last executing test programs: 22.213658577s ago: executing program 1 (id=8954): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') mlock(&(0x7f000009c000/0x4000)=nil, 0x4000) lseek(r0, 0x2084, 0x0) 21.618491007s ago: executing program 1 (id=8955): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="7800000010000304000000000000000000007400", @ANYRES32=0x0, @ANYBLOB="00000000600000005800128008000100677470004c00028008000100", @ANYRES32=r0], 0x78}}, 0x20000800) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x86, &(0x7f00000002c0)={@broadcast, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x2, 0x1, "cd93740f85f0354608ad3411da999e670ef0b845bf6fdcd54ba1f6683bd05513", "590d5421b656d71286a68ad32741881f", {"43e812f1d4981cb506492d0f79a8b0d1", "aac119510bd953d5d6d7d047cf42d2d7"}}}}}}}, 0x0) 21.053802446s ago: executing program 1 (id=8956): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x80000) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = syz_io_uring_setup(0x499, &(0x7f0000000400)={0x0, 0x707b, 0x0, 0xc, 0x288}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0xe}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) io_uring_enter(r1, 0x3516, 0x0, 0x4, 0x0, 0x0) 11.576598339s ago: executing program 1 (id=8959): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)={0x20, 0x1, 0x1, 0x201, 0x0, 0x0, {0xa, 0x0, 0x6}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x3}]}]}, 0x20}}, 0x0) 11.381454789s ago: executing program 1 (id=8960): r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4125, 0x101d}], 0x1}, 0x40002022) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 11.151238621s ago: executing program 1 (id=8961): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10138, 0x2, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone3(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r3 = syz_io_uring_setup(0x10d, &(0x7f00000000c0)={0x0, 0x127d, 0x100, 0x0, 0x90}, &(0x7f0000000280)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0x401, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}) io_uring_enter(r3, 0x3516, 0x58b3, 0x0, 0x0, 0x0) 5.172742221s ago: executing program 0 (id=8964): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x4, 0x2}, {0x10000, 0x3, 0x1, 0x0, 0xfffffffffffffffc, 0x6, 0x0, 0xfffffffffffffff7}, {0x0, 0x6, 0xfffffffffffffffc, 0x8}, 0x0, 0x6e6bb5, 0x1, 0x0, 0x1}, {{@in=@remote, 0x2, 0x6c}, 0xa, @in=@empty, 0x2, 0x1, 0x0, 0xb7}}, 0xe8) 4.689896377s ago: executing program 0 (id=8965): r0 = syz_open_dev$dri(&(0x7f0000000140), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f00000000c0)={&(0x7f0000000000)="c5", 0x1}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000180)="83d3e636", 0x4, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000000040)={r1}) 4.285362008s ago: executing program 0 (id=8966): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x0, 0x40, 0xffffffff, 0x0, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x65, 0x4, 0x0, 0x0, 0x0, @empty, @rand_addr, {[@ra={0x94, 0x4}]}}}}}) 3.882737848s ago: executing program 0 (id=8967): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x40d, 0x70bd26, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 2.643432363s ago: executing program 0 (id=8968): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1e7d, 0x319c, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000400)={0x2c, &(0x7f0000000280)={0x40, 0x0, 0x7, {0x7, 0x0, "5a7da32917"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000a00)={0x84, &(0x7f0000000440)={0x40, 0x14, 0x3, "170589"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 0s ago: executing program 0 (id=8969): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x0, 0x4, 0x4, 0x5, 0x5, 0x4, 0x7, 0x54c6cff3, 0xfd, 0x2, 0x1, 0x1, 0x1, 0x6, 0x101, 0x0, 0x27f, 0x3, 0x40000003, 0x89, 0xcaa3, 0x0, 0x20001e5b, 0x3, 0xe66, 0x4, 0x8, 0x4086, 0x0, 0xfffffff8]}) kernel console output (not intermixed with test programs): 92:57123): avc: denied { ioctl } for pid=2913 comm="syz.0.8709" path="socket:[98760]" dev="sockfs" ino=98760 ioctlcmd=0x641c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4399.706265][ T31] audit: type=1400 audit(268439855.602:57124): avc: denied { ioctl } for pid=2913 comm="syz.0.8709" path="socket:[98760]" dev="sockfs" ino=98760 ioctlcmd=0xf516 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4400.693948][ T31] audit: type=1400 audit(268439856.592:57125): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4400.698234][ T31] audit: type=1400 audit(268439856.602:57126): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4400.707835][ T31] audit: type=1400 audit(268439856.602:57127): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4400.711730][ T31] audit: type=1400 audit(268439856.612:57128): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4403.274716][ T2951] SELinux: Context /sbin/dhclient is not valid (left unmapped). [ 4403.959006][ T31] kauditd_printk_skb: 166 callbacks suppressed [ 4403.959255][ T31] audit: type=1400 audit(268439859.862:57295): avc: denied { write } for pid=2952 comm="syz.0.8718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4404.469054][ T31] audit: type=1400 audit(268439860.372:57296): avc: denied { write } for pid=2952 comm="syz.0.8718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4404.976808][ T31] audit: type=1400 audit(268439860.872:57297): avc: denied { write } for pid=2952 comm="syz.0.8718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4405.516888][ T31] audit: type=1400 audit(268439861.412:57298): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4405.531041][ T31] audit: type=1400 audit(268439861.432:57299): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4405.571242][ T31] audit: type=1400 audit(268439861.462:57300): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4405.571646][ T31] audit: type=1400 audit(268439861.462:57301): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4405.571905][ T31] audit: type=1400 audit(268439861.472:57302): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4405.596269][ T31] audit: type=1400 audit(268439861.492:57303): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4405.599884][ T31] audit: type=1400 audit(268439861.502:57304): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4408.973605][ T31] kauditd_printk_skb: 117 callbacks suppressed [ 4408.974273][ T31] audit: type=1400 audit(268439864.872:57422): avc: denied { create } for pid=2984 comm="syz.0.8726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4408.993696][ T31] audit: type=1400 audit(268439864.892:57423): avc: denied { write } for pid=2984 comm="syz.0.8726" path="socket:[99670]" dev="sockfs" ino=99670 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4409.000979][ T31] audit: type=1400 audit(268439864.902:57424): avc: denied { write } for pid=2984 comm="syz.0.8726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4409.034199][ T31] audit: type=1400 audit(268439864.932:57425): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4409.040237][ T31] audit: type=1400 audit(268439864.942:57426): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4409.060605][ T31] audit: type=1400 audit(268439864.962:57427): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4409.066115][ T31] audit: type=1400 audit(268439864.962:57428): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4409.094274][ T31] audit: type=1400 audit(268439864.992:57429): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4409.112563][ T31] audit: type=1400 audit(268439865.002:57430): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4409.113100][ T31] audit: type=1400 audit(268439865.012:57431): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4413.981782][ T31] kauditd_printk_skb: 120 callbacks suppressed [ 4413.991215][ T31] audit: type=1400 audit(268439869.882:57552): avc: denied { setattr } for pid=3022 comm="syz.0.8732" name="fb1" dev="devtmpfs" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4414.014841][ T31] audit: type=1400 audit(268439869.912:57553): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.034642][ T31] audit: type=1400 audit(268439869.932:57554): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.071018][ T31] audit: type=1400 audit(268439869.962:57555): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.078554][ T31] audit: type=1400 audit(268439869.962:57556): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.104468][ T31] audit: type=1400 audit(268439869.972:57557): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.108451][ T31] audit: type=1400 audit(268439870.002:57558): avc: denied { recv } for pid=8610 comm="kworker/u9:1" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.111311][ T31] audit: type=1400 audit(268439870.012:57559): avc: denied { recv } for pid=8610 comm="kworker/u9:1" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.145381][ T31] audit: type=1400 audit(268439870.042:57560): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4414.145768][ T31] audit: type=1400 audit(268439870.042:57561): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4415.025488][ T3030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3030 comm=syz.0.8735 [ 4416.972866][ T3051] FAULT_INJECTION: forcing a failure. [ 4416.972866][ T3051] name failslab, interval 1, probability 0, space 0, times 0 [ 4416.974190][ T3051] CPU: 0 UID: 0 PID: 3051 Comm: syz.0.8743 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4416.974309][ T3051] Hardware name: ARM-Versatile Express [ 4416.974338][ T3051] Call trace: [ 4416.974379][ T3051] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4416.974493][ T3051] r7:00000820 r6:00000000 r5:60000013 r4:8226029c [ 4416.974515][ T3051] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4416.974575][ T3051] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4416.974644][ T3051] r5:84028000 r4:82917bc0 [ 4416.974663][ T3051] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4416.974730][ T3051] [<80972200>] (should_fail_ex) from [<8051f440>] (should_failslab+0x6c/0x94) [ 4416.974799][ T3051] r8:84028000 r7:00000820 r6:854a99d8 r5:00000017 r4:83001240 [ 4416.974818][ T3051] [<8051f3d4>] (should_failslab) from [<80504a88>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 4416.974854][ T3051] [<805049e8>] (__kmalloc_node_track_caller_noprof) from [<8049b788>] (kmemdup_noprof+0x28/0x44) [ 4416.974889][ T3051] r10:00000127 r9:84b5ba04 r8:dfab9d50 r7:832eb000 r6:854a99d8 r5:dfab9d48 [ 4416.974898][ T3051] r4:00000017 [ 4416.974906][ T3051] [<8049b760>] (kmemdup_noprof) from [<807a1e30>] (sidtab_sid2str_get+0x54/0xa4) [ 4416.974940][ T3051] r7:832eb000 r6:dfab9d50 r5:dfab9d48 r4:84ae70c0 [ 4416.974948][ T3051] [<807a1ddc>] (sidtab_sid2str_get) from [<807a9338>] (sidtab_entry_to_string+0x34/0x94) [ 4416.974980][ T3051] r7:832eb000 r6:84ae70c0 r5:dfab9d48 r4:0000005f [ 4416.974987][ T3051] [<807a9304>] (sidtab_entry_to_string) from [<807a94b0>] (security_sid_to_context_core+0x118/0x17c) [ 4416.975021][ T3051] r9:dfab9e6c r8:832eb000 r7:84b5ba04 r6:dfab9d50 r5:dfab9d48 r4:0000005f [ 4416.975029][ T3051] [<807a9398>] (security_sid_to_context_core) from [<807ac4c4>] (security_sid_to_context+0x1c/0x24) [ 4416.975061][ T3051] r8:8078c5e8 r7:8078d5ec r6:84028000 r5:8481c950 r4:dfab9dd8 [ 4416.975069][ T3051] [<807ac4a8>] (security_sid_to_context) from [<8078d66c>] (avc_audit_post_callback+0x80/0x2f4) [ 4416.975096][ T3051] [<8078d5ec>] (avc_audit_post_callback) from [<807b4a80>] (common_lsm_audit+0x104/0x148) [ 4416.975132][ T3051] r10:00000127 r9:dfab9e6c r8:8078c5e8 r7:8078d5ec r6:dfab9e6c r5:8481c950 [ 4416.975141][ T3051] r4:840287f0 [ 4416.975148][ T3051] [<807b497c>] (common_lsm_audit) from [<8078daf8>] (slow_avc_audit+0xbc/0x114) [ 4416.975181][ T3051] r8:00000057 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 4416.975189][ T3051] [<8078da3c>] (slow_avc_audit) from [<8078e57c>] (avc_has_perm+0xd8/0xe8) [ 4416.975216][ T3051] r5:00000000 r4:00008000 [ 4416.975223][ T3051] [<8078e4a4>] (avc_has_perm) from [<80794994>] (sock_has_perm+0xd0/0xfc) [ 4416.975255][ T3051] r9:84028000 r8:84028000 r7:85dc5f80 r6:00008000 r5:85d5e4c0 r4:00000000 [ 4416.975264][ T3051] [<807948c4>] (sock_has_perm) from [<807949f4>] (selinux_socket_getsockopt+0x18/0x1c) [ 4416.975294][ T3051] r8:200001c0 r7:00000000 r6:0000001f r5:00000006 r4:84c02f00 [ 4416.975303][ T3051] [<807949dc>] (selinux_socket_getsockopt) from [<8078785c>] (security_socket_getsockopt+0x1d8/0x1e4) [ 4416.975327][ T3051] [<80787684>] (security_socket_getsockopt) from [<81543540>] (do_sock_getsockopt+0x48/0x1ec) [ 4416.975364][ T3051] r7:00000000 r6:84c02f00 r5:0000001f r4:00000006 [ 4416.975372][ T3051] [<815434f8>] (do_sock_getsockopt) from [<81545508>] (__sys_getsockopt+0x94/0xdc) [ 4416.975406][ T3051] r8:85c77f00 r7:dfab9f50 r6:0000001f r5:dfab9f58 r4:85c77f01 [ 4416.975414][ T3051] [<81545474>] (__sys_getsockopt) from [<8154556c>] (sys_getsockopt+0x1c/0x24) [ 4416.975448][ T3051] r8:8020029c r7:00000127 r6:00130270 r5:00000000 r4:200001c0 [ 4416.975456][ T3051] [<81545550>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4416.975482][ T3051] Exception stack(0xdfab9fa8 to 0xdfab9ff0) [ 4416.975522][ T3051] 9fa0: 200001c0 00000000 00000003 00000006 0000001f 00000000 [ 4416.975581][ T3051] 9fc0: 200001c0 00000000 00130270 00000127 002e0000 00000000 00006364 76fc30bc [ 4416.975611][ T3051] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4417.264805][ T3053] FAULT_INJECTION: forcing a failure. [ 4417.264805][ T3053] name failslab, interval 1, probability 0, space 0, times 0 [ 4417.266689][ T3053] CPU: 1 UID: 0 PID: 3053 Comm: syz.0.8744 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4417.266809][ T3053] Hardware name: ARM-Versatile Express [ 4417.266832][ T3053] Call trace: [ 4417.266928][ T3053] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4417.267040][ T3053] r7:00000d40 r6:00000000 r5:60000013 r4:8226029c [ 4417.267059][ T3053] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4417.267118][ T3053] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4417.267204][ T3053] r5:8402d400 r4:82917bc0 [ 4417.267221][ T3053] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4417.267283][ T3053] [<80972200>] (should_fail_ex) from [<8051f440>] (should_failslab+0x6c/0x94) [ 4417.267363][ T3053] r8:8402d400 r7:00000d40 r6:8550b628 r5:0000001f r4:83001240 [ 4417.267384][ T3053] [<8051f3d4>] (should_failslab) from [<80503dd4>] (__kmalloc_noprof+0x9c/0x458) [ 4417.267439][ T3053] [<80503d38>] (__kmalloc_noprof) from [<807c33cc>] (tomoyo_encode2+0x64/0xf0) [ 4417.267509][ T3053] r10:00000fff r9:8309e400 r8:00000000 r7:83426bb0 r6:8550b628 r5:8d351ffc [ 4417.267528][ T3053] r4:8d351fe8 [ 4417.267543][ T3053] [<807c3368>] (tomoyo_encode2) from [<807c347c>] (tomoyo_encode+0x24/0x30) [ 4417.267644][ T3053] r9:8309e400 r8:00000000 r7:83426bb0 r6:8550b628 r5:00001000 r4:8d351fe9 [ 4417.267666][ T3053] [<807c3458>] (tomoyo_encode) from [<807c3508>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4417.267724][ T3053] r5:00001000 r4:8d351000 [ 4417.267742][ T3053] [<807c3488>] (tomoyo_realpath_from_path) from [<807bf608>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4417.267808][ T3053] r10:8402d400 r9:00000000 r8:8550b600 r7:80045300 r6:00000004 r5:81cd6544 [ 4417.267831][ T3053] r4:8550b628 r3:826c0200 [ 4417.267870][ T3053] [<807bf53c>] (tomoyo_path_number_perm) from [<807c3ee8>] (tomoyo_file_ioctl+0x1c/0x20) [ 4417.267941][ T3053] r9:00000004 r8:8550b600 r7:00000000 r6:00000000 r5:80045300 r4:8550b600 [ 4417.267961][ T3053] [<807c3ecc>] (tomoyo_file_ioctl) from [<8077073c>] (security_file_ioctl+0x64/0x1e4) [ 4417.268015][ T3053] [<807706d8>] (security_file_ioctl) from [<8056ce24>] (sys_ioctl+0x4c/0xba0) [ 4417.268080][ T3053] r7:00000000 r6:8550b601 r5:00000000 r4:80045300 [ 4417.268097][ T3053] [<8056cdd8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4417.268148][ T3053] Exception stack(0xdfa65fa8 to 0xdfa65ff0) [ 4417.268188][ T3053] 5fa0: 00000000 00000000 00000004 80045300 00000000 00000000 [ 4417.268226][ T3053] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 4417.268258][ T3053] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4417.268296][ T3053] r10:00000036 r9:8402d400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 4417.268317][ T3053] r4:00000000 [ 4417.278910][ T3053] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4419.393948][ T31] kauditd_printk_skb: 252 callbacks suppressed [ 4419.398325][ T31] audit: type=1400 audit(268439875.292:57814): avc: denied { ioctl } for pid=3064 comm="syz.1.8749" path="socket:[98894]" dev="sockfs" ino=98894 ioctlcmd=0xf516 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4419.446310][ T31] audit: type=1400 audit(268439875.342:57815): avc: denied { create } for pid=3063 comm="syz.0.8748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4419.496403][ T31] audit: type=1400 audit(268439875.392:57816): avc: denied { read write } for pid=3063 comm="syz.0.8748" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4419.508035][ T31] audit: type=1400 audit(268439875.402:57817): avc: denied { read write open } for pid=3063 comm="syz.0.8748" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4419.534378][ T31] audit: type=1400 audit(268439875.432:57818): avc: denied { create } for pid=3063 comm="syz.0.8748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4419.550226][ T31] audit: type=1400 audit(268439875.452:57819): avc: denied { read } for pid=3063 comm="syz.0.8748" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4419.554499][ T31] audit: type=1400 audit(268439875.452:57820): avc: denied { read open } for pid=3063 comm="syz.0.8748" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4419.625688][ T31] audit: type=1400 audit(268439875.522:57821): avc: denied { create } for pid=3063 comm="syz.0.8748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4419.647924][ T31] audit: type=1400 audit(268439875.542:57822): avc: denied { write } for pid=3063 comm="syz.0.8748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4419.672847][ T31] audit: type=1400 audit(268439875.572:57823): avc: denied { write } for pid=3063 comm="syz.0.8748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.033568][ T3112] RDS: rds_bind could not find a transport for ::ffff:100.1.1.0, load rds_tcp or rds_rdma? [ 4424.433050][ T31] kauditd_printk_skb: 184 callbacks suppressed [ 4424.440410][ T31] audit: type=1400 audit(268439880.332:58008): avc: denied { read } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.452947][ T31] audit: type=1400 audit(268439880.352:58009): avc: denied { create } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.462733][ T31] audit: type=1400 audit(268439880.362:58010): avc: denied { write } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.468434][ T31] audit: type=1400 audit(268439880.372:58011): avc: denied { write } for pid=3113 comm="syz.1.8759" path="socket:[99846]" dev="sockfs" ino=99846 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.472563][ T31] audit: type=1400 audit(268439880.372:58012): avc: denied { write } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.476035][ T31] audit: type=1400 audit(268439880.372:58013): avc: denied { create } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4424.481696][ T31] audit: type=1400 audit(268439880.382:58014): avc: denied { create } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4424.489744][ T31] audit: type=1400 audit(268439880.392:58015): avc: denied { write } for pid=3113 comm="syz.1.8759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4424.509500][ T31] audit: type=1400 audit(268439880.402:58016): avc: denied { module_request } for pid=3113 comm="syz.1.8759" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4424.580617][ T31] audit: type=1400 audit(268439880.482:58017): avc: denied { write } for pid=3110 comm="syz.0.8758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4430.203660][ T31] kauditd_printk_skb: 242 callbacks suppressed [ 4430.207925][ T31] audit: type=1400 audit(268439886.102:58260): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.208179][ T31] audit: type=1400 audit(268439886.112:58261): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.249225][ T31] audit: type=1400 audit(268439886.132:58262): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.260621][ T31] audit: type=1400 audit(268439886.152:58263): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.260982][ T31] audit: type=1400 audit(268439886.162:58264): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.299108][ T31] audit: type=1400 audit(268439886.192:58265): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.299530][ T31] audit: type=1400 audit(268439886.202:58266): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.332057][ T31] audit: type=1400 audit(268439886.222:58267): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.332494][ T31] audit: type=1400 audit(268439886.232:58268): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4430.430844][ T31] audit: type=1400 audit(268439886.332:58269): avc: denied { read } for pid=3160 comm="syz.1.8775" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4432.976579][ T3186] FAULT_INJECTION: forcing a failure. [ 4432.976579][ T3186] name failslab, interval 1, probability 0, space 0, times 0 [ 4432.980213][ T3186] CPU: 1 UID: 0 PID: 3186 Comm: syz.0.8786 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4432.980360][ T3186] Hardware name: ARM-Versatile Express [ 4432.980386][ T3186] Call trace: [ 4432.980426][ T3186] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4432.980544][ T3186] r7:848ce000 r6:00000000 r5:60000013 r4:8226029c [ 4432.980562][ T3186] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4432.980618][ T3186] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4432.980673][ T3186] r5:848ce000 r4:82917bc0 [ 4432.980688][ T3186] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4432.980743][ T3186] [<80972200>] (should_fail_ex) from [<8051f440>] (should_failslab+0x6c/0x94) [ 4432.980810][ T3186] r8:00000000 r7:848ce000 r6:00000cc0 r5:85bb3708 r4:83002d80 [ 4432.980828][ T3186] [<8051f3d4>] (should_failslab) from [<80503a50>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 4432.980877][ T3186] [<80503a04>] (kmem_cache_alloc_noprof) from [<804dc790>] (__anon_vma_prepare+0xf0/0x1b0) [ 4432.980947][ T3186] r10:dfc1ddb0 r9:9188c700 r8:82ac8318 r7:84afaa40 r6:9188c700 r5:85bb3708 [ 4432.980967][ T3186] r4:00000000 [ 4432.980982][ T3186] [<804dc6a0>] (__anon_vma_prepare) from [<804c3c04>] (__vmf_anon_prepare+0x5c/0xcc) [ 4432.981047][ T3186] r10:dfc1ddb0 r9:9188c700 r8:00000001 r7:00000000 r6:20000000 r5:9188c700 [ 4432.981068][ T3186] r4:dfc1dc88 r3:00000215 [ 4432.981083][ T3186] [<804c3ba8>] (__vmf_anon_prepare) from [<804c772c>] (handle_mm_fault+0xcb8/0x14dc) [ 4432.981143][ T3186] r7:00000000 r6:20000000 r5:848ce000 r4:00000215 [ 4432.981159][ T3186] [<804c6a74>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 4432.981224][ T3186] r10:00000002 r9:84afaa40 r8:00000215 r7:20000000 r6:00000a06 r5:20000740 [ 4432.981243][ T3186] r4:dfc1ddb0 [ 4432.981259][ T3186] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 4432.981321][ T3186] r10:000000c5 r9:848ce000 r8:80234648 r7:dfc1ddb0 r6:20000740 r5:00000a06 [ 4432.981354][ T3186] r4:8281cee0 [ 4432.981371][ T3186] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 4432.981437][ T3186] r9:848ce000 r8:80234648 r7:dfc1ddb0 r6:20000740 r5:00000a06 r4:8281cee0 [ 4432.981453][ T3186] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 4432.981498][ T3186] Exception stack(0xdfc1ddb0 to 0xdfc1ddf8) [ 4432.981534][ T3186] dda0: 20000740 dfc1de48 ffffffc8 00000009 [ 4432.981569][ T3186] ddc0: 00000000 00000000 000186aa 00000000 0000c1ff 00000001 000000c5 dfc1deb4 [ 4432.981602][ T3186] dde0: 00000000 dfc1de04 00000000 81a076a0 a0000013 ffffffff [ 4432.981638][ T3186] r8:0000c1ff r7:dfc1dde4 r6:ffffffff r5:a0000013 r4:81a076a0 [ 4432.981655][ T3186] [<8055b49c>] (cp_new_stat64) from [<8055bbec>] (__do_sys_fstat64+0x78/0x80) [ 4432.981719][ T3186] r7:000000c5 r6:00130270 r5:20000740 r4:00000003 [ 4432.981734][ T3186] [<8055bb74>] (__do_sys_fstat64) from [<8055c0c0>] (sys_fstat64+0x10/0x14) [ 4432.981785][ T3186] r5:00000000 r4:00000000 [ 4432.981801][ T3186] [<8055c0b0>] (sys_fstat64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4432.981847][ T3186] Exception stack(0xdfc1dfa8 to 0xdfc1dff0) [ 4432.981879][ T3186] dfa0: 00000000 00000000 00000003 20000740 00000000 00000000 [ 4432.981913][ T3186] dfc0: 00000000 00000000 00130270 000000c5 002e0000 00000000 00006364 76fc30bc [ 4432.981941][ T3186] dfe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4435.255019][ T31] kauditd_printk_skb: 188 callbacks suppressed [ 4435.255336][ T31] audit: type=1400 audit(268439891.152:58458): avc: denied { create } for pid=3192 comm="syz.0.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4435.273020][ T31] audit: type=1400 audit(268439891.172:58459): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.278361][ T31] audit: type=1400 audit(268439891.172:58460): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.300307][ T31] audit: type=1400 audit(268439891.202:58461): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.307803][ T31] audit: type=1400 audit(268439891.202:58462): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.318224][ T31] audit: type=1400 audit(268439891.222:58463): avc: denied { recv } for pid=1473 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.342234][ T31] audit: type=1400 audit(268439891.242:58464): avc: denied { recv } for pid=1473 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.342420][ T31] audit: type=1400 audit(268439891.242:58465): avc: denied { recv } for pid=1473 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.363038][ T31] audit: type=1400 audit(268439891.262:58466): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4435.367694][ T31] audit: type=1400 audit(268439891.262:58467): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4439.129135][ T3218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=3218 comm=syz.1.8797 [ 4439.138878][ T3218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3218 comm=syz.1.8797 [ 4440.271074][ T31] kauditd_printk_skb: 159 callbacks suppressed [ 4440.271411][ T31] audit: type=1400 audit(268439896.172:58627): avc: denied { read } for pid=3230 comm="syz.1.8802" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4440.275362][ T31] audit: type=1400 audit(268439896.172:58628): avc: denied { read open } for pid=3230 comm="syz.1.8802" path="net:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4440.281021][ T31] audit: type=1400 audit(268439896.182:58629): avc: denied { create } for pid=3230 comm="syz.1.8802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4440.298974][ T31] audit: type=1400 audit(268439896.202:58630): avc: denied { write } for pid=3230 comm="syz.1.8802" path="socket:[99060]" dev="sockfs" ino=99060 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4440.305516][ T31] audit: type=1400 audit(268439896.202:58631): avc: denied { write } for pid=3230 comm="syz.1.8802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4440.341660][ T31] audit: type=1400 audit(268439896.242:58632): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4440.365507][ T31] audit: type=1400 audit(268439896.262:58633): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4440.393833][ T31] audit: type=1400 audit(268439896.292:58634): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4440.397769][ T31] audit: type=1400 audit(268439896.292:58635): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4440.403449][ T31] audit: type=1400 audit(268439896.302:58636): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4440.624971][ T3235] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3235 comm=syz.0.8804 [ 4443.531539][ T3248] FAULT_INJECTION: forcing a failure. [ 4443.531539][ T3248] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4443.531728][ T3248] CPU: 0 UID: 0 PID: 3248 Comm: syz.1.8807 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4443.531800][ T3248] Hardware name: ARM-Versatile Express [ 4443.531813][ T3248] Call trace: [ 4443.531833][ T3248] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4443.531896][ T3248] r7:00006364 r6:00000000 r5:60000013 r4:8226029c [ 4443.531905][ T3248] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4443.531932][ T3248] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4443.531960][ T3248] r5:85e78c00 r4:8294f150 [ 4443.531968][ T3248] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4443.531998][ T3248] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 4443.532030][ T3248] r8:00000000 r7:00006364 r6:76f6a0bc r5:85e79430 r4:76f69bb8 [ 4443.532125][ T3248] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 4443.532219][ T3248] [<80972440>] (should_fail_usercopy) from [<8022b624>] (setup_sigframe+0xe4/0x1c4) [ 4443.532296][ T3248] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 4443.532387][ T3248] r10:00000128 r9:b5403587 r8:00000000 r7:85e79430 r6:76f69bb8 r5:dfde1fb0 [ 4443.532497][ T3248] r4:85e78c00 [ 4443.532576][ T3248] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 4443.532682][ T3248] Exception stack(0xdfde1fb0 to 0xdfde1ff8) [ 4443.532725][ T3248] 1fa0: fffffffc 20000300 00040081 00000000 [ 4443.532750][ T3248] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f6a0bc [ 4443.534006][ T3248] 1fe0: 76f69ec0 76f69eb0 0001948c 001322c0 60000010 00000004 [ 4443.534188][ T3248] r10:00000128 r9:85e78c00 r8:8020029c r7:00000128 r6:00130270 r5:00000000 [ 4443.534231][ T3248] r4:00000000 [ 4445.314069][ T31] kauditd_printk_skb: 175 callbacks suppressed [ 4445.317608][ T31] audit: type=1400 audit(268439901.212:58812): avc: denied { read } for pid=3266 comm="syz.0.8814" name="pcmC3D0p" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4445.317920][ T31] audit: type=1400 audit(268439901.212:58813): avc: denied { read open } for pid=3266 comm="syz.0.8814" path="/dev/snd/pcmC3D0p" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4445.322835][ T31] audit: type=1400 audit(268439901.222:58814): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.327798][ T31] audit: type=1400 audit(268439901.222:58815): avc: denied { ioctl } for pid=3266 comm="syz.0.8814" path="/dev/snd/pcmC3D0p" dev="devtmpfs" ino=749 ioctlcmd=0x4120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4445.371926][ T31] audit: type=1400 audit(268439901.272:58816): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.379313][ T31] audit: type=1400 audit(268439901.282:58817): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.461939][ T31] audit: type=1400 audit(268439901.342:58818): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.462373][ T31] audit: type=1400 audit(268439901.342:58819): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.462722][ T31] audit: type=1400 audit(268439901.352:58820): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.505830][ T31] audit: type=1400 audit(268439901.392:58821): avc: denied { recv } for pid=3269 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4445.604392][ T3270] FAULT_INJECTION: forcing a failure. [ 4445.604392][ T3270] name failslab, interval 1, probability 0, space 0, times 0 [ 4445.604728][ T3270] CPU: 0 UID: 0 PID: 3270 Comm: syz.0.8815 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4445.604851][ T3270] Hardware name: ARM-Versatile Express [ 4445.604880][ T3270] Call trace: [ 4445.604918][ T3270] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4445.605019][ T3270] r7:00000820 r6:00000000 r5:60000013 r4:8226029c [ 4445.605037][ T3270] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4445.605104][ T3270] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4445.605164][ T3270] r5:85e7b000 r4:82917bc0 [ 4445.605182][ T3270] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4445.605239][ T3270] [<80972200>] (should_fail_ex) from [<8051f440>] (should_failslab+0x6c/0x94) [ 4445.605307][ T3270] r8:85e7b000 r7:00000820 r6:854a99d8 r5:00000017 r4:83001240 [ 4445.605324][ T3270] [<8051f3d4>] (should_failslab) from [<80504a88>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 4445.605376][ T3270] [<805049e8>] (__kmalloc_node_track_caller_noprof) from [<8049b788>] (kmemdup_noprof+0x28/0x44) [ 4445.605443][ T3270] r10:00000122 r9:84b5ba04 r8:dfc49cc0 r7:832eb000 r6:854a99d8 r5:dfc49cb8 [ 4445.605463][ T3270] r4:00000017 [ 4445.605576][ T3270] [<8049b760>] (kmemdup_noprof) from [<807a1e30>] (sidtab_sid2str_get+0x54/0xa4) [ 4445.605755][ T3270] r7:832eb000 r6:dfc49cc0 r5:dfc49cb8 r4:84ae70c0 [ 4445.606572][ T3270] [<807a1ddc>] (sidtab_sid2str_get) from [<807a9338>] (sidtab_entry_to_string+0x34/0x94) [ 4445.606770][ T3270] r7:832eb000 r6:84ae70c0 r5:dfc49cb8 r4:0000005f [ 4445.607327][ T3270] [<807a9304>] (sidtab_entry_to_string) from [<807a94b0>] (security_sid_to_context_core+0x118/0x17c) [ 4445.607478][ T3270] r9:dfc49ddc r8:832eb000 r7:84b5ba04 r6:dfc49cc0 r5:dfc49cb8 r4:0000005f [ 4445.607503][ T3270] [<807a9398>] (security_sid_to_context_core) from [<807ac4c4>] (security_sid_to_context+0x1c/0x24) [ 4445.607571][ T3270] r8:8078c5e8 r7:8078d5ec r6:85e7b000 r5:8481c9a0 r4:dfc49d48 [ 4445.607605][ T3270] [<807ac4a8>] (security_sid_to_context) from [<8078d66c>] (avc_audit_post_callback+0x80/0x2f4) [ 4445.607661][ T3270] [<8078d5ec>] (avc_audit_post_callback) from [<807b4a80>] (common_lsm_audit+0x104/0x148) [ 4445.607733][ T3270] r10:00000122 r9:dfc49ddc r8:8078c5e8 r7:8078d5ec r6:dfc49ddc r5:8481c9a0 [ 4445.607754][ T3270] r4:85e7b7f0 [ 4445.607770][ T3270] [<807b497c>] (common_lsm_audit) from [<8078daf8>] (slow_avc_audit+0xbc/0x114) [ 4445.607835][ T3270] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 4445.607926][ T3270] [<8078da3c>] (slow_avc_audit) from [<8078e57c>] (avc_has_perm+0xd8/0xe8) [ 4445.608009][ T3270] r5:00000000 r4:00000004 [ 4445.608032][ T3270] [<8078e4a4>] (avc_has_perm) from [<80794994>] (sock_has_perm+0xd0/0xfc) [ 4445.608103][ T3270] r9:855af6c0 r8:85e7b000 r7:85dfac80 r6:00000004 r5:84b07c00 r4:00000000 [ 4445.608122][ T3270] [<807948c4>] (sock_has_perm) from [<80794a48>] (selinux_socket_sendmsg+0x18/0x1c) [ 4445.608189][ T3270] r8:855af6c1 r7:00000000 r6:0000002e r5:dfc49e98 r4:837ec500 [ 4445.608208][ T3270] [<80794a30>] (selinux_socket_sendmsg) from [<80786fcc>] (security_socket_sendmsg+0x64/0x1e4) [ 4445.608259][ T3270] [<80786f68>] (security_socket_sendmsg) from [<81542600>] (__sock_sendmsg+0x1c/0x78) [ 4445.608330][ T3270] r7:00000000 r6:837ec500 r5:dfc49e98 r4:00000000 [ 4445.608360][ T3270] [<815425e4>] (__sock_sendmsg) from [<81545138>] (__sys_sendto+0x110/0x160) [ 4445.608430][ T3270] r7:00000000 r6:837ec500 r5:00040000 r4:00000000 [ 4445.608448][ T3270] [<81545028>] (__sys_sendto) from [<815451a4>] (sys_sendto+0x1c/0x24) [ 4445.608518][ T3270] r9:85e7b000 r8:8020029c r7:00000122 r6:00130270 r5:ffffffdd r4:00000000 [ 4445.608536][ T3270] [<81545188>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4445.608596][ T3270] Exception stack(0xdfc49fa8 to 0xdfc49ff0) [ 4445.608639][ T3270] 9fa0: 00000000 ffffffdd 00000003 20000000 0000002e 00040000 [ 4445.608679][ T3270] 9fc0: 00000000 ffffffdd 00130270 00000122 002e0000 00000000 00006364 76fc30bc [ 4445.608708][ T3270] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4450.358448][ T31] kauditd_printk_skb: 256 callbacks suppressed [ 4450.358741][ T31] audit: type=1400 audit(268439906.262:59078): avc: denied { ioctl } for pid=3311 comm="syz.0.8832" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x9370 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4450.375989][ T31] audit: type=1400 audit(268439906.272:59079): avc: denied { ioctl } for pid=3311 comm="syz.0.8832" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4450.390773][ T31] audit: type=1400 audit(268439906.292:59080): avc: denied { ioctl } for pid=3311 comm="syz.0.8832" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x5602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4450.396792][ T31] audit: type=1400 audit(268439906.292:59081): avc: denied { ioctl } for pid=3311 comm="syz.0.8832" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x6407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4450.415750][ T31] audit: type=1400 audit(268439906.312:59082): avc: denied { create } for pid=3311 comm="syz.0.8832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4450.429396][ T31] audit: type=1400 audit(268439906.332:59083): avc: denied { create } for pid=3311 comm="syz.0.8832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4450.433355][ T31] audit: type=1400 audit(268439906.332:59084): avc: denied { write } for pid=3311 comm="syz.0.8832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4450.441636][ T31] audit: type=1400 audit(268439906.342:59085): avc: denied { module_request } for pid=3311 comm="syz.0.8832" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4450.720405][ T31] audit: type=1400 audit(268439906.622:59086): avc: denied { read } for pid=3311 comm="syz.0.8832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4450.733314][ T31] audit: type=1400 audit(268439906.622:59087): avc: denied { write } for pid=3311 comm="syz.0.8832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4451.573227][ T3323] FAULT_INJECTION: forcing a failure. [ 4451.573227][ T3323] name failslab, interval 1, probability 0, space 0, times 0 [ 4451.573480][ T3323] CPU: 0 UID: 0 PID: 3323 Comm: syz.0.8836 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4451.573577][ T3323] Hardware name: ARM-Versatile Express [ 4451.573595][ T3323] Call trace: [ 4451.573616][ T3323] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4451.573677][ T3323] r7:8402c800 r6:00000000 r5:60000013 r4:8226029c [ 4451.573686][ T3323] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4451.573713][ T3323] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4451.573742][ T3323] r5:8402c800 r4:82917bc0 [ 4451.573751][ T3323] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4451.573781][ T3323] [<80972200>] (should_fail_ex) from [<8051f440>] (should_failslab+0x6c/0x94) [ 4451.573817][ T3323] r8:00000000 r7:8402c800 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 4451.573825][ T3323] [<8051f3d4>] (should_failslab) from [<805033e4>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 4451.573850][ T3323] [<80503394>] (kmem_cache_alloc_node_noprof) from [<815508b4>] (__alloc_skb+0x138/0x160) [ 4451.573895][ T3323] r10:dfe35d3c r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 4451.574066][ T3323] r4:828060c0 [ 4451.575320][ T3323] [<8155077c>] (__alloc_skb) from [<815589d4>] (alloc_skb_with_frags+0x44/0x1ec) [ 4451.576165][ T3323] r8:802c2044 r7:dfe35cc4 r6:00000000 r5:00001000 r4:00000000 [ 4451.576944][ T3323] [<81558990>] (alloc_skb_with_frags) from [<81549494>] (sock_alloc_send_pskb+0x1f4/0x228) [ 4451.577282][ T3323] r10:dfe35d3c r9:00000000 r8:802c2044 r7:dfe35cc4 r6:8402c800 r5:7fffffff [ 4451.577392][ T3323] r4:855d0000 [ 4451.577498][ T3323] [<815492a0>] (sock_alloc_send_pskb) from [<818ff078>] (isotp_sendmsg+0x2ac/0x820) [ 4451.577615][ T3323] r10:dfe35f20 r9:00000014 r8:dfe35f30 r7:00000014 r6:855d0000 r5:855d2000 [ 4451.577641][ T3323] r4:00000000 [ 4451.577649][ T3323] [<818fedcc>] (isotp_sendmsg) from [<81542628>] (__sock_sendmsg+0x44/0x78) [ 4451.577707][ T3323] r10:00000000 r9:dfe35dc4 r8:dfe35dc4 r7:00000000 r6:837ec280 r5:dfe35f20 [ 4451.577717][ T3323] r4:00000000 [ 4451.577724][ T3323] [<815425e4>] (__sock_sendmsg) from [<8154397c>] (____sys_sendmsg+0x298/0x2cc) [ 4451.577756][ T3323] r7:00000000 r6:837ec280 r5:00000090 r4:dfe35f20 [ 4451.577763][ T3323] [<815436e4>] (____sys_sendmsg) from [<81545944>] (___sys_sendmsg+0x9c/0xd0) [ 4451.577799][ T3323] r10:dfe35e24 r9:20000780 r8:00000090 r7:00000000 r6:837ec280 r5:dfe35f20 [ 4451.577808][ T3323] r4:00000000 [ 4451.577815][ T3323] [<815458a8>] (___sys_sendmsg) from [<81545ddc>] (__sys_sendmsg+0x8c/0xe0) [ 4451.577851][ T3323] r10:00000128 r9:8402c800 r8:8550b180 r7:00000090 r6:20000780 r5:8550b181 [ 4451.577860][ T3323] r4:00000003 [ 4451.577867][ T3323] [<81545d50>] (__sys_sendmsg) from [<81545e44>] (sys_sendmsg+0x14/0x18) [ 4451.577900][ T3323] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 4451.577908][ T3323] [<81545e30>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4451.577935][ T3323] Exception stack(0xdfe35fa8 to 0xdfe35ff0) [ 4451.578073][ T3323] 5fa0: 00000000 00000000 00000003 20000780 00000090 00000000 [ 4451.578092][ T3323] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 4451.578106][ T3323] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4456.146617][ T31] kauditd_printk_skb: 216 callbacks suppressed [ 4456.146952][ T31] audit: type=1400 audit(268439912.042:59302): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.168979][ T31] audit: type=1400 audit(268439912.072:59303): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.192217][ T31] audit: type=1400 audit(268439912.092:59304): avc: denied { recv } for pid=2230 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.196089][ T31] audit: type=1400 audit(268439912.092:59305): avc: denied { recv } for pid=2230 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.225847][ T31] audit: type=1400 audit(268439912.102:59306): avc: denied { recv } for pid=2230 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.226307][ T31] audit: type=1400 audit(268439912.122:59307): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.226525][ T31] audit: type=1400 audit(268439912.122:59308): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.266440][ T31] audit: type=1400 audit(268439912.162:59309): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.269471][ T31] audit: type=1400 audit(268439912.162:59310): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4456.305817][ T31] audit: type=1400 audit(268439912.202:59311): avc: denied { create } for pid=3359 comm="syz.0.8848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4461.178527][ T3377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=3377 comm=syz.1.8854 [ 4461.231340][ T31] kauditd_printk_skb: 125 callbacks suppressed [ 4461.238017][ T31] audit: type=1400 audit(268439917.132:59437): avc: denied { write } for pid=3376 comm="syz.1.8854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4461.322902][ T31] audit: type=1400 audit(268439917.222:59438): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.324684][ T31] audit: type=1400 audit(268439917.222:59439): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.367736][ T31] audit: type=1400 audit(268439917.252:59440): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.368057][ T31] audit: type=1400 audit(268439917.262:59441): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.368394][ T31] audit: type=1400 audit(268439917.262:59442): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.420188][ T31] audit: type=1400 audit(268439917.312:59443): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.420669][ T31] audit: type=1400 audit(268439917.322:59444): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.462831][ T31] audit: type=1400 audit(268439917.352:59445): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4461.463248][ T31] audit: type=1400 audit(268439917.362:59446): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4462.082571][ T3380] FAULT_INJECTION: forcing a failure. [ 4462.082571][ T3380] name failslab, interval 1, probability 0, space 0, times 0 [ 4462.107629][ T3380] CPU: 1 UID: 0 PID: 3380 Comm: syz.1.8855 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4462.107773][ T3380] Hardware name: ARM-Versatile Express [ 4462.107875][ T3380] Call trace: [ 4462.107918][ T3380] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4462.108080][ T3380] r7:8402c800 r6:00000000 r5:60000013 r4:8226029c [ 4462.108099][ T3380] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4462.108149][ T3380] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4462.108202][ T3380] r5:8402c800 r4:82917bc0 [ 4462.108215][ T3380] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4462.108271][ T3380] [<80972200>] (should_fail_ex) from [<8051f440>] (should_failslab+0x6c/0x94) [ 4462.108339][ T3380] r8:00000000 r7:8402c800 r6:00000cc0 r5:20000180 r4:830a2a80 [ 4462.108362][ T3380] [<8051f3d4>] (should_failslab) from [<80503a50>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 4462.108415][ T3380] [<80503a04>] (kmem_cache_alloc_noprof) from [<80562cc4>] (getname_flags.part.0+0x28/0x18c) [ 4462.108483][ T3380] r10:000000e9 r9:8402c800 r8:00000000 r7:00000000 r6:82465858 r5:20000180 [ 4462.108502][ T3380] r4:20000180 [ 4462.108518][ T3380] [<80562c9c>] (getname_flags.part.0) from [<80567c60>] (getname_flags+0x3c/0x50) [ 4462.108592][ T3380] r9:8402c800 r8:00000000 r7:ffffff9c r6:00130270 r5:00000000 r4:20000180 [ 4462.108615][ T3380] [<80567c24>] (getname_flags) from [<8058adfc>] (path_listxattrat+0x13c/0x168) [ 4462.108674][ T3380] r5:8402c800 r4:00000100 [ 4462.108690][ T3380] [<8058acc0>] (path_listxattrat) from [<8058cad4>] (sys_llistxattr+0x28/0x30) [ 4462.108757][ T3380] r9:8402c800 r8:8020029c r7:000000e9 r6:00130270 r5:00000000 r4:00000000 [ 4462.108776][ T3380] [<8058caac>] (sys_llistxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4462.108824][ T3380] Exception stack(0xdfe51fa8 to 0xdfe51ff0) [ 4462.108863][ T3380] 1fa0: 00000000 00000000 20000180 00000000 00000000 00000000 [ 4462.108897][ T3380] 1fc0: 00000000 00000000 00130270 000000e9 002e0000 00000000 00006364 76f8b0bc [ 4462.108927][ T3380] 1fe0: 76f8aec0 76f8aeb0 0001948c 001322c0 [ 4466.155669][ T3406] FAULT_INJECTION: forcing a failure. [ 4466.155669][ T3406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4466.156082][ T3406] CPU: 0 UID: 0 PID: 3406 Comm: syz.0.8865 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4466.156179][ T3406] Hardware name: ARM-Versatile Express [ 4466.156202][ T3406] Call trace: [ 4466.156314][ T3406] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4466.156439][ T3406] r7:df9d9e20 r6:00000000 r5:60000013 r4:8226029c [ 4466.156457][ T3406] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4466.156507][ T3406] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4466.156561][ T3406] r5:85e7c800 r4:8294f150 [ 4466.156577][ T3406] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4466.157021][ T3406] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 4466.157348][ T3406] r8:20008040 r7:df9d9e20 r6:20000880 r5:00000000 r4:df9d9f20 [ 4466.157435][ T3406] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 4466.157499][ T3406] [<80972440>] (should_fail_usercopy) from [<815457c8>] (copy_msghdr_from_user+0x50/0x130) [ 4466.157626][ T3406] [<81545778>] (copy_msghdr_from_user) from [<81545920>] (___sys_sendmsg+0x78/0xd0) [ 4466.157768][ T3406] r8:20008040 r7:00000000 r6:83798c80 r5:df9d9f20 r4:df9d9e64 [ 4466.157791][ T3406] [<815458a8>] (___sys_sendmsg) from [<81545ddc>] (__sys_sendmsg+0x8c/0xe0) [ 4466.157906][ T3406] r10:00000128 r9:85e7c800 r8:8550b240 r7:20008040 r6:20000880 r5:8550b240 [ 4466.157927][ T3406] r4:00000003 [ 4466.157945][ T3406] [<81545d50>] (__sys_sendmsg) from [<81545e44>] (sys_sendmsg+0x14/0x18) [ 4466.158052][ T3406] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 4466.158073][ T3406] [<81545e30>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4466.158216][ T3406] Exception stack(0xdf9d9fa8 to 0xdf9d9ff0) [ 4466.158274][ T3406] 9fa0: 00000000 00000000 00000003 20000880 20008040 00000000 [ 4466.158314][ T3406] 9fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 4466.158343][ T3406] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4466.263692][ T31] kauditd_printk_skb: 142 callbacks suppressed [ 4466.264018][ T31] audit: type=1400 audit(268439922.152:59589): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.288401][ T31] audit: type=1400 audit(268439922.182:59590): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.290203][ T31] audit: type=1400 audit(268439922.182:59591): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.298534][ T31] audit: type=1400 audit(268439922.192:59592): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.311666][ T31] audit: type=1400 audit(268439922.212:59593): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.325247][ T31] audit: type=1400 audit(268439922.222:59594): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.348386][ T31] audit: type=1400 audit(268439922.252:59595): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.352468][ T31] audit: type=1400 audit(268439922.252:59596): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4466.465178][ T31] audit: type=1400 audit(268439922.362:59597): avc: denied { read } for pid=3408 comm="syz.0.8866" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4466.472841][ T31] audit: type=1400 audit(268439922.372:59598): avc: denied { read open } for pid=3408 comm="syz.0.8866" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4471.274775][ T31] kauditd_printk_skb: 229 callbacks suppressed [ 4471.275026][ T31] audit: type=1400 audit(268439927.172:59828): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4471.281879][ T31] audit: type=1400 audit(268439927.182:59829): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4471.334007][ T31] audit: type=1400 audit(268439927.232:59830): avc: denied { read append } for pid=3447 comm="syz.1.8880" name="dsp1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4471.339390][ T31] audit: type=1400 audit(268439927.242:59831): avc: denied { read open } for pid=3447 comm="syz.1.8880" path="/dev/dsp1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4471.423670][ T31] audit: type=1400 audit(268439927.322:59832): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4471.424044][ T31] audit: type=1400 audit(268439927.322:59833): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4471.439246][ T31] audit: type=1400 audit(268439927.342:59834): avc: denied { read } for pid=3442 comm="syz.0.8878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4471.458769][ T31] audit: type=1400 audit(268439927.352:59835): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4471.459124][ T31] audit: type=1400 audit(268439927.352:59836): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4471.459343][ T31] audit: type=1400 audit(268439927.352:59837): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4473.799924][ T3461] FAULT_INJECTION: forcing a failure. [ 4473.799924][ T3461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4473.800278][ T3461] CPU: 0 UID: 0 PID: 3461 Comm: syz.0.8885 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4473.800391][ T3461] Hardware name: ARM-Versatile Express [ 4473.800419][ T3461] Call trace: [ 4473.800462][ T3461] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4473.800595][ T3461] r7:00000000 r6:00000000 r5:60000013 r4:8226029c [ 4473.800621][ T3461] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4473.800679][ T3461] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4473.800839][ T3461] r5:84028000 r4:8294f150 [ 4473.800873][ T3461] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 4473.801042][ T3461] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 4473.801175][ T3461] r8:76fc2f30 r7:00000000 r6:00000000 r5:dfa35f68 r4:00000002 [ 4473.801217][ T3461] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 4473.801498][ T3461] [<80972440>] (should_fail_usercopy) from [<8058e790>] (simple_read_from_buffer+0x80/0x13c) [ 4473.801571][ T3461] [<8058e710>] (simple_read_from_buffer) from [<806086b4>] (proc_fail_nth_read+0xb8/0x108) [ 4473.801655][ T3461] r10:00000001 r9:806085fc r8:00000002 r7:dfa35f68 r6:0000000f r5:76fc2f30 [ 4473.801702][ T3461] r4:84028000 r3:dfa35e9f [ 4473.801723][ T3461] [<806085fc>] (proc_fail_nth_read) from [<805535ac>] (vfs_read+0x98/0x324) [ 4473.801825][ T3461] r8:76fc2f30 r7:dfa35f68 r6:84028000 r5:0000000f r4:8550be40 [ 4473.802627][ T3461] [<80553514>] (vfs_read) from [<805542bc>] (ksys_read+0x74/0xe8) [ 4473.802714][ T3461] r10:00000003 r9:84028000 r8:8020029c r7:00000000 r6:00000000 r5:8550be40 [ 4473.802828][ T3461] r4:8550be43 [ 4473.803091][ T3461] [<80554248>] (ksys_read) from [<80554340>] (sys_read+0x10/0x14) [ 4473.803242][ T3461] r7:00000003 r6:00000004 r5:76fc2f30 r4:0000000f [ 4473.803299][ T3461] [<80554330>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4473.803459][ T3461] Exception stack(0xdfa35fa8 to 0xdfa35ff0) [ 4473.803541][ T3461] 5fa0: 0000000f 76fc2f30 00000004 76fc2f30 0000000f 00000000 [ 4473.803602][ T3461] 5fc0: 0000000f 76fc2f30 00000004 00000003 002e0000 00000000 00006364 76fc30bc [ 4473.804011][ T3461] 5fe0: 00000158 76fc2ed0 000d80f4 00130194 [ 4476.138897][T26440] usb 2-1: new high-speed USB device number 112 using dummy_hcd [ 4476.308116][T26440] usb 2-1: Using ep0 maxpacket: 8 [ 4476.315032][ T31] kauditd_printk_skb: 235 callbacks suppressed [ 4476.315376][ T31] audit: type=1400 audit(268439932.212:60073): avc: denied { ioctl } for pid=3479 comm="syz.1.8893" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4476.338680][ T31] audit: type=1400 audit(268439932.232:60074): avc: denied { ioctl } for pid=3479 comm="syz.1.8893" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4476.383354][ T31] audit: type=1400 audit(268439932.282:60075): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4476.409894][ T31] audit: type=1400 audit(268439932.312:60076): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4476.410444][ T31] audit: type=1400 audit(268439932.312:60077): avc: denied { ioctl } for pid=3479 comm="syz.1.8893" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4476.427904][ T31] audit: type=1400 audit(268439932.322:60078): avc: denied { ioctl } for pid=3479 comm="syz.1.8893" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4476.432735][ T31] audit: type=1400 audit(268439932.332:60079): avc: denied { recv } for pid=2842 comm="pr/ttyAMA-1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4476.445012][ T31] audit: type=1400 audit(268439932.332:60080): avc: denied { recv } for pid=2842 comm="pr/ttyAMA-1" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4476.445248][ T31] audit: type=1400 audit(268439932.342:60081): avc: denied { recv } for pid=2842 comm="pr/ttyAMA-1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4476.467855][ T31] audit: type=1400 audit(268439932.352:60082): avc: denied { ioctl } for pid=3479 comm="syz.1.8893" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4476.590099][T26440] usb 2-1: New USB device found, idVendor=1660, idProduct=0932, bcdDevice=80.ea [ 4476.591330][T26440] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4476.592242][T26440] usb 2-1: Product: syz [ 4476.592886][T26440] usb 2-1: Manufacturer: syz [ 4476.593546][T26440] usb 2-1: SerialNumber: syz [ 4476.608870][T26440] usb 2-1: config 0 descriptor?? [ 4477.818258][T29664] usb 1-1: new high-speed USB device number 104 using dummy_hcd [ 4477.997866][T29664] usb 1-1: Using ep0 maxpacket: 16 [ 4478.108291][T29664] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4478.108485][T29664] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 4478.108631][T29664] usb 1-1: New USB device found, idVendor=04d8, idProduct=f002, bcdDevice= 0.00 [ 4478.108663][T29664] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4478.120109][T29664] usb 1-1: config 0 descriptor?? [ 4478.881518][T29664] hid-picolcd 0003:04D8:F002.000B: No report with id 0xf3 found [ 4478.882294][T29664] hid-picolcd 0003:04D8:F002.000B: No report with id 0xf4 found [ 4479.079772][T12156] usb 1-1: USB disconnect, device number 104 [ 4481.392893][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 4481.419304][ T31] audit: type=1400 audit(268439937.292:60201): avc: denied { write } for pid=3492 comm="syz.0.8899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4481.501132][ T31] audit: type=1400 audit(268439937.402:60202): avc: denied { sys_module } for pid=3492 comm="syz.0.8899" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4481.524357][ T31] audit: type=1400 audit(268439937.422:60203): avc: denied { module_request } for pid=3492 comm="syz.0.8899" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4482.278272][ T31] audit: type=1400 audit(268439938.172:60204): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4482.287971][ T31] audit: type=1400 audit(268439938.172:60205): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4482.318722][ T31] audit: type=1400 audit(268439938.202:60206): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4482.319146][ T31] audit: type=1400 audit(268439938.202:60207): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4482.319429][ T31] audit: type=1400 audit(268439938.212:60208): avc: denied { recv } for pid=1473 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4482.338815][ T31] audit: type=1400 audit(268439938.232:60209): avc: denied { recv } for pid=3479 comm="syz.1.8893" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4482.365755][ T31] audit: type=1400 audit(268439938.242:60210): avc: denied { recv } for pid=3479 comm="syz.1.8893" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4483.412010][ T3507] netlink: 'syz.0.8902': attribute type 21 has an invalid length. [ 4484.642192][ T3511] input: syz1 as /devices/virtual/input/input27 [ 4487.064056][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 4487.064332][ T31] audit: type=1400 audit(268439942.962:60286): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.064596][ T31] audit: type=1400 audit(268439942.962:60287): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.078777][ T31] audit: type=1400 audit(268439942.982:60288): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.110904][ T31] audit: type=1400 audit(268439943.002:60289): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.111275][ T31] audit: type=1400 audit(268439943.012:60290): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.144715][ T31] audit: type=1400 audit(268439943.042:60291): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.144943][ T31] audit: type=1400 audit(268439943.042:60292): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.205075][ T31] audit: type=1400 audit(268439943.102:60293): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.205403][ T31] audit: type=1400 audit(268439943.102:60294): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4487.352568][ T31] audit: type=1400 audit(268439943.252:60295): avc: denied { read write } for pid=3512 comm="syz.0.8905" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4492.868352][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 4492.868716][ T31] audit: type=1400 audit(268439948.762:60339): avc: denied { recv } for pid=3521 comm="syz.0.8908" saddr=172.20.20.170 src=20003 daddr=172.20.20.170 dest=20003 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4492.881504][ T31] audit: type=1400 audit(268439948.782:60340): avc: denied { recv } for pid=3521 comm="syz.0.8908" saddr=172.20.20.170 src=20003 daddr=172.20.20.170 dest=20003 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.203075][ T2621] usb 2-1: USB disconnect, device number 112 [ 4495.247687][ T31] audit: type=1400 audit(268439951.132:60341): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.249738][ T31] audit: type=1400 audit(268439951.132:60342): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.262872][ T31] audit: type=1400 audit(268439951.162:60343): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.282230][ T31] audit: type=1400 audit(268439951.182:60344): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.293498][ T31] audit: type=1400 audit(268439951.182:60345): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.314134][ T31] audit: type=1400 audit(268439951.212:60346): avc: denied { recv } for pid=3521 comm="syz.0.8908" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.314447][ T31] audit: type=1400 audit(268439951.212:60347): avc: denied { recv } for pid=3521 comm="syz.0.8908" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.328106][ T31] audit: type=1400 audit(268439951.222:60348): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4495.891483][ T3532] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8910'. [ 4497.328917][T12217] usb 1-1: new high-speed USB device number 105 using dummy_hcd [ 4497.511787][T12217] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 4497.512130][T12217] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 4497.512282][T12217] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4497.530045][T12217] usb 1-1: config 0 descriptor?? [ 4497.880143][ T31] kauditd_printk_skb: 80 callbacks suppressed [ 4497.883292][ T31] audit: type=1400 audit(268439953.782:60429): avc: denied { recv } for pid=3543 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4497.888721][ T31] audit: type=1400 audit(268439953.782:60430): avc: denied { recv } for pid=3543 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4497.891198][ T31] audit: type=1400 audit(268439953.792:60431): avc: denied { recv } for pid=3543 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4497.918108][ T31] audit: type=1400 audit(268439953.812:60432): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4497.918465][ T31] audit: type=1400 audit(268439953.812:60433): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4497.953435][ T31] audit: type=1400 audit(268439953.852:60434): avc: denied { prog_load } for pid=3543 comm="syz.1.8915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4497.957930][ T31] audit: type=1400 audit(268439953.852:60435): avc: denied { bpf } for pid=3543 comm="syz.1.8915" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4497.962814][ T31] audit: type=1400 audit(268439953.862:60436): avc: denied { perfmon } for pid=3543 comm="syz.1.8915" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4497.967736][ T31] audit: type=1400 audit(268439953.862:60437): avc: denied { perfmon } for pid=3543 comm="syz.1.8915" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4497.971309][ T31] audit: type=1400 audit(268439953.872:60438): avc: denied { perfmon } for pid=3543 comm="syz.1.8915" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4502.938072][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 4502.938711][ T31] audit: type=1400 audit(268439958.832:60497): avc: denied { prog_load } for pid=3556 comm="syz.1.8920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4502.942352][ T31] audit: type=1400 audit(268439958.842:60498): avc: denied { bpf } for pid=3556 comm="syz.1.8920" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4502.956194][ T31] audit: type=1400 audit(268439958.852:60499): avc: denied { execmem } for pid=3556 comm="syz.1.8920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4504.779714][ T31] audit: type=1400 audit(268439960.682:60500): avc: denied { ioctl } for pid=3538 comm="syz.0.8913" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4505.503466][ T31] audit: type=1400 audit(268439961.402:60501): avc: denied { create } for pid=3556 comm="syz.1.8920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4505.506548][ T31] audit: type=1400 audit(268439961.402:60502): avc: denied { setopt } for pid=3556 comm="syz.1.8920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4507.752366][T12217] usb 1-1: USB disconnect, device number 105 [ 4507.786806][ T31] audit: type=1400 audit(268439963.682:60503): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4507.787862][ T31] audit: type=1400 audit(268439963.682:60504): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4507.805041][ T31] audit: type=1400 audit(268439963.702:60505): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4507.805462][ T31] audit: type=1400 audit(268439963.702:60506): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4507.970356][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 4507.971364][ T31] audit: type=1400 audit(268439963.872:60511): avc: denied { create } for pid=3561 comm="syz.0.8921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4507.988970][ T31] audit: type=1400 audit(268439963.882:60512): avc: denied { setopt } for pid=3561 comm="syz.0.8921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4507.999174][ T31] audit: type=1400 audit(268439963.892:60513): avc: denied { ioctl } for pid=3561 comm="syz.0.8921" path="socket:[100666]" dev="sockfs" ino=100666 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4508.013328][ T31] audit: type=1400 audit(268439963.912:60514): avc: denied { write } for pid=3561 comm="syz.0.8921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4508.058159][ T31] audit: type=1400 audit(268439963.952:60515): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4508.062105][ T31] audit: type=1400 audit(268439963.962:60516): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4508.077632][ T31] audit: type=1400 audit(268439963.972:60517): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4508.122927][ T31] audit: type=1400 audit(268439964.022:60518): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4508.123470][ T31] audit: type=1400 audit(268439964.022:60519): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4508.144613][ T31] audit: type=1400 audit(268439964.042:60520): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4512.978350][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 4512.979572][ T31] audit: type=1400 audit(268439968.872:60588): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4512.988418][ T31] audit: type=1400 audit(268439968.882:60589): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4512.990422][ T31] audit: type=1400 audit(268439968.882:60590): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4513.002142][ T31] audit: type=1400 audit(268439968.902:60591): avc: denied { recv } for pid=3565 comm="syz.0.8923" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4513.004605][ T31] audit: type=1400 audit(268439968.902:60592): avc: denied { recv } for pid=3565 comm="syz.0.8923" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4513.037693][ T31] audit: type=1400 audit(268439968.922:60593): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4513.038085][ T31] audit: type=1400 audit(268439968.932:60594): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4513.371713][ T31] audit: type=1400 audit(268439969.272:60595): avc: denied { read } for pid=3573 comm="syz.1.8926" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4513.397616][ T31] audit: type=1400 audit(268439969.282:60596): avc: denied { read open } for pid=3573 comm="syz.1.8926" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4513.510883][ T31] audit: type=1400 audit(268439969.412:60597): avc: denied { ioctl } for pid=3573 comm="syz.1.8926" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4515.308633][ T2846] usb 2-1: new high-speed USB device number 113 using dummy_hcd [ 4515.578926][ T2846] usb 2-1: Using ep0 maxpacket: 16 [ 4515.734407][ T2846] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 4515.757857][ T2846] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 4515.977433][ T2846] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 4515.977678][ T2846] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4515.977887][ T2846] usb 2-1: Product: syz [ 4515.978053][ T2846] usb 2-1: Manufacturer: syz [ 4515.978188][ T2846] usb 2-1: SerialNumber: syz [ 4516.005306][ T2846] usb 2-1: config 0 descriptor?? [ 4519.909116][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 4519.910907][ T31] audit: type=1400 audit(268439975.812:60652): avc: denied { ioctl } for pid=3578 comm="syz.1.8928" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4522.053250][ T31] audit: type=1400 audit(268439977.952:60653): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.055694][ T31] audit: type=1400 audit(268439977.952:60654): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.069631][ T31] audit: type=1400 audit(268439977.972:60655): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.088276][ T31] audit: type=1400 audit(268439977.982:60656): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.088634][ T31] audit: type=1400 audit(268439977.982:60657): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.115503][ T31] audit: type=1400 audit(268439978.012:60658): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.115895][ T31] audit: type=1400 audit(268439978.012:60659): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.137206][ T31] audit: type=1400 audit(268439978.032:60660): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4522.137429][ T31] audit: type=1400 audit(268439978.032:60661): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4523.787877][T12156] usb 1-1: new high-speed USB device number 106 using dummy_hcd [ 4523.947739][T12156] usb 1-1: Using ep0 maxpacket: 8 [ 4523.985598][T12156] usb 1-1: config 0 has an invalid interface number: 11 but max is 0 [ 4523.985903][T12156] usb 1-1: config 0 has no interface number 0 [ 4524.061804][T12156] usb 1-1: New USB device found, idVendor=046d, idProduct=0920, bcdDevice=c1.7f [ 4524.062939][T12156] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4524.063988][T12156] usb 1-1: Product: syz [ 4524.064735][T12156] usb 1-1: Manufacturer: syz [ 4524.065498][T12156] usb 1-1: SerialNumber: syz [ 4524.079054][T12156] usb 1-1: config 0 descriptor?? [ 4524.459022][T12156] usb 1-1: USB disconnect, device number 106 [ 4525.613628][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 4525.613903][ T31] audit: type=1400 audit(268439981.512:60745): avc: denied { create } for pid=3591 comm="syz.0.8933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4525.802747][ T31] audit: type=1400 audit(268439981.702:60746): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.803358][ T31] audit: type=1400 audit(268439981.702:60747): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.835934][ T31] audit: type=1400 audit(268439981.732:60748): avc: denied { recv } for pid=2230 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.857808][ T31] audit: type=1400 audit(268439981.752:60749): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.860727][ T31] audit: type=1400 audit(268439981.762:60750): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.883939][ T31] audit: type=1400 audit(268439981.772:60751): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.885128][ T31] audit: type=1400 audit(268439981.782:60752): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.890512][ T31] audit: type=1400 audit(268439981.792:60753): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4525.894366][ T31] audit: type=1400 audit(268439981.792:60754): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4526.424176][ T3491] usb 2-1: USB disconnect, device number 113 [ 4526.687743][T12156] usb 1-1: new high-speed USB device number 107 using dummy_hcd [ 4526.895542][T12156] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4526.895800][T12156] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4526.896063][T12156] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 4526.896189][T12156] usb 1-1: New USB device found, idVendor=20d6, idProduct=cb17, bcdDevice= 0.00 [ 4526.896231][T12156] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4526.929201][T12156] usb 1-1: config 0 descriptor?? [ 4526.991545][ T3596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3596 comm=syz.1.8935 [ 4527.007833][ T3596] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8935'. [ 4527.508780][T12156] hid_parser_main: 5 callbacks suppressed [ 4527.509077][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.509412][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.509549][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.509672][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.509769][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.509861][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.509983][T12156] hid-udraw 0003:20D6:CB17.000C: unknown main item tag 0x0 [ 4527.512529][T12156] input: THQ uDraw Game Tablet for PS3 Joypad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:20D6:CB17.000C/input/input28 [ 4527.549867][T12156] input: THQ uDraw Game Tablet for PS3 Touchpad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:20D6:CB17.000C/input/input29 [ 4527.561578][T12156] input: THQ uDraw Game Tablet for PS3 Pen as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:20D6:CB17.000C/input/input30 [ 4527.564567][T12156] input: THQ uDraw Game Tablet for PS3 Accelerometer as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:20D6:CB17.000C/input/input31 [ 4527.593849][T12156] hid-udraw 0003:20D6:CB17.000C: hidraw0: USB HID v0.00 Device [HID 20d6:cb17] on usb-dummy_hcd.0-1/input0 [ 4528.308983][ T2621] usb 1-1: USB disconnect, device number 107 [ 4530.208967][ T2621] usb 2-1: new high-speed USB device number 114 using dummy_hcd [ 4530.377717][ T2621] usb 2-1: Using ep0 maxpacket: 16 [ 4530.424400][ T2621] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4530.424675][ T2621] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 4530.424980][ T2621] usb 2-1: New USB device found, idVendor=057e, idProduct=2019, bcdDevice= 0.00 [ 4530.425104][ T2621] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4530.452691][ T2621] usb 2-1: config 0 descriptor?? [ 4530.815105][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 4530.815961][ T31] audit: type=1400 audit(268439986.712:60886): avc: denied { ioctl } for pid=3612 comm="syz.1.8940" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.854884][ T31] audit: type=1400 audit(268439986.752:60887): avc: denied { ioctl } for pid=3612 comm="syz.1.8940" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.902209][ T31] audit: type=1400 audit(268439986.802:60888): avc: denied { read append } for pid=3610 comm="syz.0.8939" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.932835][ T31] audit: type=1400 audit(268439986.832:60889): avc: denied { read open } for pid=3610 comm="syz.0.8939" path="/dev/comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.966463][ T31] audit: type=1400 audit(268439986.862:60890): avc: denied { ioctl } for pid=3610 comm="syz.0.8939" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4531.001763][ T31] audit: type=1400 audit(268439986.902:60891): avc: denied { ioctl } for pid=3610 comm="syz.0.8939" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4531.013098][ T3615] comedi: valid board names for 8255 driver are: [ 4531.020256][ T3615] 8255 [ 4531.021195][ T3615] comedi: valid board names for vmk80xx driver are: [ 4531.021507][ T3615] vmk80xx [ 4531.021838][ T3615] comedi: valid board names for usbduxsigma driver are: [ 4531.022127][ T3615] usbduxsigma [ 4531.022444][ T3615] comedi: valid board names for usbduxfast driver are: [ 4531.022753][ T3615] usbduxfast [ 4531.023039][ T3615] comedi: valid board names for usbdux driver are: [ 4531.023380][ T3615] usbdux [ 4531.023734][ T3615] comedi: valid board names for ni6501 driver are: [ 4531.024076][ T3615] ni6501 [ 4531.024432][ T3615] comedi: valid board names for dt9812 driver are: [ 4531.024743][ T3615] dt9812 [ 4531.025046][ T3615] comedi: valid board names for ni_labpc_cs driver are: [ 4531.025336][ T3615] ni_labpc_cs [ 4531.025690][ T3615] comedi: valid board names for ni_daq_700 driver are: [ 4531.026172][ T3615] ni_daq_700 [ 4531.026440][ T3615] comedi: valid board names for labpc_pci driver are: [ 4531.026806][ T3615] labpc_pci [ 4531.059096][ T3615] comedi: valid board names for adl_pci9118 driver are: [ 4531.059496][ T3615] pci9118dg [ 4531.059770][ T3615] pci9118hg [ 4531.059798][ T3615] pci9118hr [ 4531.059817][ T3615] comedi: valid board names for 8255_pci driver are: [ 4531.060349][ T3615] 8255_pci [ 4531.060746][ T3615] comedi: valid board names for comedi_parport driver are: [ 4531.060798][ T3615] comedi_parport [ 4531.061641][ T3615] comedi: valid board names for comedi_test driver are: [ 4531.062107][ T3615] comedi_test [ 4531.062130][ T3615] comedi: valid board names for comedi_bond driver are: [ 4531.062139][ T3615] comedi_bond [ 4531.148574][ T31] audit: type=1400 audit(268439987.002:60892): avc: denied { ioctl } for pid=3612 comm="syz.1.8940" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4531.230264][ T31] audit: type=1400 audit(268439987.132:60894): avc: denied { ioctl } for pid=3612 comm="syz.1.8940" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4531.257872][ T31] audit: type=1400 audit(268439987.122:60893): avc: denied { read } for pid=3610 comm="syz.0.8939" dev="nsfs" ino=4026532643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4531.258253][ T31] audit: type=1400 audit(268439987.152:60895): avc: denied { read open } for pid=3610 comm="syz.0.8939" path="net:[4026532643]" dev="nsfs" ino=4026532643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4531.282877][ T2621] nintendo 0003:057E:2019.000D: hidraw0: USB HID v80.05 Device [HID 057e:2019] on usb-dummy_hcd.1-1/input0 [ 4534.681417][ T3623] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8942'. [ 4534.960819][ C1] usb 2-1: input irq status -75 received [ 4536.227488][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 4536.227903][ T31] audit: type=1400 audit(268439992.122:60938): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.233992][ T31] audit: type=1400 audit(268439992.132:60939): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.291272][ T31] audit: type=1400 audit(268439992.182:60940): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.294586][ T31] audit: type=1400 audit(268439992.192:60941): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.368854][ T31] audit: type=1400 audit(268439992.262:60942): avc: denied { recv } for pid=2230 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.371070][ T31] audit: type=1400 audit(268439992.272:60943): avc: denied { recv } for pid=2230 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.458565][ T31] audit: type=1400 audit(268439992.352:60944): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.459310][ T31] audit: type=1400 audit(268439992.352:60945): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.544268][ T31] audit: type=1400 audit(268439992.442:60946): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4536.555833][ T31] audit: type=1400 audit(268439992.452:60947): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4541.451798][ T2621] nintendo 0003:057E:2019.000D: Failed to get joycon info; ret=-110 [ 4541.452664][ T2621] nintendo 0003:057E:2019.000D: Failed to retrieve controller info; ret=-110 [ 4541.453721][ T2621] nintendo 0003:057E:2019.000D: Failed to initialize controller; ret=-110 [ 4541.470156][ T2621] nintendo 0003:057E:2019.000D: probe - fail = -110 [ 4541.470645][ T2621] nintendo 0003:057E:2019.000D: probe with driver nintendo failed with error -110 [ 4543.410398][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 4543.410620][ T31] audit: type=1400 audit(268439999.312:60987): avc: denied { read write } for pid=3640 comm="syz.0.8947" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4543.418550][ T31] audit: type=1400 audit(268439999.322:60988): avc: denied { read write open } for pid=3640 comm="syz.0.8947" path="/dev/vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4543.428312][ T31] audit: type=1400 audit(268439999.332:60989): avc: denied { ioctl } for pid=3640 comm="syz.0.8947" path="/dev/vhost-net" dev="devtmpfs" ino=708 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4543.455994][ T31] audit: type=1400 audit(268439999.352:60990): avc: denied { ioctl } for pid=3640 comm="syz.0.8947" path="/dev/vhost-net" dev="devtmpfs" ino=708 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4544.784190][ T3491] usb 2-1: USB disconnect, device number 114 [ 4544.819889][ T31] audit: type=1400 audit(268440000.712:60991): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4544.820112][ T31] audit: type=1400 audit(268440000.712:60992): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4544.820297][ T31] audit: type=1400 audit(268440000.722:60993): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4544.820341][ T31] audit: type=1400 audit(268440000.722:60994): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4544.840778][ T31] audit: type=1400 audit(268440000.722:60995): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4544.841000][ T31] audit: type=1400 audit(268440000.732:60996): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4548.421204][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 4548.421617][ T31] audit: type=1400 audit(268440004.322:61075): avc: denied { read } for pid=3657 comm="syz.1.8953" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4548.454679][ T31] audit: type=1400 audit(268440004.352:61076): avc: denied { ioctl } for pid=3657 comm="syz.1.8953" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4548.469916][ T31] audit: type=1400 audit(268440004.372:61077): avc: denied { set_context_mgr } for pid=3657 comm="syz.1.8953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4548.494343][ T31] audit: type=1400 audit(268440004.392:61078): avc: denied { ioctl } for pid=3657 comm="syz.1.8953" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4548.519529][ T31] audit: type=1400 audit(268440004.422:61079): avc: denied { ioctl } for pid=3657 comm="syz.1.8953" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4548.526652][ T31] audit: type=1400 audit(268440004.422:61080): avc: denied { call } for pid=3657 comm="syz.1.8953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4548.609074][ T31] audit: type=1400 audit(268440004.492:61081): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4548.609551][ T31] audit: type=1400 audit(268440004.502:61082): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4548.623518][ T31] audit: type=1400 audit(268440004.522:61083): avc: denied { recv } for pid=3640 comm="syz.0.8947" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4548.652484][ T31] audit: type=1400 audit(268440004.542:61084): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4549.684461][ T3662] netlink: 64 bytes leftover after parsing attributes in process `syz.1.8955'. [ 4553.442112][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 4553.442371][ T31] audit: type=1400 audit(268440009.342:61149): avc: denied { write } for pid=3663 comm="syz.1.8956" path="socket:[100797]" dev="sockfs" ino=100797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.462246][ T31] audit: type=1400 audit(268440009.362:61150): avc: denied { write } for pid=3663 comm="syz.1.8956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.466238][ T31] audit: type=1400 audit(268440009.362:61151): avc: denied { write } for pid=3663 comm="syz.1.8956" path="socket:[100797]" dev="sockfs" ino=100797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.473622][ T31] audit: type=1400 audit(268440009.372:61152): avc: denied { write } for pid=3663 comm="syz.1.8956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.478151][ T31] audit: type=1400 audit(268440009.382:61153): avc: denied { write } for pid=3663 comm="syz.1.8956" path="socket:[100797]" dev="sockfs" ino=100797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.484351][ T31] audit: type=1400 audit(268440009.382:61154): avc: denied { write } for pid=3663 comm="syz.1.8956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.489061][ T31] audit: type=1400 audit(268440009.392:61155): avc: denied { write } for pid=3663 comm="syz.1.8956" path="socket:[100797]" dev="sockfs" ino=100797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.494663][ T31] audit: type=1400 audit(268440009.392:61156): avc: denied { write } for pid=3663 comm="syz.1.8956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.499629][ T31] audit: type=1400 audit(268440009.402:61157): avc: denied { write } for pid=3663 comm="syz.1.8956" path="socket:[100797]" dev="sockfs" ino=100797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4553.505477][ T31] audit: type=1400 audit(268440009.402:61158): avc: denied { write } for pid=3663 comm="syz.1.8956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4554.797906][ T2621] usb 1-1: new high-speed USB device number 108 using dummy_hcd [ 4554.968095][ T2621] usb 1-1: no configurations [ 4554.968379][ T2621] usb 1-1: can't read configurations, error -22 [ 4555.098000][ T2621] usb 1-1: new high-speed USB device number 109 using dummy_hcd [ 4555.271586][ T2621] usb 1-1: no configurations [ 4555.271749][ T2621] usb 1-1: can't read configurations, error -22 [ 4555.273919][ T2621] usb usb1-port1: attempt power cycle [ 4555.607865][ T2621] usb 1-1: new high-speed USB device number 110 using dummy_hcd [ 4555.649084][ T2621] usb 1-1: no configurations [ 4555.649307][ T2621] usb 1-1: can't read configurations, error -22 [ 4555.808568][ T2621] usb 1-1: new high-speed USB device number 111 using dummy_hcd [ 4555.962093][ T2621] usb 1-1: no configurations [ 4555.962852][ T2621] usb 1-1: can't read configurations, error -22 [ 4555.964372][ T2621] usb usb1-port1: unable to enumerate USB device [ 4559.266430][ T31] kauditd_printk_skb: 256 callbacks suppressed [ 4559.266824][ T31] audit: type=1400 audit(268440015.162:61415): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.267511][ T31] audit: type=1400 audit(268440015.162:61416): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.310898][ T31] audit: type=1400 audit(268440015.202:61417): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.311197][ T31] audit: type=1400 audit(268440015.202:61418): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.336760][ T31] audit: type=1400 audit(268440015.232:61419): avc: denied { recv } for pid=1473 comm="syz-executor" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.344392][ T31] audit: type=1400 audit(268440015.242:61420): avc: denied { recv } for pid=2842 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.346892][ T31] audit: type=1400 audit(268440015.242:61421): avc: denied { recv } for pid=2842 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.376289][ T31] audit: type=1400 audit(268440015.272:61422): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.382414][ T31] audit: type=1400 audit(268440015.272:61423): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4559.462485][ T31] audit: type=1400 audit(268440015.362:61424): avc: denied { create } for pid=3671 comm="syz.1.8959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4559.662556][ T3674] netlink: 730 bytes leftover after parsing attributes in process `syz.1.8960'. [ 4564.563911][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 4564.564243][ T31] audit: type=1400 audit(268440020.462:61456): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.621530][ T31] audit: type=1400 audit(268440020.502:61457): avc: denied { recv } for pid=3675 comm="syz.1.8961" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.621936][ T31] audit: type=1400 audit(268440020.512:61458): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.622202][ T31] audit: type=1400 audit(268440020.512:61459): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.622283][ T31] audit: type=1400 audit(268440020.522:61460): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.648765][ T31] audit: type=1400 audit(268440020.552:61461): avc: denied { recv } for pid=3675 comm="syz.1.8961" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.651605][ T31] audit: type=1400 audit(268440020.552:61462): avc: denied { recv } for pid=3675 comm="syz.1.8961" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.700202][ T31] audit: type=1400 audit(268440020.592:61463): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.700574][ T31] audit: type=1400 audit(268440020.602:61464): avc: denied { recv } for pid=3116 comm="sshd-session" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4564.738522][ T31] audit: type=1400 audit(268440020.632:61465): avc: denied { map_create } for pid=3679 comm="syz.0.8962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4569.027444][ T2621] usb 1-1: new high-speed USB device number 112 using dummy_hcd [ 4569.305729][ T2621] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4569.307345][ T2621] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4569.307552][ T2621] usb 1-1: New USB device found, idVendor=1e7d, idProduct=319c, bcdDevice= 0.00 [ 4569.307716][ T2621] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4569.349253][ T2621] usb 1-1: config 0 descriptor?? [ 4569.807508][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 4569.838606][ T31] audit: type=1400 audit(268440025.702:61566): avc: denied { ioctl } for pid=3692 comm="syz.0.8968" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4569.840121][ T31] audit: type=1400 audit(268440025.702:61567): avc: denied { ioctl } for pid=3692 comm="syz.0.8968" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4570.036108][ T31] audit: type=1400 audit(268440025.922:61568): avc: denied { ioctl } for pid=3692 comm="syz.0.8968" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4570.067787][ T31] audit: type=1400 audit(268440025.952:61569): avc: denied { ioctl } for pid=3692 comm="syz.0.8968" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4570.074139][ T2621] isku 0003:1E7D:319C.000E: hidraw0: USB HID v0.00 Device [HID 1e7d:319c] on usb-dummy_hcd.0-1/input0 [ 4570.258018][ T31] audit: type=1400 audit(268440026.152:61570): avc: denied { ioctl } for pid=3692 comm="syz.0.8968" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4570.385455][ T31] audit: type=1400 audit(268440026.272:61571): avc: denied { ioctl } for pid=3692 comm="syz.0.8968" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4570.641770][ T2846] usb 1-1: USB disconnect, device number 112 [ 4570.748344][ T31] audit: type=1400 audit(268440026.632:61572): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4570.750153][ T31] audit: type=1400 audit(268440026.642:61573): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4570.765470][ T31] audit: type=1400 audit(268440026.652:61574): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=33982 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4570.903575][ T31] audit: type=1400 audit(268440026.802:61575): avc: denied { recv } for pid=3117 comm="syz-executor" saddr=127.0.0.1 src=47592 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4571.222525][ T3695] 8<--- cut here --- [ 4571.222677][ T3695] Unable to handle kernel paging request at virtual address fee04f27 when write [ 4571.222778][ T3695] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 4571.223677][ T3695] Internal error: Oops: a06 [#1] SMP ARM [ 4571.226028][ T3695] Modules linked in: [ 4571.226624][ T3695] CPU: 1 UID: 0 PID: 3695 Comm: syz.0.8969 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 4571.227076][ T3695] Hardware name: ARM-Versatile Express [ 4571.227366][ T3695] PC is at parport_attach+0x174/0x1d0 [ 4571.227780][ T3695] LR is at parport_attach+0x164/0x1d0 [ 4571.228027][ T3695] pc : [<813ab000>] lr : [<813aaff0>] psr: 60000013 [ 4571.228293][ T3695] sp : df9e9d30 ip : df9e9d30 fp : df9e9d54 [ 4571.228970][ T3695] r10: 82b16f00 r9 : 00000003 r8 : 8424e000 [ 4571.229981][ T3695] r7 : df9e9d90 r6 : 8424e000 r5 : 00000000 r4 : 00000000 [ 4571.230350][ T3695] r3 : fee04f27 r2 : 81e15444 r1 : 00000001 r0 : 813aac70 [ 4571.231262][ T3695] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4571.239517][ T3695] Control: 30c5387d Table: 85a4e480 DAC: 00000000 [ 4571.240014][ T3695] Register r0 information: non-slab/vmalloc memory [ 4571.247464][ T3695] Register r1 information: non-paged memory [ 4571.247953][ T3695] Register r2 information: non-slab/vmalloc memory [ 4571.248255][ T3695] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 4571.248881][ T3695] Register r4 information: NULL pointer [ 4571.249131][ T3695] Register r5 information: NULL pointer [ 4571.249392][ T3695] Register r6 information: slab kmalloc-192 start 8424e000 pointer offset 0 size 192 [ 4571.250776][ T3695] Register r7 information: 2-page vmalloc region starting at 0xdf9e8000 allocated at kernel_clone+0xac/0x3ec [ 4571.257101][ T3695] Register r8 information: slab kmalloc-192 start 8424e000 pointer offset 0 size 192 [ 4571.257641][ T3695] Register r9 information: non-paged memory [ 4571.257933][ T3695] Register r10 information: non-slab/vmalloc memory [ 4571.258243][ T3695] Register r11 information: 2-page vmalloc region starting at 0xdf9e8000 allocated at kernel_clone+0xac/0x3ec [ 4571.258797][ T3695] Register r12 information: 2-page vmalloc region starting at 0xdf9e8000 allocated at kernel_clone+0xac/0x3ec [ 4571.259468][ T3695] Process syz.0.8969 (pid: 3695, stack limit = 0xdf9e8000) [ 4571.259813][ T3695] Stack: (0xdf9e9d30 to 0xdf9ea000) [ 4571.260064][ T3695] 9d20: df9e9d4c df9e9d40 829cf8ec 829cf8ec [ 4571.260433][ T3695] 9d40: 81e15904 8424e044 df9e9d8c df9e9d58 813a7098 813aae98 200000c0 00000000 [ 4571.260787][ T3695] 9d60: df9e9d7c 200000c0 8424e000 b5403587 200000c0 85e7ec00 40946400 00000003 [ 4571.261133][ T3695] 9d80: df9e9e4c df9e9d90 813a2c18 813a6f9c 656d6f63 705f6964 6f707261 00007472 [ 4571.261491][ T3695] 9da0: 00000000 00004f27 00000000 00000004 00000004 00000005 00000005 00000004 [ 4571.261857][ T3695] 9dc0: 00000007 54c6cff3 000000fd 00000002 00000001 00000001 00000001 00000006 [ 4571.262250][ T3695] 9de0: 00000101 00000000 0000027f 00000003 40000003 00000089 0000caa3 00000000 [ 4571.262618][ T3695] 9e00: 20001e5b 00000003 00000e66 00000004 00000008 00004086 00000000 fffffff8 [ 4571.262973][ T3695] 9e20: 00000000 15c50587 00000000 855af900 8424e000 200000c0 200000c0 85e7ec00 [ 4571.263304][ T3695] 9e40: df9e9f14 df9e9e50 813a3be4 813a2b24 00000000 df9e9e54 df9e9e54 15c50587 [ 4571.263667][ T3695] 9e60: 00000000 00000000 8247054c 0000005f 83ddee58 8424e030 84208b94 85e7ec00 [ 4571.264019][ T3695] 9e80: df9e9ee4 df9e9e90 8079794c 8078dcb0 00000064 00000001 00000000 df9e9eac [ 4571.264330][ T3695] 9ea0: 8573dd90 8342e330 00006400 0000000b df9e9ea0 00000000 df9e9d30 15c50587 [ 4571.264646][ T3695] 9ec0: 855af900 40946400 200000c0 200000c0 855af900 00000003 df9e9ef4 df9e9ee8 [ 4571.264995][ T3695] 9ee0: 80797a6c 15c50587 df9e9f14 40946400 00000000 855af901 200000c0 855af900 [ 4571.265358][ T3695] 9f00: 00000003 85e7ec00 df9e9fa4 df9e9f18 8056cf08 813a3614 ecac8b10 85e7ec00 [ 4571.265708][ T3695] 9f20: df9e9f3c df9e9f30 81a388b8 81a38788 df9e9f54 df9e9f40 8025e490 8028ef8c [ 4571.266105][ T3695] 9f40: df9e9fb0 40000000 df9e9f84 df9e9f58 802229ec 8025e44c 00000000 8281cddc [ 4571.266478][ T3695] 9f60: df9e9fb0 0014c820 ecac8b10 80222940 00000000 15c50587 df9e9fac 00000000 [ 4571.266826][ T3695] 9f80: 00000000 002f6308 00000036 8020029c 85e7ec00 00000036 00000000 df9e9fa8 [ 4571.267507][ T3695] 9fa0: 80200060 8056cde4 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4571.269100][ T3695] 9fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76fc30bc [ 4571.273760][ T3695] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 60000010 00000003 00000000 00000000 [ 4571.277564][ T3695] Call trace: [ 4571.277821][ T3695] [<813aae8c>] (parport_attach) from [<813a7098>] (comedi_device_attach+0x108/0x250) [ 4571.280154][ T3695] r6:8424e044 r5:81e15904 r4:829cf8ec [ 4571.285231][ T3695] [<813a6f90>] (comedi_device_attach) from [<813a2c18>] (do_devconfig_ioctl+0x100/0x220) [ 4571.287540][ T3695] r10:00000003 r9:40946400 r8:85e7ec00 r7:200000c0 r6:b5403587 r5:8424e000 [ 4571.287893][ T3695] r4:200000c0 [ 4571.288043][ T3695] [<813a2b18>] (do_devconfig_ioctl) from [<813a3be4>] (comedi_unlocked_ioctl+0x5dc/0x1c24) [ 4571.288406][ T3695] r8:85e7ec00 r7:200000c0 r6:200000c0 r5:8424e000 r4:855af900 [ 4571.288647][ T3695] [<813a3608>] (comedi_unlocked_ioctl) from [<8056cf08>] (sys_ioctl+0x130/0xba0) [ 4571.289004][ T3695] r10:85e7ec00 r9:00000003 r8:855af900 r7:200000c0 r6:855af901 r5:00000000 [ 4571.289297][ T3695] r4:40946400 [ 4571.289447][ T3695] [<8056cdd8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4571.289792][ T3695] Exception stack(0xdf9e9fa8 to 0xdf9e9ff0) [ 4571.290067][ T3695] 9fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4571.290398][ T3695] 9fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76fc30bc [ 4571.290757][ T3695] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 4571.291007][ T3695] r10:00000036 r9:85e7ec00 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 4571.291319][ T3695] r4:00000000 [ 4571.291825][ T3695] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 4571.292533][ T3695] ---[ end trace 0000000000000000 ]--- [ 4571.293238][ T3695] Kernel panic - not syncing: Fatal exception [ 4571.295641][ T3695] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:24:02 Registers: info registers vcpu 0 CPU#0 R00=82adb51c R01=c11ec11d R02=00000000 R03=00000000 R04=00000001 R05=00000058 R06=00002900 R07=85e7c800 R08=a0000113 R09=8078c7d8 R10=82adbcd4 R11=df801814 R12=df801818 R13=df801808 R14=81a45284 R15=8078cfa0 PSR=60000193 -ZC- A S svc32 s00=70207265 s01=696d7265 d00=696d726570207265 s02=64656c65 s03=7420745f d01=7420745f64656c65 s04=7369205d s05=3020756b d02=3020756b7369205d s06=3a333030 s07=44374531 d03=443745313a333030 s08=3931333a s09=30302e43 d04=30302e433931333a s10=203a4530 s11=72646968 d05=72646968203a4530 s12=3a307761 s13=42535520 d06=425355203a307761 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84aed040 R01=00000030 R02=eb5f7000 R03=eb5f7018 R04=84ae603f R05=84aed040 R06=80a7927c R07=84ae6051 R08=82826ee0 R09=00000000 R10=00004e85 R11=df9e9994 R12=00000002 R13=df9e9988 R14=82959084 R15=80a7928c PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000