last executing test programs: 12.168051432s ago: executing program 1 (id=8036): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000400), r0) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x821, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4094}, 0x4048850) 11.835961203s ago: executing program 1 (id=8037): fsmount(0xffffffffffffffff, 0x1, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000004c0)=""/41, 0x29) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0), 0x82000, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000026c0)=0x3d) readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/117, 0x75}, {0x0}], 0x2) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0xffffffff, 0xee3, 0x6, 0x8, 0xe, "9921ad6b5444906edf680000a6a900105700"}) 10.981983398s ago: executing program 1 (id=8042): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x1a}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x0) 10.532154998s ago: executing program 1 (id=8043): r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x200a83, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@random={'trusted.', '$\x8c\x18*--)/*^!/.\x00'}, 0x0, 0x0) 10.236402657s ago: executing program 1 (id=8044): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x60b926, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0xd}, {0x6, 0xb}, {0xffff, 0xffe0}}}, 0x24}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4890) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000002e00090027097000000000220400000008000c"], 0x28}, 0x1, 0x0, 0x0, 0x42804}, 0x0) 9.911416488s ago: executing program 1 (id=8046): readv(0xffffffffffffffff, &(0x7f0000000500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fstatfs(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = dup(r0) write$UHID_INPUT(r4, &(0x7f0000001040)={0xe, {"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", 0x1000}}, 0x1006) 3.000795076s ago: executing program 0 (id=8056): bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map, 0xffffffffffffffff, 0x14, 0x200c}, 0x20) 2.6377624s ago: executing program 0 (id=8057): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2673004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$packet(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f00000000c0), &(0x7f0000000140)='%ps \x00'}, 0x20) 2.095897385s ago: executing program 0 (id=8058): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000380)={'syz0\x00', {0xff, 0x6, 0x7fff, 0x8d5}, 0x2, [0x10000, 0xeba, 0x7, 0x9, 0x8, 0x1, 0x6, 0x7ff, 0x54, 0x7fffdfff, 0x2, 0xc, 0x8, 0x9, 0x9, 0xfffffff7, 0x7, 0x40000, 0x842, 0x2, 0x2, 0x0, 0x3ff, 0xfffffff4, 0x1, 0xda6, 0x3, 0xa7, 0x4, 0x2, 0x9, 0x9, 0x8200, 0x1, 0x1, 0x1, 0x7, 0x80009, 0x1000f, 0xb, 0x9, 0x7ffffff9, 0x2, 0xb50, 0x0, 0x800, 0x3, 0xf, 0x7, 0xfffffffe, 0xfffffffa, 0x8, 0x24, 0x7fff, 0x8, 0x1, 0x200, 0x0, 0x0, 0x7f, 0x964e, 0x2d5, 0x149, 0x1], [0x266ac, 0xfffffff9, 0x4, 0x3, 0x8e, 0x7, 0x80000001, 0x9, 0x4, 0x88, 0x0, 0x7, 0x6, 0x8001, 0x6, 0x8, 0x2, 0x5, 0xb, 0x7ff, 0x7ff, 0x5, 0x9, 0xc00, 0x89, 0x7ff, 0x0, 0x1, 0x10000, 0x9, 0x9, 0x4d26, 0x10000, 0x8, 0x1, 0x7, 0xfffffffc, 0x4, 0x0, 0x9, 0x8, 0x5, 0xe66, 0x2, 0x3, 0x81, 0x4b, 0x7d, 0x6, 0xb, 0x4, 0x49, 0x1, 0x8d1, 0x100008fd, 0x1, 0xe0, 0x8e, 0x10001, 0x4, 0x401, 0xade, 0x7f, 0x9], [0x8396, 0x7, 0x10000, 0x9, 0x8000, 0x1, 0x9, 0xe, 0x8, 0xff, 0x0, 0x400, 0x1000, 0x8000009, 0x6e, 0x8001, 0x7, 0x3, 0x6, 0x5, 0x2, 0xcb, 0x2, 0x3, 0x0, 0x2, 0x8001, 0xc, 0x5, 0xb0f, 0x1e, 0x1, 0x800, 0x80008, 0x9, 0x3, 0x200, 0xda7, 0x4, 0xe, 0x464b, 0x10, 0x1, 0x7ff, 0x1ff, 0x6, 0x7f, 0x2, 0x7fffffff, 0xffffffff, 0x4, 0xffff, 0xd5d, 0x40, 0xffffff4e, 0x9, 0x2, 0x40, 0x3, 0x0, 0x1fc1, 0x400, 0x8, 0x6], [0x10, 0x7, 0x9, 0x2, 0xa5e, 0xfe, 0xff, 0x6, 0x80000000, 0x0, 0xe, 0x2, 0x104, 0x7, 0x5, 0x0, 0x2, 0x7ff, 0xdaa, 0x4, 0x3, 0x102, 0x42, 0xcc, 0x17ffc000, 0x4000400, 0xffffffff, 0xffbffffc, 0x40, 0x80000000, 0x4, 0x7, 0x6, 0x4, 0x9, 0x0, 0x9, 0x1, 0x0, 0x7, 0x8ac1, 0x3, 0x1, 0x80000002, 0x80040002, 0xff, 0x6, 0x3, 0xfffff801, 0xffefffff, 0x37d, 0xfffffff8, 0xd, 0x7, 0xd, 0xd76, 0x6eaf, 0x0, 0x8, 0x5e02, 0x2, 0x3, 0x5, 0x400]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000440)="065967ccd0e9a6f34133c0d8a766634f2c7002eeadc75a04", 0x18}], 0x1) 1.498512454s ago: executing program 0 (id=8059): unshare(0x28000600) r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB='/'], 0x20) 898.525702ms ago: executing program 0 (id=8060): r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001440), 0x8000, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000001480)=0x8) 0s ago: executing program 0 (id=8061): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x5, 0x2, 0x4, 0x1, 0xcc7, 0xfff, 0x5c95239c, 0x5, 0x3ff, 0x802, 0x1600, 0x1, 0x1, 0x9, 0xe1cb, 0x6, 0x4, 0x3, 0x395, 0x80000089, 0xfffffffe, 0xb, 0xfffffff5, 0xffffeadb, 0x3, 0x3c, 0x0, 0x4, 0x8000000, 0xdffffffa]}) kernel console output (not intermixed with test programs): (6139.760:107612): avc: denied { read open } for pid=4277 comm="syz.1.7756" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6139.961457][ T29] audit: type=1400 audit(6139.850:107613): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6139.978614][ T29] audit: type=1400 audit(6139.860:107614): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.619188][ T4284] FAULT_INJECTION: forcing a failure. [ 6140.619188][ T4284] name failslab, interval 1, probability 0, space 0, times 0 [ 6140.619524][ T4284] CPU: 0 UID: 0 PID: 4284 Comm: syz.1.7759 Tainted: G L syzkaller #0 PREEMPT [ 6140.619623][ T4284] Tainted: [L]=SOFTLOCKUP [ 6140.619637][ T4284] Hardware name: ARM-Versatile Express [ 6140.619652][ T4284] Call trace: [ 6140.619681][ T4284] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6140.619743][ T4284] r7:00000820 r6:00000000 r5:60000013 r4:82295cd4 [ 6140.619754][ T4284] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6140.619783][ T4284] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6140.619812][ T4284] r5:83e88c00 r4:82918a08 [ 6140.619821][ T4284] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6140.619853][ T4284] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 6140.619892][ T4284] r8:00000000 r7:00000820 r6:00000017 r5:ec59dcac r4:83001240 [ 6140.619901][ T4284] [<8053a81c>] (should_failslab) from [<8051c608>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 6140.619929][ T4284] [<8051c568>] (__kmalloc_node_track_caller_noprof) from [<804ac9e8>] (kmemdup_noprof+0x28/0x44) [ 6140.619967][ T4284] r10:00000054 r9:85d06c04 r8:ec59dcb4 r7:83e08000 r6:859740d8 r5:ec59dcac [ 6140.619979][ T4284] r4:00000017 [ 6140.619987][ T4284] [<804ac9c0>] (kmemdup_noprof) from [<807c2f4c>] (sidtab_sid2str_get+0x54/0xa4) [ 6140.620023][ T4284] r7:83e08000 r6:ec59dcb4 r5:ec59dcac r4:83e0f0c0 [ 6140.620033][ T4284] [<807c2ef8>] (sidtab_sid2str_get) from [<807ca490>] (sidtab_entry_to_string+0x34/0x94) [ 6140.620065][ T4284] r7:83e08000 r6:83e0f0c0 r5:ec59dcac r4:0000005f [ 6140.620175][ T4284] [<807ca45c>] (sidtab_entry_to_string) from [<807ca608>] (security_sid_to_context_core+0x118/0x17c) [ 6140.620338][ T4284] r9:00000022 r8:83e08000 r7:85d06c04 r6:ec59dcb4 r5:ec59dcac r4:0000005f [ 6140.620352][ T4284] [<807ca4f0>] (security_sid_to_context_core) from [<807cd61c>] (security_sid_to_context+0x1c/0x24) [ 6140.620491][ T4284] r8:807ad13c r7:807ae420 r6:83e88c00 r5:84f863b8 r4:ec59dd40 [ 6140.620562][ T4284] [<807cd600>] (security_sid_to_context) from [<807ae468>] (avc_audit_post_callback+0x48/0x2f4) [ 6140.620665][ T4284] [<807ae420>] (avc_audit_post_callback) from [<807d5bfc>] (common_lsm_audit+0x104/0x148) [ 6140.620735][ T4284] r10:00000054 r9:00000022 r8:807ad13c r7:807ae420 r6:ec59deac r5:84f863b8 [ 6140.620871][ T4284] r4:83e893f0 [ 6140.621127][ T4284] [<807d5af8>] (common_lsm_audit) from [<807ae92c>] (slow_avc_audit+0xbc/0x114) [ 6140.621253][ T4284] r8:00000000 r7:00000001 r6:00000000 r5:0000005f r4:00000022 [ 6140.621333][ T4284] [<807ae870>] (slow_avc_audit) from [<807aed58>] (avc_has_extended_perms+0x280/0x5ec) [ 6140.621363][ T4284] r5:0000000b r4:0000005f [ 6140.621390][ T4284] [<807aead8>] (avc_has_extended_perms) from [<807b85c0>] (ioctl_has_perm.constprop.0+0xe4/0x160) [ 6140.621449][ T4284] r10:83e88c00 r9:8408e90c r8:00000054 r7:840df9f0 r6:0000005f r5:824a45ec [ 6140.621461][ T4284] r4:00000025 [ 6140.621470][ T4284] [<807b84dc>] (ioctl_has_perm.constprop.0) from [<807b86e0>] (selinux_file_ioctl+0xa4/0x134) [ 6140.621511][ T4284] r9:00000003 r8:84dcdf00 r7:00000000 r6:00000000 r5:00005425 r4:84dcdf00 [ 6140.621521][ T4284] [<807b863c>] (selinux_file_ioctl) from [<8079128c>] (security_file_ioctl+0x90/0x1e4) [ 6140.621561][ T4284] [<807911fc>] (security_file_ioctl) from [<80585ac4>] (sys_ioctl+0x4c/0xba0) [ 6140.621600][ T4284] r7:00000000 r6:84dcdf01 r5:00000000 r4:00005425 [ 6140.621610][ T4284] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6140.621638][ T4284] Exception stack(0xec59dfa8 to 0xec59dff0) [ 6140.621661][ T4284] dfa0: 00000000 00000000 00000003 00005425 00000000 00000000 [ 6140.621688][ T4284] dfc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76f210bc [ 6140.621704][ T4284] dfe0: 76f20ec0 76f20eb0 000192bc 00132360 [ 6140.621725][ T4284] r10:00000036 r9:83e88c00 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 6140.621736][ T4284] r4:00000000 [ 6141.338993][ T4294] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=359 sclass=netlink_audit_socket pid=4294 comm=syz.0.7763 [ 6144.606703][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 6144.607190][ T29] audit: type=1400 audit(6144.500:107672): avc: denied { read } for pid=4300 comm="syz.1.7767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6144.634414][ T29] audit: type=1400 audit(6144.520:107673): avc: denied { read write } for pid=4300 comm="syz.1.7767" name="vhost-net" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6144.645534][ T29] audit: type=1400 audit(6144.540:107674): avc: denied { read write open } for pid=4300 comm="syz.1.7767" path="/dev/vhost-net" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6144.652745][ T29] audit: type=1400 audit(6144.540:107675): avc: denied { read } for pid=4300 comm="syz.1.7767" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6144.664155][ T29] audit: type=1400 audit(6144.550:107676): avc: denied { read open } for pid=4300 comm="syz.1.7767" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6144.671415][ T29] audit: type=1400 audit(6144.560:107677): avc: denied { ioctl } for pid=4300 comm="syz.1.7767" path="/dev/vhost-net" dev="devtmpfs" ino=711 ioctlcmd=0x5334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6144.710433][ T29] audit: type=1400 audit(6144.600:107678): avc: denied { module_request } for pid=4300 comm="syz.1.7767" kmod="tcp_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6144.929784][ T29] audit: type=1400 audit(6144.820:107679): avc: denied { create } for pid=4308 comm="syz.0.7770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6144.952587][ T29] audit: type=1400 audit(6144.840:107680): avc: denied { write } for pid=4308 comm="syz.0.7770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6144.982009][ T29] audit: type=1400 audit(6144.870:107681): avc: denied { write } for pid=4308 comm="syz.0.7770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6149.814015][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 6149.815581][ T29] audit: type=1400 audit(6149.700:107772): avc: denied { sys_module } for pid=4339 comm="syz.1.7782" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6149.831192][ T29] audit: type=1400 audit(6149.720:107773): avc: denied { module_request } for pid=4339 comm="syz.1.7782" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6150.064268][ T29] audit: type=1400 audit(6149.950:107774): avc: denied { write } for pid=4339 comm="syz.1.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6150.078723][ T29] audit: type=1400 audit(6149.970:107775): avc: denied { create } for pid=4339 comm="syz.1.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6150.082273][ T29] audit: type=1400 audit(6149.970:107776): avc: denied { create } for pid=4339 comm="syz.1.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6150.087680][ T29] audit: type=1400 audit(6149.980:107777): avc: denied { write } for pid=4339 comm="syz.1.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6150.089630][ T29] audit: type=1400 audit(6149.980:107778): avc: denied { module_request } for pid=4339 comm="syz.1.7782" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6150.294769][ T29] audit: type=1400 audit(6150.180:107779): avc: denied { read } for pid=4339 comm="syz.1.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6150.299973][ T29] audit: type=1400 audit(6150.190:107780): avc: denied { write } for pid=4339 comm="syz.1.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6150.320437][ T29] audit: type=1400 audit(6150.210:107781): avc: denied { read write } for pid=4339 comm="syz.1.7782" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6151.883875][ T4358] FAULT_INJECTION: forcing a failure. [ 6151.883875][ T4358] name failslab, interval 1, probability 0, space 0, times 0 [ 6151.884343][ T4358] CPU: 0 UID: 0 PID: 4358 Comm: syz.0.7787 Tainted: G L syzkaller #0 PREEMPT [ 6151.884454][ T4358] Tainted: [L]=SOFTLOCKUP [ 6151.884485][ T4358] Hardware name: ARM-Versatile Express [ 6151.884517][ T4358] Call trace: [ 6151.884595][ T4358] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6151.884722][ T4358] r7:00000000 r6:00000000 r5:60000013 r4:82295cd4 [ 6151.884746][ T4358] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6151.884835][ T4358] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6151.884893][ T4358] r5:85f1d400 r4:82918a08 [ 6151.884911][ T4358] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6151.884975][ T4358] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 6151.885055][ T4358] r8:85f1d400 r7:00000000 r6:00000d40 r5:860a59f0 r4:830a1600 [ 6151.885077][ T4358] [<8053a81c>] (should_failslab) from [<80519d38>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 6151.885239][ T4358] [<80519cec>] (kmem_cache_alloc_noprof) from [<8079a95c>] (security_inode_alloc+0x30/0x1e8) [ 6151.885394][ T4358] r10:860a5af8 r9:00000000 r8:00000000 r7:00000c40 r6:830a4400 r5:860a59f0 [ 6151.885493][ T4358] r4:860a59f0 [ 6151.885620][ T4358] [<8079a92c>] (security_inode_alloc) from [<8058f624>] (inode_init_always_gfp+0x188/0x1dc) [ 6151.885849][ T4358] r5:00000000 r4:860a59f0 [ 6151.885975][ T4358] [<8058f49c>] (inode_init_always_gfp) from [<80592c58>] (alloc_inode+0x40/0xcc) [ 6151.886290][ T4358] r10:0000006b r9:85f1d400 r8:000081ff r7:8300b680 r6:81c1d140 r5:830a4400 [ 6151.886533][ T4358] r4:860a59f0 r3:85f1d400 [ 6151.886643][ T4358] [<80592c18>] (alloc_inode) from [<80592cf4>] (new_inode+0x10/0x68) [ 6151.886768][ T4358] r7:8300b680 r6:00000000 r5:830a4400 r4:826c8104 [ 6151.886813][ T4358] [<80592ce4>] (new_inode) from [<804a556c>] (shmem_get_inode+0x90/0x38c) [ 6151.886899][ T4358] r9:85f1d400 r8:000081ff r7:8300b680 r6:00000000 r5:830a4400 r4:826c8104 [ 6151.886922][ T4358] [<804a54dc>] (shmem_get_inode) from [<804a6148>] (__shmem_file_setup+0x8c/0x188) [ 6151.886995][ T4358] r10:00000000 r9:00000000 r8:8291f854 r7:822ac43c r6:00000000 r5:00e7e000 [ 6151.887019][ T4358] r4:830b2010 [ 6151.887040][ T4358] [<804a60bc>] (__shmem_file_setup) from [<804ac8a4>] (shmem_zero_setup+0x4c/0x84) [ 6151.887114][ T4358] r9:00000000 r8:0000075f r7:82c40c1c r6:20000000 r5:82c40c20 r4:860d8480 [ 6151.887140][ T4358] [<804ac858>] (shmem_zero_setup) from [<804fde94>] (__mmap_region+0xb54/0xe58) [ 6151.887207][ T4358] r5:82c40c20 r4:860d8480 [ 6151.887230][ T4358] [<804fd340>] (__mmap_region) from [<804ff860>] (mmap_region+0x88/0x160) [ 6151.887302][ T4358] r10:00000000 r9:85c8e1c0 r8:85f1d400 r7:00e7e000 r6:20000000 r5:00000000 [ 6151.887323][ T4358] r4:002000fe [ 6151.887343][ T4358] [<804ff7d8>] (mmap_region) from [<804e359c>] (do_mmap+0x368/0x538) [ 6151.887698][ T4358] r8:20000000 r7:85f1d400 r6:fffffffe r5:00004031 r4:00e7e000 [ 6151.887753][ T4358] [<804e3234>] (do_mmap) from [<804ae074>] (vm_mmap_pgoff+0x144/0x20c) [ 6151.887918][ T4358] r10:85c8e1c0 r9:20000000 r8:00e7e000 r7:ec5f1f18 r6:00000000 r5:fffffffe [ 6151.887987][ T4358] r4:00000000 [ 6151.888154][ T4358] [<804adf30>] (vm_mmap_pgoff) from [<804e2730>] (ksys_mmap_pgoff+0x48/0xec) [ 6151.888408][ T4358] r10:000000c0 r9:85f1d400 r8:8020029c r7:20000000 r6:00e7e000 r5:fffffffe [ 6151.888495][ T4358] r4:00004031 [ 6151.888788][ T4358] [<804e26e8>] (ksys_mmap_pgoff) from [<804e27f0>] (sys_mmap_pgoff+0x1c/0x24) [ 6151.889166][ T4358] r8:8020029c r7:000000c0 r6:00130308 r5:00004000 r4:00000003 [ 6151.889266][ T4358] [<804e27d4>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6151.889469][ T4358] Exception stack(0xec5f1fa8 to 0xec5f1ff0) [ 6151.889679][ T4358] 1fa0: 00000003 00004000 20000000 00e7e000 fffffffe 00004031 [ 6151.889727][ T4358] 1fc0: 00000003 00004000 00130308 000000c0 00310000 00000000 00006364 76f2c0bc [ 6151.889949][ T4358] 1fe0: 76f2bec0 76f2beb0 000192bc 00132360 [ 6154.826103][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 6154.827435][ T29] audit: type=1400 audit(6154.720:107893): avc: denied { create } for pid=4379 comm="syz.0.7796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6154.838449][ T29] audit: type=1400 audit(6154.730:107894): avc: denied { write } for pid=4379 comm="syz.0.7796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6154.842200][ T29] audit: type=1400 audit(6154.730:107895): avc: denied { read } for pid=4379 comm="syz.0.7796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6154.862963][ T29] audit: type=1400 audit(6154.750:107896): avc: denied { read } for pid=4379 comm="syz.0.7796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6155.042851][ T29] audit: type=1400 audit(6154.930:107897): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6155.054739][ T29] audit: type=1400 audit(6154.940:107898): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6155.057870][ T29] audit: type=1400 audit(6154.940:107899): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6155.220957][ T29] audit: type=1400 audit(6155.110:107900): avc: denied { create } for pid=4383 comm="syz.1.7798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 6155.222390][ T29] audit: type=1400 audit(6155.110:107901): avc: denied { create } for pid=4382 comm="syz.0.7797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6155.232171][ T29] audit: type=1400 audit(6155.120:107902): avc: denied { module_request } for pid=4383 comm="syz.1.7798" kmod="net-pf-35" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6158.840862][ T4414] FAULT_INJECTION: forcing a failure. [ 6158.840862][ T4414] name failslab, interval 1, probability 0, space 0, times 0 [ 6158.843099][ T4414] CPU: 1 UID: 0 PID: 4414 Comm: syz.1.7809 Tainted: G L syzkaller #0 PREEMPT [ 6158.843276][ T4414] Tainted: [L]=SOFTLOCKUP [ 6158.843298][ T4414] Hardware name: ARM-Versatile Express [ 6158.843324][ T4414] Call trace: [ 6158.843372][ T4414] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6158.843500][ T4414] r7:00000000 r6:00000000 r5:60000013 r4:82295cd4 [ 6158.843522][ T4414] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6158.843662][ T4414] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6158.843720][ T4414] r5:83e8d400 r4:82918a08 [ 6158.843737][ T4414] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6158.843799][ T4414] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 6158.843864][ T4414] r8:83e8d400 r7:00000000 r6:00000dc0 r5:82ae3bcc r4:832ae000 [ 6158.843883][ T4414] [<8053a81c>] (should_failslab) from [<80519d38>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 6158.843937][ T4414] [<80519cec>] (kmem_cache_alloc_noprof) from [<8074efac>] (fuse_request_alloc+0x24/0x84) [ 6158.844017][ T4414] r10:83e8d400 r9:00000001 r8:8291f8d8 r7:8628eb00 r6:8628eb00 r5:82ae3bcc [ 6158.844041][ T4414] r4:8656ac00 [ 6158.844057][ T4414] [<8074ef88>] (fuse_request_alloc) from [<8074fa50>] (fuse_get_req+0x1b4/0x2d8) [ 6158.844119][ T4414] r7:8628eb00 r6:ecc49b68 r5:00000000 r4:8656ac00 [ 6158.844139][ T4414] [<8074f89c>] (fuse_get_req) from [<8075047c>] (__fuse_simple_request+0x54/0x4dc) [ 6158.844211][ T4414] r10:00000000 r9:ecc49c04 r8:8291f8d8 r7:83e8d400 r6:ecc49b68 r5:8656ac00 [ 6158.844239][ T4414] r4:8628eb00 [ 6158.844259][ T4414] [<80750428>] (__fuse_simple_request) from [<80757030>] (fuse_lookup_name+0xc0/0x280) [ 6158.844334][ T4414] r8:8628eb00 r7:863a4c00 r6:8358f1b0 r5:00000001 r4:ecc49c08 [ 6158.844356][ T4414] [<80756f70>] (fuse_lookup_name) from [<80757280>] (fuse_lookup+0x90/0x174) [ 6158.844424][ T4414] r10:000000e2 r9:00000001 r8:00000001 r7:00000000 r6:8358f198 r5:85026f00 [ 6158.844447][ T4414] r4:8358f198 [ 6158.844470][ T4414] [<807571f0>] (fuse_lookup) from [<8057a2cc>] (__lookup_slow+0x8c/0x140) [ 6158.844544][ T4414] r9:00000000 r8:ecc49d40 r7:85026f00 r6:00000001 r5:8358fcc0 r4:8358f198 [ 6158.844564][ T4414] [<8057a240>] (__lookup_slow) from [<8057a3b8>] (lookup_slow+0x38/0x4c) [ 6158.844627][ T4414] r9:00000000 r8:ecc49e0c r7:00000001 r6:ecc49d40 r5:8358fcc0 r4:85026f80 [ 6158.844648][ T4414] [<8057a380>] (lookup_slow) from [<8057e580>] (path_lookupat+0x1a0/0x2a4) [ 6158.844710][ T4414] r7:00000101 r6:ecc49e0c r5:00000000 r4:ecc49d38 [ 6158.844730][ T4414] [<8057e3e0>] (path_lookupat) from [<8057ff88>] (filename_lookup+0xd4/0x1a4) [ 6158.844822][ T4414] r9:00000000 r8:ecc49e0c r7:00000001 r6:83e8d400 r5:86111000 r4:ffffff9c [ 6158.844847][ T4414] [<8057feb4>] (filename_lookup) from [<805a4dec>] (filename_setxattr+0x54/0xe0) [ 6158.844921][ T4414] r9:00000000 r8:ecc49e40 r7:ffffff9c r6:00000001 r5:86111000 r4:00000000 [ 6158.844945][ T4414] [<805a4d98>] (filename_setxattr) from [<805a4fac>] (path_setxattrat+0x134/0x17c) [ 6158.845028][ T4414] r9:83e8d400 r8:200003c0 r7:ffffff9c r6:00000000 r5:86111000 r4:00000000 [ 6158.845052][ T4414] [<805a4e78>] (path_setxattrat) from [<805a5180>] (sys_setxattr+0x34/0x3c) [ 6158.845125][ T4414] r8:8020029c r7:000000e2 r6:00130308 r5:00000000 r4:20000240 [ 6158.845145][ T4414] [<805a514c>] (sys_setxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6158.845198][ T4414] Exception stack(0xecc49fa8 to 0xecc49ff0) [ 6158.845257][ T4414] 9fa0: 00000002 00000000 200001c0 20000240 200003c0 00000001 [ 6158.845295][ T4414] 9fc0: 00000002 00000000 00130308 000000e2 00310000 00000000 00006364 76f210bc [ 6158.845325][ T4414] 9fe0: 76f20ec0 76f20eb0 000192bc 00132360 [ 6158.845351][ T4414] r4:00000002 [ 6160.065745][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 6160.070577][ T29] audit: type=1400 audit(6159.960:108001): avc: denied { create } for pid=4418 comm="syz.0.7811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6160.089067][ T29] audit: type=1400 audit(6159.980:108002): avc: denied { write } for pid=4418 comm="syz.0.7811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6160.325596][ T29] audit: type=1400 audit(6160.220:108003): avc: denied { read write } for pid=4420 comm="syz.0.7812" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6160.331655][ T29] audit: type=1400 audit(6160.220:108004): avc: denied { read write open } for pid=4420 comm="syz.0.7812" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6160.358594][ T29] audit: type=1400 audit(6160.250:108005): avc: denied { read } for pid=4420 comm="syz.0.7812" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6160.362333][ T29] audit: type=1400 audit(6160.250:108006): avc: denied { read open } for pid=4420 comm="syz.0.7812" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6160.380495][ T29] audit: type=1400 audit(6160.270:108007): avc: denied { ioctl } for pid=4420 comm="syz.0.7812" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 ioctlcmd=0x5520 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6160.398721][ T29] audit: type=1400 audit(6160.290:108008): avc: denied { setattr } for pid=4420 comm="syz.0.7812" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6160.424061][ T29] audit: type=1400 audit(6160.310:108009): avc: denied { create } for pid=4420 comm="syz.0.7812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6160.437516][ T29] audit: type=1400 audit(6160.330:108010): avc: denied { create } for pid=4420 comm="syz.0.7812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6163.879523][ T4447] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5138 sclass=netlink_xfrm_socket pid=4447 comm=syz.0.7821 [ 6165.399857][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 6165.400530][ T29] audit: type=1400 audit(6165.290:108140): avc: denied { read } for pid=4462 comm="syz.0.7828" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.417662][ T29] audit: type=1400 audit(6165.310:108141): avc: denied { read open } for pid=4462 comm="syz.0.7828" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.608446][ T29] audit: type=1400 audit(6165.500:108142): avc: denied { create } for pid=4464 comm="syz.0.7829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6165.617762][ T29] audit: type=1400 audit(6165.510:108143): avc: denied { write } for pid=4464 comm="syz.0.7829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6165.891225][ T29] audit: type=1400 audit(6165.780:108144): avc: denied { read write } for pid=4467 comm="syz.0.7830" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.902021][ T29] audit: type=1400 audit(6165.790:108145): avc: denied { read write open } for pid=4467 comm="syz.0.7830" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.917891][ T29] audit: type=1400 audit(6165.810:108146): avc: denied { read } for pid=4467 comm="syz.0.7830" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.921584][ T29] audit: type=1400 audit(6165.810:108147): avc: denied { read open } for pid=4467 comm="syz.0.7830" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.940011][ T29] audit: type=1400 audit(6165.830:108148): avc: denied { ioctl } for pid=4467 comm="syz.0.7830" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 ioctlcmd=0x5520 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6165.955064][ T29] audit: type=1400 audit(6165.850:108149): avc: denied { setattr } for pid=4467 comm="syz.0.7830" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6170.583992][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 6170.585148][ T29] audit: type=1400 audit(6170.470:108225): avc: denied { read } for pid=4497 comm="syz.0.7842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.601363][ T29] audit: type=1400 audit(6170.490:108226): avc: denied { create } for pid=4497 comm="syz.0.7842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.610567][ T29] audit: type=1400 audit(6170.500:108227): avc: denied { write } for pid=4497 comm="syz.0.7842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.618365][ T29] audit: type=1400 audit(6170.510:108228): avc: denied { read } for pid=4497 comm="syz.0.7842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.622617][ T29] audit: type=1400 audit(6170.510:108229): avc: denied { read } for pid=4497 comm="syz.0.7842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.814815][ T29] audit: type=1400 audit(6170.700:108230): avc: denied { create } for pid=4500 comm="syz.0.7843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.817817][ T29] audit: type=1400 audit(6170.710:108231): avc: denied { write } for pid=4500 comm="syz.0.7843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.821870][ T29] audit: type=1400 audit(6170.710:108232): avc: denied { read } for pid=4500 comm="syz.0.7843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.825243][ T29] audit: type=1400 audit(6170.710:108233): avc: denied { read } for pid=4500 comm="syz.0.7843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6170.847638][ T29] audit: type=1400 audit(6170.740:108234): avc: denied { create } for pid=4500 comm="syz.0.7843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6175.768532][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 6175.769836][ T29] audit: type=1400 audit(6175.660:108334): avc: denied { create } for pid=4532 comm="syz.0.7851" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6175.794112][ T29] audit: type=1400 audit(6175.680:108335): avc: denied { read write } for pid=4532 comm="syz.0.7851" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dlm_control_device_t:s0" [ 6175.816769][ T29] audit: type=1400 audit(6175.700:108336): avc: denied { read write open } for pid=4532 comm="syz.0.7851" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dlm_control_device_t:s0" [ 6175.851068][ T29] audit: type=1400 audit(6175.740:108337): avc: denied { write } for pid=4532 comm="syz.0.7851" name="file0" dev="tmpfs" ino=548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6175.868536][ T29] audit: type=1400 audit(6175.760:108338): avc: denied { write open } for pid=4532 comm="syz.0.7851" path="/104/file0" dev="tmpfs" ino=548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6175.891070][ T29] audit: type=1400 audit(6175.780:108339): avc: denied { ioctl } for pid=4532 comm="syz.0.7851" path="/104/file0" dev="tmpfs" ino=548 ioctlcmd=0x5001 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6175.930564][ T29] audit: type=1400 audit(6175.820:108340): avc: denied { unlink } for pid=3460 comm="syz-executor" name="file0" dev="tmpfs" ino=548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6176.116717][ T29] audit: type=1400 audit(6176.000:108341): avc: denied { create } for pid=4534 comm="syz.0.7852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 6176.127300][ T4535] audit: audit_lost=108 audit_rate_limit=0 audit_backlog_limit=64 [ 6176.134492][ T4535] audit: out of memory in audit_log_start [ 6178.057691][ T4542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4542 comm=syz.0.7853 [ 6180.882283][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 6180.884684][ T29] audit: type=1400 audit(6180.770:108395): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6180.885187][ T29] audit: type=1400 audit(6180.780:108396): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6180.890636][ T29] audit: type=1400 audit(6180.780:108397): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6181.143224][ T29] audit: type=1400 audit(6181.030:108398): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6181.147497][ T29] audit: type=1400 audit(6181.040:108399): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6181.160661][ T29] audit: type=1400 audit(6181.040:108400): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6181.401018][ T29] audit: type=1400 audit(6181.290:108401): avc: denied { create } for pid=4561 comm="syz.1.7862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6181.409440][ T29] audit: type=1400 audit(6181.300:108402): avc: denied { write } for pid=4561 comm="syz.1.7862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6181.416929][ T29] audit: type=1400 audit(6181.310:108403): avc: denied { write } for pid=4561 comm="syz.1.7862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6181.424148][ T29] audit: type=1400 audit(6181.310:108404): avc: denied { read } for pid=4561 comm="syz.1.7862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6185.079193][ T4574] FAULT_INJECTION: forcing a failure. [ 6185.079193][ T4574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6185.081113][ T4574] CPU: 1 UID: 0 PID: 4574 Comm: syz.1.7866 Tainted: G L syzkaller #0 PREEMPT [ 6185.081253][ T4574] Tainted: [L]=SOFTLOCKUP [ 6185.081297][ T4574] Hardware name: ARM-Versatile Express [ 6185.081328][ T4574] Call trace: [ 6185.081374][ T4574] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6185.081502][ T4574] r7:76f1fe1c r6:00000000 r5:60000013 r4:82295cd4 [ 6185.081522][ T4574] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6185.081577][ T4574] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6185.081631][ T4574] r5:85f1d400 r4:8294fc90 [ 6185.081684][ T4574] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6185.081752][ T4574] [<80999e68>] (should_fail_ex) from [<8099a0a4>] (should_fail+0x14/0x18) [ 6185.081816][ T4574] r8:84dcdd81 r7:76f1fe1c r6:ed525ee4 r5:0000000c r4:0000000c [ 6185.081836][ T4574] [<8099a090>] (should_fail) from [<8099a0c4>] (should_fail_usercopy+0x1c/0x20) [ 6185.081890][ T4574] [<8099a0a8>] (should_fail_usercopy) from [<8159872c>] (move_addr_to_kernel+0x34/0xf8) [ 6185.081953][ T4574] [<815986f8>] (move_addr_to_kernel) from [<81599d9c>] (__sys_sendto+0xd0/0x160) [ 6185.082100][ T4574] r7:76f1fe1c r6:85020500 r5:00000000 r4:00000000 [ 6185.082126][ T4574] [<81599ccc>] (__sys_sendto) from [<81599e48>] (sys_sendto+0x1c/0x24) [ 6185.082204][ T4574] r9:85f1d400 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f1fe1c [ 6185.082225][ T4574] [<81599e2c>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6185.082330][ T4574] Exception stack(0xed525fa8 to 0xed525ff0) [ 6185.082381][ T4574] 5fa0: 76f1fe1c 0000000c 00000003 76f1feb0 00000020 00000000 [ 6185.082422][ T4574] 5fc0: 76f1fe1c 0000000c 00000000 00000122 00000003 00000000 76f1feb0 76f210bc [ 6185.082666][ T4574] 5fe0: 00000000 76f1fdf0 000d801c 001347f8 [ 6185.986623][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 6185.996022][ T29] audit: type=1400 audit(6185.880:108463): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.024608][ T29] audit: type=1400 audit(6185.910:108464): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.035169][ T29] audit: type=1400 audit(6185.920:108465): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.070339][ T29] audit: type=1400 audit(6185.960:108466): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.078568][ T29] audit: type=1400 audit(6185.970:108467): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.094142][ T29] audit: type=1400 audit(6185.980:108468): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.109589][ T29] audit: type=1400 audit(6186.000:108469): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.138010][ T29] audit: type=1400 audit(6186.030:108470): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.161915][ T29] audit: type=1400 audit(6186.050:108471): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6186.179714][ T29] audit: type=1400 audit(6186.070:108472): avc: denied { write } for pid=4575 comm="syz.1.7867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6188.799114][ T4587] FAULT_INJECTION: forcing a failure. [ 6188.799114][ T4587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6188.801781][ T4587] CPU: 0 UID: 0 PID: 4587 Comm: syz.0.7871 Tainted: G L syzkaller #0 PREEMPT [ 6188.801929][ T4587] Tainted: [L]=SOFTLOCKUP [ 6188.801952][ T4587] Hardware name: ARM-Versatile Express [ 6188.801977][ T4587] Call trace: [ 6188.802021][ T4587] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6188.802132][ T4587] r7:ed5a9e20 r6:00000000 r5:60000013 r4:82295cd4 [ 6188.802153][ T4587] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6188.802205][ T4587] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6188.802263][ T4587] r5:83e73c00 r4:8294fc90 [ 6188.802280][ T4587] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6188.802342][ T4587] [<80999e68>] (should_fail_ex) from [<8099a0a4>] (should_fail+0x14/0x18) [ 6188.802408][ T4587] r8:00040014 r7:ed5a9e20 r6:200001c0 r5:00000000 r4:ed5a9f20 [ 6188.802455][ T4587] [<8099a090>] (should_fail) from [<8099a0c4>] (should_fail_usercopy+0x1c/0x20) [ 6188.802523][ T4587] [<8099a0a8>] (should_fail_usercopy) from [<8159a46c>] (copy_msghdr_from_user+0x50/0x130) [ 6188.802591][ T4587] [<8159a41c>] (copy_msghdr_from_user) from [<8159a5c4>] (___sys_sendmsg+0x78/0xd0) [ 6188.802662][ T4587] r8:00040014 r7:00000000 r6:85020280 r5:ed5a9f20 r4:ed5a9e64 [ 6188.802683][ T4587] [<8159a54c>] (___sys_sendmsg) from [<8159aa80>] (__sys_sendmsg+0x8c/0xe0) [ 6188.802763][ T4587] r10:00000128 r9:83e73c00 r8:84dcd300 r7:00040014 r6:200001c0 r5:84dcd301 [ 6188.802785][ T4587] r4:00000003 [ 6188.802803][ T4587] [<8159a9f4>] (__sys_sendmsg) from [<8159aae8>] (sys_sendmsg+0x14/0x18) [ 6188.802869][ T4587] r8:8020029c r7:00000128 r6:00130308 r5:00000000 r4:00000000 [ 6188.802914][ T4587] [<8159aad4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6188.802967][ T4587] Exception stack(0xed5a9fa8 to 0xed5a9ff0) [ 6188.803009][ T4587] 9fa0: 00000000 00000000 00000003 200001c0 00040014 00000000 [ 6188.803049][ T4587] 9fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f2c0bc [ 6188.803077][ T4587] 9fe0: 76f2bec0 76f2beb0 000192bc 00132360 [ 6191.045505][ T29] kauditd_printk_skb: 237 callbacks suppressed [ 6191.045983][ T29] audit: type=1400 audit(6190.940:108710): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.088878][ T29] audit: type=1400 audit(6190.980:108711): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.140218][ T29] audit: type=1400 audit(6191.030:108712): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.159889][ T29] audit: type=1400 audit(6191.050:108713): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.174857][ T29] audit: type=1400 audit(6191.060:108714): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.181091][ T29] audit: type=1400 audit(6191.070:108715): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.200335][ T29] audit: type=1400 audit(6191.090:108716): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.235064][ T29] audit: type=1400 audit(6191.130:108717): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.241545][ T29] audit: type=1400 audit(6191.130:108718): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6191.256258][ T29] audit: type=1400 audit(6191.150:108719): avc: denied { write } for pid=4596 comm="syz.0.7874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.135574][ T29] kauditd_printk_skb: 272 callbacks suppressed [ 6196.138104][ T29] audit: type=1400 audit(6196.030:108992): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.235619][ T29] audit: type=1400 audit(6196.130:108993): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.244592][ T29] audit: type=1400 audit(6196.140:108994): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.344768][ T29] audit: type=1400 audit(6196.220:108995): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.350748][ T29] audit: type=1400 audit(6196.240:108996): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.380573][ T29] audit: type=1400 audit(6196.270:108997): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.402801][ T29] audit: type=1400 audit(6196.290:108998): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.456742][ T29] audit: type=1400 audit(6196.350:108999): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.463699][ T29] audit: type=1400 audit(6196.350:109000): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6196.499836][ T29] audit: type=1400 audit(6196.390:109001): avc: denied { write } for pid=4614 comm="syz.1.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6197.028439][ T4621] fuse: Bad value for 'fd' [ 6201.149717][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 6201.151955][ T29] audit: type=1400 audit(6201.040:109072): avc: denied { read } for pid=4636 comm="syz.1.7888" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6201.161060][ T29] audit: type=1400 audit(6201.050:109073): avc: denied { read open } for pid=4636 comm="syz.1.7888" path="net:[4026532645]" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6201.182602][ T29] audit: type=1400 audit(6201.070:109074): avc: denied { create } for pid=4636 comm="syz.1.7888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6201.227098][ T4637] audit: audit_lost=109 audit_rate_limit=0 audit_backlog_limit=64 [ 6201.228502][ T4637] audit: out of memory in audit_log_start [ 6201.318707][ T29] audit: type=1400 audit(6201.210:109075): avc: denied { create } for pid=4638 comm="syz.0.7889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6201.340581][ T29] audit: type=1400 audit(6201.230:109076): avc: denied { create } for pid=4638 comm="syz.0.7889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6201.343068][ T29] audit: type=1400 audit(6201.230:109077): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6201.354346][ T29] audit: type=1400 audit(6201.240:109078): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6201.358843][ T29] audit: type=1400 audit(6201.250:109079): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.646164][ T4662] FAULT_INJECTION: forcing a failure. [ 6204.646164][ T4662] name failslab, interval 1, probability 0, space 0, times 0 [ 6204.647928][ T4662] CPU: 1 UID: 0 PID: 4662 Comm: syz.1.7898 Tainted: G L syzkaller #0 PREEMPT [ 6204.648035][ T4662] Tainted: [L]=SOFTLOCKUP [ 6204.648058][ T4662] Hardware name: ARM-Versatile Express [ 6204.648085][ T4662] Call trace: [ 6204.648132][ T4662] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6204.648261][ T4662] r7:00000820 r6:00000000 r5:60000013 r4:82295cd4 [ 6204.648283][ T4662] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6204.648337][ T4662] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6204.648397][ T4662] r5:83e73000 r4:82918a08 [ 6204.648416][ T4662] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6204.648488][ T4662] [<80999e68>] (should_fail_ex) from [<8053a888>] (should_failslab+0x6c/0x94) [ 6204.648560][ T4662] r8:00000000 r7:00000820 r6:00000017 r5:edbd5bfc r4:83001240 [ 6204.648580][ T4662] [<8053a81c>] (should_failslab) from [<8051c608>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 6204.648637][ T4662] [<8051c568>] (__kmalloc_node_track_caller_noprof) from [<804ac9e8>] (kmemdup_noprof+0x28/0x44) [ 6204.648711][ T4662] r10:85a14180 r9:85d06c04 r8:edbd5c04 r7:83e08000 r6:859740d8 r5:edbd5bfc [ 6204.648735][ T4662] r4:00000017 [ 6204.648754][ T4662] [<804ac9c0>] (kmemdup_noprof) from [<807c2f4c>] (sidtab_sid2str_get+0x54/0xa4) [ 6204.648870][ T4662] r7:83e08000 r6:edbd5c04 r5:edbd5bfc r4:83e0f0c0 [ 6204.648893][ T4662] [<807c2ef8>] (sidtab_sid2str_get) from [<807ca490>] (sidtab_entry_to_string+0x34/0x94) [ 6204.648961][ T4662] r7:83e08000 r6:83e0f0c0 r5:edbd5bfc r4:0000005f [ 6204.648982][ T4662] [<807ca45c>] (sidtab_entry_to_string) from [<807ca608>] (security_sid_to_context_core+0x118/0x17c) [ 6204.649053][ T4662] r9:00000000 r8:83e08000 r7:85d06c04 r6:edbd5c04 r5:edbd5bfc r4:0000005f [ 6204.649074][ T4662] [<807ca4f0>] (security_sid_to_context_core) from [<807cd61c>] (security_sid_to_context+0x1c/0x24) [ 6204.649146][ T4662] r8:807ad13c r7:807ae420 r6:83e73000 r5:8599b380 r4:edbd5c90 [ 6204.649169][ T4662] [<807cd600>] (security_sid_to_context) from [<807ae468>] (avc_audit_post_callback+0x48/0x2f4) [ 6204.649240][ T4662] [<807ae420>] (avc_audit_post_callback) from [<807d5bfc>] (common_lsm_audit+0x104/0x148) [ 6204.649309][ T4662] r10:85a14180 r9:00000000 r8:807ad13c r7:807ae420 r6:edbd5cdc r5:8599b380 [ 6204.649332][ T4662] r4:83e737f0 [ 6204.649351][ T4662] [<807d5af8>] (common_lsm_audit) from [<807ae92c>] (slow_avc_audit+0xbc/0x114) [ 6204.649416][ T4662] r8:85a14188 r7:83e73000 r6:edbd5cdc r5:0000005f r4:00000022 [ 6204.649436][ T4662] [<807ae870>] (slow_avc_audit) from [<807b4b8c>] (audit_inode_permission+0x90/0xb4) [ 6204.649506][ T4662] r5:00000002 r4:00000002 [ 6204.649525][ T4662] [<807b4afc>] (audit_inode_permission) from [<807bbfc4>] (selinux_inode_permission+0x3b8/0x41c) [ 6204.649590][ T4662] r7:8466c448 r6:00000000 r5:83fa699c r4:00000024 [ 6204.649612][ T4662] [<807bbc0c>] (selinux_inode_permission) from [<8079cecc>] (security_inode_permission+0x60/0x1cc) [ 6204.649683][ T4662] r10:00000004 r9:edbd5f20 r8:86509180 r7:00000000 r6:8291f854 r5:00000024 [ 6204.649710][ T4662] r4:8466c448 [ 6204.649728][ T4662] [<8079ce6c>] (security_inode_permission) from [<8057a488>] (inode_permission+0xbc/0x174) [ 6204.649796][ T4662] r5:00000024 r4:8466c448 [ 6204.649817][ T4662] [<8057a3cc>] (inode_permission) from [<8057a768>] (may_open+0x70/0x160) [ 6204.649885][ T4662] r9:edbd5f20 r8:86509180 r7:8466c448 r6:8291f854 r5:8291f854 r4:00002000 [ 6204.649905][ T4662] [<8057a6f8>] (may_open) from [<80581504>] (path_openat+0x410/0x1300) [ 6204.649965][ T4662] r7:edbd5e58 r6:00000000 r4:00002000 [ 6204.649983][ T4662] [<805810f4>] (path_openat) from [<805824a0>] (do_filp_open+0xac/0x148) [ 6204.650048][ T4662] r10:00000142 r9:86117000 r8:00000001 r7:edbd5e58 r6:edbd5f20 r5:83e73000 [ 6204.650069][ T4662] r4:ffffff9c [ 6204.650090][ T4662] [<805823f4>] (do_filp_open) from [<80567a94>] (do_sys_openat2+0x90/0xfc) [ 6204.650162][ T4662] r9:83e73000 r8:8020029c r7:ffffff9c r6:edbd5f58 r5:86117000 r4:00000005 [ 6204.650184][ T4662] [<80567a04>] (do_sys_openat2) from [<80567ed8>] (sys_openat+0x98/0xd4) [ 6204.650284][ T4662] r7:00000142 r6:00130308 r5:20000000 r4:ffffff9c [ 6204.650308][ T4662] [<80567e40>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6204.650362][ T4662] Exception stack(0xedbd5fa8 to 0xedbd5ff0) [ 6204.650404][ T4662] 5fa0: 00000000 00000000 ffffff9c 20000000 00002000 00000000 [ 6204.650441][ T4662] 5fc0: 00000000 00000000 00130308 00000142 00310000 00000000 00006364 76f210bc [ 6204.650482][ T4662] 5fe0: 76f20ec0 76f20eb0 000192bc 00132360 [ 6204.650509][ T4662] r5:00000000 r4:00000000 [ 6206.236510][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 6206.244523][ T29] audit: type=1400 audit(6206.130:109209): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6206.245033][ T29] audit: type=1400 audit(6206.130:109210): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6206.251070][ T29] audit: type=1400 audit(6206.140:109211): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6206.388999][ T29] audit: type=1400 audit(6206.270:109212): avc: denied { unmount } for pid=3460 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6206.544384][ T4679] FAULT_INJECTION: forcing a failure. [ 6206.544384][ T4679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6206.546028][ T4679] CPU: 1 UID: 0 PID: 4679 Comm: syz.1.7904 Tainted: G L syzkaller #0 PREEMPT [ 6206.546134][ T4679] Tainted: [L]=SOFTLOCKUP [ 6206.546159][ T4679] Hardware name: ARM-Versatile Express [ 6206.546186][ T4679] Call trace: [ 6206.546231][ T4679] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 6206.546348][ T4679] r7:00000000 r6:00000000 r5:60000013 r4:82295cd4 [ 6206.546372][ T4679] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 6206.546446][ T4679] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 6206.546511][ T4679] r5:85f1d400 r4:8294fc90 [ 6206.546531][ T4679] [<8021eec0>] (dump_stack) from [<8099a02c>] (should_fail_ex+0x1c4/0x228) [ 6206.546599][ T4679] [<80999e68>] (should_fail_ex) from [<8099a0a4>] (should_fail+0x14/0x18) [ 6206.546671][ T4679] r8:76f20f30 r7:00000000 r6:00000000 r5:edc65f68 r4:00000002 [ 6206.546692][ T4679] [<8099a090>] (should_fail) from [<8099a0c4>] (should_fail_usercopy+0x1c/0x20) [ 6206.546750][ T4679] [<8099a0a8>] (should_fail_usercopy) from [<805a7414>] (simple_read_from_buffer+0x80/0x13c) [ 6206.546814][ T4679] [<805a7394>] (simple_read_from_buffer) from [<8062522c>] (proc_fail_nth_read+0xb8/0x108) [ 6206.546890][ T4679] r10:00000001 r9:80625174 r8:00000002 r7:edc65f68 r6:0000000f r5:76f20f30 [ 6206.546918][ T4679] r4:85f1d400 r3:edc65e9f [ 6206.546939][ T4679] [<80625174>] (proc_fail_nth_read) from [<8056ab70>] (vfs_read+0x98/0x324) [ 6206.547006][ T4679] r8:76f20f30 r7:edc65f68 r6:85f1d400 r5:0000000f r4:86509f00 [ 6206.547024][ T4679] [<8056aad8>] (vfs_read) from [<8056b880>] (ksys_read+0x74/0xe8) [ 6206.547093][ T4679] r10:00000003 r9:85f1d400 r8:8020029c r7:00000000 r6:00000000 r5:86509f00 [ 6206.547118][ T4679] r4:86509f03 [ 6206.547141][ T4679] [<8056b80c>] (ksys_read) from [<8056b904>] (sys_read+0x10/0x14) [ 6206.547206][ T4679] r7:00000003 r6:00000006 r5:76f20f30 r4:0000000f [ 6206.547226][ T4679] [<8056b8f4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6206.547273][ T4679] Exception stack(0xedc65fa8 to 0xedc65ff0) [ 6206.547316][ T4679] 5fa0: 0000000f 76f20f30 00000006 76f20f30 0000000f 00000000 [ 6206.547356][ T4679] 5fc0: 0000000f 76f20f30 00000006 00000003 00310000 00000000 00006364 76f210bc [ 6206.547400][ T4679] 5fe0: 00000158 76f20ed0 000d801c 0013022c [ 6206.659922][ T29] audit: type=1400 audit(6206.550:109213): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6206.675627][ T29] audit: type=1400 audit(6206.570:109214): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6206.695173][ T29] audit: type=1400 audit(6206.570:109215): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6206.988521][ T29] audit: type=1400 audit(6206.880:109216): avc: denied { read } for pid=4681 comm="syz.1.7906" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6206.991623][ T29] audit: type=1400 audit(6206.880:109217): avc: denied { read open } for pid=4681 comm="syz.1.7906" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6207.061182][ T29] audit: type=1400 audit(6206.950:109218): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6209.217861][ T1147] usb 1-1: new full-speed USB device number 78 using dummy_hcd [ 6209.498045][ T1147] usb 1-1: config 0 has an invalid interface number: 128 but max is 0 [ 6209.499278][ T1147] usb 1-1: config 0 has no interface number 0 [ 6209.657728][ T1147] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=b7.5a [ 6209.660227][ T1147] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6209.667343][ T1147] usb 1-1: Product: syz [ 6209.670822][ T1147] usb 1-1: Manufacturer: syz [ 6209.671725][ T1147] usb 1-1: SerialNumber: syz [ 6209.690748][ T1147] usb 1-1: config 0 descriptor?? [ 6211.163982][ T4708] comedi: valid board names for 8255 driver are: [ 6211.165209][ T4708] 8255 [ 6211.166036][ T4708] comedi: valid board names for vmk80xx driver are: [ 6211.167444][ T4708] vmk80xx [ 6211.168225][ T4708] comedi: valid board names for usbduxsigma driver are: [ 6211.169126][ T4708] usbduxsigma [ 6211.169952][ T4708] comedi: valid board names for usbduxfast driver are: [ 6211.171383][ T4708] usbduxfast [ 6211.172206][ T4708] comedi: valid board names for usbdux driver are: [ 6211.176159][ T4708] usbdux [ 6211.176849][ T4708] comedi: valid board names for ni6501 driver are: [ 6211.178180][ T4708] ni6501 [ 6211.179282][ T4708] comedi: valid board names for dt9812 driver are: [ 6211.180276][ T4708] dt9812 [ 6211.181023][ T4708] comedi: valid board names for ni_labpc_cs driver are: [ 6211.181924][ T4708] ni_labpc_cs [ 6211.182582][ T4708] comedi: valid board names for ni_daq_700 driver are: [ 6211.185874][ T4708] ni_daq_700 [ 6211.186646][ T4708] comedi: valid board names for labpc_pci driver are: [ 6211.187511][ T4708] labpc_pci [ 6211.188142][ T4708] comedi: valid board names for adl_pci9118 driver are: [ 6211.189162][ T4708] pci9118dg [ 6211.189874][ T4708] pci9118hg [ 6211.190517][ T4708] pci9118hr [ 6211.191164][ T4708] comedi: valid board names for 8255_pci driver are: [ 6211.192016][ T4708] 8255_pci [ 6211.193087][ T4708] comedi: valid board names for comedi_parport driver are: [ 6211.194972][ T4708] comedi_parport [ 6211.197045][ T4708] comedi: valid board names for comedi_test driver are: [ 6211.197919][ T4708] comedi_test [ 6211.198594][ T4708] comedi: valid board names for comedi_bond driver are: [ 6211.199423][ T4708] comedi_bond [ 6213.469894][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 6213.474252][ T29] audit: type=1400 audit(6213.360:109301): avc: denied { ioctl } for pid=4699 comm="syz.0.7913" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6217.228909][ T29] audit: type=1400 audit(6217.120:109302): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6217.231001][ T29] audit: type=1400 audit(6217.120:109303): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6217.235116][ T29] audit: type=1400 audit(6217.130:109304): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6217.534166][ T29] audit: type=1400 audit(6217.420:109305): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6217.540653][ T29] audit: type=1400 audit(6217.430:109306): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6217.560117][ T29] audit: type=1400 audit(6217.450:109307): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6217.755091][ T29] audit: type=1400 audit(6217.650:109308): avc: denied { read } for pid=4712 comm="syz.1.7915" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 6217.758538][ T29] audit: type=1400 audit(6217.650:109309): avc: denied { read open } for pid=4712 comm="syz.1.7915" path="/dev/input/mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 6219.970065][T24764] usb 1-1: USB disconnect, device number 78 [ 6220.276085][ T29] audit: type=1400 audit(6220.170:109310): avc: denied { execmem } for pid=4720 comm="syz.0.7916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6220.301536][ T29] audit: type=1400 audit(6220.190:109311): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6220.309778][ T29] audit: type=1400 audit(6220.200:109312): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6220.314325][ T29] audit: type=1400 audit(6220.200:109313): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6220.491530][ T29] audit: type=1400 audit(6220.380:109314): avc: denied { create } for pid=4723 comm="syz.1.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6220.501895][ T29] audit: type=1400 audit(6220.390:109315): avc: denied { write } for pid=4723 comm="syz.1.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6220.512625][ T29] audit: type=1400 audit(6220.400:109316): avc: denied { module_request } for pid=4723 comm="syz.1.7917" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6220.885081][ T29] audit: type=1400 audit(6220.770:109317): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6220.888941][ T29] audit: type=1400 audit(6220.780:109318): avc: denied { execmem } for pid=4727 comm="syz.0.7919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6220.891854][ T29] audit: type=1400 audit(6220.780:109319): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6225.326232][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 6225.330409][ T29] audit: type=1400 audit(6225.220:109364): avc: denied { module_request } for pid=4758 comm="syz.1.7930" kmod="fs-qnx4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6225.950258][ T29] audit: type=1400 audit(6225.840:109365): avc: denied { create } for pid=4762 comm="syz.0.7931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6225.989584][ T29] audit: type=1400 audit(6225.870:109366): avc: denied { create } for pid=4762 comm="syz.0.7931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6226.015328][ T29] audit: type=1400 audit(6225.890:109367): avc: denied { write } for pid=4762 comm="syz.0.7931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6226.015962][ T29] audit: type=1400 audit(6225.890:109368): avc: denied { read } for pid=4762 comm="syz.0.7931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6226.078760][ T29] audit: type=1400 audit(6225.970:109369): avc: denied { read } for pid=4762 comm="syz.0.7931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6226.114306][ T29] audit: type=1400 audit(6226.000:109370): avc: denied { write } for pid=4762 comm="syz.0.7931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6226.654253][ T29] audit: type=1400 audit(6226.540:109371): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6226.660330][ T29] audit: type=1400 audit(6226.550:109372): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6226.775860][ T29] audit: type=1400 audit(6226.670:109373): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6230.355398][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 6230.360948][ T29] audit: type=1400 audit(6230.240:109407): avc: denied { ioctl } for pid=4778 comm="syz.0.7939" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6230.361580][ T29] audit: type=1400 audit(6230.250:109408): avc: denied { ioctl } for pid=4778 comm="syz.0.7939" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6230.404528][ T29] audit: type=1400 audit(6230.270:109409): avc: denied { call } for pid=4778 comm="syz.0.7939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 6230.406931][ T29] audit: type=1400 audit(6230.270:109410): avc: denied { transfer } for pid=4778 comm="syz.0.7939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 6230.407888][ T29] audit: type=1400 audit(6230.300:109411): avc: denied { transfer } for pid=4778 comm="syz.0.7939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 6230.412451][ T4779] binder: 4778:4779 ioctl c0306201 200001c0 returned -14 [ 6231.073000][ T29] audit: type=1400 audit(6230.950:109412): avc: denied { create } for pid=4781 comm="syz.0.7941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6231.075895][ T29] audit: type=1400 audit(6230.970:109413): avc: denied { create } for pid=4780 comm="syz.1.7940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6231.217007][ T29] audit: type=1400 audit(6231.110:109414): avc: denied { create } for pid=4780 comm="syz.1.7940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6231.237063][ T29] audit: type=1400 audit(6231.130:109415): avc: denied { write } for pid=4780 comm="syz.1.7940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6231.246907][ T29] audit: type=1400 audit(6231.140:109416): avc: denied { read } for pid=4781 comm="syz.0.7941" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6236.098208][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 6236.106855][ T29] audit: type=1400 audit(6235.990:109450): avc: denied { write } for pid=4799 comm="syz.0.7947" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6236.118748][ T29] audit: type=1400 audit(6236.010:109451): avc: denied { write open } for pid=4799 comm="syz.0.7947" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6236.141615][ T29] audit: type=1400 audit(6236.030:109452): avc: denied { ioctl } for pid=4799 comm="syz.0.7947" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6236.213874][ T29] audit: type=1400 audit(6236.100:109453): avc: denied { create } for pid=4799 comm="syz.0.7947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6236.251283][ T29] audit: type=1400 audit(6236.140:109454): avc: denied { ioctl } for pid=4799 comm="syz.0.7947" path="socket:[94009]" dev="sockfs" ino=94009 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6236.426687][ T29] audit: type=1400 audit(6236.320:109455): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6236.479344][ T29] audit: type=1400 audit(6236.370:109456): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6236.485804][ T29] audit: type=1400 audit(6236.370:109457): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6237.662380][ T29] audit: type=1400 audit(6237.550:109458): avc: denied { name_bind } for pid=4808 comm="syz.1.7948" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6237.666387][ T29] audit: type=1400 audit(6237.550:109459): avc: denied { node_bind } for pid=4808 comm="syz.1.7948" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6241.199354][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 6241.204084][ T29] audit: type=1400 audit(6241.090:109489): avc: denied { write } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.260552][ T29] audit: type=1400 audit(6241.150:109490): avc: denied { write } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.300515][ T29] audit: type=1400 audit(6241.190:109491): avc: denied { read } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.334566][ T29] audit: type=1400 audit(6241.220:109492): avc: denied { write } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.382385][ T29] audit: type=1400 audit(6241.270:109493): avc: denied { write } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.439818][ T29] audit: type=1400 audit(6241.330:109494): avc: denied { write } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.466024][ T29] audit: type=1400 audit(6241.360:109495): avc: denied { read } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.480181][ T29] audit: type=1400 audit(6241.360:109496): avc: denied { module_request } for pid=4812 comm="syz.1.7949" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6241.480687][ T29] audit: type=1400 audit(6241.370:109497): avc: denied { read } for pid=4812 comm="syz.1.7949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6241.665946][ T29] audit: type=1400 audit(6241.550:109498): avc: denied { map_create } for pid=4822 comm="syz.0.7951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6246.206056][T23233] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 6246.315177][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 6246.319802][ T29] audit: type=1400 audit(6246.160:109552): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.369861][ T29] audit: type=1400 audit(6246.260:109553): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.378509][ T29] audit: type=1400 audit(6246.270:109554): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.446538][ T29] audit: type=1400 audit(6246.340:109555): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.529980][ T29] audit: type=1400 audit(6246.420:109556): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.540181][ T29] audit: type=1400 audit(6246.430:109557): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.554458][ T29] audit: type=1400 audit(6246.440:109558): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.574527][ T29] audit: type=1400 audit(6246.460:109559): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.597326][ T29] audit: type=1400 audit(6246.490:109560): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6246.598005][T23233] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6246.598167][T23233] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6246.598298][T23233] usb 2-1: New USB device found, idVendor=0c70, idProduct=f00d, bcdDevice= 0.00 [ 6246.598391][T23233] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6246.609742][T23233] usb 2-1: config 0 descriptor?? [ 6246.617034][ T29] audit: type=1400 audit(6246.500:109561): avc: denied { ioctl } for pid=4839 comm="syz.1.7957" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6247.247205][T23233] aquacomputer_d5next 0003:0C70:F00D.0009: hidraw0: USB HID v40.00 Device [HID 0c70:f00d] on usb-dummy_hcd.1-1/input0 [ 6247.380699][ T1147] usb 2-1: USB disconnect, device number 78 [ 6251.004531][T24764] usb 2-1: new high-speed USB device number 79 using dummy_hcd [ 6251.341037][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 6251.345228][ T29] audit: type=1400 audit(6251.230:109595): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.405307][ T29] audit: type=1400 audit(6251.250:109596): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.440124][ T29] audit: type=1400 audit(6251.330:109597): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.496719][ T29] audit: type=1400 audit(6251.390:109598): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.510389][ T29] audit: type=1400 audit(6251.400:109599): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.594227][ T29] audit: type=1400 audit(6251.480:109600): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.679242][ T29] audit: type=1400 audit(6251.570:109601): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.689133][ T29] audit: type=1400 audit(6251.580:109602): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.714233][ T29] audit: type=1400 audit(6251.600:109603): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.723233][ T29] audit: type=1400 audit(6251.610:109604): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6251.834724][T24764] usb 2-1: New USB device found, idVendor=055f, idProduct=c230, bcdDevice=b6.ac [ 6251.835420][T24764] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6251.835543][T24764] usb 2-1: Product: syz [ 6251.835585][T24764] usb 2-1: Manufacturer: syz [ 6251.835639][T24764] usb 2-1: SerialNumber: syz [ 6251.888836][T24764] usb 2-1: config 0 descriptor?? [ 6259.229603][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 6259.231468][ T29] audit: type=1400 audit(6259.120:109613): avc: denied { ioctl } for pid=4871 comm="syz.1.7960" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6259.755205][ T29] audit: type=1400 audit(6259.640:109614): avc: denied { read } for pid=4881 comm="syz.0.7961" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6259.761764][ T29] audit: type=1400 audit(6259.650:109615): avc: denied { read open } for pid=4881 comm="syz.0.7961" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6259.778800][ T29] audit: type=1400 audit(6259.660:109616): avc: denied { ioctl } for pid=4881 comm="syz.0.7961" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 ioctlcmd=0x5513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6260.062584][ T29] audit: type=1400 audit(6259.950:109617): avc: denied { read write } for pid=4883 comm="syz.0.7962" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dlm_control_device_t:s0" [ 6260.066794][ T29] audit: type=1400 audit(6259.960:109618): avc: denied { read write open } for pid=4883 comm="syz.0.7962" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dlm_control_device_t:s0" [ 6260.086741][ T29] audit: type=1400 audit(6259.960:109619): avc: denied { mounton } for pid=4883 comm="syz.0.7962" path="/155/file0" dev="tmpfs" ino=813 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6260.101380][ T29] audit: type=1400 audit(6259.990:109620): avc: denied { mount } for pid=4883 comm="syz.0.7962" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6260.137328][ T29] audit: type=1400 audit(6260.030:109621): avc: denied { unmount } for pid=3460 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6260.440956][ T29] audit: type=1400 audit(6260.330:109622): avc: denied { create } for pid=4887 comm="syz.0.7963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6261.326118][ T4893] syz.0.7964 (4893): /proc/4889/oom_adj is deprecated, please use /proc/4889/oom_score_adj instead. [ 6262.259351][ T4797] usb 2-1: USB disconnect, device number 79 [ 6264.344562][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 6264.346283][ T29] audit: type=1400 audit(6264.220:109647): avc: denied { write } for pid=4906 comm="syz.0.7968" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6264.366282][ T29] audit: type=1400 audit(6264.260:109648): avc: denied { write open } for pid=4906 comm="syz.0.7968" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6264.417266][ T29] audit: type=1400 audit(6264.310:109649): avc: denied { ioctl } for pid=4906 comm="syz.0.7968" path="/dev/nullb0" dev="devtmpfs" ino=654 ioctlcmd=0x128e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6264.739537][ T29] audit: type=1400 audit(6264.630:109650): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6264.780574][ T29] audit: type=1400 audit(6264.670:109651): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6264.810668][ T29] audit: type=1400 audit(6264.700:109652): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6265.059690][ T29] audit: type=1400 audit(6264.950:109653): avc: denied { read } for pid=4910 comm="syz.0.7970" dev="nsfs" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6265.074154][ T29] audit: type=1400 audit(6264.960:109654): avc: denied { read open } for pid=4910 comm="syz.0.7970" path="net:[4026532673]" dev="nsfs" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6265.090087][ T29] audit: type=1400 audit(6264.980:109655): avc: denied { create } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6265.104446][ T29] audit: type=1400 audit(6264.990:109656): avc: denied { connect } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.358585][ T29] kauditd_printk_skb: 413 callbacks suppressed [ 6269.363985][ T29] audit: type=1400 audit(6269.250:110070): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.372286][ T29] audit: type=1400 audit(6269.260:110071): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.401519][ T29] audit: type=1400 audit(6269.290:110072): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.444527][ T29] audit: type=1400 audit(6269.310:110073): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.444968][ T29] audit: type=1400 audit(6269.330:110074): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.449666][ T29] audit: type=1400 audit(6269.340:110075): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.454436][ T29] audit: type=1400 audit(6269.340:110076): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.465380][ T29] audit: type=1400 audit(6269.350:110077): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.471072][ T29] audit: type=1400 audit(6269.360:110078): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6269.471592][ T29] audit: type=1400 audit(6269.360:110079): avc: denied { write } for pid=4910 comm="syz.0.7970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6274.368859][ T29] kauditd_printk_skb: 758 callbacks suppressed [ 6274.370065][ T29] audit: type=1400 audit(6274.260:110838): avc: denied { audit_write } for pid=4922 comm="syz.0.7973" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6274.373363][ T29] audit: type=1400 audit(6274.260:110839): avc: denied { audit_write } for pid=4922 comm="syz.0.7973" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6274.426036][ T4923] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4923 comm=syz.0.7973 [ 6274.491947][ T29] audit: type=1400 audit(6274.380:110840): avc: denied { ioctl } for pid=4922 comm="syz.0.7973" path="socket:[94103]" dev="sockfs" ino=94103 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6274.902615][ T29] audit: type=1400 audit(6274.790:110841): avc: denied { read write } for pid=4928 comm="syz.0.7974" name="uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6274.907939][ T29] audit: type=1400 audit(6274.800:110842): avc: denied { read write open } for pid=4928 comm="syz.0.7974" path="/dev/uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6274.918040][ T29] audit: type=1400 audit(6274.810:110843): avc: denied { execmem } for pid=4928 comm="syz.0.7974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6276.160631][ T4930] UHID_CREATE from different security context by process 383 (syz.0.7974), this is not allowed. [ 6276.416259][ T29] audit: type=1400 audit(6276.310:110844): avc: denied { create } for pid=4931 comm="syz.0.7975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6276.434582][ T29] audit: type=1400 audit(6276.330:110845): avc: denied { write } for pid=4931 comm="syz.0.7975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6276.772012][ T29] audit: type=1400 audit(6276.660:110846): avc: denied { name_bind } for pid=4935 comm="syz.0.7977" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6276.777627][ T29] audit: type=1400 audit(6276.670:110847): avc: denied { node_bind } for pid=4935 comm="syz.0.7977" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6279.847064][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 6279.855893][ T29] audit: type=1400 audit(6279.740:110872): avc: denied { write } for pid=4943 comm="syz.0.7980" name="mcfilter6" dev="proc" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 6279.856395][ T29] audit: type=1400 audit(6279.740:110873): avc: denied { write } for pid=4943 comm="syz.0.7980" path="/proc/397/net/mcfilter6" dev="proc" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 6281.097170][ T29] audit: type=1400 audit(6280.990:110874): avc: denied { create } for pid=4949 comm="syz.0.7982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6281.123778][ T29] audit: type=1400 audit(6281.000:110875): avc: denied { getopt } for pid=4949 comm="syz.0.7982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6282.029886][ T29] audit: type=1400 audit(6281.920:110876): avc: denied { execmem } for pid=4953 comm="syz.0.7984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6286.041917][ T29] audit: type=1400 audit(6285.930:110877): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.051641][ T29] audit: type=1400 audit(6285.940:110878): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.068209][ T29] audit: type=1400 audit(6285.960:110879): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.419597][ T29] audit: type=1400 audit(6286.310:110880): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.435222][ T29] audit: type=1400 audit(6286.320:110881): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.444345][ T29] audit: type=1400 audit(6286.330:110882): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.848929][ T29] audit: type=1400 audit(6286.740:110883): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.860412][ T29] audit: type=1400 audit(6286.750:110884): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6286.869195][ T29] audit: type=1400 audit(6286.760:110885): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6287.638622][ T29] audit: type=1400 audit(6287.530:110886): avc: denied { create } for pid=4963 comm="syz.1.7987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6287.651267][ T4964] netlink: 36 bytes leftover after parsing attributes in process `syz.1.7987'. [ 6289.322204][ T4970] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7990'. [ 6292.471033][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 6292.473832][ T29] audit: type=1400 audit(6292.360:110920): avc: denied { prog_load } for pid=4971 comm="syz.1.7991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6292.491981][ T29] audit: type=1400 audit(6292.380:110921): avc: denied { bpf } for pid=4971 comm="syz.1.7991" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.500235][ T29] audit: type=1400 audit(6292.390:110922): avc: denied { perfmon } for pid=4971 comm="syz.1.7991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.529773][ T29] audit: type=1400 audit(6292.420:110923): avc: denied { perfmon } for pid=4971 comm="syz.1.7991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.533252][ T29] audit: type=1400 audit(6292.420:110924): avc: denied { perfmon } for pid=4971 comm="syz.1.7991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.556376][ T29] audit: type=1400 audit(6292.450:110925): avc: denied { perfmon } for pid=4971 comm="syz.1.7991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.561068][ T29] audit: type=1400 audit(6292.450:110926): avc: denied { bpf } for pid=4971 comm="syz.1.7991" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.581924][ T29] audit: type=1400 audit(6292.470:110927): avc: denied { bpf } for pid=4971 comm="syz.1.7991" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6292.597855][ T29] audit: type=1400 audit(6292.490:110928): avc: denied { prog_run } for pid=4971 comm="syz.1.7991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6296.646996][ T29] audit: type=1400 audit(6296.540:110929): avc: denied { write } for pid=4977 comm="syz.0.7993" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6298.384124][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 6298.390013][ T29] audit: type=1400 audit(6298.270:110932): avc: denied { create } for pid=4985 comm="syz.0.7995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6298.405253][ T29] audit: type=1400 audit(6298.280:110933): avc: denied { write } for pid=4985 comm="syz.0.7995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6298.428555][ T29] audit: type=1400 audit(6298.320:110934): avc: denied { prog_load } for pid=4985 comm="syz.0.7995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6298.431814][ T29] audit: type=1400 audit(6298.320:110935): avc: denied { bpf } for pid=4985 comm="syz.0.7995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.577011][ T29] audit: type=1400 audit(6298.470:110936): avc: denied { perfmon } for pid=4985 comm="syz.0.7995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.582073][ T29] audit: type=1400 audit(6298.470:110937): avc: denied { perfmon } for pid=4985 comm="syz.0.7995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.667211][ T29] audit: type=1400 audit(6298.560:110938): avc: denied { perfmon } for pid=4985 comm="syz.0.7995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.678054][ T29] audit: type=1400 audit(6298.570:110939): avc: denied { perfmon } for pid=4985 comm="syz.0.7995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.689443][ T29] audit: type=1400 audit(6298.580:110940): avc: denied { bpf } for pid=4985 comm="syz.0.7995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.710339][ T29] audit: type=1400 audit(6298.600:110941): avc: denied { bpf } for pid=4985 comm="syz.0.7995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6308.612853][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 6308.624543][ T29] audit: type=1400 audit(6308.500:111007): avc: denied { read } for pid=4997 comm="syz.0.8001" name="timer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6308.640940][ T29] audit: type=1400 audit(6308.530:111008): avc: denied { read open } for pid=4997 comm="syz.0.8001" path="/dev/snd/timer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6308.655440][ T29] audit: type=1400 audit(6308.550:111009): avc: denied { ioctl } for pid=4997 comm="syz.0.8001" path="/dev/snd/timer" dev="devtmpfs" ino=721 ioctlcmd=0x5403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6310.075887][ T29] audit: type=1400 audit(6309.970:111010): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6310.080979][ T29] audit: type=1400 audit(6309.970:111011): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6310.134320][ T29] audit: type=1400 audit(6309.990:111012): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6310.134807][ T29] audit: type=1400 audit(6310.000:111013): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6310.135056][ T29] audit: type=1400 audit(6310.010:111014): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6310.145624][ T29] audit: type=1400 audit(6310.040:111015): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6310.148837][ T29] audit: type=1400 audit(6310.040:111016): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6311.384147][T24764] usb 2-1: new high-speed USB device number 80 using dummy_hcd [ 6311.567885][T24764] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 6311.568240][T24764] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 6311.572278][T24764] usb 2-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 6311.612203][T24764] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 6311.612548][T24764] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6311.612721][T24764] usb 2-1: Product: syz [ 6311.612864][T24764] usb 2-1: Manufacturer: syz [ 6311.612958][T24764] usb 2-1: SerialNumber: syz [ 6311.720965][T24764] cdc_ncm 2-1:1.0: skipping garbage [ 6311.721644][T24764] cdc_ncm 2-1:1.0: invalid descriptor buffer length [ 6311.722077][T24764] cdc_ncm 2-1:1.0: CDC Union missing and no IAD found [ 6311.722556][T24764] cdc_ncm 2-1:1.0: bind() failure [ 6315.440603][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 6315.441039][ T29] audit: type=1400 audit(6315.330:111095): avc: denied { ioctl } for pid=5004 comm="syz.1.8004" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6318.254379][ T29] audit: type=1400 audit(6318.140:111096): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.282939][ T29] audit: type=1400 audit(6318.170:111097): avc: denied { recv } for pid=3460 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.322642][ T29] audit: type=1400 audit(6318.200:111098): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.324005][ T29] audit: type=1400 audit(6318.210:111099): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.324550][ T29] audit: type=1400 audit(6318.210:111100): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.345636][ T29] audit: type=1400 audit(6318.240:111101): avc: denied { recv } for pid=3460 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.349657][ T29] audit: type=1400 audit(6318.240:111102): avc: denied { recv } for pid=3460 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.384261][ T29] audit: type=1400 audit(6318.270:111103): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6318.384681][ T29] audit: type=1400 audit(6318.270:111104): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6319.044373][ T4797] usb 1-1: new full-speed USB device number 79 using dummy_hcd [ 6319.249921][ T4797] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 6319.250260][ T4797] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 6319.250370][ T4797] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 6319.250411][ T4797] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6319.537076][ T4797] usb 1-1: usb_control_msg returned -32 [ 6319.537770][ T4797] usbtmc 1-1:16.0: can't read capabilities [ 6321.949489][ T1076] usb 2-1: USB disconnect, device number 80 [ 6322.008544][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 6322.016694][ T29] audit: type=1400 audit(6321.900:111140): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6322.072198][ T29] audit: type=1400 audit(6321.950:111141): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6322.072719][ T29] audit: type=1400 audit(6321.950:111142): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6322.074782][ T29] audit: type=1400 audit(6321.950:111143): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6322.074899][ T29] audit: type=1400 audit(6321.960:111144): avc: denied { ioctl } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6322.075371][ T29] audit: type=1400 audit(6321.960:111145): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6322.075632][ T29] audit: type=1400 audit(6321.960:111146): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6322.096296][ T29] audit: type=1400 audit(6321.990:111147): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6322.118655][ T29] audit: type=1400 audit(6322.010:111148): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6322.125467][ T29] audit: type=1400 audit(6322.010:111149): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.087756][T32137] usb 1-1: USB disconnect, device number 79 [ 6333.168498][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 6333.169043][ T29] audit: type=1400 audit(6333.050:111303): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.169320][ T29] audit: type=1400 audit(6333.060:111304): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.204397][ T29] audit: type=1400 audit(6333.080:111305): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.204930][ T29] audit: type=1400 audit(6333.080:111306): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.209596][ T29] audit: type=1400 audit(6333.100:111307): avc: denied { recv } for pid=3460 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.257294][ T29] audit: type=1400 audit(6333.130:111308): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.257889][ T29] audit: type=1400 audit(6333.130:111309): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.274798][ T29] audit: type=1400 audit(6333.170:111310): avc: denied { recv } for pid=3460 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.278132][ T29] audit: type=1400 audit(6333.170:111311): avc: denied { recv } for pid=3460 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6333.311966][ T29] audit: type=1400 audit(6333.200:111312): avc: denied { recv } for pid=1993 comm="syz-executor" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.209254][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 6338.210115][ T29] audit: type=1400 audit(6338.090:111431): avc: denied { recv } for pid=1993 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.210362][ T29] audit: type=1400 audit(6338.090:111432): avc: denied { recv } for pid=1993 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.210561][ T29] audit: type=1400 audit(6338.100:111433): avc: denied { recv } for pid=1993 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.247005][ T29] audit: type=1400 audit(6338.140:111434): avc: denied { read write } for pid=1993 comm="syz-executor" name="loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6338.252367][ T29] audit: type=1400 audit(6338.140:111435): avc: denied { read write open } for pid=1993 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6338.287156][ T29] audit: type=1400 audit(6338.180:111436): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.315889][ T29] audit: type=1400 audit(6338.200:111437): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.317855][ T29] audit: type=1400 audit(6338.200:111438): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.351176][ T29] audit: type=1400 audit(6338.230:111439): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6338.354359][ T29] audit: type=1400 audit(6338.240:111440): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6339.818695][ T5111] can: request_module (can-proto-3) failed. [ 6340.285936][ T5114] cgroup: No subsys list or none specified [ 6341.467126][ T5120] comedi: valid board names for 8255 driver are: [ 6341.467448][ T5120] 8255 [ 6341.467809][ T5120] comedi: valid board names for vmk80xx driver are: [ 6341.467953][ T5120] vmk80xx [ 6341.468041][ T5120] comedi: valid board names for usbduxsigma driver are: [ 6341.468116][ T5120] usbduxsigma [ 6341.468190][ T5120] comedi: valid board names for usbduxfast driver are: [ 6341.468276][ T5120] usbduxfast [ 6341.468345][ T5120] comedi: valid board names for usbdux driver are: [ 6341.468414][ T5120] usbdux [ 6341.468486][ T5120] comedi: valid board names for ni6501 driver are: [ 6341.468557][ T5120] ni6501 [ 6341.468626][ T5120] comedi: valid board names for dt9812 driver are: [ 6341.468697][ T5120] dt9812 [ 6341.468854][ T5120] comedi: valid board names for ni_labpc_cs driver are: [ 6341.468939][ T5120] ni_labpc_cs [ 6341.469010][ T5120] comedi: valid board names for ni_daq_700 driver are: [ 6341.469079][ T5120] ni_daq_700 [ 6341.469166][ T5120] comedi: valid board names for labpc_pci driver are: [ 6341.469309][ T5120] labpc_pci [ 6341.469386][ T5120] comedi: valid board names for adl_pci9118 driver are: [ 6341.469456][ T5120] pci9118dg [ 6341.469531][ T5120] pci9118hg [ 6341.469599][ T5120] pci9118hr [ 6341.469666][ T5120] comedi: valid board names for 8255_pci driver are: [ 6341.469733][ T5120] 8255_pci [ 6341.469860][ T5120] comedi: valid board names for comedi_parport driver are: [ 6341.469936][ T5120] comedi_parport [ 6341.470004][ T5120] comedi: valid board names for comedi_test driver are: [ 6341.470071][ T5120] comedi_test [ 6341.470137][ T5120] comedi: valid board names for comedi_bond driver are: [ 6341.470204][ T5120] comedi_bond [ 6342.185473][T29805] usb 2-1: new high-speed USB device number 81 using dummy_hcd [ 6342.374052][T29805] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 6342.374539][T29805] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6342.396433][T29805] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 6342.396870][T29805] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 6342.396944][T29805] usb 2-1: Manufacturer: syz [ 6342.406924][T29805] usb 2-1: config 0 descriptor?? [ 6342.644314][T29805] rc_core: IR keymap rc-hauppauge not found [ 6342.644713][T29805] Registered IR keymap rc-empty [ 6342.647206][T29805] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 6342.648751][T29805] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input32 [ 6342.692533][ C0] igorplugusb 2-1:0.0: Error: urb status = -32 [ 6342.731558][T29805] usb 2-1: USB disconnect, device number 81 [ 6343.344578][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 6343.345183][ T29] audit: type=1400 audit(6343.230:111601): avc: denied { read write } for pid=5147 comm="syz.1.8032" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.365882][ T29] audit: type=1400 audit(6343.240:111602): avc: denied { read write open } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.372222][ T29] audit: type=1400 audit(6343.260:111603): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.390169][ T29] audit: type=1400 audit(6343.280:111604): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.410744][ T29] audit: type=1400 audit(6343.300:111605): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.427520][ T29] audit: type=1400 audit(6343.320:111606): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.511579][ T29] audit: type=1400 audit(6343.400:111607): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.578035][ T29] audit: type=1400 audit(6343.470:111608): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.634909][T29805] usb 2-1: new high-speed USB device number 82 using dummy_hcd [ 6343.747062][ T29] audit: type=1400 audit(6343.630:111609): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.770770][ T29] audit: type=1400 audit(6343.660:111610): avc: denied { ioctl } for pid=5147 comm="syz.1.8032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.894944][T29805] usb 2-1: Using ep0 maxpacket: 16 [ 6344.033974][T29805] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6344.034400][T29805] usb 2-1: New USB device found, idVendor=2006, idProduct=0118, bcdDevice= 0.00 [ 6344.034472][T29805] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6344.055225][T29805] usb 2-1: config 0 descriptor?? [ 6344.596569][T29805] hkems 0003:2006:0118.000A: unbalanced delimiter at end of report description [ 6344.597056][T29805] hkems 0003:2006:0118.000A: parse failed [ 6344.597217][T29805] hkems 0003:2006:0118.000A: probe with driver hkems failed with error -22 [ 6344.802617][T29805] usb 2-1: USB disconnect, device number 82 [ 6348.509275][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 6348.512878][ T29] audit: type=1400 audit(6348.400:111760): avc: denied { create } for pid=5190 comm="syz.1.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6348.519828][ T29] audit: type=1400 audit(6348.410:111761): avc: denied { create } for pid=5190 comm="syz.1.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6348.530771][ T29] audit: type=1400 audit(6348.420:111762): avc: denied { write } for pid=5190 comm="syz.1.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6348.531840][ T29] audit: type=1400 audit(6348.420:111763): avc: denied { module_request } for pid=5187 comm="syz.0.8041" kmod="crypto-cbc-cast5-avx-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6348.540705][ T29] audit: type=1400 audit(6348.430:111764): avc: denied { read } for pid=5190 comm="syz.1.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6348.542457][ T29] audit: type=1400 audit(6348.430:111765): avc: denied { read } for pid=5190 comm="syz.1.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6348.556239][ T29] audit: type=1400 audit(6348.450:111766): avc: denied { write } for pid=5190 comm="syz.1.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6348.599471][ T29] audit: type=1400 audit(6348.490:111767): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6348.635877][ T29] audit: type=1400 audit(6348.530:111768): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6348.649366][ T29] audit: type=1400 audit(6348.540:111769): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.388741][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 6354.391294][ T29] audit: type=1400 audit(6354.270:111881): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.398897][ T29] audit: type=1400 audit(6354.290:111882): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.438057][ T29] audit: type=1400 audit(6354.320:111883): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.438563][ T29] audit: type=1400 audit(6354.330:111884): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.443124][ T29] audit: type=1400 audit(6354.330:111885): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.469705][ T29] audit: type=1400 audit(6354.360:111886): avc: denied { recv } for pid=5199 comm="syz.1.8046" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.471987][ T29] audit: type=1400 audit(6354.360:111887): avc: denied { recv } for pid=5199 comm="syz.1.8046" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.491786][ T29] audit: type=1400 audit(6354.380:111888): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.496640][ T29] audit: type=1400 audit(6354.380:111889): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=34614 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6354.809240][ T29] audit: type=1400 audit(6354.700:111890): avc: denied { create } for pid=5219 comm="syz.0.8051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6356.115922][ T5230] netlink: 288 bytes leftover after parsing attributes in process `syz.0.8055'. [ 6357.534391][ T5236] input: syz0 as /devices/virtual/input/input33 [ 6359.702515][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 6359.712708][ T29] audit: type=1400 audit(6359.590:112039): avc: denied { read append } for pid=5245 comm="syz.0.8061" name="comedi3" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6359.724421][ T29] audit: type=1400 audit(6359.610:112040): avc: denied { read open } for pid=5245 comm="syz.0.8061" path="/dev/comedi3" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6359.800271][ T29] audit: type=1400 audit(6359.690:112041): avc: denied { create } for pid=5245 comm="syz.0.8061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6359.816844][ T29] audit: type=1400 audit(6359.710:112042): avc: denied { write } for pid=5245 comm="syz.0.8061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6359.825725][ T29] audit: type=1400 audit(6359.720:112043): avc: denied { module_request } for pid=5245 comm="syz.0.8061" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6360.364197][ T29] audit: type=1400 audit(6360.250:112044): avc: denied { create } for pid=5245 comm="syz.0.8061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6360.403037][ T5248] 8<--- cut here --- [ 6360.404340][ T29] audit: type=1400 audit(6360.280:112045): avc: denied { ioctl } for pid=5245 comm="syz.0.8061" path="socket:[95484]" dev="sockfs" ino=95484 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6360.404431][ T29] audit: type=1400 audit(6360.290:112046): avc: denied { ioctl } for pid=5245 comm="syz.0.8061" path="/dev/comedi3" dev="devtmpfs" ino=716 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6360.409459][ T5248] Unable to handle kernel paging request at virtual address fee04f2a when write [ 6360.409616][ T5248] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 6360.411192][ T5248] Internal error: Oops: a06 [#1] SMP ARM [ 6360.414959][ T5248] Modules linked in: [ 6360.415562][ T5248] CPU: 0 UID: 0 PID: 5248 Comm: syz.0.8061 Tainted: G L syzkaller #0 PREEMPT [ 6360.415942][ T5248] Tainted: [L]=SOFTLOCKUP [ 6360.416119][ T5248] Hardware name: ARM-Versatile Express [ 6360.416402][ T5248] PC is at subdev_8255_io+0x60/0x6c [ 6360.416698][ T5248] LR is at subdev_8255_io+0x4c/0x6c [ 6360.416968][ T5248] pc : [<8141653c>] lr : [<81416528>] psr: 60000013 [ 6360.417864][ T5248] sp : ea639cb0 ip : ea639cb0 fp : ea639ccc [ 6360.418953][ T5248] r10: 00000001 r9 : 00000084 r8 : ea639d9c [ 6360.419657][ T5248] r7 : 00004f27 r6 : 0000009b r5 : 8450f480 r4 : 00004f2a [ 6360.420344][ T5248] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 8450f480 [ 6360.420948][ T5248] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 6360.421587][ T5248] Control: 30c5387d Table: 84d23e80 DAC: fffffffd [ 6360.422228][ T5248] Register r0 information: slab kmalloc-192 start 8450f480 pointer offset 0 size 192 [ 6360.423544][ T5248] Register r1 information: non-paged memory [ 6360.424233][ T5248] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 6360.424893][ T5248] Register r3 information: non-paged memory [ 6360.425336][ T5248] Register r4 information: non-paged memory [ 6360.425595][ T5248] Register r5 information: slab kmalloc-192 start 8450f480 pointer offset 0 size 192 [ 6360.426074][ T5248] Register r6 information: non-paged memory [ 6360.426557][ T5248] Register r7 information: non-paged memory [ 6360.427297][ T5248] Register r8 information: 2-page vmalloc region starting at 0xea638000 allocated at kernel_clone+0xac/0x3ec [ 6360.428233][ T5248] Register r9 information: non-paged memory [ 6360.428914][ T5248] Register r10 information: non-paged memory [ 6360.429370][ T5248] Register r11 information: 2-page vmalloc region starting at 0xea638000 allocated at kernel_clone+0xac/0x3ec [ 6360.429858][ T5248] Register r12 information: 2-page vmalloc region starting at 0xea638000 allocated at kernel_clone+0xac/0x3ec [ 6360.430365][ T5248] Process syz.0.8061 (pid: 5248, stack limit = 0xea638000) [ 6360.430695][ T5248] Stack: (0xea639cb0 to 0xea63a000) [ 6360.430927][ T5248] 9ca0: 814164dc 8450f480 00004f27 00004f27 [ 6360.431258][ T5248] 9cc0: ea639cec ea639cd0 81416214 814164e8 00004f27 805153fc 8be08000 8be08000 [ 6360.431558][ T5248] 9ce0: ea639d0c ea639cf0 814165d4 814161c8 8450f480 00000000 8be08000 00004f27 [ 6360.431864][ T5248] 9d00: ea639d4c ea639d10 81416780 81416554 0000005f 83388e80 828215b0 00000000 [ 6360.432174][ T5248] 9d20: 00000000 829d46a0 8450f480 8450f4c4 ea639d88 8450f480 00000000 82b28ad8 [ 6360.432959][ T5248] 9d40: ea639d84 ea639d50 814052b4 81416718 8450f4b0 00000000 ea639d74 200000c0 [ 6360.433407][ T5248] 9d60: 8450f480 b5403587 8450f4b0 85f1c800 40946400 00000003 ea639e44 ea639d88 [ 6360.434047][ T5248] 9d80: 81400c0c 814051b8 35353238 00000000 00000000 00000000 00000000 00004f27 [ 6360.434532][ T5248] 9da0: 00000005 00000002 00000004 00000001 00000cc7 00000fff 5c95239c 00000005 [ 6360.434842][ T5248] 9dc0: 000003ff 00000802 00001600 00000001 00000001 00000009 0000e1cb 00000006 [ 6360.435415][ T5248] 9de0: 00000004 00000003 00000395 80000089 fffffffe 0000000b fffffff5 ffffeadb [ 6360.435880][ T5248] 9e00: 00000003 0000003c 00000000 00000004 08000000 dffffffa 00000000 e973b618 [ 6360.436246][ T5248] 9e20: 00000000 86509480 8450f480 200000c0 8450f4b0 85f1c800 ea639f14 ea639e48 [ 6360.436635][ T5248] 9e40: 81401c00 81400b18 00000000 00000000 00000000 ea639e54 ea639e54 e973b618 [ 6360.437125][ T5248] 9e60: 00000000 00000000 824a45ec 0000005f 8466c640 00000064 83fa69e4 85f1c800 [ 6360.437470][ T5248] 9e80: ea639ee4 ea639e90 807b85c0 807aeae4 00000064 00000001 00000000 ea639eac [ 6360.437802][ T5248] 9ea0: 8650d6d0 834d6000 00006400 0000000b ea639ea0 00000000 ea639d40 e973b618 [ 6360.438126][ T5248] 9ec0: 86509480 40946400 200000c0 200000c0 86509480 00000003 ea639ef4 ea639ee8 [ 6360.438455][ T5248] 9ee0: 807b86e0 e973b618 ea639f14 40946400 00000000 86509481 200000c0 86509480 [ 6360.439024][ T5248] 9f00: 00000003 85f1c800 ea639fa4 ea639f18 80585ba8 81401650 ecac8b10 85f1c800 [ 6360.439490][ T5248] 9f20: ea639f3c ea639f30 81ab06a4 81ab0574 ea639f54 ea639f40 8025bcbc 8028e0c4 [ 6360.439931][ T5248] 9f40: ea639fb0 40000000 ea639f84 ea639f58 80221a38 8025bc78 00000000 8281cf7c [ 6360.440673][ T5248] 9f60: ea639fb0 0014c8c0 ecac8b10 8022198c 00000000 e973b618 ea639fac 00000000 [ 6360.441238][ T5248] 9f80: 00000000 003263b0 00000036 8020029c 85f1c800 00000036 00000000 ea639fa8 [ 6360.441620][ T5248] 9fa0: 80200060 80585a84 00000000 00000000 00000003 40946400 200000c0 00000000 [ 6360.441988][ T5248] 9fc0: 00000000 00000000 003263b0 00000036 00310000 00000000 00006364 76f0b0bc [ 6360.442340][ T5248] 9fe0: 76f0aec0 76f0aeb0 000192bc 00132360 60000010 00000003 00000000 00000000 [ 6360.442762][ T5248] Call trace: [ 6360.443007][ T5248] [<814164dc>] (subdev_8255_io) from [<81416214>] (subdev_8255_do_config+0x58/0x60) [ 6360.443793][ T5248] r7:00004f27 r6:00004f27 r5:8450f480 r4:814164dc [ 6360.444284][ T5248] [<814161bc>] (subdev_8255_do_config) from [<814165d4>] (subdev_8255_io_init+0x8c/0x9c) [ 6360.444947][ T5248] r4:8be08000 [ 6360.445134][ T5248] [<81416548>] (subdev_8255_io_init) from [<81416780>] (dev_8255_attach+0x74/0x120) [ 6360.445987][ T5248] r7:00004f27 r6:8be08000 r5:00000000 r4:8450f480 [ 6360.446420][ T5248] [<8141670c>] (dev_8255_attach) from [<814052b4>] (comedi_device_attach+0x108/0x250) [ 6360.446922][ T5248] r10:82b28ad8 r9:00000000 r8:8450f480 r7:ea639d88 r6:8450f4c4 r5:8450f480 [ 6360.447236][ T5248] r4:829d46a0 [ 6360.447495][ T5248] [<814051ac>] (comedi_device_attach) from [<81400c0c>] (do_devconfig_ioctl+0x100/0x220) [ 6360.447987][ T5248] r10:00000003 r9:40946400 r8:85f1c800 r7:8450f4b0 r6:b5403587 r5:8450f480 [ 6360.448320][ T5248] r4:200000c0 [ 6360.449211][ T5248] [<81400b0c>] (do_devconfig_ioctl) from [<81401c00>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 6360.449864][ T5248] r8:85f1c800 r7:8450f4b0 r6:200000c0 r5:8450f480 r4:86509480 [ 6360.450210][ T5248] [<81401644>] (comedi_unlocked_ioctl) from [<80585ba8>] (sys_ioctl+0x130/0xba0) [ 6360.450667][ T5248] r10:85f1c800 r9:00000003 r8:86509480 r7:200000c0 r6:86509481 r5:00000000 [ 6360.451003][ T5248] r4:40946400 [ 6360.451174][ T5248] [<80585a78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6360.451508][ T5248] Exception stack(0xea639fa8 to 0xea639ff0) [ 6360.451971][ T5248] 9fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 6360.452772][ T5248] 9fc0: 00000000 00000000 003263b0 00000036 00310000 00000000 00006364 76f0b0bc [ 6360.453836][ T5248] 9fe0: 76f0aec0 76f0aeb0 000192bc 00132360 [ 6360.454673][ T5248] r10:00000036 r9:85f1c800 r8:8020029c r7:00000036 r6:003263b0 r5:00000000 [ 6360.455263][ T5248] r4:00000000 [ 6360.455761][ T5248] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 6360.465051][ T5248] ---[ end trace 0000000000000000 ]--- [ 6360.485781][ T29] audit: type=1400 audit(6360.350:112047): avc: denied { recv } for pid=5245 comm="syz.0.8061" saddr=10.0.2.2 src=37676 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6360.506950][ T29] audit: type=1400 audit(6360.400:112048): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34614 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 SYZFAIL: failed to recv rpc [ 6360.615827][ T5248] Kernel panic - not syncing: Fatal exception [ 6360.618934][ T5248] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:23:17 Registers: info registers vcpu 0 CPU#0 R00=845bd040 R01=00000061 R02=eaa65000 R03=eaa65018 R04=845a001d R05=845bd040 R06=80aa42c0 R07=845a0042 R08=82827048 R09=00000000 R10=00006f47 R11=ea639904 R12=00000002 R13=ea6398f8 R14=82959b34 R15=80aa42d0 PSR=80010193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=8022c140 R02=00000000 R03=0000d038 R04=83e88c00 R05=ea509a44 R06=0000007e R07=0000027f R08=82aed0d0 R09=807ad32c R10=82aed0d4 R11=ea509b04 R12=ea509a20 R13=ea509a80 R14=807adbbc R15=80290454 PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000