last executing test programs: 14.080814662s ago: executing program 0 (id=9838): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$PTRACE_GETSIGMASK(0x420a, r0, 0x8, &(0x7f0000000000)) 12.101071117s ago: executing program 0 (id=9839): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x40, r1, 0x3, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x300}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 10.129812571s ago: executing program 0 (id=9840): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ptrace(0x10, r1) ptrace$setsig(0x4203, r1, 0x3, &(0x7f0000000080)={0x0, 0x0, 0x9}) 7.64010518s ago: executing program 0 (id=9846): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) r1 = eventfd(0x8800a6) write$eventfd(r1, &(0x7f0000000000)=0xfffffffffffffff7, 0x8) 5.889568938s ago: executing program 0 (id=9847): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x2f, &(0x7f0000abaff9)={0x0, 0xea60}, 0x10) 4.828915437s ago: executing program 1 (id=9849): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a, 0x0, 0xffffffffffffffff, 0xfffffffffffffef6, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x1d, 0x0, @void}, 0x10) 4.639144572s ago: executing program 1 (id=9850): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000b00)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast1, @in6=@local}, {@in=@rand_addr=0x80000000, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0xfffffffd, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 4.259069283s ago: executing program 1 (id=9851): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="05010000000000107d1e222e00000000000109022400010000000009040000020300020009210000000122020009058103"], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff2e) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, 0x0) r2 = dup(r1) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f0000000180)=ANY=[@ANYBLOB="000004"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$printer(0x4, 0x0, 0x0, 0x0) 2.17218043s ago: executing program 1 (id=9852): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40814}, 0x40804) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa001c104}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200460c1}, 0x20044895) 2.091400443s ago: executing program 0 (id=9853): r0 = openat$vcsu(0xffffff9c, &(0x7f0000000140), 0x202000, 0x0) close$binfmt(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x810) 1.189260567s ago: executing program 1 (id=9854): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000540)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000300)={@fd={0x66642a85, 0x0, r0}, @fd={0x66642a85, 0x0, r3}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/32, 0x0, 0x2, 0x13}}, &(0x7f0000000200)={0x0, 0x18, 0x93}}, 0x1000}], 0x0, 0x0, 0x0}) 0s ago: executing program 1 (id=9855): ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x0, 0x1, 0xeac38f707dfa6e65, 0x2}, 0x0, 0x3, 'id0\x00', 'timer0\x00'}) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000740)={0x0}) kernel console output (not intermixed with test programs): 00133450 [ 4351.725943][ T8773] r5:00000000 r4:00000000 [ 4353.130889][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 4353.130979][ T31] audit: type=1400 audit(4353.050:58216): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4353.137742][ T31] audit: type=1400 audit(4353.060:58217): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4353.139346][ T31] audit: type=1400 audit(4353.060:58218): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4353.140545][ T31] audit: type=1400 audit(4353.060:58219): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4353.141738][ T31] audit: type=1400 audit(4353.060:58220): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4353.145199][ T31] audit: type=1400 audit(4353.070:58221): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4353.156324][ T31] audit: type=1400 audit(4353.080:58222): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4353.160499][ T31] audit: type=1400 audit(4353.080:58223): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4353.307718][ T31] audit: type=1400 audit(4353.230:58224): avc: denied { create } for pid=8779 comm="syz.1.9552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4353.327254][ T31] audit: type=1400 audit(4353.250:58225): avc: denied { write } for pid=8779 comm="syz.1.9552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4353.518955][ T8780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=8780 comm=syz.1.9552 [ 4359.055760][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 4359.055880][ T31] audit: type=1400 audit(4358.980:58265): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4359.056772][ T31] audit: type=1400 audit(4358.980:58266): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4359.057301][ T31] audit: type=1400 audit(4358.980:58267): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4359.066507][ T31] audit: type=1400 audit(4358.990:58268): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4359.077742][ T31] audit: type=1400 audit(4359.000:58269): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4359.078453][ T31] audit: type=1400 audit(4359.000:58270): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4359.078841][ T31] audit: type=1400 audit(4359.000:58271): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4359.079224][ T31] audit: type=1400 audit(4359.000:58272): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4359.079658][ T31] audit: type=1400 audit(4359.000:58273): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4359.080014][ T31] audit: type=1400 audit(4359.000:58274): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4366.352997][ T31] audit: type=1400 audit(4366.260:58275): avc: denied { unmount } for pid=4747 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4366.376086][ T31] audit: type=1400 audit(4366.300:58276): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4366.379184][ T31] audit: type=1400 audit(4366.300:58277): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4366.383426][ T31] audit: type=1400 audit(4366.300:58278): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4366.384592][ T31] audit: type=1400 audit(4366.300:58279): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4366.385618][ T31] audit: type=1400 audit(4366.300:58280): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4368.383280][ T31] audit: type=1400 audit(4368.300:58281): avc: denied { create } for pid=8800 comm="syz.0.9557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4368.395191][ T31] audit: type=1400 audit(4368.310:58282): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4368.436548][ T31] audit: type=1400 audit(4368.350:58283): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4368.437583][ T31] audit: type=1400 audit(4368.350:58284): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4369.532687][ T8801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=8801 comm=syz.0.9557 [ 4371.408392][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 4371.408499][ T31] audit: type=1400 audit(4371.330:58320): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4371.409832][ T31] audit: type=1400 audit(4371.330:58321): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4371.411012][ T31] audit: type=1400 audit(4371.330:58322): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4371.430190][ T31] audit: type=1400 audit(4371.350:58323): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4371.439153][ T31] audit: type=1400 audit(4371.360:58324): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4371.448710][ T31] audit: type=1400 audit(4371.370:58325): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4371.449671][ T31] audit: type=1400 audit(4371.370:58326): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4371.450478][ T31] audit: type=1400 audit(4371.370:58327): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4371.566481][ T31] audit: type=1400 audit(4371.490:58328): avc: denied { create } for pid=8810 comm="syz.1.9562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4371.614439][ T31] audit: type=1400 audit(4371.530:58329): avc: denied { write } for pid=8810 comm="syz.1.9562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4373.355631][ T8820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=8820 comm=syz.1.9565 [ 4374.642057][ T8828] FAULT_INJECTION: forcing a failure. [ 4374.642057][ T8828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4374.654902][ T8828] CPU: 0 UID: 0 PID: 8828 Comm: syz.1.9567 Not tainted 6.12.0-syzkaller #0 [ 4374.655259][ T8828] Hardware name: ARM-Versatile Express [ 4374.655540][ T8828] Call trace: [ 4374.655807][ T8828] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 4374.656214][ T8828] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 4374.656470][ T8828] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 4374.656844][ T8828] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 4374.657208][ T8828] r5:00000000 r4:82751908 [ 4374.657410][ T8828] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 4374.657812][ T8828] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 4374.658166][ T8828] r6:00000000 r5:ece29f68 r4:00000002 [ 4374.658548][ T8828] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 4374.658964][ T8828] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 4374.659442][ T8828] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 4374.659960][ T8828] r10:00000001 r9:805cc9a0 r8:00000002 r7:ece29f68 r6:0000000f r5:76bc2f30 [ 4374.660319][ T8828] r4:83ea9800 r3:ece29e9f [ 4374.660563][ T8828] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 4374.660980][ T8828] r8:76bc2f30 r7:ece29f68 r6:83ea9800 r5:0000000f r4:86033180 [ 4374.661341][ T8828] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 4374.661725][ T8828] r10:00000003 r9:83ea9800 r8:8020029c r7:00000000 r6:00000000 r5:86033180 [ 4374.662090][ T8828] r4:86033183 [ 4374.662522][ T8828] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 4374.662963][ T8828] r7:00000003 r6:00000004 r5:76bc2f30 r4:0000000f [ 4374.663358][ T8828] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4374.663820][ T8828] Exception stack(0xece29fa8 to 0xece29ff0) [ 4374.664133][ T8828] 9fa0: 0000000f 76bc2f30 00000004 76bc2f30 0000000f 00000000 [ 4374.664553][ T8828] 9fc0: 0000000f 76bc2f30 00000004 00000003 00000000 00006364 003d0f00 76bc30bc [ 4374.664946][ T8828] 9fe0: 00000158 76bc2ed0 000d8998 00131324 [ 4376.498270][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 4376.498400][ T31] audit: type=1400 audit(4376.420:58402): avc: denied { read } for pid=8835 comm="syz.1.9571" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4376.514855][ T31] audit: type=1400 audit(4376.440:58403): avc: denied { read open } for pid=8835 comm="syz.1.9571" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4376.520238][ T31] audit: type=1400 audit(4376.440:58404): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4376.531627][ T31] audit: type=1400 audit(4376.450:58405): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4376.535934][ T31] audit: type=1400 audit(4376.450:58406): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4376.536766][ T31] audit: type=1400 audit(4376.450:58407): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4376.537756][ T31] audit: type=1400 audit(4376.450:58408): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4376.553170][ T31] audit: type=1400 audit(4376.470:58409): avc: denied { read } for pid=8835 comm="syz.1.9571" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4376.556843][ T31] audit: type=1400 audit(4376.480:58410): avc: denied { open } for pid=8835 comm="syz.1.9571" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4376.766526][ T31] audit: type=1400 audit(4376.690:58411): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4378.178018][ T8848] sctp: [Deprecated]: syz.1.9576 (pid 8848) Use of int in maxseg socket option. [ 4378.178018][ T8848] Use struct sctp_assoc_value instead [ 4381.543026][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 4381.543120][ T31] audit: type=1400 audit(4381.460:58478): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4381.571446][ T31] audit: type=1400 audit(4381.490:58479): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4381.587357][ T31] audit: type=1400 audit(4381.510:58480): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4381.597259][ T31] audit: type=1400 audit(4381.510:58481): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4381.598189][ T31] audit: type=1400 audit(4381.510:58482): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4381.598850][ T31] audit: type=1400 audit(4381.520:58483): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4381.599555][ T31] audit: type=1400 audit(4381.520:58484): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4381.600344][ T31] audit: type=1400 audit(4381.520:58485): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4381.741174][ T31] audit: type=1400 audit(4381.660:58486): avc: denied { create } for pid=8858 comm="syz.1.9579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4381.750300][ T31] audit: type=1400 audit(4381.670:58487): avc: denied { setopt } for pid=8858 comm="syz.1.9579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4386.655994][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 4386.656071][ T31] audit: type=1400 audit(4386.580:58511): avc: denied { read } for pid=8874 comm="syz.1.9583" name="sequencer" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4386.665780][ T31] audit: type=1400 audit(4386.590:58512): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4386.667135][ T31] audit: type=1400 audit(4386.590:58513): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4386.667899][ T31] audit: type=1400 audit(4386.590:58514): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4386.668676][ T31] audit: type=1400 audit(4386.590:58515): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4386.669994][ T31] audit: type=1400 audit(4386.590:58516): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4386.673242][ T31] audit: type=1400 audit(4386.600:58517): avc: denied { read open } for pid=8874 comm="syz.1.9583" path="/dev/sequencer" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4386.727833][ T31] audit: type=1400 audit(4386.650:58518): avc: denied { create } for pid=8874 comm="syz.1.9583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4386.730645][ T31] audit: type=1400 audit(4386.650:58519): avc: denied { ioctl } for pid=8874 comm="syz.1.9583" path="socket:[109745]" dev="sockfs" ino=109745 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4386.733129][ T31] audit: type=1400 audit(4386.660:58520): avc: denied { getopt } for pid=8874 comm="syz.1.9583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4392.288566][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 4392.288651][ T31] audit: type=1400 audit(4392.210:58551): avc: denied { ioctl } for pid=8882 comm="syz.0.9585" path="socket:[109093]" dev="sockfs" ino=109093 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4392.302615][ T31] audit: type=1400 audit(4392.220:58552): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4392.303719][ T31] audit: type=1400 audit(4392.230:58553): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4392.304569][ T31] audit: type=1400 audit(4392.230:58554): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4392.305411][ T31] audit: type=1400 audit(4392.230:58555): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4392.306708][ T31] audit: type=1400 audit(4392.230:58556): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4392.588999][ T31] audit: type=1400 audit(4392.510:58557): avc: denied { write } for pid=8880 comm="syz.1.9584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4392.892805][ T31] audit: type=1400 audit(4392.810:58558): avc: denied { ioctl } for pid=8882 comm="syz.0.9585" path="socket:[109093]" dev="sockfs" ino=109093 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4392.978891][ T31] audit: type=1400 audit(4392.900:58559): avc: denied { write } for pid=8880 comm="syz.1.9584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4393.095237][ T31] audit: type=1400 audit(4393.020:58560): avc: denied { read } for pid=8880 comm="syz.1.9584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4397.477020][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 4397.477170][ T31] audit: type=1400 audit(4397.400:58574): avc: denied { create } for pid=8887 comm="syz.0.9586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 4397.478289][ T31] audit: type=1400 audit(4397.400:58575): avc: denied { module_request } for pid=8887 comm="syz.0.9586" kmod="net-pf-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4397.496280][ T31] audit: type=1400 audit(4397.420:58576): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4397.508872][ T31] audit: type=1400 audit(4397.430:58577): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4397.509932][ T31] audit: type=1400 audit(4397.430:58578): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4397.510806][ T31] audit: type=1400 audit(4397.430:58579): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4397.511738][ T31] audit: type=1400 audit(4397.430:58580): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4397.755662][ T8889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=8889 comm=syz.0.9586 [ 4399.174086][ T31] audit: type=1400 audit(4399.100:58581): avc: denied { create } for pid=8891 comm="syz.0.9587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4399.185721][ T31] audit: type=1400 audit(4399.110:58582): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4399.193948][ T31] audit: type=1400 audit(4399.120:58583): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4402.976559][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 4402.976638][ T31] audit: type=1400 audit(4402.900:58618): avc: denied { create } for pid=8903 comm="syz.0.9590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4402.991040][ T31] audit: type=1400 audit(4402.910:58619): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4402.992005][ T31] audit: type=1400 audit(4402.910:58620): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4402.994594][ T31] audit: type=1400 audit(4402.910:58621): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4402.995594][ T31] audit: type=1400 audit(4402.910:58622): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4402.996623][ T31] audit: type=1400 audit(4402.910:58623): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4403.060927][ T31] audit: type=1400 audit(4402.980:58624): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4403.062853][ T31] audit: type=1400 audit(4402.980:58625): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4403.064186][ T31] audit: type=1400 audit(4402.990:58626): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4403.228753][ T31] audit: type=1400 audit(4403.150:58627): avc: denied { create } for pid=8905 comm="syz.1.9591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4403.275829][ T8906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=8906 comm=syz.1.9591 [ 4408.051183][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 4408.051278][ T31] audit: type=1400 audit(4407.970:58676): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4408.065821][ T31] audit: type=1400 audit(4407.970:58677): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4408.066799][ T31] audit: type=1400 audit(4407.970:58678): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4408.067665][ T31] audit: type=1400 audit(4407.980:58679): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4408.068407][ T31] audit: type=1400 audit(4407.980:58680): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4408.069146][ T31] audit: type=1400 audit(4407.980:58681): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4408.069896][ T31] audit: type=1400 audit(4407.980:58682): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4408.070809][ T31] audit: type=1400 audit(4407.980:58683): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4408.101284][ T31] audit: type=1400 audit(4408.020:58684): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4408.114458][ T31] audit: type=1400 audit(4408.020:58685): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4408.526062][ T8929] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=8929 comm=syz.1.9596 [ 4413.086593][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 4413.086726][ T31] audit: type=1400 audit(4413.010:58722): avc: denied { create } for pid=8944 comm="syz.1.9603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4413.096052][ T31] audit: type=1400 audit(4413.020:58723): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4413.098172][ T31] audit: type=1400 audit(4413.020:58724): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4413.099066][ T31] audit: type=1400 audit(4413.020:58725): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4413.099945][ T31] audit: type=1400 audit(4413.020:58726): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4413.101589][ T31] audit: type=1400 audit(4413.020:58727): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4413.126432][ T31] audit: type=1400 audit(4413.050:58728): avc: denied { write } for pid=8944 comm="syz.1.9603" name="ttynull" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4413.127396][ T31] audit: type=1400 audit(4413.050:58729): avc: denied { open } for pid=8944 comm="syz.1.9603" path="/dev/ttynull" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4413.175568][ T31] audit: type=1400 audit(4413.100:58730): avc: denied { read } for pid=8944 comm="syz.1.9603" name="iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4413.176251][ T31] audit: type=1400 audit(4413.100:58731): avc: denied { open } for pid=8944 comm="syz.1.9603" path="/dev/iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4418.136335][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 4418.136450][ T31] audit: type=1400 audit(4418.060:58781): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4418.140514][ T31] audit: type=1400 audit(4418.060:58782): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4418.148066][ T31] audit: type=1400 audit(4418.070:58783): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4418.151309][ T31] audit: type=1400 audit(4418.070:58784): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4418.168800][ T31] audit: type=1400 audit(4418.090:58785): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4418.169835][ T31] audit: type=1400 audit(4418.090:58786): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4418.170599][ T31] audit: type=1400 audit(4418.090:58787): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4418.171375][ T31] audit: type=1400 audit(4418.090:58788): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4418.423831][ T31] audit: type=1400 audit(4418.330:58789): avc: denied { create } for pid=8965 comm="syz.1.9611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4418.455856][ T31] audit: type=1400 audit(4418.380:58790): avc: denied { setopt } for pid=8965 comm="syz.1.9611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4423.243271][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 4423.243397][ T31] audit: type=1400 audit(4423.160:58818): avc: denied { create } for pid=8977 comm="syz.1.9616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4423.268785][ T31] audit: type=1400 audit(4423.190:58819): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4423.272110][ T31] audit: type=1400 audit(4423.190:58820): avc: denied { ioctl } for pid=8977 comm="syz.1.9616" path="socket:[109287]" dev="sockfs" ino=109287 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4423.278940][ T31] audit: type=1400 audit(4423.200:58821): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4423.285769][ T31] audit: type=1400 audit(4423.210:58822): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4423.286809][ T31] audit: type=1400 audit(4423.210:58823): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4423.293828][ T31] audit: type=1400 audit(4423.220:58824): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4423.556294][ T31] audit: type=1400 audit(4423.480:58825): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4423.575262][ T31] audit: type=1400 audit(4423.490:58826): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4423.575931][ T31] audit: type=1400 audit(4423.490:58827): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4428.666991][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 4428.667098][ T31] audit: type=1400 audit(4428.590:58899): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4428.679950][ T31] audit: type=1400 audit(4428.600:58900): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4428.695020][ T31] audit: type=1400 audit(4428.620:58901): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4428.703259][ T31] audit: type=1400 audit(4428.620:58902): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4428.704324][ T31] audit: type=1400 audit(4428.620:58903): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4428.709281][ T31] audit: type=1400 audit(4428.630:58904): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4428.710229][ T31] audit: type=1400 audit(4428.630:58905): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4428.711095][ T31] audit: type=1400 audit(4428.630:58906): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4428.860281][ T31] audit: type=1400 audit(4428.780:58907): avc: denied { create } for pid=9007 comm="syz.1.9626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4428.898968][ T9008] audit: audit_lost=18 audit_rate_limit=0 audit_backlog_limit=64 [ 4434.071896][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 4434.071974][ T31] audit: type=1400 audit(4433.990:58957): avc: denied { ioctl } for pid=9027 comm="syz.0.9633" path="socket:[109560]" dev="sockfs" ino=109560 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4434.079176][ T31] audit: type=1400 audit(4434.000:58958): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4434.079874][ T31] audit: type=1400 audit(4434.000:58959): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4434.080359][ T31] audit: type=1400 audit(4434.000:58960): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4434.081389][ T31] audit: type=1400 audit(4434.000:58961): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4434.081933][ T31] audit: type=1400 audit(4434.000:58962): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4434.770736][ T31] audit: type=1400 audit(4434.690:58963): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4434.777777][ T31] audit: type=1400 audit(4434.700:58964): avc: denied { ioctl } for pid=9027 comm="syz.0.9633" path="socket:[109560]" dev="sockfs" ino=109560 ioctlcmd=0x5321 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4434.823143][ T31] audit: type=1400 audit(4434.740:58965): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4434.824454][ T31] audit: type=1400 audit(4434.740:58966): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4440.964170][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 4440.964292][ T31] audit: type=1400 audit(4440.890:59015): avc: denied { create } for pid=9051 comm="syz.0.9642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4440.986755][ T31] audit: type=1400 audit(4440.910:59016): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4440.988490][ T31] audit: type=1400 audit(4440.910:59017): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4440.989829][ T31] audit: type=1400 audit(4440.910:59018): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4440.991411][ T31] audit: type=1400 audit(4440.910:59019): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4440.996655][ T31] audit: type=1400 audit(4440.920:59020): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4441.103081][ T31] audit: type=1400 audit(4441.020:59021): avc: denied { write } for pid=9051 comm="syz.0.9642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4441.117870][ T31] audit: type=1400 audit(4441.040:59022): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4441.121358][ T31] audit: type=1400 audit(4441.040:59023): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4441.122130][ T31] audit: type=1400 audit(4441.040:59024): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4446.134125][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 4446.134248][ T31] audit: type=1400 audit(4446.060:59040): avc: denied { create } for pid=9056 comm="syz.0.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4446.157284][ T31] audit: type=1400 audit(4446.080:59041): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4446.158909][ T31] audit: type=1400 audit(4446.080:59042): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4446.163014][ T31] audit: type=1400 audit(4446.080:59043): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4446.164223][ T31] audit: type=1400 audit(4446.080:59044): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4446.164949][ T31] audit: type=1400 audit(4446.080:59045): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4446.401692][ T31] audit: type=1400 audit(4446.320:59046): avc: denied { setopt } for pid=9056 comm="syz.0.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4446.503159][ T31] audit: type=1400 audit(4446.420:59047): avc: denied { ioctl } for pid=9056 comm="syz.0.9644" path="socket:[109935]" dev="sockfs" ino=109935 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4448.115739][ T31] audit: type=1400 audit(4448.040:59048): avc: denied { read write } for pid=9058 comm="syz.0.9645" name="fb0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4448.117001][ T31] audit: type=1400 audit(4448.040:59049): avc: denied { open } for pid=9058 comm="syz.0.9645" path="/dev/fb0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4451.184579][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 4451.184650][ T31] audit: type=1400 audit(4451.110:59058): avc: denied { create } for pid=9062 comm="syz.0.9647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4451.212683][ T31] audit: type=1400 audit(4451.130:59059): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4451.213427][ T31] audit: type=1400 audit(4451.130:59060): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4451.214082][ T31] audit: type=1400 audit(4451.130:59061): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4451.214684][ T31] audit: type=1400 audit(4451.130:59062): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4451.215287][ T31] audit: type=1400 audit(4451.130:59063): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4451.303831][ T31] audit: type=1400 audit(4451.230:59064): avc: denied { write } for pid=9062 comm="syz.0.9647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4451.394647][ T31] audit: type=1400 audit(4451.320:59065): avc: denied { ioctl } for pid=9062 comm="syz.0.9647" path="socket:[110663]" dev="sockfs" ino=110663 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4451.396782][ T31] audit: type=1400 audit(4451.320:59066): avc: denied { bind } for pid=9062 comm="syz.0.9647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4451.840532][ T31] audit: type=1400 audit(4451.760:59067): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4455.635505][ T9078] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9078 comm=syz.1.9651 [ 4456.235323][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 4456.235380][ T31] audit: type=1400 audit(4456.160:59127): avc: denied { sys_module } for pid=9080 comm="syz.1.9652" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4456.235615][ T9079] FAULT_INJECTION: forcing a failure. [ 4456.235615][ T9079] name failslab, interval 1, probability 0, space 0, times 0 [ 4456.236250][ T31] audit: type=1400 audit(4456.160:59128): avc: denied { module_request } for pid=9080 comm="syz.1.9652" kmod="wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4456.236822][ T9079] CPU: 0 UID: 0 PID: 9079 Comm: syz.0.9650 Not tainted 6.12.0-syzkaller #0 [ 4456.237952][ T9079] Hardware name: ARM-Versatile Express [ 4456.238186][ T9079] Call trace: [ 4456.238412][ T9079] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 4456.238864][ T9079] r7:00000d40 r6:84e19aa8 r5:60000013 r4:820413b8 [ 4456.239141][ T9079] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 4456.239583][ T9079] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 4456.239976][ T9079] r5:00000000 r4:8271b79c [ 4456.240202][ T9079] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 4456.240593][ T9079] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 4456.240969][ T9079] r6:84e19aa8 r5:00000011 r4:82c01240 [ 4456.241183][ T9079] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 4456.241588][ T9079] [<804d4614>] (__kmalloc_noprof) from [<8075b87c>] (tomoyo_encode2+0x64/0xf0) [ 4456.242025][ T9079] r10:00000fff r9:85193400 r8:00000000 r7:848ee908 r6:84e19aa8 r5:847f2ffc [ 4456.242609][ T9079] r4:847f2ff6 [ 4456.242955][ T9079] [<8075b818>] (tomoyo_encode2) from [<8075b92c>] (tomoyo_encode+0x24/0x30) [ 4456.243585][ T9079] r9:85193400 r8:00000000 r7:848ee908 r6:84e19aa8 r5:00001000 r4:847f2ff7 [ 4456.244131][ T9079] [<8075b908>] (tomoyo_encode) from [<8075b9b8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4456.244589][ T9079] r5:00001000 r4:847f2000 [ 4456.244852][ T9079] [<8075b938>] (tomoyo_realpath_from_path) from [<80757d68>] (tomoyo_check_open_permission+0x150/0x1c0) [ 4456.245350][ T9079] r10:00000000 r9:00000006 r8:83f8c4c0 r7:00000002 r6:00000000 r5:84e19aa8 [ 4456.245739][ T9079] r4:00000001 r3:00000001 [ 4456.245980][ T9079] [<80757c18>] (tomoyo_check_open_permission) from [<8075c808>] (tomoyo_file_open+0x34/0x38) [ 4456.246435][ T9079] r9:84e19a80 r8:84e19aa8 r7:00000000 r6:8331cf00 r5:81aca114 r4:84e19a80 [ 4456.246786][ T9079] [<8075c7d4>] (tomoyo_file_open) from [<8071a514>] (security_file_open+0x54/0x194) [ 4456.247216][ T9079] r5:81aca114 r4:84e19a80 [ 4456.247482][ T9079] [<8071a4c0>] (security_file_open) from [<80517ed8>] (do_dentry_open+0xe8/0x664) [ 4456.247957][ T9079] r5:81aca114 r4:84e19a80 [ 4456.248184][ T9079] [<80517df0>] (do_dentry_open) from [<80519f0c>] (vfs_open+0x2c/0xec) [ 4456.248597][ T9079] r8:dfe25e58 r7:00000000 r6:84e19aa8 r5:82722034 r4:84e19a80 [ 4456.248962][ T9079] [<80519ee0>] (vfs_open) from [<80532928>] (path_openat+0x770/0x11a4) [ 4456.249369][ T9079] r6:dfe25f20 r5:82722034 r4:00000002 [ 4456.249632][ T9079] [<805321b8>] (path_openat) from [<80533408>] (do_filp_open+0xac/0x148) [ 4456.250048][ T9079] r10:00000142 r9:8359e000 r8:00000001 r7:dfe25e58 r6:dfe25f20 r5:83eabc00 [ 4456.250461][ T9079] r4:ffffff9c [ 4456.250644][ T9079] [<8053335c>] (do_filp_open) from [<8051a3b8>] (do_sys_openat2+0xbc/0xe4) [ 4456.251190][ T9079] r9:83eabc00 r8:8020029c r7:ffffff9c r6:00000006 r5:dfe25f58 r4:8359e000 [ 4456.251603][ T9079] [<8051a2fc>] (do_sys_openat2) from [<8051a7c0>] (sys_openat+0x98/0xd4) [ 4456.252025][ T9079] r7:00000142 r6:00131400 r5:20000000 r4:ffffff9c [ 4456.252958][ T9079] [<8051a728>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4456.253484][ T9079] Exception stack(0xdfe25fa8 to 0xdfe25ff0) [ 4456.253816][ T9079] 5fa0: 00000000 00000000 ffffff9c 20000000 00000002 00000000 [ 4456.254216][ T9079] 5fc0: 00000000 00000000 00131400 00000142 00000000 00006364 003d0f00 76b830bc [ 4456.254608][ T9079] 5fe0: 76b82ec0 76b82eb0 00018af0 00133450 [ 4456.254954][ T9079] r5:00000000 r4:00000000 [ 4456.275768][ T31] audit: type=1400 audit(4456.200:59129): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4456.282554][ T31] audit: type=1400 audit(4456.200:59130): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4456.283337][ T31] audit: type=1400 audit(4456.200:59131): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4456.283951][ T31] audit: type=1400 audit(4456.200:59132): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4456.284555][ T31] audit: type=1400 audit(4456.200:59133): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4456.394806][ T31] audit: type=1400 audit(4456.320:59134): avc: denied { write } for pid=9080 comm="syz.1.9652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4456.395517][ T31] audit: type=1400 audit(4456.320:59135): avc: denied { read } for pid=9080 comm="syz.1.9652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4456.440939][ T31] audit: type=1400 audit(4456.360:59136): avc: denied { create } for pid=9080 comm="syz.1.9652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4456.966045][ T9079] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4459.653048][ T9097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9097 comm=syz.1.9656 [ 4461.663425][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 4461.663558][ T31] audit: type=1400 audit(4461.590:59195): avc: denied { write } for pid=9104 comm="syz.1.9660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4461.684636][ T31] audit: type=1400 audit(4461.610:59196): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4461.687550][ T31] audit: type=1400 audit(4461.610:59197): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4461.688528][ T31] audit: type=1400 audit(4461.610:59198): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4461.689915][ T31] audit: type=1400 audit(4461.610:59199): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4461.691271][ T31] audit: type=1400 audit(4461.610:59200): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4462.136305][ T31] audit: type=1400 audit(4462.060:59201): avc: denied { read } for pid=9104 comm="syz.1.9660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4462.158217][ T31] audit: type=1400 audit(4462.080:59202): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4462.158687][ T31] audit: type=1400 audit(4462.080:59203): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4462.159007][ T31] audit: type=1400 audit(4462.080:59204): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4467.237258][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 4467.237319][ T31] audit: type=1400 audit(4467.160:59241): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4467.238207][ T31] audit: type=1400 audit(4467.160:59242): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4467.238711][ T31] audit: type=1400 audit(4467.160:59243): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4467.264623][ T31] audit: type=1400 audit(4467.190:59244): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4467.267858][ T31] audit: type=1400 audit(4467.190:59245): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4467.268776][ T31] audit: type=1400 audit(4467.190:59246): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4467.269924][ T31] audit: type=1400 audit(4467.190:59247): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4467.270897][ T31] audit: type=1400 audit(4467.190:59248): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4467.667917][ T31] audit: type=1400 audit(4467.590:59249): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4467.669783][ T31] audit: type=1400 audit(4467.590:59250): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4472.265132][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 4472.265269][ T31] audit: type=1400 audit(4472.190:59389): avc: denied { ioctl } for pid=9153 comm="syz.0.9680" path="socket:[110175]" dev="sockfs" ino=110175 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4472.286171][ T31] audit: type=1400 audit(4472.210:59390): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4472.287287][ T31] audit: type=1400 audit(4472.210:59391): avc: denied { ioctl } for pid=9153 comm="syz.0.9680" path="socket:[110175]" dev="sockfs" ino=110175 ioctlcmd=0x5321 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4472.290300][ T31] audit: type=1400 audit(4472.210:59392): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4472.290861][ T31] audit: type=1400 audit(4472.210:59393): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4472.291440][ T31] audit: type=1400 audit(4472.210:59394): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4472.292091][ T31] audit: type=1400 audit(4472.210:59395): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4472.348419][ T31] audit: type=1400 audit(4472.270:59396): avc: denied { read } for pid=9159 comm="syz.1.9685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4472.351678][ T31] audit: type=1400 audit(4472.270:59397): avc: denied { ioctl } for pid=9159 comm="syz.1.9685" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=110816 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4472.359574][ T31] audit: type=1400 audit(4472.280:59398): avc: denied { map } for pid=9159 comm="syz.1.9685" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=110816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4477.289684][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 4477.289823][ T31] audit: type=1400 audit(4477.210:59448): avc: denied { setopt } for pid=9180 comm="syz.1.9695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4477.291208][ T31] audit: type=1400 audit(4477.210:59449): avc: denied { connect } for pid=9180 comm="syz.1.9695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4477.297572][ T31] audit: type=1400 audit(4477.220:59450): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4477.298677][ T31] audit: type=1400 audit(4477.220:59451): avc: denied { ioctl } for pid=9180 comm="syz.1.9695" path="socket:[110218]" dev="sockfs" ino=110218 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4477.302858][ T31] audit: type=1400 audit(4477.220:59452): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4477.303997][ T31] audit: type=1400 audit(4477.220:59453): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4477.304759][ T31] audit: type=1400 audit(4477.220:59454): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4477.308180][ T31] audit: type=1400 audit(4477.230:59455): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4477.326620][ T31] audit: type=1400 audit(4477.250:59456): avc: denied { ioctl } for pid=9180 comm="syz.1.9695" path="socket:[110218]" dev="sockfs" ino=110218 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4477.392600][ T31] audit: type=1400 audit(4477.310:59457): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4480.849802][ T9212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=9212 comm=syz.1.9709 [ 4482.139572][ T9225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=9225 comm=syz.1.9714 [ 4482.337354][ T31] kauditd_printk_skb: 136 callbacks suppressed [ 4482.337421][ T31] audit: type=1400 audit(4482.260:59594): avc: denied { read write } for pid=9226 comm="syz.1.9715" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4482.339662][ T31] audit: type=1400 audit(4482.260:59595): avc: denied { open } for pid=9226 comm="syz.1.9715" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4482.341024][ T31] audit: type=1400 audit(4482.260:59596): avc: denied { read } for pid=9215 comm="syz.0.9708" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4482.348373][ T31] audit: type=1400 audit(4482.270:59597): avc: denied { open } for pid=9215 comm="syz.0.9708" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4482.381464][ T31] audit: type=1400 audit(4482.300:59598): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4482.414053][ T31] audit: type=1400 audit(4482.340:59599): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4482.415290][ T31] audit: type=1400 audit(4482.340:59600): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4482.484875][ T31] audit: type=1400 audit(4482.410:59601): avc: denied { ioctl } for pid=9215 comm="syz.0.9708" path="/dev/dri/card1" dev="devtmpfs" ino=616 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4482.524016][ T31] audit: type=1400 audit(4482.450:59602): avc: denied { ioctl } for pid=9215 comm="syz.0.9708" path="/dev/dri/card1" dev="devtmpfs" ino=616 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4482.546250][ T31] audit: type=1400 audit(4482.470:59603): avc: denied { read } for pid=9215 comm="syz.0.9708" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4486.717402][ T9240] FAULT_INJECTION: forcing a failure. [ 4486.717402][ T9240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4486.717824][ T9240] CPU: 0 UID: 0 PID: 9240 Comm: syz.1.9719 Not tainted 6.12.0-syzkaller #0 [ 4486.718069][ T9240] Hardware name: ARM-Versatile Express [ 4486.718290][ T9240] Call trace: [ 4486.718494][ T9240] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 4486.718852][ T9240] r7:ea995e20 r6:20000300 r5:60000013 r4:820413b8 [ 4486.719036][ T9240] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 4486.719282][ T9240] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 4486.719604][ T9240] r5:00000000 r4:82751908 [ 4486.719720][ T9240] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 4486.719966][ T9240] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 4486.720186][ T9240] r6:20000300 r5:00000000 r4:ea995f20 [ 4486.720328][ T9240] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 4486.720583][ T9240] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 4486.720853][ T9240] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 4486.721132][ T9240] r8:04004080 r7:00000000 r6:84848500 r5:ea995f20 r4:ea995e64 [ 4486.721332][ T9240] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 4486.721591][ T9240] r10:00000128 r9:83d3ec00 r8:860336c0 r7:04004080 r6:20000300 r5:860336c1 [ 4486.721810][ T9240] r4:00000005 [ 4486.721900][ T9240] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 4486.722235][ T9240] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 4486.722612][ T9240] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4486.722854][ T9240] Exception stack(0xea995fa8 to 0xea995ff0) [ 4486.723142][ T9240] 5fa0: 00000000 00000000 00000005 20000300 04004080 00000000 [ 4486.723475][ T9240] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76ba20bc [ 4486.723891][ T9240] 5fe0: 76ba1ec0 76ba1eb0 00018af0 00133450 [ 4487.523998][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 4487.524067][ T31] audit: type=1400 audit(4487.450:59643): avc: denied { create } for pid=9241 comm="syz.0.9720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4487.546086][ T31] audit: type=1400 audit(4487.470:59644): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4487.546718][ T31] audit: type=1400 audit(4487.470:59645): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4487.547219][ T31] audit: type=1400 audit(4487.470:59646): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4487.547818][ T31] audit: type=1400 audit(4487.470:59647): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4487.548383][ T31] audit: type=1400 audit(4487.470:59648): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4487.585645][ T31] audit: type=1400 audit(4487.510:59649): avc: denied { read } for pid=9241 comm="syz.0.9720" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4487.714779][ T31] audit: type=1400 audit(4487.640:59650): avc: denied { open } for pid=9241 comm="syz.0.9720" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4487.744874][ T31] audit: type=1400 audit(4487.670:59651): avc: denied { create } for pid=9241 comm="syz.0.9720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4488.715065][ T31] audit: type=1400 audit(4488.640:59652): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4492.816068][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 4492.816205][ T31] audit: type=1400 audit(4492.740:59690): avc: denied { read } for pid=9269 comm="syz.0.9722" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4492.826618][ T31] audit: type=1400 audit(4492.750:59691): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4492.827612][ T31] audit: type=1400 audit(4492.750:59692): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4492.828279][ T31] audit: type=1400 audit(4492.750:59693): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4492.829018][ T31] audit: type=1400 audit(4492.750:59694): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4492.829599][ T31] audit: type=1400 audit(4492.750:59695): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4492.874587][ T31] audit: type=1400 audit(4492.800:59696): avc: denied { read open } for pid=9269 comm="syz.0.9722" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4492.933052][ T31] audit: type=1400 audit(4492.850:59697): avc: denied { ioctl } for pid=9269 comm="syz.0.9722" path="/dev/dri/card1" dev="devtmpfs" ino=616 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4492.958770][ T31] audit: type=1400 audit(4492.880:59698): avc: denied { ioctl } for pid=9270 comm="syz.1.9723" path="socket:[110959]" dev="sockfs" ino=110959 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4493.096300][ T31] audit: type=1400 audit(4493.020:59699): avc: denied { ioctl } for pid=9269 comm="syz.0.9722" path="/dev/dri/card1" dev="devtmpfs" ino=616 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 4497.853171][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 4497.853304][ T31] audit: type=1400 audit(4497.770:59729): avc: denied { create } for pid=9278 comm="syz.0.9724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4497.875981][ T31] audit: type=1400 audit(4497.800:59730): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4497.876713][ T31] audit: type=1400 audit(4497.800:59731): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4497.877261][ T31] audit: type=1400 audit(4497.800:59732): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4497.877824][ T31] audit: type=1400 audit(4497.800:59733): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4497.878422][ T31] audit: type=1400 audit(4497.800:59734): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4497.904926][ T31] audit: type=1400 audit(4497.830:59735): avc: denied { create } for pid=9278 comm="syz.0.9724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4497.906359][ T31] audit: type=1400 audit(4497.830:59736): avc: denied { write } for pid=9278 comm="syz.0.9724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4497.907629][ T31] audit: type=1400 audit(4497.830:59737): avc: denied { read } for pid=9278 comm="syz.0.9724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4498.235961][ T31] audit: type=1400 audit(4498.160:59738): avc: denied { write } for pid=9278 comm="syz.0.9724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4502.123704][ T9289] FAULT_INJECTION: forcing a failure. [ 4502.123704][ T9289] name failslab, interval 1, probability 0, space 0, times 0 [ 4502.124403][ T9289] CPU: 0 UID: 0 PID: 9289 Comm: syz.0.9727 Not tainted 6.12.0-syzkaller #0 [ 4502.124988][ T9289] Hardware name: ARM-Versatile Express [ 4502.125216][ T9289] Call trace: [ 4502.125389][ T9289] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 4502.125752][ T9289] r7:82e35400 r6:00000dc0 r5:60000113 r4:820413b8 [ 4502.126002][ T9289] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 4502.126321][ T9289] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 4502.126595][ T9289] r5:00000000 r4:8271b79c [ 4502.126771][ T9289] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 4502.127047][ T9289] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 4502.127301][ T9289] r6:00000dc0 r5:828cfc30 r4:82f01000 [ 4502.127549][ T9289] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 4502.127885][ T9289] [<804d42e0>] (kmem_cache_alloc_noprof) from [<806c9eb4>] (fuse_request_alloc+0x24/0x74) [ 4502.128239][ T9289] r10:82e35400 r9:00000001 r8:827220b8 r7:84570480 r6:84570480 r5:828cfc30 [ 4502.128523][ T9289] r4:84681800 [ 4502.128671][ T9289] [<806c9e90>] (fuse_request_alloc) from [<806ca6f8>] (fuse_get_req+0x164/0x264) [ 4502.129020][ T9289] r7:84570480 r6:eabb5dc0 r5:00000000 r4:84681800 [ 4502.129229][ T9289] [<806ca594>] (fuse_get_req) from [<806ce254>] (__fuse_simple_request+0x54/0x4ec) [ 4502.129641][ T9289] r10:eabb5ef0 r9:00000000 r8:827220b8 r7:82e35400 r6:eabb5dc0 r5:84681800 [ 4502.129923][ T9289] r4:84570480 [ 4502.130065][ T9289] [<806ce200>] (__fuse_simple_request) from [<806d7f58>] (fuse_perform_write+0x35c/0x7b0) [ 4502.130429][ T9289] r9:00000000 r8:848a5a08 r7:00000000 r6:eabb5db0 r5:00000008 r4:859bf180 [ 4502.130691][ T9289] [<806d7bfc>] (fuse_perform_write) from [<806d8608>] (fuse_file_write_iter+0x25c/0x464) [ 4502.130982][ T9289] r10:84681800 r9:00000000 r8:84e19540 r7:848a5980 r6:82e35400 r5:eabb5ef0 [ 4502.131185][ T9289] r4:eabb5f08 [ 4502.131330][ T9289] [<806d83ac>] (fuse_file_write_iter) from [<8051ddc0>] (vfs_write+0x274/0x44c) [ 4502.131701][ T9289] r10:81aca114 r9:200000c0 r8:eabb5f68 r7:82e35400 r6:00000018 r5:84e19540 [ 4502.131981][ T9289] r4:806d83ac [ 4502.132114][ T9289] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 4502.132732][ T9289] r10:00000004 r9:82e35400 r8:8020029c r7:00000000 r6:00000000 r5:84e19540 [ 4502.133453][ T9289] r4:84e19543 [ 4502.133724][ T9289] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 4502.134147][ T9289] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 4502.134387][ T9289] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4502.134722][ T9289] Exception stack(0xeabb5fa8 to 0xeabb5ff0) [ 4502.134971][ T9289] 5fa0: 00000000 00000000 00000005 200000c0 00000018 00000000 [ 4502.135311][ T9289] 5fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b830bc [ 4502.135677][ T9289] 5fe0: 76b82ec0 76b82eb0 00018af0 00133450 [ 4503.421891][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 4503.422025][ T31] audit: type=1400 audit(4503.340:59760): avc: denied { read write } for pid=9286 comm="syz.1.9726" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4503.425581][ T31] audit: type=1400 audit(4503.340:59761): avc: denied { open } for pid=9286 comm="syz.1.9726" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4503.448899][ T31] audit: type=1400 audit(4503.370:59762): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4503.449960][ T31] audit: type=1400 audit(4503.370:59763): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4503.450758][ T31] audit: type=1400 audit(4503.370:59764): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4503.451659][ T31] audit: type=1400 audit(4503.370:59765): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4503.456303][ T31] audit: type=1400 audit(4503.370:59766): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4503.483301][ T31] audit: type=1400 audit(4503.390:59767): avc: denied { mounton } for pid=9286 comm="syz.1.9726" path="/336/file0" dev="tmpfs" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4503.541768][ T31] audit: type=1400 audit(4503.460:59768): avc: denied { mount } for pid=9286 comm="syz.1.9726" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4504.130887][ T31] audit: type=1400 audit(4504.050:59769): avc: denied { execmem } for pid=9286 comm="syz.1.9726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4511.132519][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 4511.132634][ T31] audit: type=1400 audit(4511.050:59785): avc: denied { create } for pid=9286 comm="syz.1.9726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4511.133707][ T31] audit: type=1400 audit(4511.050:59786): avc: denied { write } for pid=9286 comm="syz.1.9726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4511.144496][ T31] audit: type=1400 audit(4511.050:59787): avc: denied { module_request } for pid=9286 comm="syz.1.9726" kmod="net-pf-16-proto-16-family-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4511.156010][ T31] audit: type=1400 audit(4511.080:59788): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4511.180527][ T31] audit: type=1400 audit(4511.080:59789): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4511.184481][ T31] audit: type=1400 audit(4511.080:59790): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4511.185316][ T31] audit: type=1400 audit(4511.080:59791): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4511.189138][ T31] audit: type=1400 audit(4511.080:59792): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4511.347694][ T31] audit: type=1400 audit(4511.270:59793): avc: denied { read } for pid=9286 comm="syz.1.9726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4512.393263][ T31] audit: type=1400 audit(4512.290:59794): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4512.924297][ T9310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=9310 comm=syz.1.9732 [ 4513.187222][ T9312] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9312 comm=syz.1.9733 [ 4513.764074][ T9313] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1543 sclass=netlink_xfrm_socket pid=9313 comm=syz.1.9733 [ 4514.234147][ T9313] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9313 comm=syz.1.9733 [ 4516.339349][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 4516.339562][ T31] audit: type=1400 audit(4516.260:59867): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4516.340877][ T31] audit: type=1400 audit(4516.260:59868): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4516.341713][ T31] audit: type=1400 audit(4516.260:59869): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4516.350256][ T31] audit: type=1400 audit(4516.270:59870): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4516.351817][ T31] audit: type=1400 audit(4516.270:59871): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4516.369002][ T31] audit: type=1400 audit(4516.290:59872): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4516.369999][ T31] audit: type=1400 audit(4516.290:59873): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4516.370778][ T31] audit: type=1400 audit(4516.290:59874): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4516.734221][ T31] audit: type=1400 audit(4516.640:59875): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4516.735069][ T31] audit: type=1400 audit(4516.640:59876): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4517.817182][ T9337] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9743'. [ 4519.852854][T32733] usb 2-1: new high-speed USB device number 57 using dummy_hcd [ 4520.003062][T32733] usb 2-1: Using ep0 maxpacket: 16 [ 4520.057955][T32733] usb 2-1: New USB device found, idVendor=1004, idProduct=61aa, bcdDevice=4f.75 [ 4520.058474][T32733] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4520.058774][T32733] usb 2-1: Product: syz [ 4520.058965][T32733] usb 2-1: Manufacturer: syz [ 4520.059154][T32733] usb 2-1: SerialNumber: syz [ 4520.074007][T32733] usb 2-1: config 0 descriptor?? [ 4520.141685][T32733] usb 2-1: bad CDC descriptors [ 4520.347794][T32733] usb 2-1: USB disconnect, device number 57 [ 4521.215712][ T9368] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9750'. [ 4521.251776][ T9368] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 4521.263191][ T9368] macvlan2: entered allmulticast mode [ 4521.263931][ T9368] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 4521.447268][ T9368] netdevsim netdevsim1 netdevsim0: left allmulticast mode [ 4521.447920][ T9368] netdevsim netdevsim1 netdevsim0: left promiscuous mode [ 4521.593411][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 4521.593527][ T31] audit: type=1400 audit(4521.510:59960): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4521.624080][ T31] audit: type=1400 audit(4521.550:59961): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4521.629188][ T31] audit: type=1400 audit(4521.550:59962): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4521.883024][ T31] audit: type=1400 audit(4521.800:59963): avc: denied { create } for pid=9374 comm="syz.1.9751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4521.889650][ T31] audit: type=1400 audit(4521.810:59964): avc: denied { write } for pid=9374 comm="syz.1.9751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4521.895897][ T31] audit: type=1400 audit(4521.810:59965): avc: denied { module_request } for pid=9374 comm="syz.1.9751" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4522.103510][ T31] audit: type=1400 audit(4522.010:59966): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4522.113649][ T31] audit: type=1400 audit(4522.040:59967): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4522.117470][ T31] audit: type=1400 audit(4522.040:59968): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4522.119728][ T31] audit: type=1400 audit(4522.040:59969): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4523.455257][ T9387] netlink: 'syz.1.9756': attribute type 4 has an invalid length. [ 4526.671285][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 4526.671399][ T31] audit: type=1400 audit(4526.590:60062): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4526.672904][ T31] audit: type=1400 audit(4526.590:60063): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4526.673554][ T31] audit: type=1400 audit(4526.590:60064): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4526.687043][ T31] audit: type=1400 audit(4526.610:60065): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4526.687831][ T31] audit: type=1400 audit(4526.610:60066): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4526.688377][ T31] audit: type=1400 audit(4526.610:60067): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4526.688772][ T31] audit: type=1400 audit(4526.610:60068): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4526.689430][ T31] audit: type=1400 audit(4526.610:60069): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4526.807079][ T31] audit: type=1400 audit(4526.730:60070): avc: denied { create } for pid=9419 comm="syz.1.9767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4526.816118][ T31] audit: type=1400 audit(4526.740:60071): avc: denied { getopt } for pid=9419 comm="syz.1.9767" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4531.676015][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 4531.676090][ T31] audit: type=1400 audit(4531.600:60115): avc: denied { ioctl } for pid=9440 comm="syz.1.9775" path="socket:[111126]" dev="sockfs" ino=111126 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4531.678397][ T31] audit: type=1400 audit(4531.600:60116): avc: denied { module_request } for pid=9440 comm="syz.1.9775" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4531.687534][ T31] audit: type=1400 audit(4531.610:60117): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4531.693549][ T31] audit: type=1400 audit(4531.620:60118): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.694959][ T31] audit: type=1400 audit(4531.620:60119): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4531.695905][ T31] audit: type=1400 audit(4531.620:60120): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4531.703200][ T31] audit: type=1400 audit(4531.620:60121): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4531.875639][ T31] audit: type=1400 audit(4531.800:60122): avc: denied { sys_module } for pid=9440 comm="syz.1.9775" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4531.893001][ T31] audit: type=1400 audit(4531.810:60123): avc: denied { module_request } for pid=9440 comm="syz.1.9775" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4532.027337][ T31] audit: type=1400 audit(4531.950:60124): avc: denied { write } for pid=9440 comm="syz.1.9775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4535.448898][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 4536.070783][ T9473] af_packet: tpacket_rcv: packet too big, clamped from 64993 to 3952. macoff=96 [ 4536.854521][ T31] kauditd_printk_skb: 89 callbacks suppressed [ 4536.854644][ T31] audit: type=1400 audit(4536.780:60214): avc: denied { execmem } for pid=9479 comm="syz.1.9792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4537.264743][ T31] audit: type=1400 audit(4537.190:60215): avc: denied { create } for pid=9478 comm="syz.0.9789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4537.294604][ T31] audit: type=1400 audit(4537.220:60216): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4537.295638][ T31] audit: type=1400 audit(4537.220:60217): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4537.296429][ T31] audit: type=1400 audit(4537.220:60218): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4537.297185][ T31] audit: type=1400 audit(4537.220:60219): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4537.298381][ T31] audit: type=1400 audit(4537.220:60220): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4537.394766][ T31] audit: type=1400 audit(4537.320:60221): avc: denied { bind } for pid=9478 comm="syz.0.9789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4537.664107][ T31] audit: type=1400 audit(4537.590:60222): avc: denied { accept } for pid=9478 comm="syz.0.9789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4537.694139][ T31] audit: type=1400 audit(4537.620:60223): avc: denied { write } for pid=9478 comm="syz.0.9789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4544.556967][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 4544.557347][ T31] audit: type=1400 audit(4544.480:60254): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4544.569796][ T31] audit: type=1400 audit(4544.490:60255): avc: denied { open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4544.570657][ T31] audit: type=1400 audit(4544.490:60256): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4544.571108][ T31] audit: type=1400 audit(4544.490:60257): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4544.571589][ T31] audit: type=1400 audit(4544.490:60258): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4544.571923][ T31] audit: type=1400 audit(4544.490:60259): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4544.573116][ T31] audit: type=1400 audit(4544.490:60260): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4544.573489][ T31] audit: type=1400 audit(4544.490:60261): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4545.665447][ T31] audit: type=1400 audit(4545.590:60262): avc: denied { name_bind } for pid=9499 comm="syz.1.9802" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 4545.666998][ T31] audit: type=1400 audit(4545.590:60263): avc: denied { node_bind } for pid=9499 comm="syz.1.9802" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 4549.650112][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 4549.650180][ T31] audit: type=1400 audit(4549.570:60281): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4549.697997][ T31] audit: type=1400 audit(4549.620:60282): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4549.723564][ T31] audit: type=1400 audit(4549.620:60283): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4549.724470][ T31] audit: type=1400 audit(4549.620:60284): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4549.725197][ T31] audit: type=1400 audit(4549.620:60285): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4549.725918][ T31] audit: type=1400 audit(4549.620:60286): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4549.746061][ T31] audit: type=1400 audit(4549.650:60287): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4549.763120][ T31] audit: type=1400 audit(4549.670:60288): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4549.984867][ T31] audit: type=1400 audit(4549.910:60289): avc: denied { create } for pid=9507 comm="syz.1.9806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4550.032115][ T31] audit: type=1400 audit(4549.950:60290): avc: denied { write } for pid=9507 comm="syz.1.9806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4555.027740][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 4555.027834][ T31] audit: type=1400 audit(4554.950:60335): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4555.045598][ T31] audit: type=1400 audit(4554.970:60336): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4555.046582][ T31] audit: type=1400 audit(4554.970:60337): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4555.047381][ T31] audit: type=1400 audit(4554.970:60338): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4555.049340][ T31] audit: type=1400 audit(4554.970:60339): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4555.050237][ T31] audit: type=1400 audit(4554.970:60340): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4555.054220][ T31] audit: type=1400 audit(4554.970:60341): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4555.063093][ T31] audit: type=1400 audit(4554.980:60342): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4555.074867][ T31] audit: type=1400 audit(4555.000:60343): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4555.075777][ T31] audit: type=1400 audit(4555.000:60344): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4560.286153][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 4560.286258][ T31] audit: type=1400 audit(4560.210:60391): avc: denied { read } for pid=9548 comm="syz.1.9822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4560.291534][ T31] audit: type=1400 audit(4560.210:60392): avc: denied { ioctl } for pid=9548 comm="syz.1.9822" path="socket:[111361]" dev="sockfs" ino=111361 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4560.310045][ T31] audit: type=1400 audit(4560.230:60393): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4560.311600][ T31] audit: type=1400 audit(4560.230:60394): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4560.353779][ T31] audit: type=1400 audit(4560.230:60395): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4560.360294][ T31] audit: type=1400 audit(4560.230:60396): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4560.393115][ T31] audit: type=1400 audit(4560.230:60397): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4560.394230][ T31] audit: type=1400 audit(4560.260:60398): avc: denied { module_request } for pid=9548 comm="syz.1.9822" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4560.679628][ T31] audit: type=1400 audit(4560.600:60399): avc: denied { sys_module } for pid=9548 comm="syz.1.9822" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4560.680619][ T31] audit: type=1400 audit(4560.600:60400): avc: denied { module_request } for pid=9548 comm="syz.1.9822" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4565.518069][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 4565.518197][ T31] audit: type=1400 audit(4565.440:60417): avc: denied { create } for pid=9560 comm="syz.1.9826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4565.528658][ T31] audit: type=1400 audit(4565.450:60418): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4565.530172][ T31] audit: type=1400 audit(4565.450:60419): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4565.531283][ T31] audit: type=1400 audit(4565.450:60420): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4565.532207][ T31] audit: type=1400 audit(4565.450:60421): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4565.536755][ T31] audit: type=1400 audit(4565.450:60422): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4565.564019][ T31] audit: type=1400 audit(4565.490:60423): avc: denied { write } for pid=9560 comm="syz.1.9826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4565.577643][ T31] audit: type=1400 audit(4565.490:60424): avc: denied { module_request } for pid=9560 comm="syz.1.9826" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4565.770790][ T31] audit: type=1400 audit(4565.690:60425): avc: denied { read } for pid=9560 comm="syz.1.9826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4565.777804][ T31] audit: type=1400 audit(4565.700:60426): avc: denied { write } for pid=9560 comm="syz.1.9826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4568.553028][T32733] usb 2-1: new high-speed USB device number 58 using dummy_hcd [ 4568.723309][T32733] usb 2-1: Using ep0 maxpacket: 32 [ 4568.773536][T32733] usb 2-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be [ 4568.774121][T32733] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4568.779780][T32733] usb 2-1: config 0 descriptor?? [ 4570.704315][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 4570.704385][ T31] audit: type=1400 audit(4570.630:60487): avc: denied { sys_module } for pid=9590 comm="syz.0.9836" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4570.705755][ T31] audit: type=1400 audit(4570.630:60488): avc: denied { module_request } for pid=9590 comm="syz.0.9836" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4570.726077][ T31] audit: type=1400 audit(4570.650:60489): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4570.735160][ T31] audit: type=1400 audit(4570.660:60490): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4570.735884][ T31] audit: type=1400 audit(4570.660:60491): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4570.736278][ T31] audit: type=1400 audit(4570.660:60492): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4570.736652][ T31] audit: type=1400 audit(4570.660:60493): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4570.835379][ T31] audit: type=1400 audit(4570.760:60494): avc: denied { create } for pid=9590 comm="syz.0.9836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4570.852861][ T31] audit: type=1400 audit(4570.760:60495): avc: denied { write } for pid=9590 comm="syz.0.9836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4570.853684][ T31] audit: type=1400 audit(4570.760:60496): avc: denied { module_request } for pid=9590 comm="syz.0.9836" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4572.983270][ T7938] usb 1-1: new full-speed USB device number 46 using dummy_hcd [ 4573.237379][ T7938] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 4573.238097][ T7938] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4573.238562][ T7938] usb 1-1: New USB device found, idVendor=5543, idProduct=004d, bcdDevice= 0.00 [ 4573.238937][ T7938] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4573.254635][ T7938] usb 1-1: config 0 descriptor?? [ 4574.527719][ T7938] usb 1-1: string descriptor 0 read error: -71 [ 4574.529387][ T7938] uclogic 0003:5543:004D.000B: failed retrieving string descriptor #200: -71 [ 4574.529973][ T7938] uclogic 0003:5543:004D.000B: failed retrieving pen parameters: -71 [ 4574.530338][ T7938] uclogic 0003:5543:004D.000B: failed probing pen v2 parameters: -71 [ 4574.530945][ T7938] uclogic 0003:5543:004D.000B: failed probing parameters: -71 [ 4574.531348][ T7938] uclogic 0003:5543:004D.000B: probe with driver uclogic failed with error -71 [ 4574.536961][ T7938] usb 1-1: USB disconnect, device number 46 [ 4576.105705][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 4576.105829][ T31] audit: type=1400 audit(4576.030:60523): avc: denied { ioctl } for pid=9581 comm="syz.1.9835" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4576.124943][ T31] audit: type=1400 audit(4576.050:60524): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4576.126306][ T31] audit: type=1400 audit(4576.050:60525): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.126750][ T31] audit: type=1400 audit(4576.050:60526): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4576.127336][ T31] audit: type=1400 audit(4576.050:60527): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4576.127912][ T31] audit: type=1400 audit(4576.050:60528): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4578.073468][ T31] audit: type=1400 audit(4577.990:60529): avc: denied { create } for pid=9618 comm="syz.0.9839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4578.087786][ T31] audit: type=1400 audit(4578.010:60530): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4578.089021][ T31] audit: type=1400 audit(4578.010:60531): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4578.090190][ T31] audit: type=1400 audit(4578.010:60532): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4579.109883][T32646] usb 2-1: USB disconnect, device number 58 [ 4581.566331][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 4581.566582][ T31] audit: type=1400 audit(4581.490:60568): avc: denied { create } for pid=9642 comm="syz.1.9845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4581.577068][ T31] audit: type=1400 audit(4581.500:60569): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4581.578487][ T31] audit: type=1400 audit(4581.500:60570): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4581.579346][ T31] audit: type=1400 audit(4581.500:60571): avc: denied { append } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4581.580031][ T31] audit: type=1400 audit(4581.500:60572): avc: denied { open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4581.580660][ T31] audit: type=1400 audit(4581.500:60573): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=20 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4581.597167][ T31] audit: type=1400 audit(4581.520:60574): avc: denied { write } for pid=9642 comm="syz.1.9845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4583.587220][ T31] audit: type=1400 audit(4583.510:60575): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4583.608319][ T31] audit: type=1400 audit(4583.530:60576): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4583.609536][ T31] audit: type=1400 audit(4583.530:60577): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4585.053130][T32646] usb 2-1: new high-speed USB device number 59 using dummy_hcd [ 4585.222935][T32646] usb 2-1: Using ep0 maxpacket: 16 [ 4585.275037][T32646] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4585.275547][T32646] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4585.275809][T32646] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 4585.276149][T32646] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 4585.276360][T32646] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4585.306320][T32646] usb 2-1: config 0 descriptor?? [ 4586.227936][T32646] koneplus 0003:1E7D:2E22.000C: unknown main item tag 0x0 [ 4586.228510][T32646] koneplus 0003:1E7D:2E22.000C: unknown main item tag 0x0 [ 4586.244585][T32646] koneplus 0003:1E7D:2E22.000C: hidraw0: USB HID v0.00 Device [HID 1e7d:2e22] on usb-dummy_hcd.1-1/input0 [ 4586.457280][T32646] koneplus 0003:1E7D:2E22.000C: couldn't init struct koneplus_device [ 4586.457828][T32646] koneplus 0003:1E7D:2E22.000C: couldn't install mouse [ 4586.463560][T32646] koneplus 0003:1E7D:2E22.000C: probe with driver koneplus failed with error -71 [ 4586.475309][T32646] usb 2-1: USB disconnect, device number 59 [ 4586.582907][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 4586.583014][ T31] audit: type=1400 audit(4586.500:60617): avc: denied { read write } for pid=7508 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4586.674211][ T31] audit: type=1400 audit(4586.600:60618): avc: denied { read write open } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4586.676601][ T31] audit: type=1400 audit(4586.600:60619): avc: denied { ioctl } for pid=7508 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4587.007912][ T31] audit: type=1400 audit(4586.930:60620): avc: denied { read } for pid=9677 comm="syz.1.9852" dev="nsfs" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4587.022888][ T31] audit: type=1400 audit(4586.940:60621): avc: denied { open } for pid=9677 comm="syz.1.9852" path="net:[4026532697]" dev="nsfs" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4587.023899][ T31] audit: type=1400 audit(4586.940:60622): avc: denied { create } for pid=9677 comm="syz.1.9852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4587.042014][ T31] audit: type=1400 audit(4586.960:60623): avc: denied { write } for pid=9677 comm="syz.1.9852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4587.051092][ T31] audit: type=1400 audit(4586.970:60624): avc: denied { module_request } for pid=9677 comm="syz.1.9852" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4587.119426][ T31] audit: type=1400 audit(4587.040:60625): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4587.120425][ T31] audit: type=1400 audit(4587.040:60626): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4589.864312][ T9684] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 4589.866308][ T9684] ------------[ cut here ]------------ [ 4589.866713][ T9684] kernel BUG at mm/usercopy.c:102! [ 4589.867022][ T9684] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 4589.867652][ T9684] Modules linked in: [ 4589.868108][ T9684] CPU: 0 UID: 0 PID: 9684 Comm: syz.1.9855 Not tainted 6.12.0-syzkaller #0 [ 4589.868521][ T9684] Hardware name: ARM-Versatile Express [ 4589.868825][ T9684] PC is at usercopy_abort+0x98/0x9c [ 4589.869173][ T9684] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 4589.869502][ T9684] pc : [<819be580>] lr : [<802be434>] psr: 60000013 [ 4589.869818][ T9684] sp : dff05d90 ip : dff05cd0 fp : dff05db4 [ 4589.870331][ T9684] r10: 81a00568 r9 : 00000078 r8 : 84df6050 [ 4589.870632][ T9684] r7 : ddea85c0 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 4589.871679][ T9684] r3 : 83eaa400 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 4589.872408][ T9684] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 4589.873177][ T9684] Control: 30c5387d Table: 84c65800 DAC: fffffffd [ 4589.882637][ T9684] Register r0 information: non-paged memory [ 4589.883410][ T9684] Register r1 information: NULL pointer [ 4589.883760][ T9684] Register r2 information: NULL pointer [ 4589.884054][ T9684] Register r3 information: slab task_struct start 83eaa400 pointer offset 0 size 3072 [ 4589.885391][ T9684] Register r4 information: non-paged memory [ 4589.885741][ T9684] Register r5 information: non-paged memory [ 4589.886075][ T9684] Register r6 information: NULL pointer [ 4589.886381][ T9684] Register r7 information: non-slab/vmalloc memory [ 4589.886833][ T9684] Register r8 information: slab task_struct start 84df6000 pointer offset 80 size 3072 [ 4589.887393][ T9684] Register r9 information: non-paged memory [ 4589.887734][ T9684] Register r10 information: non-slab/vmalloc memory [ 4589.888091][ T9684] Register r11 information: 2-page vmalloc region starting at 0xdff04000 allocated at kernel_clone+0xac/0x3e4 [ 4589.888779][ T9684] Register r12 information: 2-page vmalloc region starting at 0xdff04000 allocated at kernel_clone+0xac/0x3e4 [ 4589.889320][ T9684] Process syz.1.9855 (pid: 9684, stack limit = 0xdff04000) [ 4589.889929][ T9684] Stack: (0xdff05d90 to 0xdff06000) [ 4589.890209][ T9684] 5d80: 8205f678 82030fcc 820464dc 00000050 [ 4589.890568][ T9684] 5da0: 00000074 00000078 dff05de4 dff05db8 804d5d54 819be4f4 00000074 dff05dc8 [ 4589.890938][ T9684] 5dc0: 80214800 84df6050 00000074 00000000 84df60c4 ddea85c0 dff05e1c dff05de8 [ 4589.891298][ T9684] 5de0: 80514b34 804d5c88 00000074 20000084 dff05e0c 84df6050 00000074 20000084 [ 4589.891755][ T9684] 5e00: 00000074 81a005a0 00000078 81a00568 dff05e4c dff05e20 80209db4 805148b8 [ 4589.892118][ T9684] 5e20: dff05e64 82eb4840 00000064 dff05e2c dff05e2c 80209d24 84df6000 20000084 [ 4589.892964][ T9684] 5e40: dff05ef4 dff05e50 80253634 80209d30 00000000 20000000 20000000 81a0057c [ 4589.902346][ T9684] 5e60: 819e3204 00000000 dff05eb4 dff05e78 8020d0cc 8020c034 824bd180 00000000 [ 4589.903014][ T9684] 5e80: 8027fa10 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4589.903414][ T9684] 5ea0: 00000000 83eaa400 dff05edc dff05eb8 8027e354 802af5ec 00000000 00000000 [ 4589.903857][ T9684] 5ec0: dff05eec cef7458f 84df6000 20000080 00004202 00000002 00000000 20000080 [ 4589.904230][ T9684] 5ee0: 83eaa400 0000001a dff05f6c dff05ef8 8020a1e4 8025332c 84df6000 84df6884 [ 4589.904600][ T9684] 5f00: dff05f1c dff05f10 819e36b0 8027c778 dff05f6c dff05f20 802813ec 819e368c [ 4589.904987][ T9684] 5f20: dff05f54 00000000 8027e354 60000013 81990410 819a7694 dff05f54 cef7458f [ 4589.905375][ T9684] 5f40: 00004205 84df6000 00004205 cef7458f 84df6000 00004205 00000002 00000000 [ 4589.905782][ T9684] 5f60: dff05fa4 dff05f70 80252fdc 8020a140 80202cc0 cef7458f dff05fac 00000000 [ 4589.906148][ T9684] 5f80: 00000000 002862f4 0000001a 8020029c 83eaa400 0000001a 00000000 dff05fa8 [ 4589.906526][ T9684] 5fa0: 80200060 80252db0 00000000 00000000 00004205 0000042e 00000002 20000080 [ 4589.906901][ T9684] 5fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76bc30bc [ 4589.907267][ T9684] 5fe0: 76bc2ec0 76bc2eb0 00018af0 00133450 60000010 00004205 00000000 00000000 [ 4589.907796][ T9684] Call trace: [ 4589.908068][ T9684] [<819be4e8>] (usercopy_abort) from [<804d5d54>] (__check_heap_object+0xd8/0xf4) [ 4589.908523][ T9684] [<804d5c7c>] (__check_heap_object) from [<80514b34>] (__check_object_size+0x288/0x304) [ 4589.908973][ T9684] r8:ddea85c0 r7:84df60c4 r6:00000000 r5:00000074 r4:84df6050 [ 4589.909256][ T9684] [<805148ac>] (__check_object_size) from [<80209db4>] (fpa_set+0x90/0x118) [ 4589.909664][ T9684] r10:81a00568 r9:00000078 r8:81a005a0 r7:00000074 r6:20000084 r5:00000074 [ 4589.910024][ T9684] r4:84df6050 [ 4589.910186][ T9684] [<80209d24>] (fpa_set) from [<80253634>] (ptrace_request+0x314/0xa78) [ 4589.910561][ T9684] r6:20000084 r5:84df6000 r4:80209d24 [ 4589.910821][ T9684] [<80253320>] (ptrace_request) from [<8020a1e4>] (arch_ptrace+0xb0/0x424) [ 4589.911177][ T9684] r10:0000001a r9:83eaa400 r8:20000080 r7:00000000 r6:00000002 r5:00004202 [ 4589.911566][ T9684] r4:20000080 [ 4589.911732][ T9684] [<8020a134>] (arch_ptrace) from [<80252fdc>] (sys_ptrace+0x238/0x4dc) [ 4589.912287][ T9684] r7:00000000 r6:00000002 r5:00004205 r4:84df6000 [ 4589.913225][ T9684] [<80252da4>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4589.922374][ T9684] Exception stack(0xdff05fa8 to 0xdff05ff0) [ 4589.922865][ T9684] 5fa0: 00000000 00000000 00004205 0000042e 00000002 20000080 [ 4589.923485][ T9684] 5fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76bc30bc [ 4589.924115][ T9684] 5fe0: 76bc2ec0 76bc2eb0 00018af0 00133450 [ 4589.924412][ T9684] r10:0000001a r9:83eaa400 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 4589.924779][ T9684] r4:00000000 [ 4589.925215][ T9684] Code: e30f067c e3480205 e58dc000 ebfff265 (e7f001f2) [ 4589.925953][ T9684] ---[ end trace 0000000000000000 ]--- [ 4589.926649][ T9684] Kernel panic - not syncing: Fatal exception [ 4589.928386][ T9684] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:08:40 Registers: info registers vcpu 0 CPU#0 R00=84059040 R01=00000030 R02=eb8c3000 R03=eb8c3018 R04=82877459 R05=84059040 R06=809f5e5c R07=8287746d R08=8287741c R09=00000052 R10=00000001 R11=dff05ab4 R12=00000002 R13=dff05aa8 R14=8275b574 R15=809f5e6c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00dc6a9e R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=76bc30bc R12=20000370 R13=20000370 R14=00018b8c R15=00018b8c PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000