last executing test programs: 12.285033015s ago: executing program 1 (id=861): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000200)={0x1d, r1, 0x1}, 0x18) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x48801) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4008800}, 0x40084) 11.694912262s ago: executing program 1 (id=865): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000380)='veth0_to_hsr\x00', 0x10) connect$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @local, 0x80000001}, 0x10) listen(r1, 0x1) ioctl$TUNSETDEBUG(r2, 0x400454c9, 0x0) connect$netlink(r2, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f0000000400)="2ff5ba0230", 0x5) 8.053934507s ago: executing program 1 (id=871): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/random', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x5450, 0x0) (fail_nth: 3) 7.423405655s ago: executing program 1 (id=873): ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000200)={0x1d, r0, 0x1}, 0x18) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x48801) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4008800}, 0x40084) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="e5a8332e23941feb2b375b4dc30b256b9039989c24998ba83489406798bf578316", @ANYRES8, @ANYRES8], 0x2c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000) 6.833703363s ago: executing program 1 (id=876): r0 = socket(0x22, 0x1, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$unix(0x1, 0x1, 0x0) r2 = openat$selinux_access(0xffffff9c, 0x0, 0x2, 0x0) fcntl$getown(r1, 0x9) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x2, 0x20041) ioctl$TIOCOUTQ(r3, 0x5452, &(0x7f0000000000)) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000440)={'vxcan0\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000040)={0x1d, r5, 0x3, {0x2}, 0xfd}, 0x18) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000580)=ANY=[], 0x14}}, 0x0) sendmsg$can_j1939(r4, &(0x7f0000000200)={0x0, 0xfffffffffffffd62, &(0x7f0000000000)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008800) lstat(0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000c80)="61a983a6") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) write(r0, 0x0, 0x0) openat$dma_heap(0xffffff9c, &(0x7f00000004c0), 0x127302, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct}}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r3, 0xf504, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 4.864130999s ago: executing program 1 (id=877): r0 = openat$drirender128(0xffffff9c, &(0x7f0000000000), 0x200040, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={r1}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = dup3(r2, r3, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300)='veth0_to_hsr\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r6, 0x0, 0x8000f28, 0x0) write$binfmt_format(r6, &(0x7f0000000140)='-1\x00', 0x3) connect$l2tp(r4, &(0x7f0000000340)={0x2, 0x0, @local, 0x80000001}, 0x10) listen(r3, 0x1) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x3) ioctl$SNDCTL_TMR_STOP(r4, 0x5403) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x90880) write$FUSE_NOTIFY_STORE(r7, 0x0, 0x31) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000ac0)=ANY=[], 0x8c) 3.706304412s ago: executing program 0 (id=878): r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x100) r1 = landlock_create_ruleset(&(0x7f00000000c0)={0xc4d8, 0x0, 0x1}, 0x18, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000400), 0x8) ioctl$PIO_UNIMAPCLR(r2, 0x5450, 0x0) landlock_restrict_self(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/firmware/fdt', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000000)) 3.517286998s ago: executing program 0 (id=879): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000200)={0x1d, r1, 0x1}, 0x18) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x48801) sendmsg$NL80211_CMD_NEW_STATION(r0, 0x0, 0x40084) 2.336963682s ago: executing program 0 (id=880): ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000200)={0x1d, r0, 0x1}, 0x18) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x48801) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4008800}, 0x40084) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="e5a8332e23941feb2b375b4dc30b256b9039989c24998ba83489406798bf578316", @ANYRES8, @ANYRES8], 0x2c}, 0x1, 0x0, 0x0, 0x48040}, 0x4000) 2.176490747s ago: executing program 0 (id=881): r0 = socket(0x22, 0x1, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$unix(0x1, 0x1, 0x0) r2 = openat$selinux_access(0xffffff9c, 0x0, 0x2, 0x0) fcntl$getown(r1, 0x9) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x2, 0x20041) ioctl$TIOCOUTQ(r3, 0x5452, &(0x7f0000000000)) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000440)={'vxcan0\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000040)={0x1d, r5, 0x3, {0x2}, 0xfd}, 0x18) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000580)=ANY=[], 0x14}}, 0x0) sendmsg$can_j1939(r4, &(0x7f0000000200)={0x0, 0xfffffffffffffd62, &(0x7f0000000000)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008800) lstat(0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000c80)="61a983a6") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) write(r0, 0x0, 0x0) openat$dma_heap(0xffffff9c, &(0x7f00000004c0), 0x127302, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct}}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 483.931285ms ago: executing program 0 (id=882): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f0000000d00)=[{&(0x7f0000000100)="89e7ee2c7cdad9b4b47380c988cafbe882cac5050093517d176c709a6db96cb03276db1bb7c9f6ca6878744421b3197464cdb25e2576bd8345f788", 0x3b}], 0x1) 0s ago: executing program 0 (id=883): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x8000) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @loopback}, 0x1c) syz_usb_connect(0x2, 0x3c, 0x0, 0x0) kernel console output (not intermixed with test programs): 356.369595][ T5645] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 356.370005][ T5645] Exception stack(0xecd85fa8 to 0xecd85ff0) [ 356.370323][ T5645] 5fa0: 00000000 00000000 00000003 20000600 2002c0c0 00000000 [ 356.370730][ T5645] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bbe0bc [ 356.371124][ T5645] 5fe0: 76bbdec0 76bbdeb0 00018af0 00133450 [ 360.336466][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 360.336555][ T31] audit: type=1400 audit(360.240:5200): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 360.341508][ T31] audit: type=1400 audit(360.240:5201): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 360.346157][ T31] audit: type=1400 audit(360.250:5202): avc: denied { recv } for pid=3084 comm="sshd" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 360.352080][ T31] audit: type=1400 audit(360.250:5203): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.356523][ T31] audit: type=1400 audit(360.260:5204): avc: denied { open } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.361473][ T31] audit: type=1400 audit(360.260:5205): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 360.361993][ T31] audit: type=1400 audit(360.260:5206): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 360.362664][ T31] audit: type=1400 audit(360.260:5207): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 360.363424][ T31] audit: type=1400 audit(360.260:5208): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 360.378389][ T31] audit: type=1400 audit(360.260:5209): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 360.636731][ T5662] FAULT_INJECTION: forcing a failure. [ 360.636731][ T5662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 360.637655][ T5662] CPU: 1 UID: 0 PID: 5662 Comm: syz.0.614 Not tainted 6.12.0-syzkaller #0 [ 360.637860][ T5662] Hardware name: ARM-Versatile Express [ 360.637968][ T5662] Call trace: [ 360.638062][ T5662] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 360.638263][ T5662] r7:ecf81adc r6:00000000 r5:60000013 r4:820413b8 [ 360.638399][ T5662] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 360.638585][ T5662] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 360.638759][ T5662] r5:00000000 r4:8271b7f0 [ 360.638863][ T5662] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 360.639032][ T5662] [<808f17e0>] (should_fail_ex) from [<804ef5d0>] (should_fail_alloc_page+0x68/0x74) [ 360.639245][ T5662] r6:00000000 r5:00140cc2 r4:ecf81ae8 [ 360.639463][ T5662] [<804ef568>] (should_fail_alloc_page) from [<804bfad8>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 360.639739][ T5662] [<804bfa50>] (prepare_alloc_pages.constprop.0) from [<804c6550>] (__alloc_pages_noprof+0xb4/0x1128) [ 360.640000][ T5662] r10:00000000 r9:84032a00 r8:00000000 r7:84073c00 r6:00140cc2 r5:84073c00 [ 360.640194][ T5662] r4:00000000 r3:ecf81ae8 [ 360.640301][ T5662] [<804c649c>] (__alloc_pages_noprof) from [<804c7b50>] (__folio_alloc_noprof+0x14/0x2c) [ 360.640523][ T5662] r10:00000000 r9:84032a00 r8:00000000 r7:00000000 r6:20017000 r5:84073c00 [ 360.640702][ T5662] r4:00000015 [ 360.640810][ T5662] [<804c7b3c>] (__folio_alloc_noprof) from [<8049b324>] (handle_mm_fault+0xd18/0x135c) [ 360.641028][ T5662] r5:84073c00 r4:00000015 [ 360.641140][ T5662] [<8049a60c>] (handle_mm_fault) from [<8048ed3c>] (__get_user_pages+0x23c/0x664) [ 360.641348][ T5662] r10:00000016 r9:20017000 r8:84073c00 r7:00000000 r6:00000015 r5:842762a0 [ 360.641537][ T5662] r4:00290101 [ 360.641636][ T5662] [<8048eb00>] (__get_user_pages) from [<80490090>] (__gup_longterm_locked+0x2e0/0x990) [ 360.641912][ T5662] r10:ecf81d74 r9:00290101 r8:84032a00 r7:84032a84 r6:20001000 r5:82ca2000 [ 360.642127][ T5662] r4:20001000 [ 360.642294][ T5662] [<8048fdb0>] (__gup_longterm_locked) from [<80490b20>] (gup_fast_fallback+0x3e0/0x810) [ 360.642646][ T5662] r10:20001000 r9:00000000 r8:00000441 r7:84073c00 r6:ffedc008 r5:ffedc008 [ 360.642843][ T5662] r4:20001000 [ 360.642940][ T5662] [<80490740>] (gup_fast_fallback) from [<80491064>] (pin_user_pages_fast+0x50/0x60) [ 360.643164][ T5662] r10:ecf81e84 r9:00000000 r8:850d5300 r7:ecf81e2c r6:00000441 r5:20001700 [ 360.643437][ T5662] r4:82ca2000 [ 360.643536][ T5662] [<80491014>] (pin_user_pages_fast) from [<80838c00>] (io_pin_pages+0x60/0x120) [ 360.643789][ T5662] r6:82ca2000 r5:20001700 r4:00000441 [ 360.644003][ T5662] [<80838ba0>] (io_pin_pages) from [<80826b4c>] (io_sqe_buffer_register+0x8c/0x798) [ 360.644379][ T5662] r7:00000468 r6:200002c8 r5:ecf81e9c r4:00000000 [ 360.644692][ T5662] [<80826ac0>] (io_sqe_buffer_register) from [<80827b7c>] (io_sqe_buffers_register+0x18c/0x1f4) [ 360.645487][ T5662] r10:ecf81e9c r9:00000000 r8:ecf81e94 r7:00000468 r6:200002c8 r5:00000000 [ 360.646000][ T5662] r4:84da3c00 [ 360.646179][ T5662] [<808279f0>] (io_sqe_buffers_register) from [<80837940>] (sys_io_uring_register+0x4a8/0x11ac) [ 360.646653][ T5662] r10:00000000 r9:84da3c40 r8:200002c0 r7:84073c00 r6:00000000 r5:84da3c00 [ 360.647002][ T5662] r4:0000011a [ 360.647186][ T5662] [<80837498>] (sys_io_uring_register) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 360.647609][ T5662] Exception stack(0xecf81fa8 to 0xecf81ff0) [ 360.647924][ T5662] 1fa0: 00000000 00000000 00000003 00000000 200002c0 0000011a [ 360.648265][ T5662] 1fc0: 00000000 00000000 00131400 000001ab 00000000 00006364 003d0f00 76bbe0bc [ 360.648644][ T5662] 1fe0: 76bbdec0 76bbdeb0 00018af0 00133450 [ 360.648942][ T5662] r10:000001ab r9:84073c00 r8:8020029c r7:000001ab r6:00131400 r5:00000000 [ 360.649274][ T5662] r4:00000000 [ 360.794370][ T5667] fuse: Unknown parameter 'use00000000000000000000' [ 360.890078][ T5666] fuse: Unknown parameter 'use00000000000000000000' [ 360.963382][ T5666] FAULT_INJECTION: forcing a failure. [ 360.963382][ T5666] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.963930][ T5666] CPU: 0 UID: 0 PID: 5666 Comm: syz.1.615 Not tainted 6.12.0-syzkaller #0 [ 360.964221][ T5666] Hardware name: ARM-Versatile Express [ 360.964462][ T5666] Call trace: [ 360.964991][ T5666] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 360.965542][ T5666] r7:00000004 r6:00000000 r5:60000013 r4:820413b8 [ 360.965860][ T5666] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 360.966203][ T5666] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 360.966534][ T5666] r5:00000000 r4:82751908 [ 360.966726][ T5666] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 360.967075][ T5666] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 360.967458][ T5666] r6:00000000 r5:20000080 r4:ecfb9e48 [ 360.967677][ T5666] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 360.968024][ T5666] [<808f19d4>] (should_fail_usercopy) from [<808f7a38>] (strncpy_from_user+0x20/0x194) [ 360.968381][ T5666] [<808f7a18>] (strncpy_from_user) from [<80555814>] (setxattr_copy+0x2c/0x90) [ 360.968769][ T5666] r10:000000e4 r9:84049800 r8:200000c0 r7:00000004 r6:00000000 r5:00001000 [ 360.969273][ T5666] r4:ecfb9e48 [ 360.969601][ T5666] [<805557e8>] (setxattr_copy) from [<80555a54>] (path_setxattrat+0x7c/0x14c) [ 360.970203][ T5666] r5:00001000 r4:20000080 [ 360.970500][ T5666] [<805559d8>] (path_setxattrat) from [<80555d24>] (sys_fsetxattr+0x30/0x38) [ 360.970972][ T5666] r8:8020029c r7:000000e4 r6:00131400 r5:00000000 r4:00000001 [ 360.971251][ T5666] [<80555cf4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 360.971550][ T5666] Exception stack(0xecfb9fa8 to 0xecfb9ff0) [ 360.971772][ T5666] 9fa0: 00000001 00000000 00000004 20000080 200000c0 0000000e [ 360.971988][ T5666] 9fc0: 00000001 00000000 00131400 000000e4 00000000 00006364 003d0f00 76bfb0bc [ 360.972163][ T5666] 9fe0: 76bfaec0 76bfaeb0 00018af0 00133450 [ 361.734139][ T5681] FAULT_INJECTION: forcing a failure. [ 361.734139][ T5681] name failslab, interval 1, probability 0, space 0, times 0 [ 361.739599][ T5681] CPU: 1 UID: 0 PID: 5681 Comm: syz.1.621 Not tainted 6.12.0-syzkaller #0 [ 361.740060][ T5681] Hardware name: ARM-Versatile Express [ 361.740275][ T5681] Call trace: [ 361.740465][ T5681] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 361.740834][ T5681] r7:00000c40 r6:84f84c28 r5:60000013 r4:820413b8 [ 361.741067][ T5681] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 361.741377][ T5681] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 361.741690][ T5681] r5:00000000 r4:8271b79c [ 361.741872][ T5681] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 361.742192][ T5681] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 361.742530][ T5681] r6:84f84c28 r5:00001000 r4:82c016c0 [ 361.742733][ T5681] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 361.743059][ T5681] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 361.743477][ T5681] r10:8404ec00 r9:82c9fc00 r8:00000000 r7:8480f440 r6:84f84c28 r5:00001000 [ 361.743776][ T5681] r4:00000000 [ 361.743946][ T5681] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 361.744319][ T5681] r10:8404ec00 r9:00000000 r8:84f84c00 r7:00005411 r6:00000004 r5:81ad1efc [ 361.744743][ T5681] r4:84f84c28 r3:824bb340 [ 361.744964][ T5681] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 361.745415][ T5681] r9:00000004 r8:84f84c00 r7:20000100 r6:20000100 r5:00005411 r4:84f84c00 [ 361.745724][ T5681] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 361.746094][ T5681] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 361.746454][ T5681] r7:20000100 r6:84f84c01 r5:00000000 r4:00005411 [ 361.746727][ T5681] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 361.747071][ T5681] Exception stack(0xed049fa8 to 0xed049ff0) [ 361.747365][ T5681] 9fa0: 00000000 00000000 00000004 00005411 20000100 00000000 [ 361.747724][ T5681] 9fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bfb0bc [ 361.748060][ T5681] 9fe0: 76bfaec0 76bfaeb0 00018af0 00133450 [ 361.748320][ T5681] r10:00000036 r9:8404ec00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 361.748644][ T5681] r4:00000000 [ 361.761008][ T5681] ERROR: Out of memory at tomoyo_realpath_from_path. [ 363.925497][ T10] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 364.090059][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 364.090690][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 364.091066][ T10] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 364.091575][ T10] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 364.091912][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 364.099934][ T10] usb 2-1: config 0 descriptor?? [ 364.557838][ T10] usbhid 2-1:0.0: can't add hid device: -71 [ 364.558554][ T10] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 364.565366][ T10] usb 2-1: USB disconnect, device number 12 [ 367.131656][ T31] kauditd_printk_skb: 329 callbacks suppressed [ 367.131745][ T31] audit: type=1400 audit(367.030:5539): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 367.145237][ T31] audit: type=1400 audit(367.040:5540): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 367.146423][ T31] audit: type=1400 audit(367.040:5541): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 367.147659][ T31] audit: type=1400 audit(367.040:5542): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 367.148272][ T31] audit: type=1400 audit(367.040:5543): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 367.149643][ T31] audit: type=1400 audit(367.040:5544): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 367.150468][ T31] audit: type=1400 audit(367.050:5545): avc: denied { recv } for pid=3084 comm="sshd" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 367.186357][ T31] audit: type=1400 audit(367.080:5546): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 367.187304][ T31] audit: type=1400 audit(367.080:5547): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 367.188527][ T31] audit: type=1400 audit(367.080:5548): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 367.757233][ T5743] FAULT_INJECTION: forcing a failure. [ 367.757233][ T5743] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.757790][ T5743] CPU: 0 UID: 0 PID: 5743 Comm: syz.1.638 Not tainted 6.12.0-syzkaller #0 [ 367.758025][ T5743] Hardware name: ARM-Versatile Express [ 367.758181][ T5743] Call trace: [ 367.758334][ T5743] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 367.758629][ T5743] r7:ed661dec r6:00000000 r5:60000113 r4:820413b8 [ 367.758811][ T5743] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 367.759055][ T5743] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 367.759295][ T5743] r5:00000000 r4:8271b7f0 [ 367.759471][ T5743] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 367.759734][ T5743] [<808f17e0>] (should_fail_ex) from [<804ef5d0>] (should_fail_alloc_page+0x68/0x74) [ 367.760011][ T5743] r6:00000000 r5:00140cca r4:ed661df8 [ 367.760167][ T5743] [<804ef568>] (should_fail_alloc_page) from [<804bfad8>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 367.760456][ T5743] [<804bfa50>] (prepare_alloc_pages.constprop.0) from [<804c6550>] (__alloc_pages_noprof+0xb4/0x1128) [ 367.760774][ T5743] r10:00000000 r9:84025b00 r8:00000000 r7:8404d400 r6:00140cca r5:8404d400 [ 367.760994][ T5743] r4:00000000 r3:ed661df8 [ 367.761131][ T5743] [<804c649c>] (__alloc_pages_noprof) from [<804c7b50>] (__folio_alloc_noprof+0x14/0x2c) [ 367.761408][ T5743] r10:ed661fb0 r9:84025b00 r8:00000000 r7:00000040 r6:003b0004 r5:8404d400 [ 367.761711][ T5743] r4:00001255 [ 367.761843][ T5743] [<804c7b3c>] (__folio_alloc_noprof) from [<8049b324>] (handle_mm_fault+0xd18/0x135c) [ 367.762756][ T5743] r5:8404d400 r4:00001255 [ 367.762974][ T5743] [<8049a60c>] (handle_mm_fault) from [<802142d0>] (do_page_fault+0x1c8/0x3d8) [ 367.763509][ T5743] r10:00000002 r9:84025b00 r8:00000255 r7:8404d400 r6:00000a07 r5:003b0004 [ 367.763787][ T5743] r4:ed661fb0 [ 367.763925][ T5743] [<80214108>] (do_page_fault) from [<802146c8>] (do_DataAbort+0x38/0xa8) [ 367.764214][ T5743] r10:003d0f00 r9:00006364 r8:80214108 r7:ed661fb0 r6:003b0004 r5:00000a07 [ 367.764458][ T5743] r4:8261d384 [ 367.764860][ T5743] [<80214690>] (do_DataAbort) from [<80200ebc>] (__dabt_usr+0x5c/0x60) [ 367.765409][ T5743] Exception stack(0xed661fb0 to 0xed661ff8) [ 367.765687][ T5743] 1fa0: 003b0004 00000000 00000840 003b0004 [ 367.766312][ T5743] 1fc0: 0002236c 003b0000 20000400 00000024 00000005 00006364 003d0f00 00000000 [ 367.766717][ T5743] 1fe0: 00000000 76bf8e08 000218c0 00119290 20000010 ffffffff [ 367.766965][ T5743] r8:824b2044 r7:8404d400 r6:ffffffff r5:20000010 r4:00119290 [ 367.780405][ T5743] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 368.025225][ T3771] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 368.201460][ T3771] usb 2-1: unable to get BOS descriptor or descriptor too short [ 368.207501][ T3771] usb 2-1: config 129 has an invalid interface number: 135 but max is 0 [ 368.207934][ T3771] usb 2-1: config 129 has no interface number 0 [ 368.208227][ T3771] usb 2-1: config 129 interface 135 has no altsetting 0 [ 368.246227][ T3771] usb 2-1: New USB device found, idVendor=2040, idProduct=721f, bcdDevice=f2.62 [ 368.246584][ T3771] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 368.246859][ T3771] usb 2-1: Product: syz [ 368.247030][ T3771] usb 2-1: Manufacturer: syz [ 368.247198][ T3771] usb 2-1: SerialNumber: syz [ 368.503919][ T3771] usb 2-1: USB disconnect, device number 13 [ 371.777870][ T5767] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=5767 comm=syz.1.641 [ 372.185050][ T31] kauditd_printk_skb: 155 callbacks suppressed [ 372.185118][ T31] audit: type=1400 audit(372.080:5704): avc: denied { read } for pid=5771 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 372.192654][ T31] audit: type=1400 audit(372.090:5705): avc: denied { write } for pid=5771 comm="syz.1.643" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 372.193637][ T31] audit: type=1400 audit(372.090:5706): avc: denied { open } for pid=5771 comm="syz.1.643" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 372.200715][ T31] audit: type=1400 audit(372.100:5707): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 372.202699][ T31] audit: type=1400 audit(372.100:5708): avc: denied { ioctl } for pid=5771 comm="syz.1.643" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54cf scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 372.219921][ T31] audit: type=1400 audit(372.110:5709): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 372.220614][ T31] audit: type=1400 audit(372.120:5710): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 372.221163][ T31] audit: type=1400 audit(372.120:5711): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 372.221733][ T31] audit: type=1400 audit(372.120:5712): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 372.223625][ T31] audit: type=1400 audit(372.120:5713): avc: denied { read } for pid=5771 comm="syz.1.643" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 377.231878][ T31] kauditd_printk_skb: 112 callbacks suppressed [ 377.231976][ T31] audit: type=1400 audit(377.130:5826): avc: denied { setopt } for pid=5789 comm="syz.1.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 377.241685][ T31] audit: type=1400 audit(377.140:5827): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 377.242568][ T31] audit: type=1400 audit(377.140:5828): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 377.243318][ T31] audit: type=1400 audit(377.140:5829): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 377.244092][ T31] audit: type=1400 audit(377.140:5830): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 377.249275][ T31] audit: type=1400 audit(377.140:5831): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 377.726536][ T31] audit: type=1400 audit(377.630:5832): avc: denied { setopt } for pid=5789 comm="syz.1.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 378.382702][ T31] audit: type=1400 audit(378.270:5833): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 378.383893][ T31] audit: type=1400 audit(378.280:5834): avc: denied { recv } for pid=3084 comm="sshd" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 378.394959][ T31] audit: type=1400 audit(378.290:5835): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 382.718506][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 382.718571][ T31] audit: type=1400 audit(382.620:5936): avc: denied { connect } for pid=5818 comm="syz.0.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 382.739912][ T31] audit: type=1400 audit(382.640:5937): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 382.742531][ T31] audit: type=1400 audit(382.640:5938): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 382.743602][ T31] audit: type=1400 audit(382.640:5939): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 382.745228][ T31] audit: type=1400 audit(382.650:5940): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 382.746393][ T31] audit: type=1400 audit(382.650:5941): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 383.070743][ T31] audit: type=1400 audit(382.960:5942): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 383.071817][ T31] audit: type=1400 audit(382.970:5943): avc: denied { recv } for pid=3084 comm="sshd" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 383.093590][ T31] audit: type=1400 audit(382.990:5944): avc: denied { read write } for pid=3092 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 383.105319][ T31] audit: type=1400 audit(382.990:5945): avc: denied { open } for pid=3092 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 387.805245][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 387.805311][ T31] audit: type=1400 audit(387.640:6077): avc: denied { execmem } for pid=5848 comm="syz.1.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 387.849326][ T31] audit: type=1400 audit(387.750:6078): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 387.849955][ T31] audit: type=1400 audit(387.750:6079): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 387.850378][ T31] audit: type=1400 audit(387.750:6080): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 387.850764][ T31] audit: type=1400 audit(387.750:6081): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 387.851151][ T31] audit: type=1400 audit(387.750:6082): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 388.086751][ T31] audit: type=1400 audit(387.990:6083): avc: denied { read } for pid=5852 comm="syz.0.662" name="nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 388.097417][ T31] audit: type=1400 audit(388.000:6084): avc: denied { open } for pid=5852 comm="syz.0.662" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 388.100336][ T31] audit: type=1400 audit(388.000:6085): avc: denied { read } for pid=5852 comm="syz.0.662" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 388.105043][ T31] audit: type=1400 audit(388.000:6086): avc: denied { read open } for pid=5852 comm="syz.0.662" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 392.819943][ T31] kauditd_printk_skb: 222 callbacks suppressed [ 392.820042][ T31] audit: type=1400 audit(392.700:6308): avc: denied { prog_load } for pid=5867 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 392.820926][ T31] audit: type=1400 audit(392.720:6310): avc: denied { bpf } for pid=5867 comm="syz.0.665" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 392.821480][ T31] audit: type=1400 audit(392.720:6311): avc: denied { perfmon } for pid=5867 comm="syz.0.665" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 392.845425][ T31] audit: type=1400 audit(392.740:6312): avc: denied { write } for pid=5867 comm="syz.0.665" name="pfkey" dev="proc" ino=4026532728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 392.846625][ T31] audit: type=1400 audit(392.740:6313): avc: denied { prog_load } for pid=5867 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 392.858348][ T31] audit: type=1400 audit(392.740:6314): avc: denied { bpf } for pid=5867 comm="syz.0.665" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 392.859115][ T31] audit: type=1400 audit(392.740:6315): avc: denied { perfmon } for pid=5867 comm="syz.0.665" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 392.859725][ T31] audit: type=1400 audit(392.750:6316): avc: denied { write } for pid=5867 comm="syz.0.665" name="pfkey" dev="proc" ino=4026532728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 392.868966][ T31] audit: type=1400 audit(392.770:6317): avc: denied { prog_load } for pid=5867 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 392.877359][ T31] audit: type=1400 audit(392.780:6318): avc: denied { bpf } for pid=5867 comm="syz.0.665" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 393.472940][ T5880] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=5880 comm=syz.0.666 [ 393.646968][ T5885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5885 comm=syz.0.668 [ 393.827294][ T51] hid-generic 00DF:FFFFFFF9:0009.0004: unknown main item tag 0x1 [ 393.827994][ T51] hid-generic 00DF:FFFFFFF9:0009.0004: collection stack underflow [ 393.828371][ T51] hid-generic 00DF:FFFFFFF9:0009.0004: item 0 0 0 12 parsing failed [ 393.829075][ T51] hid-generic 00DF:FFFFFFF9:0009.0004: probe with driver hid-generic failed with error -22 [ 393.962652][ T5889] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5889 comm=syz.0.669 [ 399.144469][ T31] kauditd_printk_skb: 191 callbacks suppressed [ 399.145496][ T31] audit: type=1400 audit(399.040:6510): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 399.165664][ T31] audit: type=1400 audit(399.060:6511): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 399.184083][ T31] audit: type=1400 audit(399.080:6512): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 399.199483][ T31] audit: type=1400 audit(399.080:6513): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 399.200371][ T31] audit: type=1400 audit(399.080:6514): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 399.205806][ T31] audit: type=1400 audit(399.080:6515): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 399.206606][ T31] audit: type=1400 audit(399.080:6516): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 399.207268][ T31] audit: type=1400 audit(399.090:6517): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 399.207889][ T31] audit: type=1400 audit(399.090:6518): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 399.208585][ T31] audit: type=1400 audit(399.090:6519): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 399.477399][ T5917] FAULT_INJECTION: forcing a failure. [ 399.477399][ T5917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 399.479344][ T5917] CPU: 1 UID: 0 PID: 5917 Comm: syz.0.674 Not tainted 6.12.0-syzkaller #0 [ 399.479712][ T5917] Hardware name: ARM-Versatile Express [ 399.479957][ T5917] Call trace: [ 399.480167][ T5917] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 399.480577][ T5917] r7:eda6ddec r6:00000000 r5:60000113 r4:820413b8 [ 399.480840][ T5917] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 399.481201][ T5917] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 399.481562][ T5917] r5:00000000 r4:8271b7f0 [ 399.481762][ T5917] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 399.482138][ T5917] [<808f17e0>] (should_fail_ex) from [<804ef5d0>] (should_fail_alloc_page+0x68/0x74) [ 399.482556][ T5917] r6:00000000 r5:00140cca r4:eda6ddf8 [ 399.482796][ T5917] [<804ef568>] (should_fail_alloc_page) from [<804bfad8>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 399.483237][ T5917] [<804bfa50>] (prepare_alloc_pages.constprop.0) from [<804c6550>] (__alloc_pages_noprof+0xb4/0x1128) [ 399.483777][ T5917] r10:00000000 r9:84033600 r8:00000000 r7:84073c00 r6:00140cca r5:84073c00 [ 399.484114][ T5917] r4:00000000 r3:eda6ddf8 [ 399.484311][ T5917] [<804c649c>] (__alloc_pages_noprof) from [<804c7b50>] (__folio_alloc_noprof+0x14/0x2c) [ 399.485088][ T5917] r10:eda6dfb0 r9:84033600 r8:00000000 r7:00000040 r6:76bbce69 r5:84073c00 [ 399.486282][ T5917] r4:00001255 [ 399.486465][ T5917] [<804c7b3c>] (__folio_alloc_noprof) from [<8049b324>] (handle_mm_fault+0xd18/0x135c) [ 399.486929][ T5917] r5:84073c00 r4:00001255 [ 399.487163][ T5917] [<8049a60c>] (handle_mm_fault) from [<802142d0>] (do_page_fault+0x1c8/0x3d8) [ 399.487638][ T5917] r10:00000002 r9:84033600 r8:00000255 r7:84073c00 r6:00000a07 r5:76bbce69 [ 399.487993][ T5917] r4:eda6dfb0 [ 399.488157][ T5917] [<80214108>] (do_page_fault) from [<802146c8>] (do_DataAbort+0x38/0xa8) [ 399.488575][ T5917] r10:003b0000 r9:76bbce60 r8:80214108 r7:eda6dfb0 r6:76bbce69 r5:00000a07 [ 399.488931][ T5917] r4:8261d384 [ 399.489128][ T5917] [<80214690>] (do_DataAbort) from [<80200ebc>] (__dabt_usr+0x5c/0x60) [ 399.489524][ T5917] Exception stack(0xeda6dfb0 to 0xeda6dff8) [ 399.489825][ T5917] dfa0: 76bbce69 00000000 00000077 76bbce69 [ 399.490209][ T5917] dfc0: 00000009 00000080 0018a3c4 76bbce60 00000000 76bbce60 003b0000 00000000 [ 399.490959][ T5917] dfe0: 0018a3cd 76bbbdf0 0011aad0 00119270 20000010 ffffffff [ 399.491317][ T5917] r8:824b2044 r7:84073c00 r6:ffffffff r5:20000010 r4:00119270 [ 399.528799][ T5917] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 399.775968][ T718] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 399.945421][ T718] usb 1-1: Using ep0 maxpacket: 16 [ 399.955417][ T718] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 399.955931][ T718] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 399.956315][ T718] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 400.011543][ T718] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 400.012049][ T718] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 400.012349][ T718] usb 1-1: Product: syz [ 400.012543][ T718] usb 1-1: Manufacturer: syz [ 400.012754][ T718] usb 1-1: SerialNumber: syz [ 400.286614][ T718] usb 1-1: 0:2 : does not exist [ 400.372790][ T718] usb 1-1: USB disconnect, device number 3 [ 401.661681][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 404.190610][ T31] kauditd_printk_skb: 135 callbacks suppressed [ 404.190723][ T31] audit: type=1400 audit(404.090:6655): avc: denied { read } for pid=5966 comm="syz.1.680" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 404.193484][ T31] audit: type=1400 audit(404.090:6656): avc: denied { open } for pid=5966 comm="syz.1.680" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 404.202737][ T31] audit: type=1400 audit(404.100:6657): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 404.214878][ T31] audit: type=1400 audit(404.110:6658): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 404.216427][ T31] audit: type=1400 audit(404.110:6659): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 404.217230][ T31] audit: type=1400 audit(404.110:6660): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 404.223582][ T31] audit: type=1400 audit(404.120:6662): avc: denied { ioctl } for pid=5966 comm="syz.1.680" path="/dev/mixer" dev="devtmpfs" ino=721 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 404.225361][ T31] audit: type=1400 audit(404.110:6661): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 404.259097][ T31] audit: type=1400 audit(404.160:6663): avc: denied { write } for pid=5966 comm="syz.1.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 405.003408][ T31] audit: type=1400 audit(404.900:6664): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 407.810869][ T5981] FAULT_INJECTION: forcing a failure. [ 407.810869][ T5981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.811310][ T5981] CPU: 1 UID: 0 PID: 5981 Comm: syz.0.681 Not tainted 6.12.0-syzkaller #0 [ 407.811601][ T5981] Hardware name: ARM-Versatile Express [ 407.811719][ T5981] Call trace: [ 407.811847][ T5981] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 407.812072][ T5981] r7:20000080 r6:0000000c r5:60000013 r4:820413b8 [ 407.812233][ T5981] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 407.812550][ T5981] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 407.812809][ T5981] r5:00000000 r4:82751908 [ 407.812950][ T5981] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 407.813198][ T5981] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 407.813439][ T5981] r6:0000000c r5:0000000c r4:ee0c5e64 [ 407.813595][ T5981] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 407.813864][ T5981] [<808f19d4>] (should_fail_usercopy) from [<8149666c>] (move_addr_to_kernel+0x3c/0xe4) [ 407.814125][ T5981] [<81496630>] (move_addr_to_kernel) from [<814981b0>] (__copy_msghdr+0xe4/0x110) [ 407.814344][ T5981] r9:20000300 r8:b5403587 r7:ee0c5e20 r6:20000300 r5:ee0c5dd0 r4:ee0c5f20 [ 407.814661][ T5981] [<814980cc>] (__copy_msghdr) from [<81498288>] (copy_msghdr_from_user+0xac/0x130) [ 407.815083][ T5981] r5:00000000 r4:ee0c5f20 [ 407.815277][ T5981] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 407.815717][ T5981] r8:20028890 r7:00000000 r6:833ce780 r5:ee0c5f20 r4:ee0c5e64 [ 407.815925][ T5981] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 407.816188][ T5981] r10:00000128 r9:8404d400 r8:840dd000 r7:20028890 r6:20000300 r5:840dd001 [ 407.816437][ T5981] r4:0000000c [ 407.816559][ T5981] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 407.816824][ T5981] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 407.817019][ T5981] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 407.817275][ T5981] Exception stack(0xee0c5fa8 to 0xee0c5ff0) [ 407.817471][ T5981] 5fa0: 00000000 00000000 0000000c 20000300 20028890 00000000 [ 407.817747][ T5981] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b7c0bc [ 407.818011][ T5981] 5fe0: 76b7bec0 76b7beb0 00018af0 00133450 [ 409.220791][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 409.220881][ T31] audit: type=1400 audit(409.120:6740): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 409.253074][ T31] audit: type=1400 audit(409.150:6741): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 409.257632][ T31] audit: type=1400 audit(409.160:6742): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 409.262709][ T31] audit: type=1400 audit(409.160:6743): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 409.264050][ T31] audit: type=1400 audit(409.160:6744): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 409.286330][ T31] audit: type=1400 audit(409.170:6745): avc: denied { recv } for pid=31 comm="kauditd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 409.287232][ T31] audit: type=1400 audit(409.170:6746): avc: denied { recv } for pid=31 comm="kauditd" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 409.288000][ T31] audit: type=1400 audit(409.170:6747): avc: denied { recv } for pid=31 comm="kauditd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 409.288711][ T31] audit: type=1400 audit(409.170:6748): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 409.289462][ T31] audit: type=1400 audit(409.170:6749): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 414.502089][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 414.502178][ T31] audit: type=1400 audit(414.400:6868): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 414.523991][ T31] audit: type=1400 audit(414.420:6869): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 414.542627][ T31] audit: type=1400 audit(414.430:6870): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 414.543571][ T31] audit: type=1400 audit(414.430:6871): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 414.560175][ T31] audit: type=1400 audit(414.430:6872): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 414.561148][ T31] audit: type=1400 audit(414.450:6874): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 414.561839][ T31] audit: type=1400 audit(414.450:6875): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 414.579038][ T31] audit: type=1400 audit(414.450:6876): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 414.580057][ T31] audit: type=1400 audit(414.430:6873): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 414.580744][ T31] audit: type=1400 audit(414.450:6877): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 419.518297][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 419.518355][ T31] audit: type=1400 audit(419.420:6942): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.519244][ T31] audit: type=1400 audit(419.420:6943): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.519817][ T31] audit: type=1400 audit(419.420:6944): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.533872][ T31] audit: type=1400 audit(419.430:6945): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.535269][ T31] audit: type=1400 audit(419.430:6946): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 419.535989][ T31] audit: type=1400 audit(419.430:6947): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 419.536487][ T31] audit: type=1400 audit(419.430:6948): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 419.537063][ T31] audit: type=1400 audit(419.430:6949): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 419.537678][ T31] audit: type=1400 audit(419.430:6950): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 419.567971][ T31] audit: type=1400 audit(419.440:6951): avc: denied { recv } for pid=3084 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.951412][ T6031] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=6031 comm=syz.1.694 [ 424.672105][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 424.672220][ T31] audit: type=1400 audit(424.570:7002): avc: denied { read write } for pid=6039 comm="syz.1.697" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 424.680118][ T31] audit: type=1400 audit(424.580:7003): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 424.688171][ T31] audit: type=1400 audit(424.590:7004): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 424.689015][ T31] audit: type=1400 audit(424.590:7005): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 424.689698][ T31] audit: type=1400 audit(424.590:7006): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 424.690335][ T31] audit: type=1400 audit(424.590:7007): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 424.730649][ T31] audit: type=1400 audit(424.630:7008): avc: denied { read write open } for pid=6039 comm="syz.1.697" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 424.732210][ T31] audit: type=1400 audit(424.630:7009): avc: denied { ioctl } for pid=6039 comm="syz.1.697" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 424.743939][ T31] audit: type=1400 audit(424.640:7010): avc: denied { ioctl } for pid=6039 comm="syz.1.697" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 424.765122][ T31] audit: type=1400 audit(424.660:7011): avc: denied { ioctl } for pid=6039 comm="syz.1.697" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 424.995611][ T51] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 425.165386][ T51] usb 2-1: Using ep0 maxpacket: 8 [ 425.265595][ T51] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 425.366286][ T51] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 425.366819][ T51] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 425.367116][ T51] usb 2-1: Product: syz [ 425.367306][ T51] usb 2-1: Manufacturer: syz [ 425.367569][ T51] usb 2-1: SerialNumber: syz [ 426.684209][ T51] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 426.685212][ T51] cdc_ncm 2-1:1.0: setting tx_max = 16384 [ 427.004017][ T51] cdc_ncm 2-1:1.0 eth1: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 427.034506][ T6040] FAULT_INJECTION: forcing a failure. [ 427.034506][ T6040] name failslab, interval 1, probability 0, space 0, times 0 [ 427.046180][ T6040] CPU: 1 UID: 0 PID: 6040 Comm: syz.1.697 Not tainted 6.12.0-syzkaller #0 [ 427.046497][ T6040] Hardware name: ARM-Versatile Express [ 427.046688][ T6040] Call trace: [ 427.046864][ T6040] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 427.047205][ T6040] r7:00000c40 r6:84f844a8 r5:60000013 r4:820413b8 [ 427.047441][ T6040] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 427.047738][ T6040] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 427.048060][ T6040] r5:00000000 r4:8271b79c [ 427.048223][ T6040] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 427.048515][ T6040] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 427.048839][ T6040] r6:84f844a8 r5:00001000 r4:82c016c0 [ 427.049041][ T6040] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 427.049345][ T6040] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 427.049682][ T6040] r10:84049800 r9:82c9e800 r8:00000000 r7:830dd4c8 r6:84f844a8 r5:00001000 [ 427.049955][ T6040] r4:00000000 [ 427.050092][ T6040] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 427.050445][ T6040] r10:84049800 r9:00000000 r8:84f84480 r7:80085502 r6:00000004 r5:81ad1efc [ 427.050712][ T6040] r4:84f844a8 r3:824bb340 [ 427.050873][ T6040] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 427.051192][ T6040] r9:00000003 r8:84f84480 r7:76bf9e90 r6:76bf9e90 r5:80085502 r4:84f84480 [ 427.051490][ T6040] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 427.051849][ T6040] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 427.052201][ T6040] r7:76bf9e90 r6:84f84481 r5:00000003 r4:80085502 [ 427.052438][ T6040] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 427.052794][ T6040] Exception stack(0xee2e1fa8 to 0xee2e1ff0) [ 427.053023][ T6040] 1fa0: 76bf9ea0 00000003 00000003 80085502 76bf9e90 76bf8e60 [ 427.053328][ T6040] 1fc0: 76bf9ea0 00000003 00000003 00000036 00000000 00000000 003d0f00 76bfb0bc [ 427.053681][ T6040] 1fe0: 00000000 76bf8e48 00258000 00132e1c [ 427.053934][ T6040] r10:00000036 r9:84049800 r8:8020029c r7:00000036 r6:00000003 r5:00000003 [ 427.054214][ T6040] r4:76bf9ea0 [ 427.054368][ T6040] ERROR: Out of memory at tomoyo_realpath_from_path. [ 429.687661][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 429.687862][ T31] audit: type=1400 audit(429.590:7083): avc: denied { search } for pid=6058 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.692178][ T31] audit: type=1400 audit(429.590:7084): avc: denied { getattr } for pid=6058 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=34 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 429.694349][ T31] audit: type=1400 audit(429.590:7085): avc: denied { search } for pid=6058 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.704907][ T31] audit: type=1400 audit(429.600:7086): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 429.706314][ T31] audit: type=1400 audit(429.600:7087): avc: denied { search } for pid=6058 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.724947][ T31] audit: type=1400 audit(429.600:7088): avc: denied { write } for pid=6058 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.726052][ T31] audit: type=1400 audit(429.620:7089): avc: denied { remove_name search } for pid=6058 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=34 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.726803][ T31] audit: type=1400 audit(429.620:7090): avc: denied { unlink } for pid=6058 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=34 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 429.727534][ T31] audit: type=1400 audit(429.620:7091): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.728204][ T31] audit: type=1400 audit(429.620:7092): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 430.432805][ T51] usb 2-1: USB disconnect, device number 14 [ 430.434059][ T51] cdc_ncm 2-1:1.0 eth1: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 431.187637][ T6079] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=6079 comm=syz.1.699 [ 434.097931][ T6098] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5129 sclass=netlink_tcpdiag_socket pid=6098 comm=syz.0.702 [ 434.588687][ T6105] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=6105 comm=syz.0.704 [ 434.721460][ T31] kauditd_printk_skb: 180 callbacks suppressed [ 434.721575][ T31] audit: type=1400 audit(434.620:7273): avc: denied { create } for pid=6107 comm="syz.0.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 434.737186][ T31] audit: type=1400 audit(434.640:7274): avc: denied { create } for pid=6107 comm="syz.0.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 434.765293][ T31] audit: type=1400 audit(434.660:7275): avc: denied { read } for pid=6107 comm="syz.0.705" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 434.766922][ T31] audit: type=1400 audit(434.670:7276): avc: denied { open } for pid=6107 comm="syz.0.705" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 434.791207][ T31] audit: type=1400 audit(434.690:7277): avc: denied { setopt } for pid=6107 comm="syz.0.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 434.793001][ T31] audit: type=1400 audit(434.690:7278): avc: denied { connect } for pid=6107 comm="syz.0.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 434.854317][ T31] audit: type=1400 audit(434.750:7279): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 434.872464][ T31] audit: type=1400 audit(434.770:7280): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 434.903356][ T31] audit: type=1400 audit(434.800:7281): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 434.907541][ T31] audit: type=1400 audit(434.800:7282): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 438.567376][ T6122] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=6122 comm=syz.0.709 [ 438.827788][ T6120] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5129 sclass=netlink_tcpdiag_socket pid=6120 comm=syz.1.708 [ 439.874078][ T31] kauditd_printk_skb: 147 callbacks suppressed [ 439.874168][ T31] audit: type=1400 audit(439.770:7430): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 439.897297][ T31] audit: type=1400 audit(439.800:7431): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 439.908039][ T31] audit: type=1400 audit(439.810:7432): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 439.908850][ T31] audit: type=1400 audit(439.810:7433): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 439.909270][ T31] audit: type=1400 audit(439.810:7434): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 439.909656][ T31] audit: type=1400 audit(439.810:7435): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 439.921084][ T31] audit: type=1400 audit(439.820:7436): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 439.921635][ T31] audit: type=1400 audit(439.820:7437): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 439.922074][ T31] audit: type=1400 audit(439.820:7438): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 439.928710][ T31] audit: type=1400 audit(439.830:7439): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 440.036764][ T6136] FAULT_INJECTION: forcing a failure. [ 440.036764][ T6136] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.039142][ T6136] CPU: 1 UID: 0 PID: 6136 Comm: syz.0.714 Not tainted 6.12.0-syzkaller #0 [ 440.039461][ T6136] Hardware name: ARM-Versatile Express [ 440.039609][ T6136] Call trace: [ 440.039734][ T6136] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 440.039975][ T6136] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 440.040114][ T6136] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 440.040416][ T6136] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 440.040666][ T6136] r5:00000000 r4:82751908 [ 440.040771][ T6136] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 440.041009][ T6136] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 440.041231][ T6136] r6:00000000 r5:ee5a9f68 r4:00000002 [ 440.041396][ T6136] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 440.041615][ T6136] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 440.041834][ T6136] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 440.042064][ T6136] r10:00000001 r9:805cc9a0 r8:00000002 r7:ee5a9f68 r6:0000000f r5:76bbdf30 [ 440.042230][ T6136] r4:8404ec00 r3:ee5a9e9f [ 440.042401][ T6136] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 440.042662][ T6136] r8:76bbdf30 r7:ee5a9f68 r6:8404ec00 r5:0000000f r4:84f84a80 [ 440.042861][ T6136] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 440.043124][ T6136] r10:00000003 r9:8404ec00 r8:8020029c r7:00000000 r6:00000000 r5:84f84a80 [ 440.043387][ T6136] r4:84f84a83 [ 440.043512][ T6136] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 440.043715][ T6136] r7:00000003 r6:00000004 r5:76bbdf30 r4:0000000f [ 440.043872][ T6136] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 440.044064][ T6136] Exception stack(0xee5a9fa8 to 0xee5a9ff0) [ 440.044224][ T6136] 9fa0: 0000000f 76bbdf30 00000004 76bbdf30 0000000f 00000000 [ 440.044431][ T6136] 9fc0: 0000000f 76bbdf30 00000004 00000003 00000000 00006364 003d0f00 76bbe0bc [ 440.044807][ T6136] 9fe0: 00000158 76bbded0 000d8998 00131324 [ 440.745764][ T6141] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5129 sclass=netlink_tcpdiag_socket pid=6141 comm=syz.0.717 [ 442.320579][ T6154] fuse: Bad value for 'fd' [ 443.200763][ T6161] FAULT_INJECTION: forcing a failure. [ 443.200763][ T6161] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.246590][ T6161] CPU: 1 UID: 0 PID: 6161 Comm: syz.1.719 Not tainted 6.12.0-syzkaller #0 [ 443.246948][ T6161] Hardware name: ARM-Versatile Express [ 443.247176][ T6161] Call trace: [ 443.247446][ T6161] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 443.247842][ T6161] r7:ee915e20 r6:200001c0 r5:60000013 r4:820413b8 [ 443.248087][ T6161] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 443.248409][ T6161] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 443.248747][ T6161] r5:00000000 r4:82751908 [ 443.248934][ T6161] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 443.249277][ T6161] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 443.249627][ T6161] r6:200001c0 r5:00000000 r4:ee915f20 [ 443.249850][ T6161] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 443.250176][ T6161] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 443.250547][ T6161] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 443.250910][ T6161] r8:00008800 r7:00000000 r6:833cf680 r5:ee915f20 r4:ee915e64 [ 443.251175][ T6161] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 443.251575][ T6161] r10:00000128 r9:8404bc00 r8:84f84e40 r7:00008800 r6:200001c0 r5:84f84e41 [ 443.251875][ T6161] r4:00000003 [ 443.252029][ T6161] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 443.252366][ T6161] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 443.252649][ T6161] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 443.252976][ T6161] Exception stack(0xee915fa8 to 0xee915ff0) [ 443.253228][ T6161] 5fa0: 00000000 00000000 00000003 200001c0 00008800 00000000 [ 443.253567][ T6161] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bda0bc [ 443.253889][ T6161] 5fe0: 76bd9ec0 76bd9eb0 00018af0 00133450 [ 444.949780][ T31] kauditd_printk_skb: 248 callbacks suppressed [ 444.949886][ T31] audit: type=1400 audit(444.850:7688): avc: denied { mounton } for pid=6167 comm="syz.1.727" path="/352/file0" dev="tmpfs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 444.961193][ T31] audit: type=1400 audit(444.860:7689): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 444.963415][ T6169] fuse: Bad value for 'fd' [ 444.965689][ T31] audit: type=1400 audit(444.870:7690): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 444.966962][ T31] audit: type=1400 audit(444.870:7691): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 444.968143][ T31] audit: type=1400 audit(444.870:7692): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 444.990416][ T31] audit: type=1400 audit(444.890:7693): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 445.035187][ T31] audit: type=1400 audit(444.930:7694): avc: denied { read write } for pid=6168 comm="syz.0.729" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 445.046866][ T31] audit: type=1400 audit(444.940:7695): avc: denied { open } for pid=6168 comm="syz.0.729" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 445.080320][ T31] audit: type=1400 audit(444.970:7696): avc: denied { mounton } for pid=6168 comm="syz.0.729" path="/375/file0" dev="tmpfs" ino=2059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 445.097277][ T31] audit: type=1400 audit(445.000:7697): avc: denied { mount } for pid=6168 comm="syz.0.729" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 446.642315][ T6173] fuse: root generation should be zero [ 446.933065][ T6181] FAULT_INJECTION: forcing a failure. [ 446.933065][ T6181] name failslab, interval 1, probability 0, space 0, times 0 [ 446.933429][ T6181] CPU: 1 UID: 0 PID: 6181 Comm: syz.0.733 Not tainted 6.12.0-syzkaller #0 [ 446.933576][ T6181] Hardware name: ARM-Versatile Express [ 446.933689][ T6181] Call trace: [ 446.933774][ T6181] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 446.933972][ T6181] r7:8404b000 r6:00000cc0 r5:60000113 r4:820413b8 [ 446.934135][ T6181] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 446.934310][ T6181] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 446.934504][ T6181] r5:00000000 r4:8271b79c [ 446.934791][ T6181] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 446.935431][ T6181] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 446.935657][ T6181] r6:00000cc0 r5:00000002 r4:82c01240 [ 446.935799][ T6181] [<804ef4d4>] (should_failslab) from [<804d36d8>] (__kmalloc_cache_noprof+0x4c/0x344) [ 446.936009][ T6181] [<804d368c>] (__kmalloc_cache_noprof) from [<802fca4c>] (__request_module+0xe8/0x2c0) [ 446.936238][ T6181] r10:df9cdd84 r9:85207c00 r8:826f8ad4 r7:8404b000 r6:8054849c r5:00000002 [ 446.936437][ T6181] r4:00000000 [ 446.936544][ T6181] [<802fc964>] (__request_module) from [<8054849c>] (get_fs_type+0x8c/0xe8) [ 446.936753][ T6181] r3:8203eaf4 r2:00000006 r1:8206089c [ 446.936895][ T6181] r8:852071c0 r7:8203eaf4 r6:00000006 r5:00000000 r4:8203eaf4 [ 446.937055][ T6181] [<80548410>] (get_fs_type) from [<8075a198>] (tomoyo_mount_acl+0x2a4/0x32c) [ 446.937266][ T6181] r7:8203eaf4 r6:00000000 r5:00000000 r4:df9cde68 [ 446.937417][ T6181] [<80759ef4>] (tomoyo_mount_acl) from [<8075a2d0>] (tomoyo_mount_permission+0xb0/0x1f0) [ 446.937651][ T6181] r10:8404b000 r9:8075c320 r8:8203eaf4 r7:df9cdf6c r6:00000000 r5:00000001 [ 446.937831][ T6181] r4:00000000 [ 446.937954][ T6181] [<8075a220>] (tomoyo_mount_permission) from [<8075c33c>] (tomoyo_sb_mount+0x1c/0x24) [ 446.938311][ T6181] r8:00000000 r7:00008001 r6:00000000 r5:df9cdf6c r4:00000000 [ 446.938559][ T6181] [<8075c320>] (tomoyo_sb_mount) from [<807136b8>] (security_sb_mount+0x7c/0x24c) [ 446.938771][ T6181] [<8071363c>] (security_sb_mount) from [<8054ea6c>] (path_mount+0x78/0xacc) [ 446.938990][ T6181] r9:00000000 r8:00008001 r7:00000000 r6:df9cdf6c r5:00000000 r4:00000000 [ 446.939174][ T6181] [<8054e9f4>] (path_mount) from [<8054fa48>] (sys_mount+0x178/0x260) [ 446.939465][ T6181] r10:00000015 r9:8404b000 r8:00000000 r7:00000000 r6:00000000 r5:00000000 [ 446.939771][ T6181] r4:00000000 [ 446.939898][ T6181] [<8054f8d0>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 446.940142][ T6181] Exception stack(0xdf9cdfa8 to 0xdf9cdff0) [ 446.940399][ T6181] dfa0: 00000000 00000000 00000000 20000140 00000000 00008001 [ 446.940753][ T6181] dfc0: 00000000 00000000 00131400 00000015 00000000 00006364 003d0f00 76bbe0bc [ 446.941096][ T6181] dfe0: 76bbdec0 76bbdeb0 00018af0 00133450 [ 446.941363][ T6181] r10:00000015 r9:8404b000 r8:8020029c r7:00000015 r6:00131400 r5:00000000 [ 446.941714][ T6181] r4:00000000 [ 450.027005][ T31] kauditd_printk_skb: 176 callbacks suppressed [ 450.027107][ T31] audit: type=1400 audit(449.920:7874): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.028403][ T31] audit: type=1400 audit(449.920:7875): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.029128][ T31] audit: type=1400 audit(449.930:7876): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.037501][ T31] audit: type=1400 audit(449.930:7877): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.038390][ T31] audit: type=1400 audit(449.930:7878): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.039144][ T31] audit: type=1400 audit(449.940:7879): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.065154][ T31] audit: type=1400 audit(449.950:7880): avc: denied { recv } for pid=3084 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.066052][ T31] audit: type=1400 audit(449.960:7881): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 450.066775][ T31] audit: type=1400 audit(449.960:7882): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 450.067408][ T31] audit: type=1400 audit(449.960:7883): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 455.048571][ T31] kauditd_printk_skb: 149 callbacks suppressed [ 455.048678][ T31] audit: type=1400 audit(454.950:8033): avc: denied { recv } for pid=1987 comm="kworker/u10:5" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 455.053501][ T31] audit: type=1400 audit(454.950:8034): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 455.054437][ T31] audit: type=1400 audit(454.950:8035): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 455.068089][ T31] audit: type=1400 audit(454.970:8036): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 455.110900][ T31] audit: type=1400 audit(455.000:8037): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 455.111880][ T31] audit: type=1400 audit(455.010:8038): avc: denied { recv } for pid=3084 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 455.112633][ T31] audit: type=1400 audit(455.010:8039): avc: denied { recv } for pid=3084 comm="sshd" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 455.145244][ T31] audit: type=1400 audit(455.030:8040): avc: denied { read write open } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 455.146190][ T31] audit: type=1400 audit(455.030:8041): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 455.146837][ T31] audit: type=1400 audit(455.030:8042): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 456.175551][ T2886] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 456.315498][ T2886] usb 1-1: device descriptor read/64, error -71 [ 456.566087][ T2886] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 456.696024][ T2886] usb 1-1: device descriptor read/64, error -71 [ 456.806122][ T2886] usb usb1-port1: attempt power cycle [ 457.150442][ T2886] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 457.193387][ T2886] usb 1-1: device descriptor read/8, error -71 [ 457.428048][ T2886] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 457.495613][ T2886] usb 1-1: device descriptor read/8, error -71 [ 457.608755][ T2886] usb usb1-port1: unable to enumerate USB device [ 459.936404][ T6248] fuse: Bad value for 'fd' [ 460.072671][ T31] kauditd_printk_skb: 128 callbacks suppressed [ 460.072761][ T31] audit: type=1400 audit(459.970:8171): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.086968][ T31] audit: type=1400 audit(459.990:8172): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.099098][ T31] audit: type=1400 audit(460.000:8173): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 460.124254][ T31] audit: type=1400 audit(460.020:8174): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.140929][ T31] audit: type=1400 audit(460.020:8175): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.141835][ T31] audit: type=1400 audit(460.020:8176): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.142561][ T31] audit: type=1400 audit(460.030:8177): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.143373][ T31] audit: type=1400 audit(460.030:8178): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.144088][ T31] audit: type=1400 audit(460.040:8179): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 460.165713][ T31] audit: type=1400 audit(460.040:8180): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 465.351736][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 465.351860][ T31] audit: type=1400 audit(465.250:8230): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 465.353430][ T31] audit: type=1400 audit(465.250:8231): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 465.360245][ T31] audit: type=1400 audit(465.260:8232): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 465.361391][ T31] audit: type=1400 audit(465.260:8233): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 465.421739][ T31] audit: type=1400 audit(465.300:8234): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 465.422689][ T31] audit: type=1400 audit(465.300:8235): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.423608][ T31] audit: type=1400 audit(465.300:8236): avc: denied { recv } for pid=3084 comm="sshd" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 465.424571][ T31] audit: type=1400 audit(465.300:8237): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 465.428818][ T31] audit: type=1400 audit(465.300:8238): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 465.429592][ T31] audit: type=1400 audit(465.300:8239): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.056407][ T6262] fuse: Bad value for 'fd' [ 470.355430][ T6276] fuse: Bad value for 'fd' [ 470.376047][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 470.376146][ T31] audit: type=1400 audit(470.270:8337): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 470.377463][ T31] audit: type=1400 audit(470.270:8338): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 470.378077][ T31] audit: type=1400 audit(470.270:8339): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.378652][ T31] audit: type=1400 audit(470.270:8340): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.388815][ T31] audit: type=1400 audit(470.270:8341): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.447154][ T31] audit: type=1400 audit(470.340:8342): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 470.488766][ T31] audit: type=1400 audit(470.390:8343): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 470.489544][ T31] audit: type=1400 audit(470.390:8344): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 470.490173][ T31] audit: type=1400 audit(470.390:8345): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 470.496417][ T31] audit: type=1400 audit(470.400:8346): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 475.678895][ T31] kauditd_printk_skb: 115 callbacks suppressed [ 475.678965][ T31] audit: type=1400 audit(475.570:8462): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 475.679749][ T31] audit: type=1400 audit(475.580:8463): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 475.705860][ T31] audit: type=1400 audit(475.600:8464): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 475.709710][ T31] audit: type=1400 audit(475.610:8465): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 475.710424][ T31] audit: type=1400 audit(475.610:8466): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 475.711497][ T31] audit: type=1400 audit(475.610:8467): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 475.712173][ T31] audit: type=1400 audit(475.610:8468): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 475.730243][ T31] audit: type=1400 audit(475.630:8469): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 475.731113][ T31] audit: type=1400 audit(475.630:8470): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 475.731854][ T31] audit: type=1400 audit(475.630:8471): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 477.356010][ T6320] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=6320 comm=syz.1.779 [ 480.707632][ T31] kauditd_printk_skb: 143 callbacks suppressed [ 480.707718][ T31] audit: type=1400 audit(480.610:8615): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 480.723764][ T31] audit: type=1400 audit(480.620:8616): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 480.731854][ T31] audit: type=1400 audit(480.630:8617): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 480.737355][ T31] audit: type=1400 audit(480.640:8618): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 480.760150][ T31] audit: type=1400 audit(480.650:8619): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 480.760901][ T31] audit: type=1400 audit(480.650:8620): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 480.761470][ T31] audit: type=1400 audit(480.650:8621): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 480.762050][ T31] audit: type=1400 audit(480.650:8622): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 480.762637][ T31] audit: type=1400 audit(480.650:8623): avc: denied { open } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 480.763215][ T31] audit: type=1400 audit(480.650:8624): avc: denied { ioctl } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 481.378413][ T6342] binfmt_misc: register: failed to install interpreter file ./file0 [ 485.717174][ T31] kauditd_printk_skb: 103 callbacks suppressed [ 485.717292][ T31] audit: type=1400 audit(485.620:8728): avc: denied { ioctl } for pid=6356 comm="syz.0.792" path="/dev/urandom" dev="devtmpfs" ino=8 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 485.742932][ T31] audit: type=1400 audit(485.640:8730): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 485.743987][ T31] audit: type=1400 audit(485.640:8731): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 485.760689][ T31] audit: type=1400 audit(485.640:8732): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 485.761478][ T31] audit: type=1400 audit(485.640:8733): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 485.762138][ T31] audit: type=1400 audit(485.640:8734): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 485.762798][ T31] audit: type=1400 audit(485.640:8729): avc: denied { create } for pid=6356 comm="syz.0.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 485.772761][ T31] audit: type=1400 audit(485.670:8735): avc: denied { getopt } for pid=6356 comm="syz.0.792" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 485.785486][ T31] audit: type=1400 audit(485.680:8736): avc: denied { create } for pid=6356 comm="syz.0.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 485.797190][ T31] audit: type=1400 audit(485.700:8737): avc: denied { setopt } for pid=6356 comm="syz.0.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 487.302363][ T6368] binfmt_misc: register: failed to install interpreter file ./file0 [ 491.358869][ T31] kauditd_printk_skb: 240 callbacks suppressed [ 491.358963][ T31] audit: type=1400 audit(491.260:8976): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 491.382586][ T31] audit: type=1400 audit(491.280:8977): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 491.383122][ T31] audit: type=1400 audit(491.280:8978): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 491.383724][ T31] audit: type=1400 audit(491.280:8979): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 491.388337][ T31] audit: type=1400 audit(491.280:8980): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 491.388855][ T31] audit: type=1400 audit(491.280:8981): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 491.408402][ T31] audit: type=1400 audit(491.310:8982): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 491.409087][ T31] audit: type=1400 audit(491.310:8983): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 491.409702][ T31] audit: type=1400 audit(491.310:8984): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 491.414086][ T31] audit: type=1400 audit(491.310:8985): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 491.897315][ T6404] binfmt_misc: register: failed to install interpreter file ./file0 [ 492.037504][ T6405] FAULT_INJECTION: forcing a failure. [ 492.037504][ T6405] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 492.037961][ T6405] CPU: 1 UID: 0 PID: 6405 Comm: syz.1.811 Not tainted 6.12.0-syzkaller #0 [ 492.038207][ T6405] Hardware name: ARM-Versatile Express [ 492.038422][ T6405] Call trace: [ 492.038628][ T6405] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 492.038960][ T6405] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 492.039180][ T6405] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 492.039496][ T6405] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 492.039810][ T6405] r5:00000000 r4:82751908 [ 492.039983][ T6405] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 492.040285][ T6405] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 492.040602][ T6405] r6:00000000 r5:e063df68 r4:00000002 [ 492.040800][ T6405] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 492.041102][ T6405] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 492.041433][ T6405] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 492.041787][ T6405] r10:00000001 r9:805cc9a0 r8:00000002 r7:e063df68 r6:0000000f r5:76bfaf30 [ 492.042046][ T6405] r4:8404ec00 r3:e063de9f [ 492.042214][ T6405] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 492.042518][ T6405] r8:76bfaf30 r7:e063df68 r6:8404ec00 r5:0000000f r4:840dd3c0 [ 492.042765][ T6405] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 492.042966][ T6405] r10:00000003 r9:8404ec00 r8:8020029c r7:00000000 r6:00000000 r5:840dd3c0 [ 492.043231][ T6405] r4:840dd3c3 [ 492.043417][ T6405] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 492.043704][ T6405] r7:00000003 r6:00000006 r5:76bfaf30 r4:0000000f [ 492.043929][ T6405] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 492.044145][ T6405] Exception stack(0xe063dfa8 to 0xe063dff0) [ 492.044396][ T6405] dfa0: 0000000f 76bfaf30 00000006 76bfaf30 0000000f 00000000 [ 492.045219][ T6405] dfc0: 0000000f 76bfaf30 00000006 00000003 00000000 00006364 003d0f00 76bfb0bc [ 492.045907][ T6405] dfe0: 00000158 76bfaed0 000d8998 00131324 [ 492.477123][ T6411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6411 comm=syz.1.815 [ 496.616302][ T31] kauditd_printk_skb: 201 callbacks suppressed [ 496.616416][ T31] audit: type=1400 audit(496.500:9187): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 496.632815][ T31] audit: type=1400 audit(496.530:9188): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 496.649124][ T31] audit: type=1400 audit(496.550:9190): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 496.650542][ T31] audit: type=1400 audit(496.550:9191): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 496.651284][ T31] audit: type=1400 audit(496.550:9192): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 496.666184][ T31] audit: type=1400 audit(496.560:9193): avc: denied { read write open } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 496.667097][ T31] audit: type=1400 audit(496.560:9194): avc: denied { ioctl } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 496.686971][ T31] audit: type=1400 audit(496.570:9195): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 496.687941][ T31] audit: type=1400 audit(496.540:9189): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 496.688568][ T31] audit: type=1400 audit(496.580:9196): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 501.739405][ T31] kauditd_printk_skb: 165 callbacks suppressed [ 501.739472][ T31] audit: type=1400 audit(501.640:9362): avc: denied { setopt } for pid=6451 comm="syz.1.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 501.759423][ T31] audit: type=1400 audit(501.660:9363): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 501.764023][ T31] audit: type=1400 audit(501.660:9364): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 501.776223][ T31] audit: type=1400 audit(501.660:9365): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 501.777037][ T31] audit: type=1400 audit(501.670:9366): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 501.777686][ T31] audit: type=1400 audit(501.670:9367): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 501.793682][ T31] audit: type=1400 audit(501.690:9368): avc: denied { read } for pid=6454 comm="syz.0.833" name="timer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 501.797377][ T31] audit: type=1400 audit(501.700:9369): avc: denied { open } for pid=6454 comm="syz.0.833" path="/dev/snd/timer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 501.817554][ T31] audit: type=1400 audit(501.710:9370): avc: denied { setattr } for pid=6454 comm="syz.0.833" path="/dev/snd/timer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 501.818134][ T31] audit: type=1400 audit(501.720:9371): avc: denied { write } for pid=6454 comm="syz.0.833" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 507.325255][ T31] kauditd_printk_skb: 198 callbacks suppressed [ 507.325348][ T31] audit: type=1400 audit(507.220:9570): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 507.342379][ T31] audit: type=1400 audit(507.240:9571): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 507.361345][ T31] audit: type=1400 audit(507.260:9572): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 507.383614][ T31] audit: type=1400 audit(507.280:9573): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 507.385312][ T31] audit: type=1400 audit(507.280:9574): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 507.386630][ T31] audit: type=1400 audit(507.280:9575): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58182 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 507.387402][ T31] audit: type=1400 audit(507.280:9576): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 507.410230][ T31] audit: type=1400 audit(507.290:9577): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 507.411134][ T31] audit: type=1400 audit(507.290:9578): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 507.411842][ T31] audit: type=1400 audit(507.290:9579): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 509.349053][ T6524] FAULT_INJECTION: forcing a failure. [ 509.349053][ T6524] name failslab, interval 1, probability 0, space 0, times 0 [ 509.366557][ T6524] CPU: 1 UID: 0 PID: 6524 Comm: syz.1.851 Not tainted 6.12.0-syzkaller #0 [ 509.366941][ T6524] Hardware name: ARM-Versatile Express [ 509.367189][ T6524] Call trace: [ 509.367434][ T6524] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 509.367873][ T6524] r7:00000c40 r6:84f84ce8 r5:60000013 r4:820413b8 [ 509.368130][ T6524] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 509.368464][ T6524] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 509.368820][ T6524] r5:00000000 r4:8271b79c [ 509.369029][ T6524] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 509.369390][ T6524] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 509.369786][ T6524] r6:84f84ce8 r5:00001000 r4:82c016c0 [ 509.370013][ T6524] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 509.370371][ T6524] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 509.370789][ T6524] r10:84049800 r9:82c9fc00 r8:00000000 r7:8480d660 r6:84f84ce8 r5:00001000 [ 509.371200][ T6524] r4:00000000 [ 509.371445][ T6524] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 509.371958][ T6524] r10:84049800 r9:00000000 r8:84f84cc0 r7:40089416 r6:00000004 r5:81ad1efc [ 509.372334][ T6524] r4:84f84ce8 r3:824bb340 [ 509.372581][ T6524] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 509.373021][ T6524] r9:00000003 r8:84f84cc0 r7:00000000 r6:00000000 r5:40089416 r4:84f84cc0 [ 509.373382][ T6524] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 509.373798][ T6524] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 509.374213][ T6524] r7:00000000 r6:84f84cc1 r5:00000000 r4:40089416 [ 509.374502][ T6524] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 509.375254][ T6524] Exception stack(0xeb091fa8 to 0xeb091ff0) [ 509.375572][ T6524] 1fa0: 00000000 00000000 00000003 40089416 00000000 00000000 [ 509.375980][ T6524] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bda0bc [ 509.376360][ T6524] 1fe0: 76bd9ec0 76bd9eb0 00018af0 00133450 [ 509.376663][ T6524] r10:00000036 r9:84049800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 509.377013][ T6524] r4:00000000 [ 509.501699][ T6524] ERROR: Out of memory at tomoyo_realpath_from_path. [ 512.398070][ T31] kauditd_printk_skb: 217 callbacks suppressed [ 512.398182][ T31] audit: type=1400 audit(512.300:9797): avc: denied { ioctl } for pid=6531 comm="syz.0.856" path="socket:[14195]" dev="sockfs" ino=14195 ioctlcmd=0x89f4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 512.406086][ T31] audit: type=1400 audit(512.310:9798): avc: denied { module_request } for pid=6531 comm="syz.0.856" kmod=6E65746465762D61A983A6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 512.435940][ T31] audit: type=1400 audit(512.330:9799): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 512.436929][ T31] audit: type=1400 audit(512.330:9800): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 512.437711][ T31] audit: type=1400 audit(512.330:9801): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 512.442740][ T31] audit: type=1400 audit(512.340:9802): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 512.443736][ T31] audit: type=1400 audit(512.340:9803): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 512.665143][ T31] audit: type=1400 audit(512.560:9804): avc: denied { sys_module } for pid=6531 comm="syz.0.856" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 512.666330][ T31] audit: type=1400 audit(512.560:9805): avc: denied { module_request } for pid=6531 comm="syz.0.856" kmod=61A983A6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 512.824988][ T31] audit: type=1400 audit(512.710:9806): avc: denied { read } for pid=6531 comm="syz.0.856" name="timer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.348912][ T6555] FAULT_INJECTION: forcing a failure. [ 514.348912][ T6555] name failslab, interval 1, probability 0, space 0, times 0 [ 514.349591][ T6555] CPU: 1 UID: 0 PID: 6555 Comm: syz.0.862 Not tainted 6.12.0-syzkaller #0 [ 514.349967][ T6555] Hardware name: ARM-Versatile Express [ 514.350228][ T6555] Call trace: [ 514.350455][ T6555] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 514.350888][ T6555] r7:84080000 r6:00400cc0 r5:60000013 r4:820413b8 [ 514.351159][ T6555] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 514.351661][ T6555] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 514.352048][ T6555] r5:00000000 r4:8271b79c [ 514.352213][ T6555] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 514.352538][ T6555] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 514.352838][ T6555] r6:00400cc0 r5:ffffffff r4:82cab840 [ 514.353009][ T6555] [<804ef4d4>] (should_failslab) from [<804d3cc0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 514.353318][ T6555] [<804d3c70>] (kmem_cache_alloc_node_noprof) from [<814a2ca8>] (__alloc_skb+0x138/0x160) [ 514.353601][ T6555] r10:eb1cdddc r9:00000000 r8:00400cc0 r7:00000000 r6:82cab840 r5:ffffffff [ 514.353804][ T6555] r4:82606040 [ 514.353900][ T6555] [<814a2b70>] (__alloc_skb) from [<814ab060>] (alloc_skb_with_frags+0x44/0x1ec) [ 514.354105][ T6555] r8:802a7e50 r7:eb1cdd7c r6:00000000 r5:00001000 r4:00000003 [ 514.354313][ T6555] [<814ab01c>] (alloc_skb_with_frags) from [<8149c290>] (sock_alloc_send_pskb+0x1f4/0x228) [ 514.354893][ T6555] r10:eb1cdddc r9:00000000 r8:802a7e50 r7:eb1cdd7c r6:84080000 r5:7fffffff [ 514.355157][ T6555] r4:83df1200 [ 514.355377][ T6555] [<8149c09c>] (sock_alloc_send_pskb) from [<8176174c>] (unix_dgram_sendmsg+0x154/0x8b8) [ 514.355643][ T6555] r10:00000000 r9:83df1200 r8:84080000 r7:00000000 r6:00000015 r5:833cea00 [ 514.355835][ T6555] r4:eb1cde68 [ 514.355930][ T6555] [<817615f8>] (unix_dgram_sendmsg) from [<81761ef4>] (unix_seqpacket_sendmsg+0x44/0x84) [ 514.356161][ T6555] r10:81c4a400 r9:20000280 r8:00000000 r7:833cea00 r6:833cea00 r5:eb1cde68 [ 514.356341][ T6555] r4:00000000 [ 514.356427][ T6555] [<81761eb0>] (unix_seqpacket_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 514.356693][ T6555] r5:eb1cde68 r4:00000000 [ 514.356816][ T6555] [<814955cc>] (__sock_sendmsg) from [<814956e4>] (sock_write_iter+0xa0/0xfc) [ 514.357054][ T6555] r7:833cea00 r6:84f84180 r5:eb1cdf08 r4:eb1cdef0 [ 514.357201][ T6555] [<81495644>] (sock_write_iter) from [<8051def4>] (vfs_write+0x3a8/0x44c) [ 514.357426][ T6555] r7:84080000 r6:00000015 r5:84f84180 r4:00000000 [ 514.357593][ T6555] [<8051db4c>] (vfs_write) from [<8051e160>] (ksys_write+0xd0/0xe4) [ 514.357781][ T6555] r10:00000004 r9:84080000 r8:8020029c r7:00000015 r6:20000280 r5:84f84180 [ 514.357977][ T6555] r4:84f84181 [ 514.358069][ T6555] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 514.358287][ T6555] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 514.358436][ T6555] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 514.358640][ T6555] Exception stack(0xeb1cdfa8 to 0xeb1cdff0) [ 514.358870][ T6555] dfa0: 00000000 00000000 00000003 20000280 00000015 00000000 [ 514.359082][ T6555] dfc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76bbe0bc [ 514.359279][ T6555] dfe0: 76bbdec0 76bbdeb0 00018af0 00133450 [ 517.626830][ T31] kauditd_printk_skb: 187 callbacks suppressed [ 517.626912][ T31] audit: type=1400 audit(517.530:9994): avc: denied { ioctl } for pid=6579 comm="syz.0.870" path="socket:[14312]" dev="sockfs" ino=14312 ioctlcmd=0x89f4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 517.629958][ T31] audit: type=1400 audit(517.530:9995): avc: denied { module_request } for pid=6579 comm="syz.0.870" kmod=6E65746465762D61A983A6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 517.686588][ T31] audit: type=1400 audit(517.580:9996): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 517.687445][ T31] audit: type=1400 audit(517.580:9997): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 517.688030][ T31] audit: type=1400 audit(517.580:9998): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 517.688625][ T31] audit: type=1400 audit(517.580:9999): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 517.689194][ T31] audit: type=1400 audit(517.580:10000): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 517.890356][ T31] audit: type=1400 audit(517.790:10001): avc: denied { sys_module } for pid=6579 comm="syz.0.870" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 517.891099][ T31] audit: type=1400 audit(517.790:10002): avc: denied { module_request } for pid=6579 comm="syz.0.870" kmod=61A983A6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 518.159816][ T31] audit: type=1400 audit(518.060:10003): avc: denied { read } for pid=6579 comm="syz.0.870" name="timer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 518.892980][ T6586] FAULT_INJECTION: forcing a failure. [ 518.892980][ T6586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 518.893590][ T6586] CPU: 1 UID: 0 PID: 6586 Comm: syz.1.871 Not tainted 6.12.0-syzkaller #0 [ 518.893917][ T6586] Hardware name: ARM-Versatile Express [ 518.894114][ T6586] Call trace: [ 518.894308][ T6586] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 518.894745][ T6586] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 518.895234][ T6586] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 518.895697][ T6586] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 518.896005][ T6586] r5:00000000 r4:82751908 [ 518.896173][ T6586] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 518.896482][ T6586] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 518.896791][ T6586] r6:00000000 r5:eb359f68 r4:00000002 [ 518.896970][ T6586] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 518.897281][ T6586] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 518.897582][ T6586] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 518.897935][ T6586] r10:00000001 r9:805cc9a0 r8:00000002 r7:eb359f68 r6:0000000f r5:76bfaf30 [ 518.898210][ T6586] r4:83543000 r3:eb359e9f [ 518.898391][ T6586] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 518.898709][ T6586] r8:76bfaf30 r7:eb359f68 r6:83543000 r5:0000000f r4:84f849c0 [ 518.898974][ T6586] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 518.899260][ T6586] r10:00000003 r9:83543000 r8:8020029c r7:00000000 r6:00000000 r5:84f849c0 [ 518.899560][ T6586] r4:84f849c3 [ 518.899696][ T6586] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 518.899989][ T6586] r7:00000003 r6:00000004 r5:76bfaf30 r4:0000000f [ 518.900189][ T6586] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 518.900451][ T6586] Exception stack(0xeb359fa8 to 0xeb359ff0) [ 518.900665][ T6586] 9fa0: 0000000f 76bfaf30 00000004 76bfaf30 0000000f 00000000 [ 518.900938][ T6586] 9fc0: 0000000f 76bfaf30 00000004 00000003 00000000 00006364 003d0f00 76bfb0bc [ 518.901202][ T6586] 9fe0: 00000158 76bfaed0 000d8998 00131324 [ 522.737508][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 522.737560][ T31] audit: type=1400 audit(522.630:10109): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 522.738549][ T31] audit: type=1400 audit(522.640:10110): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=58182 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 522.744338][ T31] audit: type=1400 audit(522.640:10111): avc: denied { read write open } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 522.747159][ T31] audit: type=1400 audit(522.650:10112): avc: denied { recv } for pid=5850 comm="syz.1.661" saddr=10.0.2.2 src=45616 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 522.760724][ T31] audit: type=1400 audit(522.660:10113): avc: denied { ioctl } for pid=3091 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 522.767598][ T31] audit: type=1400 audit(522.670:10114): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 522.775595][ T31] audit: type=1400 audit(522.670:10115): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 522.776216][ T31] audit: type=1400 audit(522.670:10116): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 522.776895][ T31] audit: type=1400 audit(522.670:10117): avc: denied { open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 522.777630][ T31] audit: type=1400 audit(522.670:10118): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 526.340299][ T6627] syzkaller0: entered promiscuous mode [ 526.340740][ T6627] syzkaller0: entered allmulticast mode [ 528.664302][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 528.664392][ T31] audit: type=1400 audit(528.550:10226): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=::1 src=16385 daddr=::1 dest=56876 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 528.668815][ T31] audit: type=1400 audit(528.560:10227): avc: denied { recv } for pid=3152 comm="kworker/u8:2" saddr=::1 src=16385 daddr=::1 dest=56876 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 528.672658][ C1] 8<--- cut here --- [ 528.673142][ C1] Unable to handle kernel NULL pointer dereference at virtual address 00000008 when read [ 528.673602][ C1] [00000008] *pgd=851f7003, *pmd=fdcc9003 [ 528.675409][ C1] Internal error: Oops: 205 [#1] PREEMPT SMP ARM [ 528.676638][ C1] Modules linked in: [ 528.677007][ C1] CPU: 1 UID: 0 PID: 6633 Comm: syz.0.883 Not tainted 6.12.0-syzkaller #0 [ 528.677722][ C1] Hardware name: ARM-Versatile Express [ 528.678583][ C1] PC is at selinux_ip_output+0x54/0x80 [ 528.679252][ C1] LR is at selinux_ip_output+0x18/0x80 [ 528.679578][ C1] pc : [<8072a1d8>] lr : [<8072a19c>] psr: 40000013 [ 528.679897][ C1] sp : df805aa8 ip : df805aa8 fp : df805abc [ 528.680185][ C1] r10: 84f04e40 r9 : 84f16188 r8 : df805b10 [ 528.680474][ C1] r7 : 844cae40 r6 : 84f16180 r5 : df805b10 r4 : 844cae40 [ 528.680801][ C1] r3 : 00000000 r2 : 00000000 r1 : 00000040 r0 : 00000001 [ 528.681199][ C1] Flags: nZcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 528.681582][ C1] Control: 30c5387d Table: 851f8180 DAC: 00000000 [ 528.681941][ C1] Register r0 information: non-paged memory [ 528.682617][ C1] Register r1 information: non-paged memory [ 528.682919][ C1] Register r2 information: NULL pointer [ 528.683186][ C1] Register r3 information: NULL pointer [ 528.683543][ C1] Register r4 information: slab skbuff_head_cache start 844cae40 pointer offset 0 size 192 [ 528.684822][ C1] Register r5 information: 2-page vmalloc region starting at 0xdf804000 allocated at start_kernel+0x5d0/0x778 [ 528.685650][ C1] Register r6 information: slab kmalloc-cg-128 start 84f16180 pointer offset 0 size 128 [ 528.686199][ C1] Register r7 information: slab skbuff_head_cache start 844cae40 pointer offset 0 size 192 [ 528.686707][ C1] Register r8 information: 2-page vmalloc region starting at 0xdf804000 allocated at start_kernel+0x5d0/0x778 [ 528.687213][ C1] Register r9 information: slab kmalloc-cg-128 start 84f16180 pointer offset 8 size 128 [ 528.687742][ C1] Register r10 information: slab mnt_cache start 84f04e40 pointer offset 0 size 184 [ 528.688236][ C1] Register r11 information: 2-page vmalloc region starting at 0xdf804000 allocated at start_kernel+0x5d0/0x778 [ 528.688698][ C1] Register r12 information: 2-page vmalloc region starting at 0xdf804000 allocated at start_kernel+0x5d0/0x778 [ 528.689201][ C1] Process syz.0.883 (pid: 6633, stack limit = 0xeb504000) [ 528.689574][ C1] Stack: (0xdf805aa8 to 0xdf806000) [ 528.689809][ C1] 5aa0: 00000001 00000001 df805ae4 df805ac0 815dec9c 8072a190 [ 528.690125][ C1] 5ac0: 844cae40 ffffdd86 84414b40 82e6be10 df805be8 847a8000 df805bac df805ae8 [ 528.690432][ C1] 5ae0: 81768f18 815dec68 a0000013 804d3dc8 82fec000 df805c20 00000020 000000b8 [ 528.690741][ C1] 5b00: 00000000 8400a400 06000000 df805c10 00000a03 00000000 82fec000 84414b40 [ 528.691049][ C1] 5b20: 847a8000 81766c4c ffffffff 00000000 847a8000 84f04e40 84414b40 00000000 [ 528.691383][ C1] 5b40: 82e6be20 000000e0 df805b7c df805b58 8173e0cc 8173d134 00000006 00000000 [ 528.691676][ C1] 5b60: 84414b40 00000000 df805be8 847a8000 df805bac df805b80 81767510 7fcfe624 [ 528.691994][ C1] 5b80: 00000000 844cae40 00000000 00000000 83eb0980 00000000 82e6be20 000000e0 [ 528.692272][ C1] 5ba0: df805c74 df805bb0 817ac35c 81768b38 00000000 00000000 00000000 82eb6840 [ 528.692628][ C1] 5bc0: 00000000 00000000 96d772d4 ba538b57 82e6b680 df805cd8 84414b40 847a8000 [ 528.692931][ C1] 5be0: 82e6b760 83eb0980 00000001 00000001 00000000 00000000 00060000 00000000 [ 528.693228][ C1] 5c00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 01000000 [ 528.693546][ C1] 5c20: 00000000 00000000 00000000 01000000 00000000 01402cde 00000000 00000000 [ 528.693847][ C1] 5c40: df805c74 7fcfe624 8030b2e8 00000000 00000200 1f9720cc 00000000 84f5f000 [ 528.694131][ C1] 5c60: 83eb0980 00000000 df805d1c df805c78 817ae890 817abf10 00000200 1f9720cd [ 528.694432][ C1] 5c80: 1f9720cc 00000001 00000000 00000000 00000000 00000000 ffc9dd60 df805cd8 [ 528.694990][ C1] 5ca0: 00000001 817f43a0 84043000 00002cde 82929400 8149cc30 00000020 82e6b738 [ 528.695553][ C1] 5cc0: 847a8000 00000001 96d772d4 ba538b57 00000002 00000000 00000000 00000000 [ 528.695880][ C1] 5ce0: 00000000 00000000 00000000 7fcfe624 00000084 83eb0980 826060cc 00000006 [ 528.696181][ C1] 5d00: 00000001 82e6b738 8261a060 82e6b680 df805d64 df805d20 8176e7dc 817ad9a4 [ 528.696475][ C1] 5d20: 00000000 7fcfe624 00000000 00000006 8400a400 847a8000 80c63e84 83eb0980 [ 528.696802][ C1] 5d40: 847a8000 847a8000 00000000 00000001 00000040 ddde4e88 df805d7c df805d68 [ 528.697111][ C1] 5d60: 8176efdc 8176e780 83eb0980 00000001 df805dbc df805d80 8176f038 8176ef98 [ 528.697442][ C1] 5d80: 00000002 00000a01 82fec000 00000000 00000000 847a8000 8176ef8c 7fcfe624 [ 528.697785][ C1] 5da0: 847a8000 00000001 83eb0980 847a8000 df805dfc df805dc0 8176e614 8176f004 [ 528.698121][ C1] 5dc0: 802aca0c 00000a00 82fec000 00000000 00000000 847a8000 8176dc00 7fcfe624 [ 528.698455][ C1] 5de0: 00000000 82fec000 8176e4c4 00000000 df805e24 df805e00 814cc17c 8176e4d0 [ 528.698822][ C1] 5e00: ddde4180 83eb0980 82619424 7fcfe624 83eb0980 ddde4f70 df805e3c df805e28 [ 528.699182][ C1] 5e20: 814cc1e8 814cc12c 83eb0980 ddde4f70 df805e74 df805e40 814cc4f0 814cc1dc [ 528.699574][ C1] 5e40: 00000001 ddde4f5c 824bd180 00000001 ddde4f70 00000040 df805ecb df805ed0 [ 528.699929][ C1] 5e60: ddde50c0 ddde4e80 df805ea4 df805e78 814cd3f0 814cc45c 824bde80 82606040 [ 528.700274][ C1] 5e80: 00000000 ddde4f70 0000594c 0000012c df805ed0 ddde50c0 df805f64 df805ea8 [ 528.700638][ C1] 5ea0: 814cdc64 814cd3c8 84043000 11d2b900 df805ee0 0000594c 80319d5c 5b927000 [ 528.701093][ C1] 5ec0: 824bde80 82604d40 00de77c0 00000000 df805ed0 df805ed0 df805ed8 df805ed8 [ 528.701446][ C1] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 528.701806][ C1] 5f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 528.702142][ C1] 5f20: 00000000 00000000 00000000 00000000 8029f31c 7fcfe624 8260408c 8260408c [ 528.702491][ C1] 5f40: 00000004 00000003 00400040 00000101 84043000 00000008 df805fdc df805f68 [ 528.702831][ C1] 5f60: 8024ba68 814cd918 ddde16c4 824ba6cc 824ba6d4 00400040 82604d40 0000594b [ 528.703205][ C1] 5f80: 82223e4c 00000000 824bca80 0000000a 827ff928 8260c610 822111b8 824b2210 [ 528.703634][ C1] 5fa0: df805f68 82604080 df805fc4 df805fb8 819d75d4 60000013 00000001 824bdecc [ 528.703996][ C1] 5fc0: 82fec000 eb505908 84f04e40 00000013 df805fec df805fe0 802012d0 8024b91c [ 528.704517][ C1] 5fe0: df805ffc df805ff0 80208824 802012c8 eb5058c4 df806000 8198744c 80208820 [ 528.705224][ C1] Call trace: frame pointer underflow [ 528.705695][ C1] [<8072a184>] (selinux_ip_output) from [<815dec9c>] (nf_hook_slow+0x40/0x104) [ 528.706182][ C1] r5:00000001 r4:00000001 [ 528.706444][ C1] [<815dec5c>] (nf_hook_slow) from [<81768f18>] (ip6_xmit+0x3ec/0x7b8) [ 528.706900][ C1] r9:847a8000 r8:df805be8 r7:82e6be10 r6:84414b40 r5:ffffdd86 r4:844cae40 [ 528.707280][ C1] [<81768b2c>] (ip6_xmit) from [<817ac35c>] (tcp_v6_send_response+0x458/0x868) [ 528.707732][ C1] r10:000000e0 r9:82e6be20 r8:00000000 r7:83eb0980 r6:00000000 r5:00000000 [ 528.708139][ C1] r4:844cae40 [ 528.708358][ C1] [<817abf04>] (tcp_v6_send_response) from [<817ae890>] (tcp_v6_rcv+0xef8/0x1190) [ 528.708817][ C1] r10:00000000 r9:83eb0980 r8:84f5f000 r7:00000000 r6:1f9720cc r5:00000200 [ 528.709222][ C1] r4:00000000 [ 528.709449][ C1] [<817ad998>] (tcp_v6_rcv) from [<8176e7dc>] (ip6_protocol_deliver_rcu+0x68/0x818) [ 528.709877][ C1] r10:82e6b680 r9:8261a060 r8:82e6b738 r7:00000001 r6:00000006 r5:826060cc [ 528.710177][ C1] r4:83eb0980 [ 528.710334][ C1] [<8176e774>] (ip6_protocol_deliver_rcu) from [<8176efdc>] (ip6_input_finish+0x50/0x6c) [ 528.710710][ C1] r10:ddde4e88 r9:00000040 r8:00000001 r7:00000000 r6:847a8000 r5:847a8000 [ 528.711013][ C1] r4:83eb0980 [ 528.711166][ C1] [<8176ef8c>] (ip6_input_finish) from [<8176f038>] (ip6_input+0x40/0xd0) [ 528.711594][ C1] r5:00000001 r4:83eb0980 [ 528.711858][ C1] [<8176eff8>] (ip6_input) from [<8176e614>] (ipv6_rcv+0x150/0x15c) [ 528.712220][ C1] r6:847a8000 r5:83eb0980 r4:00000001 [ 528.712457][ C1] [<8176e4c4>] (ipv6_rcv) from [<814cc17c>] (__netif_receive_skb_one_core+0x5c/0x80) [ 528.712831][ C1] r6:00000000 r5:8176e4c4 r4:82fec000 [ 528.713036][ C1] [<814cc120>] (__netif_receive_skb_one_core) from [<814cc1e8>] (__netif_receive_skb+0x18/0x5c) [ 528.713393][ C1] r5:ddde4f70 r4:83eb0980 [ 528.713567][ C1] [<814cc1d0>] (__netif_receive_skb) from [<814cc4f0>] (process_backlog+0xa0/0x17c) [ 528.713907][ C1] r5:ddde4f70 r4:83eb0980 [ 528.714081][ C1] [<814cc450>] (process_backlog) from [<814cd3f0>] (__napi_poll+0x34/0x240) [ 528.714414][ C1] r10:ddde4e80 r9:ddde50c0 r8:df805ed0 r7:df805ecb r6:00000040 r5:ddde4f70 [ 528.715645][ C1] r4:00000001 [ 528.716132][ C1] [<814cd3bc>] (__napi_poll) from [<814cdc64>] (net_rx_action+0x358/0x440) [ 528.716821][ C1] r9:ddde50c0 r8:df805ed0 r7:0000012c r6:0000594c r5:ddde4f70 r4:00000000 [ 528.717241][ C1] [<814cd90c>] (net_rx_action) from [<8024ba68>] (handle_softirqs+0x158/0x464) [ 528.717716][ C1] r10:00000008 r9:84043000 r8:00000101 r7:00400040 r6:00000003 r5:00000004 [ 528.718131][ C1] r4:8260408c [ 528.718365][ C1] [<8024b910>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 528.718827][ C1] r10:00000013 r9:84f04e40 r8:eb505908 r7:82fec000 r6:824bdecc r5:00000001 [ 528.719266][ C1] r4:60000013 [ 528.719494][ C1] [<802012bc>] (__do_softirq) from [<80208824>] (____do_softirq+0x10/0x14) [ 528.719947][ C1] [<80208814>] (____do_softirq) from [<8198744c>] (call_with_stack+0x1c/0x20) [ 528.720405][ C1] [<81987430>] (call_with_stack) from [<80208860>] (do_softirq_own_stack+0x38/0x3c) [ 528.720842][ C1] [<80208828>] (do_softirq_own_stack) from [<8024c064>] (do_softirq+0x5c/0x64) [ 528.721244][ C1] [<8024c008>] (do_softirq) from [<8024c138>] (__local_bh_enable_ip+0xcc/0xd0) [ 528.721667][ C1] r5:00000001 r4:84043000 [ 528.721916][ C1] [<8024c06c>] (__local_bh_enable_ip) from [<814c943c>] (__dev_queue_xmit+0x394/0xfa4) [ 528.722318][ C1] r5:83eff000 r4:00000000 [ 528.722531][ C1] [<814c90a8>] (__dev_queue_xmit) from [<81767b1c>] (ip6_finish_output2+0x374/0x97c) [ 528.722961][ C1] r10:00000013 r9:00000009 r8:00000010 r7:0000000e r6:84f69d00 r5:83eb0980 [ 528.723362][ C1] r4:00000000 [ 528.723555][ C1] [<817677a8>] (ip6_finish_output2) from [<8176c774>] (ip6_finish_output+0x238/0x3a8) [ 528.723970][ C1] r10:84f04e40 r9:00000000 r8:00010000 r7:00000000 r6:847a8000 r5:846d8840 [ 528.724320][ C1] r4:83eb0980 [ 528.724514][ C1] [<8176c53c>] (ip6_finish_output) from [<8176c964>] (ip6_output+0x80/0x1e8) [ 528.725125][ C1] r10:84f04e40 r9:00000000 r8:82fec000 r7:00000001 r6:846d8840 r5:847a8000 [ 528.725459][ C1] r4:83eb0980 [ 528.725615][ C1] [<8176c8e4>] (ip6_output) from [<81768e78>] (ip6_xmit+0x34c/0x7b8) [ 528.725948][ C1] r9:847a8000 r8:eb505b88 r7:82e6b750 r6:846d8840 r5:00000001 r4:83eb0980 [ 528.726225][ C1] [<81768b2c>] (ip6_xmit) from [<817b70a4>] (inet6_csk_xmit+0xc8/0x124) [ 528.726546][ C1] r10:00010000 r9:0000007b r8:83eb0998 r7:846d8fc0 r6:84f04e40 r5:83eb0980 [ 528.726878][ C1] r4:846d8840 [ 528.727058][ C1] [<817b6fdc>] (inet6_csk_xmit) from [<8169c984>] (__tcp_transmit_skb+0x56c/0xd5c) [ 528.727517][ C1] r7:00000020 r6:00000000 r5:83eb0980 r4:846d8840 [ 528.727791][ C1] [<8169c418>] (__tcp_transmit_skb) from [<8169eec0>] (tcp_write_xmit+0x388/0x1848) [ 528.728186][ C1] r10:00008000 r9:00008000 r8:96d772d3 r7:846d8968 r6:00000000 r5:846d8840 [ 528.728509][ C1] r4:83eb08c0 [ 528.728694][ C1] [<8169eb38>] (tcp_write_xmit) from [<816a03b8>] (__tcp_push_pending_frames+0x38/0x10c) [ 528.729115][ C1] r10:000001b4 r9:84043000 r8:82caf610 r7:000001a2 r6:846d8968 r5:83eb08c0 [ 528.729447][ C1] r4:846d8840 [ 528.729630][ C1] [<816a0380>] (__tcp_push_pending_frames) from [<816a1204>] (tcp_send_fin+0x64/0x248) [ 528.730103][ C1] r5:83eb08c0 r4:846d8840 [ 528.730336][ C1] [<816a11a0>] (tcp_send_fin) from [<81684070>] (tcp_shutdown+0x54/0x58) [ 528.730786][ C1] r6:00000002 r5:00000089 r4:846d8840 [ 528.731065][ C1] [<8168401c>] (tcp_shutdown) from [<81964604>] (mptcp_subflow_shutdown+0xd8/0x1b8) [ 528.731579][ C1] r5:84e50000 r4:846d8840 [ 528.731829][ C1] [<8196452c>] (mptcp_subflow_shutdown) from [<8196479c>] (mptcp_check_send_data_fin+0xb8/0x17c) [ 528.732303][ C1] r7:00000000 r6:84e50514 r5:84f7b200 r4:84e50000 [ 528.732605][ C1] [<819646e4>] (mptcp_check_send_data_fin) from [<819648b4>] (__mptcp_wr_shutdown+0x54/0xf0) [ 528.733023][ C1] r7:00000000 r6:84e50000 r5:00000000 r4:84e50000 [ 528.733290][ C1] [<81964860>] (__mptcp_wr_shutdown) from [<8196724c>] (__mptcp_close+0x2c0/0x2c8) [ 528.733704][ C1] r7:00000000 r6:84e50000 r5:00000000 r4:00000084 [ 528.733989][ C1] [<81966f8c>] (__mptcp_close) from [<8196727c>] (mptcp_close+0x28/0x94) [ 528.734422][ C1] r10:000001b4 r9:84043000 r8:82caf610 r7:00000000 r6:81c88930 r5:00000000 [ 528.735678][ C1] r4:84e50000 r3:00000000 [ 528.736209][ C1] [<81967254>] (mptcp_close) from [<816cbb98>] (inet_release+0x54/0x8c) [ 528.736667][ C1] r5:833cf180 r4:84e50000 [ 528.736894][ C1] [<816cbb44>] (inet_release) from [<81764bd8>] (inet6_release+0x34/0x40) [ 528.737263][ C1] r5:84e50000 r4:833cf180 [ 528.737458][ C1] [<81764ba4>] (inet6_release) from [<81493fdc>] (__sock_release+0x44/0xbc) [ 528.737853][ C1] r5:833cf280 r4:833cf180 [ 528.738064][ C1] [<81493f98>] (__sock_release) from [<8149406c>] (sock_close+0x18/0x20) [ 528.738432][ C1] r7:833cf200 r6:833b2d48 r5:082e0003 r4:84f84300 [ 528.738705][ C1] [<81494054>] (sock_close) from [<8051f748>] (__fput+0xdc/0x2f0) [ 528.739046][ C1] [<8051f66c>] (__fput) from [<8051f9e4>] (____fput+0x14/0x18) [ 528.739417][ C1] r9:84043000 r8:82875694 r7:84043000 r6:84043884 r5:84043854 r4:00000000 [ 528.739733][ C1] [<8051f9d0>] (____fput) from [<8026d41c>] (task_work_run+0x90/0xb8) [ 528.740096][ C1] [<8026d38c>] (task_work_run) from [<8020be00>] (do_work_pending+0x448/0x4f8) [ 528.740477][ C1] r9:84043000 r8:8020029c r7:000001b4 r6:8020029c r5:eb505fb0 r4:84043000 [ 528.740808][ C1] [<8020b9b8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 528.741160][ C1] Exception stack(0xeb505fb0 to 0xeb505ff8) [ 528.741439][ C1] 5fa0: 00000000 0000001e 00000000 7ed74938 [ 528.741798][ C1] 5fc0: 00000000 00000000 00000000 000001b4 00270000 00270000 00087fb2 00000000 [ 528.742143][ C1] 5fe0: 7ed74838 7ed74828 0002422c 00133450 20000010 00000003 [ 528.742467][ C1] r10:000001b4 r9:84043000 r8:8020029c r7:000001b4 r6:00000000 r5:00000000 [ 528.742844][ C1] r4:00000000 [ 528.743376][ C1] Code: e3482224 e59331ec e5922010 e0833002 (e5932008) [ 528.744832][ C1] ---[ end trace 0000000000000000 ]--- [ 528.745596][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 528.747647][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 22:36:15 Registers: info registers vcpu 0 CPU#0 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=76bfb0bc R12=20001490 R13=20001490 R14=00018b8c R15=00018b8c PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000000 R03=0000003c R04=8277b808 R05=00000000 R06=60000193 R07=00000001 R08=00000001 R09=df805810 R10=00000001 R11=df8057fc R12=00000020 R13=df805780 R14=43202020 R15=802c0850 PSR=60000193 -ZC- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=31736b66 s05=ec3461fa d02=ec3461fa31736b66 s06=00000000 s07=00000000 d03=0000000000000000 s08=78a4c420 s09=31945927 d04=3194592778a4c420 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=eb7fa4a8 s17=92c93d29 d08=92c93d29eb7fa4a8 s18=3bddd4a0 s19=00000000 d09=000000003bddd4a0 s20=8f73f4e4 s21=1e211c1c d10=1e211c1c8f73f4e4 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000