last executing test programs: 2.688766016s ago: executing program 0 (id=445): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001e000b072dbd7000fddbdf2507"], 0x34}, 0x1, 0x0, 0x0, 0x4008010}, 0x240480d0) 2.569723903s ago: executing program 1 (id=446): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000100)=0x401, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty, 0xffffffff}, 0x1c) listen(r0, 0x100003) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) 2.406575314s ago: executing program 0 (id=447): r0 = userfaultfd(0x80001) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000009, 0x32, 0xffffffffffffffff, 0x91c6b000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x100}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000000000/0x400000)=nil, 0x400000}, 0x1}) syz_open_dev$evdev(&(0x7f0000002f80), 0x6, 0x2) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000000000/0x800000)=nil, 0x800000}) 2.15479252s ago: executing program 1 (id=448): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r1, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) 1.580590268s ago: executing program 0 (id=449): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="340000001400010027bd7000ffcbdf250a1f1dc8", @ANYRES32=r2, @ANYBLOB="080008001606000014000200ff"], 0x34}, 0x1, 0x0, 0x0, 0x40080d0}, 0x0) 1.450384476s ago: executing program 1 (id=450): r0 = socket$inet6(0xa, 0x3, 0x5) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x500, 0x0, @loopback, 0x0, 0x3}, 0x80, 0x0}, 0x5b4}], 0x1, 0x0) 1.258260299s ago: executing program 0 (id=451): rt_sigprocmask(0x2, &(0x7f0000000600)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r0, 0x12) tkill(r1, 0x14) 998.312286ms ago: executing program 1 (id=452): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40, @empty}, 0x1c) 883.159212ms ago: executing program 0 (id=453): syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast, @random="1704b45adbde", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x23, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x65, 0x6, 0x0, 0x11, 0x0, @empty=0xac1414aa}}}}}}, 0x0) r0 = syz_io_uring_setup(0x7990, &(0x7f00000000c0)={0x0, 0x3fb7, 0x1, 0x3, 0x1c}, &(0x7f0000000240), &(0x7f0000000000)) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000080)={0x0, 0x0, 0x2}, 0x1) 388.807125ms ago: executing program 1 (id=454): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@mcast1, @mcast1, @remote, 0x7, 0x0, 0x0, 0x100, 0x4, 0x400182, r2}) 196.116878ms ago: executing program 0 (id=455): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, &(0x7f0000003540)=ANY=[@ANYBLOB="b700000000fdffafbca30000000000002403000040feffff7b1af0ff0000000079a4f0ff000000001f030000000000002e030200000000002604fdffffff000e61141800000000001d430000000000007a0a00fe0000001f61141c00000000004603f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fd79153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f2440000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c9494963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c88629a6c921c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fbf05b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71ca3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb7ed9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e2848890522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b2676c07bb0fd14020a66718378825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b60f132a2bf8a858392f34072d99aee0ec70aa6d75096e608d97ac4b7bfa2e0ae3e59718e7a7691a98b1334e34553300000000000000000000000000000000062c7cf52e9624806a4833e1c0059e5a703ab9c2e9b38779270dc5e80af75d509b1a31fe6ed3f8c0172659256dc88de4e377c8a07e95ec5549ae47dc43b93a159a201be254048b9e0857ea3c736c761e686f9b3d0690f035617a12055b2cb3a03794d67b95e7f4fc6af323120c09d0503c8ce92e869e22bb2590299ad76d541f844d32f96184f74d433793bbd75ec15fb1497ce835445212421cb4e3ce08395c9055a2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 0s ago: executing program 1 (id=456): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x44, 0x24, 0xd0f, 0x70bd2c, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffe0, 0xa}, {0x1, 0xe}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x14, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}, @TCA_CODEL_TARGET={0x8, 0x1, 0x2}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x55}, 0xc010) kernel console output (not intermixed with test programs): [ 53.897001][ T29] audit: type=1400 audit(53.780:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.901706][ T29] audit: type=1400 audit(53.780:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:61701' (ED25519) to the list of known hosts. [ 71.079578][ T29] audit: type=1400 audit(70.960:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 73.320119][ T29] audit: type=1400 audit(73.200:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.329254][ T29] audit: type=1400 audit(73.210:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 76.342810][ T29] audit: type=1400 audit(76.230:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 76.347359][ T29] audit: type=1400 audit(76.230:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 76.359982][ T3090] cgroup: Unknown subsys name 'net' [ 76.367764][ T29] audit: type=1400 audit(76.250:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 76.533619][ T3090] cgroup: Unknown subsys name 'cpuset' [ 76.543059][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 76.544115][ T3090] cgroup: Unknown subsys name 'rlimit' [ 76.806198][ T29] audit: type=1400 audit(76.690:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.806734][ T29] audit: type=1400 audit(76.690:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 76.812860][ T29] audit: type=1400 audit(76.700:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 77.085230][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 77.089350][ T29] audit: type=1400 audit(76.970:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.095863][ T29] audit: type=1400 audit(76.980:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 77.149851][ T29] audit: type=1400 audit(77.030:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.150591][ T29] audit: type=1400 audit(77.030:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.890232][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 86.238847][ T29] audit: type=1400 audit(86.120:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.299673][ T29] audit: type=1400 audit(86.190:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.302996][ T29] audit: type=1400 audit(86.190:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.313355][ T29] audit: type=1400 audit(86.200:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.335479][ T29] audit: type=1400 audit(86.220:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.337516][ T29] audit: type=1400 audit(86.220:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.417672][ T29] audit: type=1400 audit(86.300:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 86.979637][ T29] audit: type=1400 audit(86.860:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.891466][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.901788][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.023879][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.036689][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.959626][ T3096] hsr_slave_0: entered promiscuous mode [ 88.962583][ T3096] hsr_slave_1: entered promiscuous mode [ 89.009426][ T3095] hsr_slave_0: entered promiscuous mode [ 89.010724][ T3095] hsr_slave_1: entered promiscuous mode [ 89.013921][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 89.014351][ T3095] Cannot create hsr debugfs directory [ 89.495123][ T29] audit: type=1400 audit(89.380:79): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.502318][ T29] audit: type=1400 audit(89.390:80): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.512064][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.530442][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.544272][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.554347][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.671725][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.682306][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.697836][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.722628][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 90.574845][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.691811][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.817885][ T3095] veth0_vlan: entered promiscuous mode [ 93.856706][ T3095] veth1_vlan: entered promiscuous mode [ 93.921128][ T3095] veth0_macvtap: entered promiscuous mode [ 93.937370][ T3095] veth1_macvtap: entered promiscuous mode [ 93.996921][ T3096] veth0_vlan: entered promiscuous mode [ 94.042159][ T3096] veth1_vlan: entered promiscuous mode [ 94.082426][ T60] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.094168][ T60] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.094643][ T60] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.094983][ T60] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.260291][ T3096] veth0_macvtap: entered promiscuous mode [ 94.297743][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 94.298733][ T29] audit: type=1400 audit(94.180:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 94.307016][ T3096] veth1_macvtap: entered promiscuous mode [ 94.315567][ T29] audit: type=1400 audit(94.200:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.x4gp7O/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 94.323615][ T29] audit: type=1400 audit(94.210:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 94.336161][ T29] audit: type=1400 audit(94.220:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.x4gp7O/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 94.344026][ T29] audit: type=1400 audit(94.230:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.x4gp7O/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 94.370874][ T29] audit: type=1400 audit(94.250:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 94.378953][ T29] audit: type=1400 audit(94.260:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 94.384600][ T29] audit: type=1400 audit(94.270:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=2431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 94.396022][ T29] audit: type=1400 audit(94.280:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 94.402268][ T29] audit: type=1400 audit(94.290:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 94.485166][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 94.506741][ T53] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.507368][ T53] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.507536][ T53] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.507682][ T53] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.796777][ T3719] SELinux: Context system_u:object_r:load_policy_exec_t:s0 is not valid (left unmapped). [ 100.121793][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 100.122164][ T29] audit: type=1400 audit(100.010:111): avc: denied { create } for pid=3733 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.128048][ T3734] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 100.195559][ T29] audit: type=1400 audit(100.080:112): avc: denied { mount } for pid=3733 comm="syz.1.11" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 100.304015][ T29] audit: type=1400 audit(100.190:113): avc: denied { create } for pid=3735 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.315565][ T29] audit: type=1400 audit(100.200:114): avc: denied { bind } for pid=3735 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.348886][ T3734] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 100.352651][ T29] audit: type=1400 audit(100.240:115): avc: denied { accept } for pid=3735 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.362193][ T29] audit: type=1400 audit(100.250:116): avc: denied { ioctl } for pid=3733 comm="syz.1.11" path="socket:[3087]" dev="sockfs" ino=3087 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.366684][ T29] audit: type=1400 audit(100.250:117): avc: denied { write } for pid=3735 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.551437][ T29] audit: type=1400 audit(100.440:118): avc: denied { setopt } for pid=3735 comm="syz.0.12" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.818210][ T29] audit: type=1400 audit(100.700:119): avc: denied { read write } for pid=3739 comm="syz.0.13" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:load_policy_exec_t:s0" [ 100.819766][ T29] audit: type=1400 audit(100.700:120): avc: denied { open } for pid=3739 comm="syz.0.13" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:load_policy_exec_t:s0" [ 104.501180][ T3789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3789 comm=syz.0.33 [ 105.875593][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 105.876112][ T29] audit: type=1400 audit(105.760:123): avc: denied { create } for pid=3810 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.891372][ T29] audit: type=1400 audit(105.780:124): avc: denied { write } for pid=3810 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.634490][ T29] audit: type=1400 audit(108.520:125): avc: denied { ioctl } for pid=3827 comm="syz.0.50" path="socket:[2657]" dev="sockfs" ino=2657 ioctlcmd=0x661a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 109.465611][ T3841] fuse: Bad value for 'fd' [ 109.465916][ T29] audit: type=1400 audit(109.350:126): avc: denied { mounton } for pid=3840 comm="syz.1.55" path="/29/file0" dev="tmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 109.479080][ T29] audit: type=1400 audit(109.360:127): avc: denied { execute } for pid=3840 comm="syz.1.55" name="file0" dev="tmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 109.489339][ T3841] process 'syz.1.55' launched './file0' with NULL argv: empty string added [ 109.497278][ T29] audit: type=1400 audit(109.380:128): avc: denied { execute_no_trans } for pid=3840 comm="syz.1.55" path="/29/file0" dev="tmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 109.631040][ T3844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=3844 comm=syz.1.56 [ 109.789020][ T29] audit: type=1400 audit(109.670:129): avc: denied { name_bind } for pid=3846 comm="syz.1.57" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 109.796394][ T29] audit: type=1400 audit(109.680:130): avc: denied { node_bind } for pid=3846 comm="syz.1.57" saddr=ff01::1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 112.194515][ T29] audit: type=1400 audit(112.080:131): avc: denied { getopt } for pid=3853 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 112.433804][ T29] audit: type=1400 audit(112.320:132): avc: denied { create } for pid=3855 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.458009][ T29] audit: type=1400 audit(112.340:133): avc: denied { write } for pid=3855 comm="syz.1.61" path="socket:[2729]" dev="sockfs" ino=2729 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.467750][ T29] audit: type=1400 audit(112.350:134): avc: denied { setopt } for pid=3855 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.837325][ T29] audit: type=1400 audit(112.720:135): avc: denied { bind } for pid=3853 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 114.820450][ T29] audit: type=1400 audit(114.710:136): avc: denied { create } for pid=3862 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 114.829588][ T29] audit: type=1400 audit(114.710:137): avc: denied { getopt } for pid=3862 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.774912][ T3874] syz.0.65 uses obsolete (PF_INET,SOCK_PACKET) [ 115.782967][ T29] audit: type=1400 audit(115.670:138): avc: denied { create } for pid=3867 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 115.876199][ T29] audit: type=1400 audit(115.760:139): avc: denied { create } for pid=3867 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 116.445163][ T3873] FAULT_INJECTION: forcing a failure. [ 116.445163][ T3873] name failslab, interval 1, probability 0, space 0, times 1 [ 116.446824][ T3873] CPU: 0 UID: 0 PID: 3873 Comm: syz.1.67 Not tainted syzkaller #0 PREEMPT [ 116.447207][ T3873] Hardware name: ARM-Versatile Express [ 116.447721][ T3873] Call trace: [ 116.448421][ T3873] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 116.450367][ T3873] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 116.450912][ T3873] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 116.451141][ T3873] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 116.451384][ T3873] r7:00000000 r6:00000000 r5:833aa400 r4:82918c50 [ 116.451521][ T3873] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 116.451671][ T3873] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 116.451754][ T3873] r8:833aa400 r7:00000000 r6:00000cc0 r5:00000000 r4:830a1300 [ 116.451979][ T3873] [<80537278>] (should_failslab) from [<80515110>] (kmem_cache_alloc_noprof+0x54/0x450) [ 116.452321][ T3873] [<805150bc>] (kmem_cache_alloc_noprof) from [<804cd934>] (vm_area_dup+0x24/0x148) [ 116.452620][ T3873] r10:00000001 r9:00000000 r8:ea72df3c r7:76e00000 r6:82c41ca0 r5:84d62180 [ 116.452960][ T3873] r4:84d62180 [ 116.453174][ T3873] [<804cd910>] (vm_area_dup) from [<804f7ef0>] (__split_vma+0x8c/0x43c) [ 116.453435][ T3873] r5:84d62180 r4:84d62180 [ 116.453552][ T3873] [<804f7e64>] (__split_vma) from [<804f8380>] (vms_gather_munmap_vmas+0xe0/0x408) [ 116.453757][ T3873] r10:00000001 r9:7f000000 r8:ea72de48 r7:82c41c9c r6:82c41ca0 r5:84d62180 [ 116.453781][ T3873] r4:ea72de78 [ 116.453840][ T3873] [<804f82a0>] (vms_gather_munmap_vmas) from [<804fafec>] (do_vmi_align_munmap+0xfc/0x27c) [ 116.454107][ T3873] r9:7f000000 r8:00002000 r7:76dac000 r6:00000000 r5:76e00000 r4:ea72df3c [ 116.454217][ T3873] [<804faef0>] (do_vmi_align_munmap) from [<804fb1ec>] (do_vmi_munmap+0x80/0xfc) [ 116.454688][ T3873] r10:0000005b r9:00054000 r8:76dac000 r7:00000001 r6:ea72df3c r5:84697c00 [ 116.454732][ T3873] r4:76e00000 [ 116.454855][ T3873] [<804fb16c>] (do_vmi_munmap) from [<804fcf90>] (__vm_munmap+0xc8/0x194) [ 116.454995][ T3873] r8:84697d0c r7:84697c00 r6:ea72df30 r5:76dac000 r4:00000000 [ 116.455016][ T3873] [<804fcec8>] (__vm_munmap) from [<804e05a8>] (sys_munmap+0x14/0x18) [ 116.455355][ T3873] r9:833aa400 r8:8020029c r7:0000005b r6:00100000 r5:00021000 r4:76e00000 [ 116.455687][ T3873] [<804e0594>] (sys_munmap) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 116.455985][ T3873] Exception stack(0xea72dfa8 to 0xea72dff0) [ 116.456702][ T3873] dfa0: 76e00000 00021000 76dac000 00054000 00000000 fff00000 [ 116.457132][ T3873] dfc0: 76e00000 00021000 00100000 0000005b 00310000 00001000 76f00000 001cbe40 [ 116.457213][ T3873] dfe0: 00000000 76febcbc 00113380 0012f92c [ 120.114601][ T29] audit: type=1400 audit(120.000:140): avc: denied { read } for pid=3896 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 127.574530][ T29] audit: type=1400 audit(127.460:141): avc: denied { create } for pid=3935 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 128.120833][ T29] audit: type=1400 audit(128.010:142): avc: denied { lock } for pid=3948 comm="syz.1.92" path="/dev/uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 133.079376][ T29] audit: type=1400 audit(132.970:143): avc: denied { write } for pid=3978 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.236917][ T3995] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3995 comm=syz.1.107 [ 135.503021][ T29] audit: type=1400 audit(135.390:144): avc: denied { allowed } for pid=3998 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 137.746619][ T29] audit: type=1400 audit(137.630:145): avc: denied { remount } for pid=4018 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 137.767733][ T4019] fuse: Bad value for 'user_id' [ 137.768159][ T4019] fuse: Bad value for 'user_id' [ 139.053277][ T4033] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4033 comm=syz.0.120 [ 142.591538][ T4061] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4061 comm=syz.1.128 [ 149.587844][ T29] audit: type=1400 audit(149.440:146): avc: denied { ioctl } for pid=4110 comm="syz.0.140" path="/dev/ttynull" dev="devtmpfs" ino=609 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:load_policy_exec_t:s0" [ 150.018166][ T29] audit: type=1400 audit(149.900:147): avc: denied { setopt } for pid=4116 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.031843][ T29] audit: type=1400 audit(149.920:148): avc: denied { connect } for pid=4116 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 154.161498][ T4157] FAULT_INJECTION: forcing a failure. [ 154.161498][ T4157] name failslab, interval 1, probability 0, space 0, times 0 [ 154.161874][ T4157] CPU: 1 UID: 0 PID: 4157 Comm: syz.0.155 Not tainted syzkaller #0 PREEMPT [ 154.161978][ T4157] Hardware name: ARM-Versatile Express [ 154.162005][ T4157] Call trace: [ 154.162086][ T4157] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 154.162221][ T4157] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 154.162241][ T4157] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 154.162292][ T4157] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 154.162349][ T4157] r7:00000cc0 r6:00000000 r5:85bba400 r4:82918c50 [ 154.162366][ T4157] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 154.162479][ T4157] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 154.162548][ T4157] r8:85bba400 r7:00000cc0 r6:00000000 r5:00000008 r4:83001240 [ 154.162567][ T4157] [<80537278>] (should_failslab) from [<8051697c>] (__kmalloc_node_track_caller_noprof+0xa8/0x58c) [ 154.162647][ T4157] [<805168d4>] (__kmalloc_node_track_caller_noprof) from [<804a9ef4>] (kstrdup+0x3c/0x60) [ 154.162719][ T4157] r10:85bba400 r9:00000017 r8:828f5814 r7:ec2d1d40 r6:8031ed40 r5:00000007 [ 154.162775][ T4157] r4:00000cc0 [ 154.162815][ T4157] [<804a9eb8>] (kstrdup) from [<8031ed40>] (__request_module+0xfc/0x2c0) [ 154.162882][ T4157] r7:85bba400 r6:816006a0 r5:00000002 r4:85d8cdc0 [ 154.162915][ T4157] [<8031ec44>] (__request_module) from [<816006a0>] (dev_load+0x68/0x8c) [ 154.162984][ T4157] r3:00400140 r2:ec2d1e28 r1:8231b870 [ 154.163014][ T4157] r8:00008917 r7:ec2d1e38 r6:00000000 r5:00000000 r4:ec2d1e28 [ 154.163034][ T4157] [<81600638>] (dev_load) from [<817db380>] (devinet_ioctl+0x74/0x788) [ 154.163091][ T4157] r5:84cf0000 r4:ec2d1e28 [ 154.163405][ T4157] [<817db30c>] (devinet_ioctl) from [<817de3b0>] (inet_ioctl+0xe0/0x24c) [ 154.163530][ T4157] r10:85bba400 r9:81e769ec r8:ec2d1ecc r7:84cf0000 r6:83349980 r5:20000000 [ 154.163557][ T4157] r4:00008917 [ 154.163575][ T4157] [<817de2d0>] (inet_ioctl) from [<8158ffd8>] (sock_ioctl+0x138/0x4c0) [ 154.163640][ T4157] r7:854b8a00 r6:84cf0000 r5:20000000 r4:00008917 [ 154.163660][ T4157] [<8158fea0>] (sock_ioctl) from [<80582358>] (sys_ioctl+0x244/0xb58) [ 154.163732][ T4157] r9:00000004 r8:85d50540 r7:20000000 r6:00008917 r5:85d50541 r4:00000000 [ 154.163754][ T4157] [<80582114>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 154.163858][ T4157] Exception stack(0xec2d1fa8 to 0xec2d1ff0) [ 154.163936][ T4157] 1fa0: 00000000 00000000 00000004 00008917 20000000 00000000 [ 154.163970][ T4157] 1fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f610dc [ 154.163999][ T4157] 1fe0: 76f60e88 76f60e78 00018734 0012fc20 [ 154.164034][ T4157] r10:00000036 r9:85bba400 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 154.164057][ T4157] r4:00000000 [ 158.093434][ T29] audit: type=1400 audit(157.980:149): avc: denied { create } for pid=4185 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 158.340198][ T29] audit: type=1400 audit(158.230:150): avc: denied { create } for pid=4187 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 158.345923][ T29] audit: type=1400 audit(158.230:151): avc: denied { setattr } for pid=4187 comm="syz.0.166" name="NETLINK" dev="sockfs" ino=3781 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 160.584519][ T4203] capability: warning: `syz.1.170' uses 32-bit capabilities (legacy support in use) [ 161.328901][ T4205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=4205 comm=syz.1.171 [ 161.636236][ T29] audit: type=1400 audit(161.520:152): avc: denied { connect } for pid=4207 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 163.540785][ T29] audit: type=1400 audit(163.430:153): avc: denied { getopt } for pid=4226 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 163.548007][ T4227] FAULT_INJECTION: forcing a failure. [ 163.548007][ T4227] name failslab, interval 1, probability 0, space 0, times 0 [ 163.561388][ T4227] CPU: 0 UID: 0 PID: 4227 Comm: syz.1.178 Not tainted syzkaller #0 PREEMPT [ 163.561497][ T4227] Hardware name: ARM-Versatile Express [ 163.561521][ T4227] Call trace: [ 163.561563][ T4227] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 163.561681][ T4227] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 163.561702][ T4227] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 163.561753][ T4227] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 163.561811][ T4227] r7:00000c40 r6:00000000 r5:85915400 r4:82918c50 [ 163.561828][ T4227] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 163.561936][ T4227] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 163.562012][ T4227] r8:00000000 r7:00000c40 r6:00000000 r5:00001000 r4:830016c0 [ 163.562059][ T4227] [<80537278>] (should_failslab) from [<805163e8>] (__kmalloc_noprof+0xa4/0x590) [ 163.562265][ T4227] [<80516344>] (__kmalloc_noprof) from [<807e0718>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 163.562484][ T4227] r10:00000000 r9:830a7000 r8:00000000 r7:8547edd0 r6:85d509e8 r5:00001000 [ 163.562712][ T4227] r4:00000000 [ 163.562882][ T4227] [<807e06dc>] (tomoyo_realpath_from_path) from [<807dc7e8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 163.562957][ T4227] r10:00000000 r9:00000003 r8:85d509c0 r7:00008933 r6:81cd98e8 r5:00000004 [ 163.563029][ T4227] r4:85d509e8 r3:826c2240 [ 163.563428][ T4227] [<807dc71c>] (tomoyo_path_number_perm) from [<807e113c>] (tomoyo_file_ioctl+0x1c/0x20) [ 163.563738][ T4227] r10:85915400 r9:00000003 r8:85d509c0 r7:200002c0 r6:200002c0 r5:00008933 [ 163.563836][ T4227] r4:85d509c0 [ 163.563871][ T4227] [<807e1120>] (tomoyo_file_ioctl) from [<8078cfa8>] (security_file_ioctl+0x80/0x1d4) [ 163.564286][ T4227] [<8078cf28>] (security_file_ioctl) from [<80582160>] (sys_ioctl+0x4c/0xb58) [ 163.564413][ T4227] r7:200002c0 r6:00008933 r5:85d509c1 r4:00000000 [ 163.564535][ T4227] [<80582114>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 163.564767][ T4227] Exception stack(0xec5b1fa8 to 0xec5b1ff0) [ 163.564830][ T4227] 1fa0: 00000000 00000000 00000003 00008933 200002c0 00000000 [ 163.564959][ T4227] 1fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76fed0dc [ 163.564992][ T4227] 1fe0: 76fece88 76fece78 00018734 0012fc20 [ 163.565533][ T4227] r10:00000036 r9:85915400 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 163.565700][ T4227] r4:00000000 [ 163.619266][ T4227] ERROR: Out of memory at tomoyo_realpath_from_path. [ 164.542867][ T4236] FAULT_INJECTION: forcing a failure. [ 164.542867][ T4236] name failslab, interval 1, probability 0, space 0, times 0 [ 164.550941][ T4236] CPU: 1 UID: 0 PID: 4236 Comm: syz.1.181 Not tainted syzkaller #0 PREEMPT [ 164.551095][ T4236] Hardware name: ARM-Versatile Express [ 164.551118][ T4236] Call trace: [ 164.551170][ T4236] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 164.551271][ T4236] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 164.551288][ T4236] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 164.551332][ T4236] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 164.551383][ T4236] r7:00000c40 r6:00000000 r5:85bbc800 r4:82918c50 [ 164.551397][ T4236] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 164.551443][ T4236] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 164.551538][ T4236] r8:00000000 r7:00000c40 r6:00000000 r5:00001000 r4:830016c0 [ 164.551557][ T4236] [<80537278>] (should_failslab) from [<805163e8>] (__kmalloc_noprof+0xa4/0x590) [ 164.551602][ T4236] [<80516344>] (__kmalloc_noprof) from [<807e0718>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 164.551665][ T4236] r10:00000000 r9:830a6000 r8:00000000 r7:834f3660 r6:85d50928 r5:00001000 [ 164.551682][ T4236] r4:00000000 [ 164.551696][ T4236] [<807e06dc>] (tomoyo_realpath_from_path) from [<807dc7e8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 164.551754][ T4236] r10:00000000 r9:00000003 r8:85d50900 r7:82187201 r6:81cd98e8 r5:00000004 [ 164.551775][ T4236] r4:85d50928 r3:826c2240 [ 164.551789][ T4236] [<807dc71c>] (tomoyo_path_number_perm) from [<807e113c>] (tomoyo_file_ioctl+0x1c/0x20) [ 164.551846][ T4236] r10:85bbc800 r9:00000003 r8:85d50900 r7:00000000 r6:00000000 r5:82187201 [ 164.551865][ T4236] r4:85d50900 [ 164.551879][ T4236] [<807e1120>] (tomoyo_file_ioctl) from [<8078cfa8>] (security_file_ioctl+0x80/0x1d4) [ 164.551927][ T4236] [<8078cf28>] (security_file_ioctl) from [<80582160>] (sys_ioctl+0x4c/0xb58) [ 164.551982][ T4236] r7:00000000 r6:82187201 r5:85d50901 r4:00000000 [ 164.551997][ T4236] [<80582114>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 164.552036][ T4236] Exception stack(0xec5b1fa8 to 0xec5b1ff0) [ 164.552070][ T4236] 1fa0: 00000000 00000000 00000003 82187201 00000000 00000000 [ 164.552100][ T4236] 1fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76fed0dc [ 164.552126][ T4236] 1fe0: 76fece88 76fece78 00018734 0012fc20 [ 164.552169][ T4236] r10:00000036 r9:85bbc800 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 164.552185][ T4236] r4:00000000 [ 164.578069][ T4236] ERROR: Out of memory at tomoyo_realpath_from_path. [ 164.978963][ T29] audit: type=1400 audit(164.860:154): avc: denied { append } for pid=4241 comm="syz.0.183" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 165.056744][ T4243] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=4243 comm=syz.0.183 [ 166.269147][ T29] audit: type=1400 audit(166.100:155): avc: denied { write } for pid=4251 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 170.042678][ T4273] capability: warning: `syz.0.192' uses deprecated v2 capabilities in a way that may be insecure [ 170.064337][ T29] audit: type=1400 audit(169.950:156): avc: denied { create } for pid=4272 comm="syz.0.192" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 172.861836][ T4291] Zero length message leads to an empty skb [ 172.877121][ T4291] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4291 comm=syz.1.198 [ 173.626674][ T4303] FAULT_INJECTION: forcing a failure. [ 173.626674][ T4303] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 173.632063][ T4303] CPU: 1 UID: 0 PID: 4303 Comm: syz.0.202 Not tainted syzkaller #0 PREEMPT [ 173.632217][ T4303] Hardware name: ARM-Versatile Express [ 173.632246][ T4303] Call trace: [ 173.632292][ T4303] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 173.632409][ T4303] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 173.632427][ T4303] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 173.632477][ T4303] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 173.632538][ T4303] r7:00000000 r6:00000000 r5:85bbbc00 r4:8294f8d0 [ 173.632557][ T4303] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 173.632612][ T4303] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 173.632669][ T4303] r8:00000000 r7:00000000 r6:00000ff0 r5:20002240 r4:838dc000 [ 173.632763][ T4303] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 173.632818][ T4303] [<8099ac7c>] (should_fail_usercopy) from [<809a0bcc>] (strncpy_from_user+0x20/0x1b0) [ 173.632867][ T4303] [<809a0bac>] (strncpy_from_user) from [<80576580>] (getname_flags.part.0+0x44/0x190) [ 173.632939][ T4303] r10:000000e8 r9:85bbbc00 r8:00000000 r7:00000000 r6:824a68b8 r5:20002240 [ 173.632959][ T4303] r4:838dc000 [ 173.632975][ T4303] [<8057653c>] (getname_flags.part.0) from [<8057c1d8>] (getname_flags+0x3c/0x50) [ 173.633032][ T4303] r9:85bbbc00 r8:00000000 r7:ffffff9c r6:0012e624 r5:00000000 r4:20002240 [ 173.633050][ T4303] [<8057c19c>] (getname_flags) from [<805a01e0>] (path_listxattrat+0x13c/0x168) [ 173.633116][ T4303] r5:85bbbc00 r4:00000000 [ 173.633135][ T4303] [<805a00a4>] (path_listxattrat) from [<805a1e9c>] (sys_listxattr+0x28/0x30) [ 173.633199][ T4303] r9:85bbbc00 r8:8020029c r7:000000e8 r6:0012e624 r5:00000000 r4:00000000 [ 173.633218][ T4303] [<805a1e74>] (sys_listxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 173.633270][ T4303] Exception stack(0xec931fa8 to 0xec931ff0) [ 173.633311][ T4303] 1fa0: 00000000 00000000 20002240 00000000 00000000 00000000 [ 173.633349][ T4303] 1fc0: 00000000 00000000 0012e624 000000e8 003462d8 00000000 00000001 76f610dc [ 173.633379][ T4303] 1fe0: 76f60e88 76f60e78 00018734 0012fc20 [ 173.973131][ T29] audit: type=1400 audit(173.860:157): avc: denied { create } for pid=4306 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 174.012158][ T29] audit: type=1400 audit(173.900:158): avc: denied { write } for pid=4306 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 174.322048][ T29] audit: type=1400 audit(174.210:159): avc: denied { ioctl } for pid=4306 comm="syz.0.203" path="socket:[4578]" dev="sockfs" ino=4578 ioctlcmd=0x9402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 174.347353][ T29] audit: type=1400 audit(174.230:160): avc: denied { getopt } for pid=4306 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 174.644896][ T29] audit: type=1400 audit(174.530:161): avc: denied { map } for pid=4318 comm="syz.1.207" path="pipe:[4609]" dev="pipefs" ino=4609 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 176.106453][ T29] audit: type=1400 audit(175.990:162): avc: denied { create } for pid=4329 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 176.145485][ T29] audit: type=1400 audit(176.030:163): avc: denied { perfmon } for pid=4329 comm="syz.1.209" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 176.186932][ T29] audit: type=1400 audit(176.070:164): avc: denied { ioctl } for pid=4329 comm="syz.1.209" path="socket:[4641]" dev="sockfs" ino=4641 ioctlcmd=0x8923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 176.246471][ T29] audit: type=1400 audit(176.130:165): avc: denied { map_create } for pid=4329 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 176.682805][ T29] audit: type=1400 audit(176.570:166): avc: denied { read } for pid=4332 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 185.989589][ T4414] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4414 comm=syz.0.230 [ 185.996899][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.009794][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.013733][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.024080][ T29] audit: type=1400 audit(185.910:167): avc: denied { ioctl } for pid=4410 comm="syz.0.230" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x943e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 186.030613][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.033006][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.033584][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.034341][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.035094][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.035704][ T4411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4411 comm=syz.0.230 [ 186.215105][ T29] audit: type=1400 audit(186.100:168): avc: denied { read } for pid=4415 comm="syz.0.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 188.285574][ T29] audit: type=1400 audit(188.170:169): avc: denied { create } for pid=4434 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 188.324143][ T29] audit: type=1400 audit(188.210:170): avc: denied { ioctl } for pid=4434 comm="syz.1.237" path="socket:[5184]" dev="sockfs" ino=5184 ioctlcmd=0x7012 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 188.413916][ T29] audit: type=1400 audit(188.300:171): avc: denied { write } for pid=4434 comm="syz.1.237" path="socket:[5180]" dev="sockfs" ino=5180 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 189.931416][ T29] audit: type=1400 audit(189.820:172): avc: denied { setopt } for pid=4440 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 193.830518][ T4480] netlink: 'syz.1.244': attribute type 1 has an invalid length. [ 193.836200][ T4480] netlink: 'syz.1.244': attribute type 1 has an invalid length. [ 193.837731][ T4480] netlink: 'syz.1.244': attribute type 2 has an invalid length. [ 193.839641][ T4480] netlink: 'syz.1.244': attribute type 2 has an invalid length. [ 193.842458][ T4480] netlink: 'syz.1.244': attribute type 2 has an invalid length. [ 193.843926][ T4480] netlink: 'syz.1.244': attribute type 1 has an invalid length. [ 194.000433][ T4482] FAULT_INJECTION: forcing a failure. [ 194.000433][ T4482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 194.000773][ T4482] CPU: 0 UID: 0 PID: 4482 Comm: syz.0.245 Not tainted syzkaller #0 PREEMPT [ 194.000830][ T4482] Hardware name: ARM-Versatile Express [ 194.000848][ T4482] Call trace: [ 194.000934][ T4482] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 194.001045][ T4482] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 194.001067][ T4482] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 194.001154][ T4482] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 194.001188][ T4482] r7:000000ad r6:00000000 r5:85bba400 r4:8294f8d0 [ 194.001196][ T4482] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 194.001269][ T4482] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 194.001322][ T4482] r8:00000000 r7:000000ad r6:76f60b80 r5:76f60b00 r4:eced1fb0 [ 194.001340][ T4482] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 194.001387][ T4482] [<8099ac7c>] (should_fail_usercopy) from [<8022b090>] (restore_sigframe+0x48/0x210) [ 194.001418][ T4482] [<8022b048>] (restore_sigframe) from [<8022b2fc>] (sys_rt_sigreturn+0x44/0x74) [ 194.001454][ T4482] r7:000000ad r6:0012e624 r5:76f60b00 r4:eced1fb0 [ 194.001462][ T4482] [<8022b2b8>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 194.001487][ T4482] Exception stack(0xeced1fa8 to 0xeced1ff0) [ 194.001508][ T4482] 1fa0: 00000000 00000000 00000111 76f60b00 76f60b80 00000000 [ 194.001526][ T4482] 1fc0: 00000000 00000000 0012e624 000000ad 003462d8 00000000 00000001 76f610dc [ 194.001539][ T4482] 1fe0: 76f60e88 76f60b00 0014d1b0 000f2e78 [ 194.001552][ T4482] r5:00000000 r4:00000000 [ 194.132435][ T29] audit: type=1400 audit(194.020:173): avc: denied { audit_write } for pid=4485 comm="syz.1.246" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 194.183165][ T29] audit: type=1400 audit(194.070:174): avc: denied { ioctl } for pid=4485 comm="syz.1.246" path="socket:[4951]" dev="sockfs" ino=4951 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 194.827891][ T4491] selinux_netlink_send: 25 callbacks suppressed [ 194.833987][ T4491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4491 comm=syz.0.247 [ 194.846730][ T4491] netlink: 40 bytes leftover after parsing attributes in process `syz.0.247'. [ 194.863803][ T4491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=4491 comm=syz.0.247 [ 194.926198][ T29] audit: type=1400 audit(194.810:175): avc: denied { create } for pid=4487 comm="syz.0.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 196.552639][ T29] audit: type=1400 audit(196.440:176): avc: denied { connect } for pid=4503 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 203.197123][ T4531] ======================================================= [ 203.197123][ T4531] WARNING: The mand mount option has been deprecated and [ 203.197123][ T4531] and is ignored by this kernel. Remove the mand [ 203.197123][ T4531] option from the mount to silence this warning. [ 203.197123][ T4531] ======================================================= [ 203.213440][ T4531] fuse: Bad value for 'fd' [ 203.235792][ T29] audit: type=1400 audit(203.120:177): avc: denied { connect } for pid=4530 comm="syz.0.262" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 203.504385][ T4535] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4535 comm=syz.0.264 [ 204.293064][ T29] audit: type=1400 audit(204.180:178): avc: denied { ioctl } for pid=4542 comm="syz.1.267" path="socket:[5054]" dev="sockfs" ino=5054 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 205.371037][ T29] audit: type=1400 audit(205.260:179): avc: denied { name_bind } for pid=4562 comm="syz.1.273" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 206.415213][ T29] audit: type=1400 audit(206.300:180): avc: denied { setopt } for pid=4570 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 215.735211][ T29] audit: type=1400 audit(215.620:181): avc: denied { write } for pid=4609 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 215.737651][ T29] audit: type=1400 audit(215.620:182): avc: denied { create } for pid=4609 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 215.943415][ T29] audit: type=1400 audit(215.830:183): avc: denied { create } for pid=4609 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 215.967304][ T29] audit: type=1400 audit(215.850:184): avc: denied { getattr } for pid=4609 comm="syz.0.288" path="socket:[6168]" dev="sockfs" ino=6168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 215.983704][ T29] audit: type=1400 audit(215.870:185): avc: denied { create } for pid=4609 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 216.045984][ T4619] fuse: Unknown parameter '000000000000000000040xffffffffffffffff' [ 220.185217][ T29] audit: type=1400 audit(220.070:186): avc: denied { ioctl } for pid=4648 comm="syz.1.300" path="socket:[6219]" dev="sockfs" ino=6219 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 225.191951][ T29] audit: type=1400 audit(225.080:187): avc: denied { bind } for pid=4665 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 236.666127][ T29] audit: type=1400 audit(236.550:188): avc: denied { setattr } for pid=4735 comm="syz.0.330" path="socket:[6336]" dev="sockfs" ino=6336 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 240.662702][ T29] audit: type=1400 audit(240.550:189): avc: denied { ioctl } for pid=4758 comm="syz.1.338" path="socket:[5748]" dev="sockfs" ino=5748 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 242.986294][ T4787] FAULT_INJECTION: forcing a failure. [ 242.986294][ T4787] name failslab, interval 1, probability 0, space 0, times 0 [ 242.987792][ T4787] CPU: 0 UID: 0 PID: 4787 Comm: syz.1.348 Not tainted syzkaller #0 PREEMPT [ 242.988114][ T4787] Hardware name: ARM-Versatile Express [ 242.988375][ T4787] Call trace: [ 242.990190][ T4787] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 242.992235][ T4787] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 242.992335][ T4787] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 242.992391][ T4787] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 242.992448][ T4787] r7:00000000 r6:00000000 r5:85913c00 r4:82918c50 [ 242.992465][ T4787] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 242.992521][ T4787] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 242.992585][ T4787] r8:85913c00 r7:00000000 r6:00000cc0 r5:00000000 r4:83002840 [ 242.992604][ T4787] [<80537278>] (should_failslab) from [<80515110>] (kmem_cache_alloc_noprof+0x54/0x450) [ 242.992664][ T4787] [<805150bc>] (kmem_cache_alloc_noprof) from [<81a8429c>] (mas_alloc_nodes+0xd4/0x10c) [ 242.992765][ T4787] r10:76fcd000 r9:00000000 r8:eda19f3c r7:76fcd000 r6:00000cc0 r5:00000001 [ 242.992793][ T4787] r4:eda19f3c [ 242.992812][ T4787] [<81a841c8>] (mas_alloc_nodes) from [<81a86ab0>] (mas_preallocate+0x17c/0x25c) [ 242.992874][ T4787] r7:76fcd000 r6:00000cc0 r5:85d92500 r4:eda19f3c [ 242.992892][ T4787] [<81a86934>] (mas_preallocate) from [<804f7fac>] (__split_vma+0x148/0x43c) [ 242.992963][ T4787] r6:82c41c9c r5:85d92500 r4:85d92700 [ 242.992981][ T4787] [<804f7e64>] (__split_vma) from [<804f8380>] (vms_gather_munmap_vmas+0xe0/0x408) [ 242.993044][ T4787] r10:00000001 r9:00000000 r8:eda19e48 r7:82c41c9c r6:82c41ca0 r5:85d92700 [ 242.993065][ T4787] r4:eda19e78 [ 242.993082][ T4787] [<804f82a0>] (vms_gather_munmap_vmas) from [<804fafec>] (do_vmi_align_munmap+0xfc/0x27c) [ 242.993147][ T4787] r9:7f000000 r8:00002000 r7:76f00000 r6:00000000 r5:76fcd000 r4:eda19f3c [ 242.993166][ T4787] [<804faef0>] (do_vmi_align_munmap) from [<804fb1ec>] (do_vmi_munmap+0x80/0xfc) [ 242.993230][ T4787] r10:0000005b r9:000cd000 r8:76f00000 r7:00000001 r6:eda19f3c r5:85da8b40 [ 242.993250][ T4787] r4:76fcd000 [ 242.993267][ T4787] [<804fb16c>] (do_vmi_munmap) from [<804fcf90>] (__vm_munmap+0xc8/0x194) [ 242.993329][ T4787] r8:85da8c4c r7:85da8b40 r6:eda19f30 r5:76f00000 r4:00000000 [ 242.993348][ T4787] [<804fcec8>] (__vm_munmap) from [<804e05a8>] (sys_munmap+0x14/0x18) [ 242.993455][ T4787] r9:85913c00 r8:8020029c r7:0000005b r6:00100000 r5:00021000 r4:76e00000 [ 242.993479][ T4787] [<804e0594>] (sys_munmap) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 242.993606][ T4787] Exception stack(0xeda19fa8 to 0xeda19ff0) [ 242.993787][ T4787] 9fa0: 76e00000 00021000 76f00000 000cd000 00000000 fff00000 [ 242.993999][ T4787] 9fc0: 76e00000 00021000 00100000 0000005b 00310000 00001000 76f00000 001cbe40 [ 242.994038][ T4787] 9fe0: 00000000 76febcbc 00113358 0012f92c [ 243.746636][ T4798] FAULT_INJECTION: forcing a failure. [ 243.746636][ T4798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.752154][ T4798] CPU: 1 UID: 0 PID: 4798 Comm: syz.0.353 Not tainted syzkaller #0 PREEMPT [ 243.752309][ T4798] Hardware name: ARM-Versatile Express [ 243.752338][ T4798] Call trace: [ 243.752419][ T4798] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 243.752587][ T4798] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 243.752613][ T4798] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 243.752681][ T4798] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 243.752788][ T4798] r7:00000000 r6:00000000 r5:85bbbc00 r4:8294f8d0 [ 243.752809][ T4798] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 243.752875][ T4798] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 243.752942][ T4798] r8:ee061eb8 r7:00000000 r6:76f60f08 r5:00000001 r4:00000001 [ 243.752962][ T4798] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 243.753013][ T4798] [<8099ac7c>] (should_fail_usercopy) from [<808deae0>] (kstrtouint_from_user+0x54/0x13c) [ 243.753073][ T4798] [<808dea8c>] (kstrtouint_from_user) from [<806238f0>] (proc_fail_nth_write+0x40/0xf0) [ 243.753150][ T4798] r8:806238b0 r7:ee061f68 r6:76f60f08 r5:85f1d9c0 r4:00000001 [ 243.753172][ T4798] [<806238b0>] (proc_fail_nth_write) from [<80567678>] (vfs_write+0xd4/0x450) [ 243.753291][ T4798] r5:85f1d9c0 r4:00000001 [ 243.753312][ T4798] [<805675a4>] (vfs_write) from [<80567b68>] (ksys_write+0x74/0xec) [ 243.753389][ T4798] r10:00000004 r9:85bbbc00 r8:8020029c r7:00000000 r6:00000002 r5:85f1d9c0 [ 243.753414][ T4798] r4:85f1d9c3 [ 243.753432][ T4798] [<80567af4>] (ksys_write) from [<80567bf0>] (sys_write+0x10/0x14) [ 243.753525][ T4798] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 243.753546][ T4798] [<80567be0>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 243.753601][ T4798] Exception stack(0xee061fa8 to 0xee061ff0) [ 243.753644][ T4798] 1fa0: 00000000 00000000 00000005 76f60f08 00000001 00000000 [ 243.753681][ T4798] 1fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f610dc [ 243.753711][ T4798] 1fe0: 76f60e58 76f60e44 0010af14 00111af8 [ 246.143445][ T29] audit: type=1400 audit(246.030:190): avc: denied { connect } for pid=4819 comm="syz.0.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 246.285585][ T4811] FAULT_INJECTION: forcing a failure. [ 246.285585][ T4811] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 246.299156][ T4811] CPU: 1 UID: 0 PID: 4811 Comm: syz.1.357 Not tainted syzkaller #0 PREEMPT [ 246.299337][ T4811] Hardware name: ARM-Versatile Express [ 246.299374][ T4811] Call trace: [ 246.299428][ T4811] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 246.299589][ T4811] r7:60000113 r6:60000113 r5:822a2700 r4:00000000 [ 246.299678][ T4811] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 246.299746][ T4811] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 246.299817][ T4811] r7:00000001 r6:00000000 r5:85910000 r4:8294f8d0 [ 246.299842][ T4811] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 246.299908][ T4811] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 246.299973][ T4811] r8:00000000 r7:00000001 r6:76fed0dc r5:85910830 r4:76fecbb8 [ 246.299995][ T4811] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 246.300051][ T4811] [<8099ac7c>] (should_fail_usercopy) from [<8022af64>] (setup_sigframe+0xe4/0x1c8) [ 246.300126][ T4811] [<8022ae80>] (setup_sigframe) from [<8022b5f0>] (do_work_pending+0x2c4/0x4d8) [ 246.300204][ T4811] r10:00000001 r9:b5403587 r8:00000000 r7:85910830 r6:76fecbb8 r5:edfe5fb0 [ 246.300233][ T4811] r4:85910000 [ 246.300250][ T4811] [<8022b32c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 246.300305][ T4811] Exception stack(0xedfe5fb0 to 0xedfe5ff8) [ 246.300343][ T4811] 5fa0: 76fedaf0 00000000 003fb0d6 00e796f8 [ 246.300383][ T4811] 5fc0: 76fedae0 00000004 00000001 0018df44 003462d8 00000000 00000001 76fed0dc [ 246.300419][ T4811] 5fe0: 76fedb18 76feceb0 00020ad8 0013ddc0 20000010 ffffffff [ 246.300459][ T4811] r10:00000001 r9:85910000 r8:00000000 r7:85910000 r6:ffffffff r5:20000010 [ 246.300484][ T4811] r4:0013ddc4 [ 256.178991][ T4875] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=4875 comm=syz.1.377 [ 257.333574][ T4883] FAULT_INJECTION: forcing a failure. [ 257.333574][ T4883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.342664][ T4883] CPU: 0 UID: 0 PID: 4883 Comm: syz.0.379 Not tainted syzkaller #0 PREEMPT [ 257.342821][ T4883] Hardware name: ARM-Versatile Express [ 257.342849][ T4883] Call trace: [ 257.342894][ T4883] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 257.343023][ T4883] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 257.343043][ T4883] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 257.343238][ T4883] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 257.343360][ T4883] r7:200002c0 r6:00000000 r5:85bbec00 r4:8294f8d0 [ 257.343391][ T4883] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 257.343452][ T4883] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 257.343583][ T4883] r8:00000800 r7:200002c0 r6:ee115e28 r5:00000000 r4:ee115f20 [ 257.343602][ T4883] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 257.343649][ T4883] [<8099ac7c>] (should_fail_usercopy) from [<8158f654>] (copy_msghdr_from_user+0x50/0x1e0) [ 257.343699][ T4883] [<8158f604>] (copy_msghdr_from_user) from [<8158f85c>] (___sys_sendmsg+0x78/0xd0) [ 257.343751][ T4883] r8:00000800 r7:00000000 r6:854d2500 r5:ee115f20 r4:ee115e6c [ 257.343768][ T4883] [<8158f7e4>] (___sys_sendmsg) from [<815918dc>] (__sys_sendmsg+0x8c/0xe0) [ 257.343870][ T4883] r9:85bbec00 r8:85f1db40 r7:00000800 r6:200002c0 r5:85f1db41 r4:00000003 [ 257.343897][ T4883] [<81591850>] (__sys_sendmsg) from [<81591944>] (sys_sendmsg+0x14/0x18) [ 257.344003][ T4883] r8:8020029c r7:00000128 r6:0012e624 r5:00000000 r4:00000000 [ 257.344022][ T4883] [<81591930>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 257.344065][ T4883] Exception stack(0xee115fa8 to 0xee115ff0) [ 257.344105][ T4883] 5fa0: 00000000 00000000 00000003 200002c0 00000800 00000000 [ 257.344138][ T4883] 5fc0: 00000000 00000000 0012e624 00000128 003462d8 00000000 00000001 76f610dc [ 257.344177][ T4883] 5fe0: 76f60e88 76f60e78 00018734 0012fc20 [ 259.438005][ T29] audit: type=1400 audit(259.320:191): avc: denied { create } for pid=4890 comm="syz.1.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 259.845792][ T29] audit: type=1400 audit(259.730:192): avc: denied { getopt } for pid=4894 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 259.862893][ T29] audit: type=1400 audit(259.750:193): avc: denied { setattr } for pid=4894 comm="syz.1.383" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:load_policy_exec_t:s0" [ 261.410389][ T4907] FAULT_INJECTION: forcing a failure. [ 261.410389][ T4907] name failslab, interval 1, probability 0, space 0, times 0 [ 261.410995][ T4907] CPU: 0 UID: 0 PID: 4907 Comm: syz.1.387 Not tainted syzkaller #0 PREEMPT [ 261.411103][ T4907] Hardware name: ARM-Versatile Express [ 261.411130][ T4907] Call trace: [ 261.411192][ T4907] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 261.411433][ T4907] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 261.411632][ T4907] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 261.411772][ T4907] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 261.411946][ T4907] r7:00000000 r6:00000000 r5:85910000 r4:82918c50 [ 261.412269][ T4907] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 261.412649][ T4907] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 261.412738][ T4907] r8:85910000 r7:00000000 r6:00000cc0 r5:00000000 r4:830b0c00 [ 261.412758][ T4907] [<80537278>] (should_failslab) from [<805159b8>] (kmem_cache_alloc_node_noprof+0x58/0x458) [ 261.413022][ T4907] [<80515960>] (kmem_cache_alloc_node_noprof) from [<8159c054>] (__alloc_skb+0x90/0x198) [ 261.413202][ T4907] r10:00000000 r9:00000000 r8:00000cc0 r7:830b0c00 r6:00000000 r5:ffffffff [ 261.413520][ T4907] r4:00000000 [ 261.413757][ T4907] [<8159bfc4>] (__alloc_skb) from [<816bf220>] (netlink_alloc_large_skb+0x8c/0xa8) [ 261.413860][ T4907] r8:00000000 r7:84e1f800 r6:0000001c r5:8543e280 r4:00000140 [ 261.413884][ T4907] [<816bf194>] (netlink_alloc_large_skb) from [<816bf9e4>] (netlink_sendmsg+0x134/0x444) [ 261.414174][ T4907] r5:8543e280 r4:ee4b1f20 [ 261.414301][ T4907] [<816bf8b0>] (netlink_sendmsg) from [<8158e5c4>] (__sock_sendmsg+0x44/0x78) [ 261.414446][ T4907] r10:00000000 r9:00000000 r8:ee4b1dcc r7:00000000 r6:8543e280 r5:ee4b1f20 [ 261.414474][ T4907] r4:00000000 [ 261.414495][ T4907] [<8158e580>] (__sock_sendmsg) from [<8158f480>] (____sys_sendmsg+0x238/0x2c4) [ 261.414860][ T4907] r7:00000000 r6:00000000 r5:8543e280 r4:ee4b1f20 [ 261.414931][ T4907] [<8158f248>] (____sys_sendmsg) from [<8158f880>] (___sys_sendmsg+0x9c/0xd0) [ 261.415680][ T4907] r10:00000128 r9:200003c0 r8:00000000 r7:00000000 r6:8543e280 r5:ee4b1f20 [ 261.415880][ T4907] r4:00000000 [ 261.415943][ T4907] [<8158f7e4>] (___sys_sendmsg) from [<815918dc>] (__sys_sendmsg+0x8c/0xe0) [ 261.416090][ T4907] r9:85910000 r8:85d56840 r7:00000000 r6:200003c0 r5:85d56841 r4:00000003 [ 261.416117][ T4907] [<81591850>] (__sys_sendmsg) from [<81591944>] (sys_sendmsg+0x14/0x18) [ 261.416241][ T4907] r8:8020029c r7:00000128 r6:0012e624 r5:00000000 r4:00000000 [ 261.416326][ T4907] [<81591930>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 261.416538][ T4907] Exception stack(0xee4b1fa8 to 0xee4b1ff0) [ 261.416623][ T4907] 1fa0: 00000000 00000000 00000003 200003c0 00000000 00000000 [ 261.416749][ T4907] 1fc0: 00000000 00000000 0012e624 00000128 003462d8 00000000 00000001 76fed0dc [ 261.417066][ T4907] 1fe0: 76fece88 76fece78 00018734 0012fc20 [ 264.897035][ T4927] veth1: entered promiscuous mode [ 264.897624][ T4927] veth1: entered allmulticast mode [ 266.422815][ T4937] netlink: 8 bytes leftover after parsing attributes in process `syz.1.397'. [ 266.426645][ T4937] v: renamed from gre0 (while UP) [ 266.445344][ T4937] v: entered promiscuous mode [ 266.939995][ T4944] bond0: entered promiscuous mode [ 266.942571][ T4944] bond_slave_0: entered promiscuous mode [ 266.947562][ T4944] bond_slave_1: entered promiscuous mode [ 267.285871][ T29] audit: type=1400 audit(267.170:194): avc: denied { bind } for pid=4950 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 267.445570][ T29] audit: type=1400 audit(267.330:195): avc: denied { create } for pid=4955 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 267.447904][ T29] audit: type=1400 audit(267.330:196): avc: denied { ioctl } for pid=4955 comm="syz.0.404" path="socket:[6051]" dev="sockfs" ino=6051 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 267.529524][ T29] audit: type=1400 audit(267.400:197): avc: denied { prog_run } for pid=4955 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 267.677098][ T29] audit: type=1326 audit(267.560:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4958 comm="syz.0.406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 267.680444][ T29] audit: type=1326 audit(267.560:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4958 comm="syz.0.406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 267.715132][ T29] audit: type=1326 audit(267.600:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4958 comm="syz.0.406" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 267.716587][ T29] audit: type=1326 audit(267.600:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4958 comm="syz.0.406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 267.716772][ T29] audit: type=1326 audit(267.600:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4958 comm="syz.0.406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 267.716842][ T29] audit: type=1326 audit(267.600:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4958 comm="syz.0.406" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 270.391967][ T4979] mmap: syz.1.414 (4979) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 270.826834][ T4985] netlink: 8 bytes leftover after parsing attributes in process `syz.0.417'. [ 271.119689][ T4988] IPv6: addrconf: prefix option has invalid lifetime [ 271.120274][ T4988] IPv6: addrconf: prefix option has invalid lifetime [ 271.120364][ T4988] IPv6: addrconf: prefix option has invalid lifetime [ 273.518549][ C0] hrtimer: interrupt took 6020560 ns [ 273.985534][ T5014] netlink: 59 bytes leftover after parsing attributes in process `syz.0.428'. [ 275.102639][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 275.103034][ T29] audit: type=1400 audit(274.990:212): avc: denied { map } for pid=5022 comm="syz.1.431" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6127 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 275.105649][ T29] audit: type=1400 audit(274.990:213): avc: denied { read write } for pid=5022 comm="syz.1.431" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6127 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 276.561366][ T29] audit: type=1400 audit(276.370:214): avc: denied { write } for pid=5028 comm="syz.0.433" name="vlan0" dev="proc" ino=4026532913 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 277.611452][ T29] audit: type=1400 audit(277.500:215): avc: denied { mount } for pid=5032 comm="syz.1.435" name="/" dev="ramfs" ino=6138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 278.332861][ T29] audit: type=1326 audit(278.220:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5035 comm="syz.1.436" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x0 [ 278.750118][ T29] audit: type=1326 audit(278.610:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ff00000 [ 278.753544][ T29] audit: type=1326 audit(278.610:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ff00000 [ 278.769284][ T29] audit: type=1326 audit(278.610:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ff00000 [ 278.769549][ T29] audit: type=1326 audit(278.610:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ff00000 [ 278.769744][ T29] audit: type=1326 audit(278.610:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ff00000 [ 279.627934][ T5052] netlink: 8 bytes leftover after parsing attributes in process `syz.0.444'. [ 279.897004][ T5054] netlink: 20 bytes leftover after parsing attributes in process `syz.0.445'. [ 280.170334][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 280.173961][ T29] audit: type=1400 audit(280.060:245): avc: denied { ioctl } for pid=5057 comm="syz.0.447" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7202 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 280.865471][ T29] audit: type=1400 audit(280.740:246): avc: denied { setopt } for pid=5059 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 282.572609][ T5076] ------------[ cut here ]------------ [ 282.573842][ T5076] WARNING: kernel/bpf/verifier.c:2742 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.0.455/5076 [ 282.576587][ T5076] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xf0000900, 0xaffffd00] s64=[0xf0000900, 0xaffffd00] u32=[0xf0000900, 0xaffffd00] s32=[0xf0000900, 0xffffffc0] var_off=(0x80000000, 0x7fffffc0) [ 282.580919][ T5076] Modules linked in: [ 282.581951][ T5076] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 282.582435][ T5076] CPU: 0 UID: 0 PID: 5076 Comm: syz.0.455 Not tainted syzkaller #0 PREEMPT [ 282.582838][ T5076] Hardware name: ARM-Versatile Express [ 282.583188][ T5076] Call trace: [ 282.583386][ T5076] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 282.583836][ T5076] r7:82290da0 r6:00000000 r5:822a2700 r4:00000001 [ 282.584105][ T5076] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 282.584562][ T5076] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 282.585089][ T5076] r7:82290da0 r6:85915400 r5:00000000 r4:82a7cd14 [ 282.585373][ T5076] [<8021edb0>] (dump_stack) from [<802025c4>] (vpanic+0xe0/0x2e4) [ 282.585991][ T5076] [<802024e4>] (vpanic) from [<802027fc>] (trace_suspend_resume+0x0/0xd8) [ 282.586830][ T5076] r7:803dc6c8 [ 282.587047][ T5076] [<802027c8>] (panic) from [<80251f68>] (get_taint+0x0/0x1c) [ 282.587418][ T5076] r3:8280c504 r2:00000001 r1:8228958c r0:82290da0 [ 282.587837][ T5076] [<80251ef0>] (check_panic_on_warn) from [<802520e0>] (__warn+0x94/0x1a0) [ 282.588452][ T5076] [<8025204c>] (__warn) from [<802523d4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 282.589046][ T5076] r8:00000009 r7:822a8f9c r6:dfb618bc r5:85915400 r4:00000000 [ 282.589489][ T5076] [<802521f0>] (warn_slowpath_fmt) from [<803dc6c8>] (reg_bounds_sanity_check+0x3c0/0x428) [ 282.590057][ T5076] r10:85970000 r9:f0000900 r8:00000000 r7:f0000900 r6:affffd00 r5:822a9700 [ 282.590830][ T5076] r4:85339950 [ 282.591455][ T5076] [<803dc308>] (reg_bounds_sanity_check) from [<803e90ac>] (reg_set_min_max+0x1c4/0x288) [ 282.592127][ T5076] r10:00000000 r9:00000010 r8:85970000 r7:84d069c0 r6:853399c0 r5:85339950 [ 282.592582][ T5076] r4:84d06950 [ 282.592768][ T5076] [<803e8ee8>] (reg_set_min_max) from [<803f9248>] (check_cond_jmp_op+0xc64/0x1968) [ 282.593214][ T5076] r10:85339800 r9:00000010 r8:85d69d00 r7:00000000 r6:f0000900 r5:85d6ccc0 [ 282.593612][ T5076] r4:dfc67090 r3:84d06950 [ 282.594074][ T5076] [<803f85e4>] (check_cond_jmp_op) from [<803ff4d0>] (do_check_common+0x2160/0x31c4) [ 282.594811][ T5076] r10:85970000 r9:00000000 r8:85d69d00 r7:85976000 r6:dfc67090 r5:dfc67048 [ 282.595271][ T5076] r4:dfc67000 [ 282.595442][ T5076] [<803fd370>] (do_check_common) from [<80403910>] (bpf_check+0x275c/0x2d2c) [ 282.595862][ T5076] r10:85976000 r9:00000001 r8:85970000 r7:00000a7b r6:859708bc r5:fffffff0 [ 282.596176][ T5076] r4:0000000e [ 282.596504][ T5076] [<804011b4>] (bpf_check) from [<803d5a58>] (bpf_prog_load+0x5b0/0xdd8) [ 282.596913][ T5076] r10:dfb61d58 r9:85915400 r8:85ca9730 r7:dfb61d18 r6:00000000 r5:00000000 [ 282.597460][ T5076] r4:dfb61eb0 [ 282.597655][ T5076] [<803d54a8>] (bpf_prog_load) from [<803d7254>] (__sys_bpf+0x334/0x2118) [ 282.598066][ T5076] r10:00000005 r9:00000000 r8:dfb61e50 r7:00000048 r6:85915400 r5:200017c0 [ 282.598558][ T5076] r4:00000000 [ 282.598828][ T5076] [<803d6f20>] (__sys_bpf) from [<803d95cc>] (sys_bpf+0x2c/0x48) [ 282.599245][ T5076] r10:00000182 r9:85915400 r8:8020029c r7:00000182 r6:00346310 r5:00000000 [ 282.599596][ T5076] r4:00000000 [ 282.599789][ T5076] [<803d95a0>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 282.600187][ T5076] Exception stack(0xdfb61fa8 to 0xdfb61ff0) [ 282.600485][ T5076] 1fa0: 00000000 00000000 00000005 200017c0 00000048 00000000 [ 282.600896][ T5076] 1fc0: 00000000 00000000 00346310 00000182 003462d8 00000000 003d0f00 76f610dc [ 282.601235][ T5076] 1fe0: 76f60e88 76f60e78 00018734 0012fc20 [ 282.603938][ T5076] Rebooting in 86400 seconds..