][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 2956.363359][ T31] audit: type=1400 audit(2956.270:45528): avc: denied { read } for pid=22437 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2956.396141][ T31] audit: type=1400 audit(2956.290:45529): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2956.400464][ T31] audit: type=1400 audit(2956.310:45530): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2956.409886][ T31] audit: type=1400 audit(2956.310:45531): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2956.410845][ T31] audit: type=1400 audit(2956.310:45532): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2956.422743][ T31] audit: type=1400 audit(2956.330:45533): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2956.452792][ T31] audit: type=1400 audit(2956.360:45534): avc: denied { sys_module } for pid=22430 comm="syz.3.4013" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2956.459144][ T31] audit: type=1400 audit(2956.360:45535): avc: denied { module_request } for pid=22430 comm="syz.3.4013" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2956.476286][ T31] audit: type=1400 audit(2956.380:45536): avc: denied { create } for pid=22437 comm="syz.0.4015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2956.492467][ T31] audit: type=1400 audit(2956.380:45537): avc: denied { write } for pid=22437 comm="syz.0.4015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2961.440219][ T31] kauditd_printk_skb: 353 callbacks suppressed [ 2961.440334][ T31] audit: type=1400 audit(2961.350:45891): avc: denied { read } for pid=22459 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2961.480200][ T31] audit: type=1400 audit(2961.380:45892): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2961.481073][ T31] audit: type=1400 audit(2961.380:45893): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2961.481771][ T31] audit: type=1326 audit(2961.380:45894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.3.4018" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2961.482530][ T31] audit: type=1326 audit(2961.380:45895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.3.4018" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2961.483659][ T31] audit: type=1326 audit(2961.380:45896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.3.4018" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x133450 code=0x7ffc0000 [ 2961.484426][ T31] audit: type=1400 audit(2961.380:45897): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2961.485087][ T31] audit: type=1326 audit(2961.390:45898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.3.4018" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2961.486078][ T31] audit: type=1326 audit(2961.390:45899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.3.4018" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x133450 code=0x7ffc0000 [ 2961.486734][ T31] audit: type=1326 audit(2961.390:45900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.3.4018" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2968.667434][ T31] kauditd_printk_skb: 103 callbacks suppressed [ 2968.667564][ T31] audit: type=1400 audit(2968.570:46004): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2968.691619][ T31] audit: type=1400 audit(2968.600:46005): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2968.695490][ T31] audit: type=1400 audit(2968.600:46006): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2968.715234][ T31] audit: type=1400 audit(2968.620:46007): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2968.741001][ T31] audit: type=1400 audit(2968.650:46008): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2968.743157][ T31] audit: type=1400 audit(2968.650:46009): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2968.745781][ T31] audit: type=1400 audit(2968.650:46010): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2968.781474][ T31] audit: type=1400 audit(2968.690:46011): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2969.226342][ T31] audit: type=1400 audit(2969.110:46012): avc: denied { read } for pid=22477 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2969.256439][ T31] audit: type=1400 audit(2969.160:46013): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2973.680487][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 2973.681585][ T31] audit: type=1326 audit(2973.590:46111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22491 comm="syz.0.4028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2973.823725][ T31] audit: type=1400 audit(2973.730:46112): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2973.825933][ T31] audit: type=1400 audit(2973.730:46113): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2973.826788][ T31] audit: type=1400 audit(2973.730:46114): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2973.859038][ T31] audit: type=1400 audit(2973.760:46115): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2973.869274][ T31] audit: type=1400 audit(2973.770:46116): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2973.894713][ T31] audit: type=1400 audit(2973.800:46117): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2973.895760][ T31] audit: type=1400 audit(2973.800:46118): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2973.908614][ T31] audit: type=1400 audit(2973.800:46119): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2974.348679][ T31] audit: type=1400 audit(2974.250:46120): avc: denied { read } for pid=22495 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2978.846141][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 2978.846234][ T31] audit: type=1400 audit(2978.750:46170): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2978.872308][ T31] audit: type=1400 audit(2978.780:46171): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2978.873292][ T31] audit: type=1400 audit(2978.780:46172): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2978.877049][ T31] audit: type=1400 audit(2978.780:46173): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2978.885557][ T31] audit: type=1400 audit(2978.790:46174): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2978.908839][ T31] audit: type=1400 audit(2978.810:46175): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2978.909927][ T31] audit: type=1400 audit(2978.810:46176): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2978.911823][ T31] audit: type=1400 audit(2978.810:46177): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2979.249060][ T31] audit: type=1400 audit(2979.150:46178): avc: denied { read } for pid=22508 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2979.328952][ T31] audit: type=1400 audit(2979.230:46179): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2983.877239][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 2983.877364][ T31] audit: type=1400 audit(2983.780:46247): avc: denied { prog_load } for pid=22520 comm="syz.0.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2983.909264][ T31] audit: type=1400 audit(2983.810:46248): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2983.910605][ T31] audit: type=1400 audit(2983.810:46249): avc: denied { bpf } for pid=22520 comm="syz.0.4037" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2983.911389][ T31] audit: type=1400 audit(2983.810:46250): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2983.912280][ T31] audit: type=1400 audit(2983.810:46251): avc: denied { perfmon } for pid=22520 comm="syz.0.4037" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2983.929150][ T31] audit: type=1400 audit(2983.820:46252): avc: denied { perfmon } for pid=22520 comm="syz.0.4037" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2983.930113][ T31] audit: type=1400 audit(2983.840:46253): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2983.933049][ T31] audit: type=1400 audit(2983.840:46254): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2983.948255][ T31] audit: type=1400 audit(2983.840:46255): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2983.960657][ T31] audit: type=1400 audit(2983.840:46256): avc: denied { perfmon } for pid=22520 comm="syz.0.4037" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2988.899675][ T31] kauditd_printk_skb: 70 callbacks suppressed [ 2988.899794][ T31] audit: type=1400 audit(2988.800:46327): avc: denied { read } for pid=22531 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2988.999405][ T31] audit: type=1400 audit(2988.900:46328): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2989.000845][ T31] audit: type=1400 audit(2988.900:46329): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2989.040003][ T31] audit: type=1400 audit(2988.940:46330): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2989.040978][ T31] audit: type=1400 audit(2988.940:46331): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2989.061393][ T31] audit: type=1400 audit(2988.940:46332): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2989.101945][ T31] audit: type=1400 audit(2989.010:46333): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2989.107114][ T31] audit: type=1400 audit(2989.010:46334): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2989.148915][ T31] audit: type=1400 audit(2989.040:46335): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2989.149542][ T31] audit: type=1400 audit(2989.040:46336): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2996.306409][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 2996.306515][ T31] audit: type=1400 audit(2996.210:46435): avc: denied { read write } for pid=19962 comm="syz-executor" name="loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2996.331240][ T31] audit: type=1400 audit(2996.240:46436): avc: denied { read write open } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2996.332442][ T31] audit: type=1400 audit(2996.240:46437): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2996.349931][ T31] audit: type=1400 audit(2996.240:46438): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2996.350918][ T31] audit: type=1400 audit(2996.240:46439): avc: denied { append } for pid=2905 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2996.352339][ T31] audit: type=1400 audit(2996.240:46440): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2996.353169][ T31] audit: type=1400 audit(2996.240:46441): avc: denied { ioctl } for pid=19962 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=788 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2996.354022][ T31] audit: type=1400 audit(2996.240:46442): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2996.945436][ T31] audit: type=1400 audit(2996.840:46443): avc: denied { read } for pid=22547 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2997.017007][ T31] audit: type=1400 audit(2996.920:46444): avc: denied { map_create } for pid=22547 comm="syz.0.4047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2999.652195][T22553] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 2999.653962][T22553] ------------[ cut here ]------------ [ 2999.654305][T22553] kernel BUG at mm/usercopy.c:102! [ 2999.654597][T22553] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 2999.655221][T22553] Modules linked in: [ 2999.656027][T22553] CPU: 0 UID: 0 PID: 22553 Comm: syz.3.4049 Not tainted 6.12.0-syzkaller #0 [ 2999.656546][T22553] Hardware name: ARM-Versatile Express [ 2999.656833][T22553] PC is at usercopy_abort+0x98/0x9c [ 2999.657128][T22553] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 2999.657954][T22553] pc : [<819be580>] lr : [<802be434>] psr: 60000013 [ 2999.659292][T22553] sp : df999d90 ip : df999cd0 fp : df999db4 [ 2999.660091][T22553] r10: 81a00568 r9 : 00000078 r8 : 851eb050 [ 2999.660554][T22553] r7 : ddeb14a0 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 2999.661123][T22553] r3 : 851e9800 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 2999.661541][T22553] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 2999.661974][T22553] Control: 30c5387d Table: 84a73ec0 DAC: fffffffd [ 2999.662321][T22553] Register r0 information: non-paged memory [ 2999.663041][T22553] Register r1 information: NULL pointer [ 2999.663350][T22553] Register r2 information: NULL pointer [ 2999.663689][T22553] Register r3 information: slab task_struct start 851e9800 pointer offset 0 size 3072 [ 2999.664843][T22553] Register r4 information: non-paged memory [ 2999.665182][T22553] Register r5 information: non-paged memory [ 2999.665511][T22553] Register r6 information: NULL pointer [ 2999.665857][T22553] Register r7 information: non-slab/vmalloc memory [ 2999.666327][T22553] Register r8 information: slab task_struct start 851eb000 pointer offset 80 size 3072 [ 2999.667301][T22553] Register r9 information: non-paged memory [ 2999.668310][T22553] Register r10 information: non-slab/vmalloc memory [ 2999.669256][T22553] Register r11 information: 2-page vmalloc region starting at 0xdf998000 allocated at kernel_clone+0xac/0x3e4 [ 2999.670468][T22553] Register r12 information: 2-page vmalloc region starting at 0xdf998000 allocated at kernel_clone+0xac/0x3e4 [ 2999.671134][T22553] Process syz.3.4049 (pid: 22553, stack limit = 0xdf998000) [ 2999.672126][T22553] Stack: (0xdf999d90 to 0xdf99a000) [ 2999.672456][T22553] 9d80: 8205f678 82030fcc 820464dc 00000050 [ 2999.672871][T22553] 9da0: 00000074 00000078 df999de4 df999db8 804d5d54 819be4f4 00000074 df999dc8 [ 2999.673312][T22553] 9dc0: 80214800 851eb050 00000074 00000000 851eb0c4 ddeb14a0 df999e1c df999de8 [ 2999.673729][T22553] 9de0: 80514b34 804d5c88 00000074 20000084 df999e0c 851eb050 00000074 20000084 [ 2999.674172][T22553] 9e00: 00000074 81a005a0 00000078 81a00568 df999e4c df999e20 80209db4 805148b8 [ 2999.674609][T22553] 9e20: df999e54 2ffba21c 00000064 87415200 849c8280 80209d24 851eb000 20000084 [ 2999.675123][T22553] 9e40: df999ef4 df999e50 80253634 80209d30 00000000 20000000 20000000 81a0057c [ 2999.675658][T22553] 9e60: 819e3204 00000000 df999eb4 df999e78 8020d0cc 8020c034 819da440 00000000 [ 2999.676137][T22553] 9e80: 8027fa10 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2999.676578][T22553] 9ea0: 00000000 851e9800 df999edc df999eb8 8027e354 802af5ec 8027251c 849c8000 [ 2999.677062][T22553] 9ec0: df999eec 2ffba21c 851eb000 20000080 00004202 00000002 00000000 20000080 [ 2999.677545][T22553] 9ee0: 851e9800 0000001a df999f6c df999ef8 8020a1e4 8025332c 851eb000 851eb884 [ 2999.677970][T22553] 9f00: df999f1c df999f10 819e36b0 8027c778 df999f6c df999f20 802813ec 819e368c [ 2999.679118][T22553] 9f20: df999f54 00000000 8027e354 60000013 81990410 819a7694 df999f54 2ffba21c [ 2999.680114][T22553] 9f40: 00004205 851eb000 00004205 2ffba21c 851eb000 00004205 00000002 00000000 [ 2999.680959][T22553] 9f60: df999fa4 df999f70 80252fdc 8020a140 80202cc0 2ffba21c df999fac 00000000 [ 2999.681932][T22553] 9f80: 00000000 002862f4 0000001a 8020029c 851e9800 0000001a 00000000 df999fa8 [ 2999.683130][T22553] 9fa0: 80200060 80252db0 00000000 00000000 00004205 000003b3 00000002 20000080 [ 2999.684286][T22553] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76ba90bc [ 2999.685250][T22553] 9fe0: 76ba8ec0 76ba8eb0 00018af0 00133450 60000010 00004205 00000000 00000000 [ 2999.685758][T22553] Call trace: [ 2999.686032][T22553] [<819be4e8>] (usercopy_abort) from [<804d5d54>] (__check_heap_object+0xd8/0xf4) [ 2999.686534][T22553] [<804d5c7c>] (__check_heap_object) from [<80514b34>] (__check_object_size+0x288/0x304) [ 2999.687084][T22553] r8:ddeb14a0 r7:851eb0c4 r6:00000000 r5:00000074 r4:851eb050 [ 2999.687467][T22553] [<805148ac>] (__check_object_size) from [<80209db4>] (fpa_set+0x90/0x118) [ 2999.687922][T22553] r10:81a00568 r9:00000078 r8:81a005a0 r7:00000074 r6:20000084 r5:00000074 [ 2999.688581][T22553] r4:851eb050 [ 2999.688976][T22553] [<80209d24>] (fpa_set) from [<80253634>] (ptrace_request+0x314/0xa78) [ 2999.690825][T22553] r6:20000084 r5:851eb000 r4:80209d24 [ 2999.691447][T22553] [<80253320>] (ptrace_request) from [<8020a1e4>] (arch_ptrace+0xb0/0x424) [ 2999.692057][T22553] r10:0000001a r9:851e9800 r8:20000080 r7:00000000 r6:00000002 r5:00004202 [ 2999.692834][T22553] r4:20000080 [ 2999.693054][T22553] [<8020a134>] (arch_ptrace) from [<80252fdc>] (sys_ptrace+0x238/0x4dc) [ 2999.693480][T22553] r7:00000000 r6:00000002 r5:00004205 r4:851eb000 [ 2999.693854][T22553] [<80252da4>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2999.694284][T22553] Exception stack(0xdf999fa8 to 0xdf999ff0) [ 2999.694998][T22553] 9fa0: 00000000 00000000 00004205 000003b3 00000002 20000080 [ 2999.696409][T22553] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76ba90bc [ 2999.697637][T22553] 9fe0: 76ba8ec0 76ba8eb0 00018af0 00133450 [ 2999.698438][T22553] r10:0000001a r9:851e9800 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 2999.699368][T22553] r4:00000000 [ 2999.700391][T22553] Code: e30f067c e3480205 e58dc000 ebfff265 (e7f001f2) [ 2999.701118][T22553] ---[ end trace 0000000000000000 ]--- [ 2999.701859][T22553] Kernel panic - not syncing: Fatal exception [ 2999.705324][T22553] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:43:51 Registers: info registers vcpu 0 CPU#0 R00=83d72440 R01=00000033 R02=eb25d000 R03=eb25d018 R04=82877455 R05=83d72440 R06=809f5e5c R07=8287746a R08=8287741c R09=0000004f R10=00000001 R11=df999ab4 R12=00000002 R13=df999aa8 R14=8275b574 R15=809f5e6c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ff7d4880 R01=00000180 R02=00274b80 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=84b58000 R09=00000028 R10=826faf88 R11=df805db4 R12=df805db8 R13=df805da8 R14=8031ce20 R15=819d7f58 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000