last executing test programs: 8.075906147s ago: executing program 0 (id=10123): r0 = openat$random(0xffffff9c, &(0x7f0000000000), 0x8a40, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) (async) r1 = signalfd(r0, &(0x7f0000000080)={[0x9, 0x81]}, 0x8) ioctl$SNDRV_TIMER_IOCTL_CREATE(r1, 0xc02054a5, &(0x7f00000000c0)={0x6, r0, 'id0\x00'}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000140)={0x0, 'gretap0\x00', {0x1}}) (async, rerun: 32) r3 = fspick(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) (rerun: 32) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) (async, rerun: 32) r4 = gettid() (rerun: 32) fcntl$setown(r1, 0x8, r4) (async) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0x8001, 0x0, [0xa3d, 0x0, 0x48000000000000, 0x9, 0x3], [0x7fffffffffffffff, 0x3ff, 0xbd9, 0x1, 0x4, 0x0, 0x9, 0x1, 0x5, 0x6, 0x8, 0x3, 0xaab0, 0x69c, 0x1ff, 0x5, 0x5, 0x10001, 0x7fff, 0x1, 0x10, 0x7, 0xbad2, 0x3, 0xaecc, 0xc231, 0xffffffffffffd66f, 0x8000, 0x8, 0x0, 0x200, 0x8000, 0xf9, 0xa89, 0x4, 0xffff, 0x1, 0x1, 0x3a5b, 0x0, 0x8, 0x6, 0x3, 0x4f73, 0x7, 0x81, 0x401, 0x1, 0x7, 0x7, 0xf9a, 0x5c, 0x2, 0x4, 0xa28d, 0x8, 0x0, 0x2, 0x7, 0x42e4b80d, 0x7, 0x9, 0x100000000, 0xb0, 0xc1, 0x98f, 0x1000, 0x79a4, 0x6, 0xffffffffffff0001, 0x3, 0x7, 0x8d5, 0x3ff, 0x6, 0x5, 0x99, 0x5cf, 0x5e, 0x5, 0x200, 0x7, 0x7, 0x0, 0x5, 0x5, 0x400, 0x5, 0x2, 0x1f91, 0x2, 0xabc4, 0x1, 0x1ff, 0x8, 0x7ff, 0x5, 0xffffffffffffffff, 0x8, 0x2, 0x100000001, 0xfffffffffffffffc, 0x7, 0x8, 0x65d, 0x100000000, 0xce, 0xa, 0x4, 0x4, 0x4, 0x9, 0x10001, 0x8001, 0x8000, 0x1, 0x9, 0x5, 0x8, 0xffff, 0x8]}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000640)={0x0, 0x3, @start={r5, 0x1, "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", "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"}, [0x4, 0x1af, 0x56, 0xb, 0x8, 0x7, 0x0, 0x2, 0x9, 0x800, 0x8001, 0x4, 0x7fffffff, 0x2, 0x8, 0x1, 0xf, 0x0, 0x18, 0x0, 0xad0f, 0x1, 0x3, 0xfffffffffffffffc, 0x3ff, 0x7, 0x8, 0x8, 0x9, 0xffffffffffffff17, 0x1, 0xfffffffffffffffa, 0x8000000000000001, 0x600, 0x3, 0xe6, 0x1, 0x1, 0xfffffffffffffffa, 0x5, 0x3, 0x2, 0x4, 0x3, 0x0, 0x7, 0x7fffffffffffffff, 0x200, 0x9, 0x2, 0x8bb2, 0x1, 0x6, 0x400, 0xffffffffffffff3e, 0x9f, 0xfffffffffffffff9, 0xe8, 0x3, 0x7ff, 0x100000000, 0x401, 0x4, 0x3]}) (async, rerun: 64) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) sendmsg$NFT_MSG_GETGEN(r6, &(0x7f0000001140)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, 0x10, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x4000091) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000011c0), r2) (rerun: 32) sendmsg$BATADV_CMD_TP_METER_CANCEL(r7, &(0x7f0000001280)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x24, r8, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffff4ee}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x220000e0) (async) fcntl$setflags(r2, 0x2, 0x0) (async) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f00000012c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) r10 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x41, &(0x7f0000001340)=0x1, 0x4) (async) ioctl$NBD_SET_SOCK(r1, 0xab00, r9) (async) r11 = openat$vcs(0xffffff9c, &(0x7f0000001380), 0x800, 0x0) connect$inet(r11, &(0x7f00000013c0)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$mixer_OSS_ALSAEMULVER(r1, 0x80044df9, &(0x7f0000001400)) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) (async) r12 = openat$userio(0xffffff9c, &(0x7f0000001440), 0x10d402, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r12, &(0x7f0000001480)={0x2, 0x2}, 0x2) 5.468507835s ago: executing program 0 (id=10126): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000001640), 0x2, 0x0) close_range(r0, r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x28, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x1e}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x800) (fail_nth: 5) 5.284758759s ago: executing program 0 (id=10127): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000800)) r2 = socket$nl_generic(0x10, 0x3, 0x10) write$selinux_user(r2, &(0x7f0000001900)={'system_u:object_r:pam_var_run_t:s0', 0x20, 'root\x00'}, 0x28) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x48, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '-{$+\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4040800) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r4, 0x200, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 2.62812591s ago: executing program 0 (id=10136): r0 = syz_open_dev$hidraw(&(0x7f0000000000), 0xb1, 0x82000) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000040)={0x2, 0x7fffffff, @status={[0x3, 0x2, 0xb6, 0xffffffff7fffffff, 0xfffffffffffffffa, 0xc]}, [0xe9d, 0x8000000000000001, 0x9, 0xffffffffffffffff, 0x4, 0x42f0, 0x0, 0x100000001, 0x7, 0x8, 0x5, 0x8, 0x6, 0x234c8426, 0x9, 0x2, 0x9, 0x6, 0x10, 0x4, 0x4, 0xe7d, 0x7, 0xad27, 0x1, 0xf, 0x4, 0x8001, 0x2, 0x80000000, 0x2, 0x6, 0x25dc, 0xe6, 0x5, 0x7f, 0x7fffffffffffffff, 0x3b, 0x1, 0x800000, 0x8, 0x0, 0x3, 0x8000000000000000, 0x5, 0xfffffffffffffffe, 0xa53f, 0x1, 0x7fff, 0x3ff, 0x1, 0x7fffffff, 0xffffffff, 0xfffffffffffffffb, 0x240000, 0x346a, 0x7, 0x99a2, 0x4, 0x1, 0x9f, 0x200, 0x4, 0x17]}) r1 = openat$full(0xffffff9c, &(0x7f0000000ac0), 0x690000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a80), r1) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000b00)) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b40)=""/243) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000c40), &(0x7f0000000c80)=ANY=[@ANYBLOB="00fbe5040f945b8e6bbd35678277d3d685c54433e136fc0711b9f2b59dd6c8b5a1e8d0c3146bcfcac73b7f30c9ed80af71984d26d3e87cdb1550c2e96513de9668dda93eb906fcb4330a291f5553e8d0dcfdcbc42ec253ae34375052237f6dc04741816772c2e0c420672b8ce0241b16b5bc1254913ab9f2d788a7048099e8f9f83e2e4cbfe1505b51c206510d366d2dadad6c21e6a7569f166664dddc1ab4c4e19a4aa96fceca45b63bc4f992963993cb0053ce3a5fa9a971eead5061bfe4be93e576b30932a672e30ed1732b2f87dbf7bd14400352fb10781471108863a9d045303700ed"], 0xe5, 0x1) sendmsg$NFT_BATCH(r1, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x8}}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xa}}}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x44000) r2 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000e80), 0x410803, 0x0) io_uring_register$IORING_REGISTER_CLONE_BUFFERS(r1, 0x1e, &(0x7f0000000ec0)={r2}, 0x1) r3 = openat$iommufd(0xffffff9c, &(0x7f0000000f00), 0x240000, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000f40), &(0x7f0000000f80)={'L-', 0x9}, 0x16, 0x2) r4 = ioctl$USERFAULTFD_IOC_NEW(r1, 0xaa00) fsetxattr$security_capability(r4, &(0x7f0000000fc0), &(0x7f0000001000)=@v2={0x2000000, [{0x2, 0xe}, {0x0, 0xffffffff}]}, 0x14, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000001040)=@gcm_128={{0x304}, "d8fa9819c245c901", "ee5bb1238a5df1b81d6e76b3720f3169", "f2c83bb2", "69ea1c6b272088a3"}, 0x28) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000010c0), r0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000011c0)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001180)={&(0x7f0000001100)={0x64, r5, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x80000001}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x150}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x40}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x400}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x40080) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r3, 0xf503, 0x0) times(&(0x7f0000001200)) ioctl$BTRFS_IOC_DEFRAG_RANGE(r4, 0x40309410, &(0x7f0000001240)={0x8, 0x1, 0x2, 0x5, 0x3, [0xfffffffe, 0x9, 0x0, 0x6]}) r6 = io_uring_setup(0x6db2, &(0x7f0000001280)={0x0, 0x3c8f, 0x20, 0x3, 0x331, 0x0, r2}) fsetxattr$security_capability(r2, &(0x7f0000001300), &(0x7f0000001340)=@v2={0x2000000, [{0x5}, {0x100, 0x3}]}, 0x14, 0x1) ioctl$UFFDIO_POISON(r1, 0xc020aa08, &(0x7f0000001380)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) syz_genetlink_get_family_id$ipvs(&(0x7f00000013c0), r1) write$tun(r1, &(0x7f0000001400)={@void, @val={0x2, 0xe2a5b34e87081edb, 0x10, 0x7, 0x101, 0xfff1}, @eth={@broadcast, @local, @val={@void, {0x8100, 0x2, 0x0, 0x3}}, {@ipv4={0x800, @gre={{0x35, 0x4, 0x2, 0x3, 0x2ba, 0x66, 0x0, 0x2, 0x2f, 0x0, @private=0xa010100, @remote, {[@end, @ssrr={0x89, 0xb, 0xf0, [@broadcast, @multicast1]}, @rr={0x7, 0x17, 0x93, [@dev={0xac, 0x14, 0x14, 0x18}, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1, @remote]}, @end, @ssrr={0x89, 0x1f, 0x1c, [@loopback, @empty, @broadcast, @private=0xa010102, @private=0xa010102, @private=0xa010102, @remote]}, @rr={0x7, 0x23, 0xc6, [@broadcast, @private=0xa010102, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1c}]}, @timestamp_prespec={0x44, 0x24, 0x37, 0x3, 0x1, [{@rand_addr=0x64010102, 0x7}, {@loopback, 0x9}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x2}, {@private=0xa010102, 0x7f}]}, @timestamp_prespec={0x44, 0x1c, 0xb6, 0x3, 0x7, [{@multicast1, 0x100}, {@multicast1, 0x2b}, {@private=0xa010102}]}, @lsrr={0x83, 0x13, 0x8e, [@remote, @broadcast, @dev={0xac, 0x14, 0x14, 0x13}, @loopback]}, @ra={0x94, 0x4, 0x1}]}}, {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x56, 0x0, [0x98c], "a0a425ab80b82dbf6dd3917d972bbbf0772d3f1e8997da5b705c253c809d9ccbad22aa753133eac90b0959c74d709d8a8fd9c43acae185adcc5e738c14ea7934db6b88123acc58216bdfb95970f69392fb02962f4751"}, {0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, [0x4], "f42ad65f4b94ba3072fd644acaf578b59d9106168c35bda840b8b77a33435e8909e7967acf2c942ad1947bda7974bb430751e4450fdcdef7d2b4e4cc9377016ea78cb373cdfa9701b90c8f4c98793c1950135f590f0b615e39ffccfa"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [], "d99ba319d531562a0952c4d06d8222efcc0c19eac10fe581dc3faec49146b3a049c075969de8ff1e2266bd2912692b6d54ef8f88642226cbb063af2b651e482fa537011b6f94935ed789d28418cac9e9830e16de890fd3b16134c4388976f3999228d270cbeaa975e66454b872936a04c21a06b2901ee0364c533b2f9719243304298d0bf7ecd653b554a2f2a187485417eb3f3b63c6a2f05f498839c40a3e2065eb62c92649785c37f59c38bbb32f0475401950bab895f67c57b210b5acabffe688e7c798b5e410b9f74756"}, {0x8, 0x88be, 0x3, {{0x0, 0x1, 0x9, 0x3, 0x1, 0x2, 0x1, 0x4}, 0x1, {0x7}}}, {0x8, 0x22eb, 0x1, {{0x8, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3b}, 0x2, {0x45, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1}}}, {0x8, 0x6558, 0x2, "9dd3ca1c437f369674587633520963dfde9ddfbd516414e296fe1187adbc5a3f"}}}}}}}, 0x2d6) syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), r2) close_range(r6, r1, 0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001740)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x5}) io_uring_register$IORING_REGISTER_CLOCK(r1, 0x1d, &(0x7f0000001780)={0x8}, 0x0) 2.459710953s ago: executing program 0 (id=10137): r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) (async) r2 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x657, 0xfeffffff) fchmod(r4, 0x0) (async, rerun: 32) prctl$PR_GET_IO_FLUSHER(0x3a) (async, rerun: 32) r5 = timerfd_create(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x5451, 0x0) 2.307424034s ago: executing program 0 (id=10138): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000) close_range(r0, 0xffffffffffffffff, 0x0) 2.039469315s ago: executing program 1 (id=10140): r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001dc0)={0x0}, 0x1, 0x0, 0x0, 0x4001}, 0x2000c091) (fail_nth: 1) 1.96870452s ago: executing program 1 (id=10141): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/keys\x00', 0x0, 0x0) close(r0) r1 = openat$hwrng(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x5450, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) creat(&(0x7f0000000000)='./file0\x00', 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0xc0bc5310, &(0x7f0000000040)={0x108, @time={0xbc, 0x7}, 0x4, {0x6d, 0x6}, 0x86, 0x0, 0x7}) r3 = openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x8919, &(0x7f0000000040)={'veth1_to_team\x00', @ifru_data=0x0}) close(r3) socket$key(0xf, 0x3, 0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x5450) ioctl$TIOCGWINSZ(r3, 0x5413, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f00000000c0)) 1.885281216s ago: executing program 1 (id=10142): socket$kcm(0x29, 0x5, 0x0) r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_SET_CONFIG(r0, 0x4008af74, &(0x7f0000000040)={0xabc7, 0xd3, "3bab0020117d2ddcefac8dee161729e6ac27e768b5881af35f65265470aa6d82b30221e90759df9a6e6512ffc2968288c7bf7c11547c5b663c5d2c75ee3cfaf89c736101496b01195aaefc47ab2ea427354603294098e7feb313f16f65ea6622fa62eccc403a6c7b0986ccf813f822b071531809d0337a61963759be3721f7651c4850ee14a095d3304211edc9b7d45f512841ea2f01a5767eb07da57e920c6b86c1a8e2d53139ecfe45bc31e8a603c48ff04a81cb946ac4c6f8ba54e0cd654e1e3468daf84525f35afa6c174bce264e4c470f"}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r3, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) write$binfmt_format(r6, 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r5, 0xc01064c7, &(0x7f0000000100)={0x0, 0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r5}, 0x10) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001dc0)={0x0}, 0x1, 0x0, 0x0, 0x4001}, 0x2000c091) 1.819106572s ago: executing program 1 (id=10143): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x2400c010}, 0x0) getsockname$packet(r0, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000180)={0xa, 0x4e22, 0x80, @private2}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000240)="610dcdb15683ad621215c2d872a05f2e5844aae0215f5458de823507bbe04191a7fa4d782d422e3f67fe65a32e6f6ec61761ceafa99bb7f18e88dd8ecdaf7126c7801f6e92023c34a5a12a329df5357f501edd79062785b7e165d4c7ba56500b19570c2c9770d4a01f01", 0x6a}, {&(0x7f00000002c0)="b6186e494d2b70e4386e137124977af367d96784377c9eddee5207c1d0dd0f73f316b56c0b13fc6493574b31d1379491853a7917eae76411226b04b1d9031e6e04251bcb3138d0d410b3e5f7ece1c7505ebb934f24bedb5b65bbc0cace115f354dac6e3a1d9eb73d9a9cae0090406e855aa1ba04763e953344dbb2d6505d1f5f39aed84f78415de22ea860638c8be160b3fa21521a5a31c998a3ee", 0x9b}, {&(0x7f0000000380)="60408ba65814a6acfce8", 0xa}, {&(0x7f0000000480)="3d72575c8a52d5", 0x7}, {&(0x7f00000004c0)="40d08478cf203d8789f625cb896d29afbb43fac07e0a3cdb24e2e09aac7606fd38d31ec1af6c19d06535ccf43a554d1ab5c9115e1360772d5646e26dcaa6b573ca7213844717d7f86a2ca60f055dc755ef49d695e0caae8f37f42e5e43519fe24858b779be86897d37623d5fb2f12c5166a8624860", 0x75}, {&(0x7f0000000540)="56b21d798610142e0d07395b9c4a29a3ce544fbac4a0d207cf1a2ccdde8096a0f7a49b2885c4650643e8480bfb8ff8dfbdcc786495887f9de49cb54516a29bb05474bafef5c981531292a9b4604b9bed6688118c52908fa0a431ef9e8e43297cbdfe9f617be246309714a18bd4601ae55a55455cbb55a57013914862386d592190f6d10c05714f", 0x87}], 0x6}}, {{&(0x7f0000000640)={0xa, 0x4e23, 0xfffff549, @mcast2, 0x2}, 0x1c, &(0x7f0000000900)=[{&(0x7f00000006c0)="45b669f2a5ff7b7eb0b656b11bcce19e71782eef99a59de2258cd330388d5e5f9b621acc0b4cbfc126763905c9e7419c23ea6053ebd167dc269a0c00260de8a0ac5714ce1c8b05d447c8133365649d255ab26e92f1f36f6b4d0f660b0512af8679714bbff9ab9e7c06f91abaf4a853f8d72ff1a7142fbe137daffe6b89aaa0c5ddf7de33678a016dfe82be9d935bb396ce1290772821b71e6db39059b03352cc1abffc3bc18a084dd87279bfc768d1b361d59550772500ff921dd282f80d4c05", 0xc0}, {&(0x7f0000000780)="04b6545aa33f1d2c9b2c03c57d47137f016c255571cc4cfcadaab401ef0a7a644c6ef70422033c6a81c5447e7a408fedb09f43baf4790ae3216dc9fb32143e978b964eb46cf4762bcaba420eee0fbdf8c6d5d4a7dce23d423711cec702f18bd360b932488be5ae963370c333b774410f16b4f29ac6ff", 0x76}, {&(0x7f0000000800)="901bbc6dab982a30d864a08719ad230325f29655ca5c1358c8dd0a101023edf6130010132c58eb41b0b3a3dc851d749cd8f94d04d3942714d158bffff3334f609c6173f9ae4afa64ba9877d6eb761a2b1298affd8c33e7280afc6acb1b8eb9b3cbf19f0436b15ae82fa2e03ea8eaebf39710e643f86b26a59d09eb603d60c92bdd41efe2c88fe39c89d3c24b2935ec27d2b2d1ecd771", 0x96}, {&(0x7f00000008c0)="8433da3ae015d136558989e24d57674a7720e469ab0ac8250f49896fa85e0001b40da6beb390df3cc43948fb94a27f5953", 0x31}], 0x4, &(0x7f00000009c0)=[@hoplimit_2292={{0x10, 0x29, 0x8, 0x82a7}}, @hoplimit_2292={{0x10, 0x29, 0x8, 0x7fffffff}}, @hoplimit={{0x10, 0x29, 0x34, 0x8000}}, @dontfrag={{0x10, 0x29, 0x3e, 0x9}}, @rthdr={{0x74, 0x29, 0x39, {0x32, 0xc, 0x2, 0x7, 0x0, [@empty, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @pktinfo={{0x20, 0x29, 0x32, {@private1, r1}}}, @flowinfo={{0x10, 0x29, 0xb, 0x10001}}], 0xe4}}], 0x2, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x200048c0}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="00042bbd7000fdfbdf2513000000"], 0x14}, 0x1, 0x0, 0x0, 0x48}, 0x20000000) close(0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) timer_create(0x0, &(0x7f0000000100)={0x0, 0x11}, &(0x7f0000000000)) r3 = socket(0x29, 0x2, 0x0) read$dsp(r3, &(0x7f00000003c0)=""/179, 0xb3) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) timer_create(0x1, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000040)) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='cpu.pressure\x00', 0xe0, 0x0) ioctl$EXT4_IOC_GETFSUUID(r5, 0x5451, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 110.049972ms ago: executing program 1 (id=10144): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002300)={0x0, 0x33fe0}, 0x1, 0x0, 0x0, 0x4091}, 0x20000010) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) close_range(r0, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000100)={0xa, 0xfffd, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "bb28ced7b820ec2d", "ca08bd91171e6405c84cdc6e52f57229", "f5ce6f37", "fe017c9f4e95f742"}, 0x28) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) 0s ago: executing program 1 (id=10145): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x6480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x5, 0x1, 0x401, 0x0, 0x0, {0x2, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x40081}, 0x4810) r2 = openat$comedi(0xffffff9c, &(0x7f0000000440)='/dev/comedi0\x00', 0x101001, 0x0) ioctl$COMEDI_DEVCONFIG(r2, 0x40946400, &(0x7f00000002c0)={'8255\x00', [0x3, 0xfdfffffd, 0x3, 0x5, 0x2f, 0xa, 0x7, 0x5, 0xffe, 0x1, 0x0, 0x8500, 0x1003, 0xf, 0xffff, 0xffff, 0xffffffa8, 0x7ffffffd, 0x3ff, 0x1, 0x10, 0x0, 0xf, 0x5, 0x746f, 0x7, 0x5, 0x3, 0x0, 0xfffffffe, 0x8049]}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x401, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x270080, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) close(r5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x22, 0x0, &(0x7f0000000040)) close(r4) socket(0x200000000000011, 0x2, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0xc040) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x44080) kernel console output (not intermixed with test programs): =1400 audit(134223785.275:101864): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6057.479918][ T29] audit: type=1400 audit(134223785.405:101865): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6057.482813][ T29] audit: type=1400 audit(134223785.405:101866): avc: denied { read write open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6057.485873][ T29] audit: type=1400 audit(134223785.405:101867): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6057.581811][ T29] audit: type=1400 audit(134223785.505:101868): avc: denied { read write } for pid=10217 comm="syz.1.9789" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6057.585729][ T29] audit: type=1400 audit(134223785.505:101869): avc: denied { open } for pid=10217 comm="syz.1.9789" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6057.588010][T10218] fuse: Invalid rootmode [ 6057.591490][ T29] audit: type=1400 audit(134223785.515:101870): avc: denied { mounton } for pid=10217 comm="syz.1.9789" path="/94/file0" dev="tmpfs" ino=496 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6057.637177][ T29] audit: type=1400 audit(134223785.565:101871): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6060.444489][T10230] fuse: Invalid rootmode [ 6062.039072][T10242] fuse: Bad value for 'rootmode' [ 6063.373081][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 6063.373446][ T29] audit: type=1400 audit(134223791.295:101942): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6063.373712][ T29] audit: type=1400 audit(134223791.295:101943): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6063.373900][ T29] audit: type=1400 audit(134223791.295:101944): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6063.487389][ T29] audit: type=1400 audit(134223791.415:101945): avc: denied { read append } for pid=10246 comm="syz.1.9801" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6063.490229][ T29] audit: type=1400 audit(134223791.415:101946): avc: denied { open } for pid=10246 comm="syz.1.9801" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6063.526387][ T29] audit: type=1400 audit(134223791.455:101947): avc: denied { write } for pid=10243 comm="syz.0.9800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6063.560944][ T29] audit: type=1400 audit(134223791.485:101949): avc: denied { write } for pid=10243 comm="syz.0.9800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6063.561254][ T29] audit: type=1400 audit(134223791.475:101948): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6063.565023][ T29] audit: type=1400 audit(134223791.495:101950): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6063.567043][ T29] audit: type=1400 audit(134223791.495:101951): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6066.231810][T10255] fuse: Bad value for 'rootmode' [ 6068.405277][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 6068.408172][ T29] audit: type=1400 audit(134223796.335:101981): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6068.409813][ T29] audit: type=1400 audit(134223796.335:101982): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6068.419179][ T29] audit: type=1400 audit(134223796.345:101983): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6068.486320][ T29] audit: type=1400 audit(134223796.415:101984): avc: denied { create } for pid=10263 comm="syz.0.9807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6068.491354][ T29] audit: type=1400 audit(134223796.415:101985): avc: denied { write } for pid=10263 comm="syz.0.9807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6068.508866][ T29] audit: type=1400 audit(134223796.435:101986): avc: denied { write } for pid=10263 comm="syz.0.9807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6068.869850][ T29] audit: type=1400 audit(134223796.795:101987): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6068.870383][ T29] audit: type=1400 audit(134223796.795:101988): avc: denied { read write open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6068.875146][ T29] audit: type=1400 audit(134223796.805:101989): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6068.932172][ T29] audit: type=1400 audit(134223796.855:101990): avc: denied { create } for pid=10265 comm="syz.1.9808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6071.103773][T10270] fuse: Bad value for 'rootmode' [ 6073.747983][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 6073.750340][ T29] audit: type=1400 audit(134223801.675:102027): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.753953][ T29] audit: type=1400 audit(134223801.675:102028): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.755955][ T29] audit: type=1400 audit(134223801.675:102029): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.832328][ T29] audit: type=1400 audit(134223801.755:102030): avc: denied { read } for pid=10279 comm="syz.0.9813" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.834202][ T29] audit: type=1400 audit(134223801.755:102031): avc: denied { open } for pid=10279 comm="syz.0.9813" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.837793][ T29] audit: type=1400 audit(134223801.765:102032): avc: denied { ioctl } for pid=10279 comm="syz.0.9813" path="/dev/nullb0" dev="devtmpfs" ino=654 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.845959][ T29] audit: type=1400 audit(134223801.775:102033): avc: denied { setattr } for pid=10279 comm="syz.0.9813" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6073.848656][ T29] audit: type=1400 audit(134223801.775:102034): avc: denied { read } for pid=10279 comm="syz.0.9813" name="card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6073.851902][ T29] audit: type=1400 audit(134223801.775:102035): avc: denied { open } for pid=10279 comm="syz.0.9813" path="/dev/dri/card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6073.857942][ T29] audit: type=1400 audit(134223801.785:102036): avc: denied { ioctl } for pid=10279 comm="syz.0.9813" path="/dev/dri/card0" dev="devtmpfs" ino=614 ioctlcmd=0x64cc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6074.276557][T10287] fuse: Unknown parameter 'use00000000000000000000' [ 6079.370786][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 6079.377050][ T29] audit: type=1400 audit(134223807.295:102083): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.379249][ T29] audit: type=1400 audit(134223807.295:102084): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.383247][ T29] audit: type=1400 audit(134223807.295:102085): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.434994][ T29] audit: type=1400 audit(134223807.365:102086): avc: denied { read } for pid=10302 comm="syz.0.9820" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.438189][ T29] audit: type=1400 audit(134223807.365:102087): avc: denied { open } for pid=10302 comm="syz.0.9820" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.445411][ T29] audit: type=1400 audit(134223807.375:102088): avc: denied { ioctl } for pid=10302 comm="syz.0.9820" path="/dev/nullb0" dev="devtmpfs" ino=654 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.451214][ T29] audit: type=1400 audit(134223807.375:102089): avc: denied { setattr } for pid=10302 comm="syz.0.9820" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6079.456354][ T29] audit: type=1400 audit(134223807.385:102090): avc: denied { read } for pid=10302 comm="syz.0.9820" name="card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6079.456814][ T29] audit: type=1400 audit(134223807.385:102091): avc: denied { open } for pid=10302 comm="syz.0.9820" path="/dev/dri/card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6079.465825][ T29] audit: type=1400 audit(134223807.395:102092): avc: denied { ioctl } for pid=10302 comm="syz.0.9820" path="/dev/dri/card0" dev="devtmpfs" ino=614 ioctlcmd=0x64cc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6079.710237][T10308] fuse: Unknown parameter 'use00000000000000000000' [ 6082.627479][T10320] fuse: Unknown parameter 'use00000000000000000000' [ 6084.971608][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 6084.972416][ T29] audit: type=1400 audit(134223812.895:102148): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6084.973766][ T29] audit: type=1400 audit(134223812.895:102149): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6084.973865][ T29] audit: type=1400 audit(134223812.895:102150): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6085.055856][ T29] audit: type=1400 audit(134223812.985:102151): avc: denied { create } for pid=10328 comm="syz.1.9829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6085.062263][ T29] audit: type=1400 audit(134223812.985:102152): avc: denied { write } for pid=10328 comm="syz.1.9829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6085.080601][ T29] audit: type=1400 audit(134223813.005:102153): avc: denied { write } for pid=10328 comm="syz.1.9829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6085.589609][ T29] audit: type=1400 audit(134223813.515:102154): avc: denied { create } for pid=10328 comm="syz.1.9829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6085.890529][ T29] audit: type=1400 audit(134223813.815:102155): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6085.892450][ T29] audit: type=1400 audit(134223813.815:102156): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6085.892548][ T29] audit: type=1400 audit(134223813.815:102157): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6087.926732][T10338] FAULT_INJECTION: forcing a failure. [ 6087.926732][T10338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6087.927155][T10338] CPU: 1 UID: 0 PID: 10338 Comm: syz.1.9832 Not tainted syzkaller #0 PREEMPT [ 6087.927237][T10338] Hardware name: ARM-Versatile Express [ 6087.927260][T10338] Call trace: [ 6087.927301][T10338] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6087.927404][T10338] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 6087.927421][T10338] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6087.927469][T10338] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6087.927519][T10338] r5:84e2d400 r4:8294f590 [ 6087.927566][T10338] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6087.927626][T10338] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6087.927681][T10338] r8:76f7ff30 r7:00000000 r6:00000000 r5:ea7edf68 r4:00000002 [ 6087.927697][T10338] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6087.927734][T10338] [<80986ef4>] (should_fail_usercopy) from [<8059a064>] (simple_read_from_buffer+0x80/0x13c) [ 6087.927782][T10338] [<80599fe4>] (simple_read_from_buffer) from [<8061618c>] (proc_fail_nth_read+0xb8/0x108) [ 6087.927901][T10338] r10:00000001 r9:806160d4 r8:00000002 r7:ea7edf68 r6:0000000f r5:76f7ff30 [ 6087.927945][T10338] r4:84e2d400 r3:ea7ede9f [ 6087.928022][T10338] [<806160d4>] (proc_fail_nth_read) from [<8055f014>] (vfs_read+0x98/0x324) [ 6087.928154][T10338] r8:76f7ff30 r7:ea7edf68 r6:84e2d400 r5:0000000f r4:848ce180 [ 6087.928550][T10338] [<8055ef7c>] (vfs_read) from [<8055fd24>] (ksys_read+0x74/0xe8) [ 6087.929067][T10338] r10:00000003 r9:84e2d400 r8:8020029c r7:00000000 r6:00000000 r5:848ce180 [ 6087.929416][T10338] r4:848ce183 [ 6087.929880][T10338] [<8055fcb0>] (ksys_read) from [<8055fda8>] (sys_read+0x10/0x14) [ 6087.929992][T10338] r7:00000003 r6:00000005 r5:76f7ff30 r4:0000000f [ 6087.930011][T10338] [<8055fd98>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6087.930059][T10338] Exception stack(0xea7edfa8 to 0xea7edff0) [ 6087.930096][T10338] dfa0: 0000000f 76f7ff30 00000005 76f7ff30 0000000f 00000000 [ 6087.930129][T10338] dfc0: 0000000f 76f7ff30 00000005 00000003 00300000 00000000 00006364 76f800bc [ 6087.930152][T10338] dfe0: 00000158 76f7fed0 000d81d0 001303dc [ 6091.090611][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 6091.094667][ T29] audit: type=1400 audit(134223819.015:102205): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6091.095159][ T29] audit: type=1400 audit(134223819.015:102206): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6091.095392][ T29] audit: type=1400 audit(134223819.015:102207): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6091.180726][ T29] audit: type=1400 audit(134223819.105:102208): avc: denied { read } for pid=10348 comm="syz.0.9836" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6091.187198][ T29] audit: type=1400 audit(134223819.105:102209): avc: denied { open } for pid=10348 comm="syz.0.9836" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6091.195790][ T29] audit: type=1400 audit(134223819.115:102210): avc: denied { ioctl } for pid=10348 comm="syz.0.9836" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6091.196351][ T29] audit: type=1400 audit(134223819.115:102211): avc: denied { create } for pid=10348 comm="syz.0.9836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6091.197052][ T29] audit: type=1400 audit(134223819.125:102212): avc: denied { ioctl } for pid=10348 comm="syz.0.9836" path="socket:[113670]" dev="sockfs" ino=113670 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6091.203994][ T29] audit: type=1400 audit(134223819.125:102213): avc: denied { setattr } for pid=10348 comm="syz.0.9836" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6091.227698][ T29] audit: type=1400 audit(134223819.155:102214): avc: denied { create } for pid=10348 comm="syz.0.9836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6096.623970][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 6096.624385][ T29] audit: type=1400 audit(134223824.545:102265): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6096.624631][ T29] audit: type=1400 audit(134223824.545:102266): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6096.624821][ T29] audit: type=1400 audit(134223824.545:102267): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6096.650069][ T29] audit: type=1400 audit(134223824.575:102268): avc: denied { write } for pid=10364 comm="syz.1.9842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6096.734301][ T29] audit: type=1400 audit(134223824.665:102269): avc: denied { read write } for pid=10368 comm="syz.0.9843" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6096.737161][ T29] audit: type=1400 audit(134223824.665:102270): avc: denied { open } for pid=10368 comm="syz.0.9843" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6096.756600][ T29] audit: type=1400 audit(134223824.685:102271): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6096.760479][ T29] audit: type=1400 audit(134223824.685:102272): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6096.763897][ T29] audit: type=1400 audit(134223824.695:102273): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6096.777619][ T29] audit: type=1400 audit(134223824.705:102274): avc: denied { write } for pid=10364 comm="syz.1.9842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6102.295575][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 6102.299930][ T29] audit: type=1400 audit(134223830.225:102318): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6102.300286][ T29] audit: type=1400 audit(134223830.225:102319): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6102.300442][ T29] audit: type=1400 audit(134223830.225:102320): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6102.356238][ T29] audit: type=1400 audit(134223830.285:102321): avc: denied { read } for pid=10392 comm="syz.1.9853" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6102.356603][ T29] audit: type=1400 audit(134223830.285:102322): avc: denied { open } for pid=10392 comm="syz.1.9853" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6102.359458][ T29] audit: type=1400 audit(134223830.285:102323): avc: denied { create } for pid=10392 comm="syz.1.9853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6102.368360][ T29] audit: type=1400 audit(134223830.295:102324): avc: denied { setattr } for pid=10392 comm="syz.1.9853" name="NETLINK" dev="sockfs" ino=113361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6102.371124][ T29] audit: type=1400 audit(134223830.295:102325): avc: denied { create } for pid=10392 comm="syz.1.9853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6102.373620][ T29] audit: type=1400 audit(134223830.305:102326): avc: denied { setattr } for pid=10392 comm="syz.1.9853" name="L2TP/IPv6" dev="sockfs" ino=113362 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6102.381879][ T29] audit: type=1400 audit(134223830.305:102327): avc: denied { read write } for pid=10392 comm="syz.1.9853" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6107.691913][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 6107.693207][ T29] audit: type=1400 audit(134223835.615:102407): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6107.693500][ T29] audit: type=1400 audit(134223835.615:102408): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6107.693575][ T29] audit: type=1400 audit(134223835.615:102409): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6107.771356][ T29] audit: type=1400 audit(134223835.695:102410): avc: denied { allowed } for pid=10415 comm="syz.0.9860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6107.777996][ T29] audit: type=1400 audit(134223835.705:102411): avc: denied { create } for pid=10415 comm="syz.0.9860" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6107.785059][ T29] audit: type=1400 audit(134223835.715:102412): avc: denied { create } for pid=10415 comm="syz.0.9860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6107.792431][ T29] audit: type=1400 audit(134223835.715:102413): avc: denied { write } for pid=10415 comm="syz.0.9860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6107.841603][ T29] audit: type=1400 audit(134223835.765:102414): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6107.841986][ T29] audit: type=1400 audit(134223835.765:102415): avc: denied { read write open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6107.845103][ T29] audit: type=1400 audit(134223835.765:102416): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6108.339007][T10428] FAULT_INJECTION: forcing a failure. [ 6108.339007][T10428] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6108.340904][T10428] CPU: 0 UID: 0 PID: 10428 Comm: syz.1.9866 Not tainted syzkaller #0 PREEMPT [ 6108.341019][T10428] Hardware name: ARM-Versatile Express [ 6108.341052][T10428] Call trace: [ 6108.341098][T10428] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6108.341209][T10428] r7:eab51e20 r6:00000000 r5:60000013 r4:82252544 [ 6108.341230][T10428] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6108.341284][T10428] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6108.341342][T10428] r5:841bd400 r4:8294f590 [ 6108.341359][T10428] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6108.341422][T10428] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6108.341482][T10428] r8:00000002 r7:eab51e20 r6:200000c0 r5:00000000 r4:eab51f20 [ 6108.341501][T10428] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6108.341549][T10428] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 6108.341606][T10428] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 6108.341668][T10428] r8:00000002 r7:00000000 r6:8511bb80 r5:eab51f20 r4:eab51e64 [ 6108.341690][T10428] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 6108.341757][T10428] r10:00000128 r9:841bd400 r8:871ce6c0 r7:00000002 r6:200000c0 r5:871ce6c1 [ 6108.341782][T10428] r4:00000004 [ 6108.341800][T10428] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 6108.341865][T10428] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 6108.341884][T10428] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6108.341951][T10428] Exception stack(0xeab51fa8 to 0xeab51ff0) [ 6108.341991][T10428] 1fa0: 00000000 00000000 00000004 200000c0 00000002 00000000 [ 6108.342026][T10428] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f800bc [ 6108.342055][T10428] 1fe0: 76f7fec0 76f7feb0 000195a4 00132510 [ 6112.756155][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 6112.756831][ T29] audit: type=1400 audit(134223840.685:102502): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6112.757202][ T29] audit: type=1400 audit(134223840.685:102503): avc: denied { read write open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6112.757304][ T29] audit: type=1400 audit(134223840.685:102504): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6112.840854][ T29] audit: type=1400 audit(134223840.765:102505): avc: denied { create } for pid=10457 comm="syz.1.9878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6112.856208][ T29] audit: type=1400 audit(134223840.785:102506): avc: denied { write } for pid=10457 comm="syz.1.9878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6113.383240][ T29] audit: type=1400 audit(134223841.305:102507): avc: denied { create } for pid=10457 comm="syz.1.9878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6113.387258][ T29] audit: type=1400 audit(134223841.315:102508): avc: denied { connect } for pid=10457 comm="syz.1.9878" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6113.462972][ T29] audit: type=1400 audit(134223841.385:102509): avc: denied { write } for pid=10457 comm="syz.1.9878" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6113.493754][ T29] audit: type=1400 audit(134223841.425:102510): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6113.495831][ T29] audit: type=1400 audit(134223841.425:102511): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6117.843764][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 6117.843963][ T29] audit: type=1400 audit(134223845.775:102586): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6117.849018][ T29] audit: type=1400 audit(134223845.775:102587): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6117.849412][ T29] audit: type=1400 audit(134223845.775:102588): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6117.909606][ T29] audit: type=1400 audit(134223845.835:102589): avc: denied { create } for pid=10488 comm="syz.1.9886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6117.924685][ T29] audit: type=1400 audit(134223845.855:102590): avc: denied { read } for pid=10488 comm="syz.1.9886" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6117.926934][ T29] audit: type=1400 audit(134223845.855:102591): avc: denied { open } for pid=10488 comm="syz.1.9886" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6117.935683][ T29] audit: type=1400 audit(134223845.865:102592): avc: denied { ioctl } for pid=10488 comm="syz.1.9886" path="/dev/input/event0" dev="devtmpfs" ino=702 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6117.945087][ T29] audit: type=1400 audit(134223845.865:102593): avc: denied { write } for pid=10488 comm="syz.1.9886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6117.974665][ T29] audit: type=1400 audit(134223845.905:102594): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6117.976868][ T29] audit: type=1400 audit(134223845.905:102595): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6122.697531][T10521] FAULT_INJECTION: forcing a failure. [ 6122.697531][T10521] name failslab, interval 1, probability 0, space 0, times 0 [ 6122.698082][T10521] CPU: 1 UID: 0 PID: 10521 Comm: syz.1.9895 Not tainted syzkaller #0 PREEMPT [ 6122.698168][T10521] Hardware name: ARM-Versatile Express [ 6122.698196][T10521] Call trace: [ 6122.698279][T10521] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6122.698399][T10521] r7:00000c40 r6:00000000 r5:60000013 r4:82252544 [ 6122.698420][T10521] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6122.698471][T10521] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6122.698523][T10521] r5:84912400 r4:82918810 [ 6122.698538][T10521] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6122.698593][T10521] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 6122.698663][T10521] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 6122.698683][T10521] [<8052ef70>] (should_failslab) from [<8050a4c0>] (__kmalloc_noprof+0x9c/0x568) [ 6122.698738][T10521] [<8050a424>] (__kmalloc_noprof) from [<807d3258>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 6122.698805][T10521] r10:84912400 r9:8339c000 r8:00000000 r7:8506eaa0 r6:848cece8 r5:00001000 [ 6122.698830][T10521] r4:00000000 [ 6122.698846][T10521] [<807d321c>] (tomoyo_realpath_from_path) from [<807cf39c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 6122.698906][T10521] r10:84912400 r9:00000000 r8:848cecc0 r7:00005450 r6:00000004 r5:81cd65c8 [ 6122.698930][T10521] r4:848cece8 r3:826c1240 [ 6122.698947][T10521] [<807cf2d0>] (tomoyo_path_number_perm) from [<807d3c7c>] (tomoyo_file_ioctl+0x1c/0x20) [ 6122.699007][T10521] r9:00000003 r8:848cecc0 r7:00000000 r6:00000000 r5:00005450 r4:848cecc0 [ 6122.699036][T10521] [<807d3c60>] (tomoyo_file_ioctl) from [<80780540>] (security_file_ioctl+0x64/0x1e4) [ 6122.699090][T10521] [<807804dc>] (security_file_ioctl) from [<805787d4>] (sys_ioctl+0x4c/0xba0) [ 6122.699148][T10521] r7:00000000 r6:848cecc1 r5:00000000 r4:00005450 [ 6122.699167][T10521] [<80578788>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6122.699212][T10521] Exception stack(0xeba41fa8 to 0xeba41ff0) [ 6122.699252][T10521] 1fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 6122.699286][T10521] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f800bc [ 6122.699312][T10521] 1fe0: 76f7fec0 76f7feb0 000195a4 00132510 [ 6122.699347][T10521] r10:00000036 r9:84912400 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 6122.699366][T10521] r4:00000000 [ 6122.699827][T10521] ERROR: Out of memory at tomoyo_realpath_from_path. [ 6122.867571][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 6122.868031][ T29] audit: type=1400 audit(134223850.795:102691): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6122.868279][ T29] audit: type=1400 audit(134223850.795:102692): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6122.873528][ T29] audit: type=1400 audit(134223850.795:102693): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6122.957250][ T29] audit: type=1400 audit(134223850.885:102694): avc: denied { read } for pid=10524 comm="syz.1.9897" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6122.959304][ T29] audit: type=1400 audit(134223850.885:102695): avc: denied { read open } for pid=10524 comm="syz.1.9897" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6122.965212][ T29] audit: type=1400 audit(134223850.895:102696): avc: denied { ioctl } for pid=10524 comm="syz.1.9897" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0xaa01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6122.993303][ T29] audit: type=1400 audit(134223850.915:102697): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6122.993730][ T29] audit: type=1400 audit(134223850.925:102698): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6122.996522][ T29] audit: type=1400 audit(134223850.925:102699): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6123.068341][ T29] audit: type=1400 audit(134223850.995:102700): avc: denied { read } for pid=10526 comm="syz.1.9898" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6125.865033][T10548] fuse: Unknown parameter 'fÁô0x000000000000000b' [ 6126.530888][T10555] FAULT_INJECTION: forcing a failure. [ 6126.530888][T10555] name failslab, interval 1, probability 0, space 0, times 0 [ 6126.531335][T10555] CPU: 1 UID: 0 PID: 10555 Comm: syz.0.9908 Not tainted syzkaller #0 PREEMPT [ 6126.531425][T10555] Hardware name: ARM-Versatile Express [ 6126.531452][T10555] Call trace: [ 6126.531499][T10555] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6126.532100][T10555] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 6126.532123][T10555] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6126.532177][T10555] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6126.532235][T10555] r5:84181800 r4:82918810 [ 6126.532253][T10555] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6126.532403][T10555] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 6126.532646][T10555] r8:84181800 r7:00000000 r6:00000dc0 r5:848ce6c0 r4:830a4540 [ 6126.532704][T10555] [<8052ef70>] (should_failslab) from [<8050ec74>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 6126.532777][T10555] [<8050ec28>] (kmem_cache_alloc_noprof) from [<8078f2c8>] (security_file_alloc+0x30/0x1dc) [ 6126.532838][T10555] r10:00000142 r9:832e4000 r8:82805cc0 r7:85b1ca80 r6:00000000 r5:848ce6c0 [ 6126.532855][T10555] r4:848ce6c0 [ 6126.532870][T10555] [<8078f298>] (security_file_alloc) from [<80561150>] (init_file+0x48/0x110) [ 6126.532926][T10555] r5:848ce6c0 r4:848ce6c0 [ 6126.532942][T10555] [<80561108>] (init_file) from [<805618c0>] (alloc_empty_file+0x68/0x13c) [ 6126.533047][T10555] r7:85b1ca80 r6:00000000 r5:848ce6c0 r4:82457898 [ 6126.533069][T10555] [<80561858>] (alloc_empty_file) from [<805741c8>] (path_openat+0x40/0x1150) [ 6126.533124][T10555] r8:ebcb9e58 r7:ebcb9e58 r6:ebcb9f20 r5:84181800 r4:ffffff9c [ 6126.533139][T10555] [<80574188>] (path_openat) from [<80575384>] (do_filp_open+0xac/0x148) [ 6126.533191][T10555] r10:00000142 r9:832e4000 r8:00000001 r7:ebcb9e58 r6:ebcb9f20 r5:84181800 [ 6126.533219][T10555] r4:ffffff9c [ 6126.533236][T10555] [<805752d8>] (do_filp_open) from [<8055bf54>] (do_sys_openat2+0x90/0xe0) [ 6126.533318][T10555] r9:84181800 r8:8020029c r7:ffffff9c r6:ebcb9f58 r5:832e4000 r4:00000005 [ 6126.533384][T10555] [<8055bec4>] (do_sys_openat2) from [<8055c37c>] (sys_openat+0x98/0xd4) [ 6126.533548][T10555] r7:00000142 r6:00000000 r5:76fe2ab0 r4:ffffff9c [ 6126.533621][T10555] [<8055c2e4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6126.533676][T10555] Exception stack(0xebcb9fa8 to 0xebcb9ff0) [ 6126.533715][T10555] 9fa0: 00000000 76fe2ab0 ffffff9c 76fe2ab0 00000000 00000000 [ 6126.533780][T10555] 9fc0: 00000000 76fe2ab0 00000000 00000142 00000000 00000000 00006364 76fe30bc [ 6126.533812][T10555] 9fe0: 81010301 76fe2a68 000d81d0 00130198 [ 6126.533863][T10555] r5:76fe2ab0 r4:00000000 [ 6127.182038][T10559] FAULT_INJECTION: forcing a failure. [ 6127.182038][T10559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6127.186274][T10559] CPU: 0 UID: 0 PID: 10559 Comm: syz.0.9909 Not tainted syzkaller #0 PREEMPT [ 6127.186382][T10559] Hardware name: ARM-Versatile Express [ 6127.186417][T10559] Call trace: [ 6127.186467][T10559] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6127.186577][T10559] r7:b5403587 r6:00000000 r5:60000013 r4:82252544 [ 6127.186627][T10559] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6127.186685][T10559] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6127.186739][T10559] r5:84183c00 r4:8294f590 [ 6127.186758][T10559] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6127.186870][T10559] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6127.187010][T10559] r8:00000000 r7:b5403587 r6:76fe2bb8 r5:00000000 r4:ebde1fb0 [ 6127.187033][T10559] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6127.187085][T10559] [<80986ef4>] (should_fail_usercopy) from [<8022b588>] (restore_sigframe+0x94/0x210) [ 6127.187141][T10559] [<8022b4f4>] (restore_sigframe) from [<8022b7a8>] (sys_rt_sigreturn+0x44/0x74) [ 6127.187199][T10559] r7:000000ad r6:001304b8 r5:76fe2b38 r4:ebde1fb0 [ 6127.187215][T10559] [<8022b764>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6127.187263][T10559] Exception stack(0xebde1fa8 to 0xebde1ff0) [ 6127.187303][T10559] 1fa0: 00000000 00000000 00000169 76fe2b38 76fe2bb8 00000000 [ 6127.187335][T10559] 1fc0: 00000000 00000000 001304b8 000000ad 00300000 00000000 00006364 76fe30bc [ 6127.187363][T10559] 1fe0: 76fe2ec0 76fe2b38 0015aea0 000ef5e8 [ 6127.187386][T10559] r5:00000000 r4:00000000 [ 6128.920602][ T29] kauditd_printk_skb: 88 callbacks suppressed [ 6128.921113][ T29] audit: type=1400 audit(134223856.845:102789): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6128.921358][ T29] audit: type=1400 audit(134223856.845:102790): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6128.921434][ T29] audit: type=1400 audit(134223856.845:102791): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6129.011409][ T29] audit: type=1400 audit(134223856.935:102792): avc: denied { create } for pid=10565 comm="syz.1.9911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6129.050360][ T29] audit: type=1400 audit(134223856.975:102793): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6129.054914][ T29] audit: type=1400 audit(134223856.975:102794): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6129.059326][ T29] audit: type=1400 audit(134223856.975:102795): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6129.125334][ T29] audit: type=1400 audit(134223857.055:102796): avc: denied { read } for pid=10567 comm="syz.1.9912" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6129.125798][ T29] audit: type=1400 audit(134223857.055:102797): avc: denied { open } for pid=10567 comm="syz.1.9912" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6129.130814][ T29] audit: type=1400 audit(134223857.055:102798): avc: denied { ioctl } for pid=10567 comm="syz.1.9912" path="/dev/nullb0" dev="devtmpfs" ino=654 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6135.370061][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 6135.370584][ T29] audit: type=1400 audit(134223863.295:102891): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6135.370969][ T29] audit: type=1400 audit(134223863.295:102892): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6135.375308][ T29] audit: type=1400 audit(134223863.295:102893): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6135.436861][ T29] audit: type=1400 audit(134223863.365:102894): avc: denied { create } for pid=10611 comm="syz.0.9929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6135.448425][ T29] audit: type=1400 audit(134223863.375:102895): avc: denied { write } for pid=10611 comm="syz.0.9929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6135.969735][ T29] audit: type=1400 audit(134223863.895:102896): avc: denied { create } for pid=10611 comm="syz.0.9929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6135.987417][ T29] audit: type=1400 audit(134223863.915:102897): avc: denied { ioctl } for pid=10611 comm="syz.0.9929" path="socket:[114718]" dev="sockfs" ino=114718 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6135.988933][ T29] audit: type=1400 audit(134223863.915:102898): avc: denied { module_request } for pid=10611 comm="syz.0.9929" kmod="netdev-syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6136.081944][ T29] audit: type=1400 audit(134223864.005:102899): avc: denied { sys_module } for pid=10611 comm="syz.0.9929" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6136.082385][ T29] audit: type=1400 audit(134223864.005:102900): avc: denied { module_request } for pid=10611 comm="syz.0.9929" kmod="syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6140.281837][T10640] FAULT_INJECTION: forcing a failure. [ 6140.281837][T10640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6140.283983][T10640] CPU: 1 UID: 0 PID: 10640 Comm: syz.1.9936 Not tainted syzkaller #0 PREEMPT [ 6140.284598][T10640] Hardware name: ARM-Versatile Express [ 6140.284627][T10640] Call trace: [ 6140.284679][T10640] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6140.284815][T10640] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 6140.284842][T10640] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6140.284909][T10640] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6140.284957][T10640] r5:83a90c00 r4:8294f590 [ 6140.284967][T10640] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6140.285006][T10640] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6140.285045][T10640] r8:76f7ff30 r7:00000000 r6:00000000 r5:ec161f68 r4:00000002 [ 6140.285090][T10640] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6140.285143][T10640] [<80986ef4>] (should_fail_usercopy) from [<8059a064>] (simple_read_from_buffer+0x80/0x13c) [ 6140.285194][T10640] [<80599fe4>] (simple_read_from_buffer) from [<8061618c>] (proc_fail_nth_read+0xb8/0x108) [ 6140.285237][T10640] r10:00000001 r9:806160d4 r8:00000002 r7:ec161f68 r6:0000000f r5:76f7ff30 [ 6140.285252][T10640] r4:83a90c00 r3:ec161e9f [ 6140.285262][T10640] [<806160d4>] (proc_fail_nth_read) from [<8055f014>] (vfs_read+0x98/0x324) [ 6140.285345][T10640] r8:76f7ff30 r7:ec161f68 r6:83a90c00 r5:0000000f r4:84e19a80 [ 6140.285356][T10640] [<8055ef7c>] (vfs_read) from [<8055fd24>] (ksys_read+0x74/0xe8) [ 6140.285442][T10640] r10:00000003 r9:83a90c00 r8:8020029c r7:00000000 r6:00000000 r5:84e19a80 [ 6140.285454][T10640] r4:84e19a83 [ 6140.285463][T10640] [<8055fcb0>] (ksys_read) from [<8055fda8>] (sys_read+0x10/0x14) [ 6140.285497][T10640] r7:00000003 r6:00000004 r5:76f7ff30 r4:0000000f [ 6140.285507][T10640] [<8055fd98>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6140.285534][T10640] Exception stack(0xec161fa8 to 0xec161ff0) [ 6140.285571][T10640] 1fa0: 0000000f 76f7ff30 00000004 76f7ff30 0000000f 00000000 [ 6140.285603][T10640] 1fc0: 0000000f 76f7ff30 00000004 00000003 00300000 00000000 00006364 76f800bc [ 6140.285619][T10640] 1fe0: 00000158 76f7fed0 000d81d0 001303dc [ 6140.416781][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 6140.417968][ T29] audit: type=1400 audit(134223868.345:102962): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.419914][ T29] audit: type=1400 audit(134223868.345:102963): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.421600][ T29] audit: type=1400 audit(134223868.345:102964): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.499899][ T29] audit: type=1400 audit(134223868.425:102965): avc: denied { create } for pid=10643 comm="syz.1.9938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6140.504818][ T29] audit: type=1400 audit(134223868.435:102966): avc: denied { write } for pid=10643 comm="syz.1.9938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6140.509387][ T29] audit: type=1400 audit(134223868.435:102967): avc: denied { create } for pid=10643 comm="syz.1.9938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6140.543228][ T29] audit: type=1400 audit(134223868.475:102969): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.553755][ T29] audit: type=1400 audit(134223868.475:102970): avc: denied { read write open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.554122][ T29] audit: type=1400 audit(134223868.475:102971): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6140.554329][ T29] audit: type=1400 audit(134223868.465:102968): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6141.498143][T10651] FAULT_INJECTION: forcing a failure. [ 6141.498143][T10651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6141.498559][T10651] CPU: 1 UID: 0 PID: 10651 Comm: syz.1.9941 Not tainted syzkaller #0 PREEMPT [ 6141.498648][T10651] Hardware name: ARM-Versatile Express [ 6141.498674][T10651] Call trace: [ 6141.498720][T10651] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6141.498954][T10651] r7:76f7fb58 r6:00000000 r5:60000013 r4:82252544 [ 6141.499048][T10651] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6141.499194][T10651] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6141.499256][T10651] r5:83a96c00 r4:8294f590 [ 6141.499338][T10651] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6141.499420][T10651] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6141.499624][T10651] r8:b5003587 r7:76f7fb58 r6:76f7fb38 r5:ec161f58 r4:76f7fb38 [ 6141.499647][T10651] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6141.499732][T10651] [<80986ef4>] (should_fail_usercopy) from [<8026ad70>] (copy_siginfo_to_user+0x1c/0xa4) [ 6141.499841][T10651] [<8026ad54>] (copy_siginfo_to_user) from [<8022bb50>] (do_work_pending+0x378/0x4e8) [ 6141.499955][T10651] r9:fffffe00 r8:b5003587 r7:83a97430 r6:76f7fb38 r5:ec161fb0 r4:83a96c00 [ 6141.500081][T10651] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 6141.500202][T10651] Exception stack(0xec161fb0 to 0xec161ff8) [ 6141.500363][T10651] 1fa0: 00000003 200002c0 00000000 00000000 [ 6141.500497][T10651] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f800bc [ 6141.500583][T10651] 1fe0: 76f7fec0 76f7feb0 000195a4 0013250c 60000010 00000003 [ 6141.500747][T10651] r10:00000128 r9:83a96c00 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 6141.500809][T10651] r4:00000000 [ 6146.550494][ T29] kauditd_printk_skb: 209 callbacks suppressed [ 6146.552115][ T29] audit: type=1400 audit(134223874.475:103181): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6146.555506][ T29] audit: type=1400 audit(134223874.475:103182): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6146.558340][ T29] audit: type=1400 audit(134223874.475:103183): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6146.648170][ T29] audit: type=1400 audit(134223874.575:103184): avc: denied { create } for pid=10717 comm="syz.0.9967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6146.689992][ T29] audit: type=1400 audit(134223874.615:103185): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6146.690574][ T29] audit: type=1400 audit(134223874.615:103186): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6146.690967][ T29] audit: type=1400 audit(134223874.615:103187): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6146.776561][ T29] audit: type=1400 audit(134223874.705:103188): avc: denied { read } for pid=10719 comm="syz.0.9968" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6146.780408][ T29] audit: type=1400 audit(134223874.705:103189): avc: denied { open } for pid=10719 comm="syz.0.9968" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6146.788210][ T29] audit: type=1400 audit(134223874.715:103190): avc: denied { ioctl } for pid=10719 comm="syz.0.9968" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6150.970329][T10766] FAULT_INJECTION: forcing a failure. [ 6150.970329][T10766] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 6150.970951][T10766] CPU: 1 UID: 0 PID: 10766 Comm: syz.0.9982 Not tainted syzkaller #0 PREEMPT [ 6150.971064][T10766] Hardware name: ARM-Versatile Express [ 6150.971118][T10766] Call trace: [ 6150.971165][T10766] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6150.971271][T10766] r7:00000000 r6:00000000 r5:60000113 r4:82252544 [ 6150.971380][T10766] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6150.971520][T10766] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6150.971712][T10766] r5:84186000 r4:82918864 [ 6150.971820][T10766] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6150.971952][T10766] [<80986cb4>] (should_fail_ex) from [<8052f06c>] (should_fail_alloc_page+0x68/0x74) [ 6150.972074][T10766] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:ec4b1de8 [ 6150.972131][T10766] [<8052f004>] (should_fail_alloc_page) from [<804f712c>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 6150.972220][T10766] [<804f7098>] (prepare_alloc_pages.constprop.0) from [<804ff6f4>] (__alloc_frozen_pages_noprof+0xac/0x1104) [ 6150.972370][T10766] r10:ec4b1fb0 r9:00000000 r8:84186000 r7:00000040 r6:00140cca r5:84186000 [ 6150.972461][T10766] r4:00000000 r3:ec4b1de8 [ 6150.972521][T10766] [<804ff648>] (__alloc_frozen_pages_noprof) from [<805007c0>] (__folio_alloc_noprof+0x14/0x6c) [ 6150.972692][T10766] r10:ec4b1fb0 r9:85842a00 r8:00000001 r7:00000040 r6:76fc0e84 r5:84186000 [ 6150.972817][T10766] r4:00001255 [ 6150.972915][T10766] [<805007ac>] (__folio_alloc_noprof) from [<804d09a4>] (handle_mm_fault+0xcec/0x14e0) [ 6150.973066][T10766] r5:84186000 r4:00001255 [ 6150.973101][T10766] [<804cfcb8>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 6150.973185][T10766] r10:00000002 r9:84a363c0 r8:00000255 r7:84186000 r6:00000a07 r5:76fc0e84 [ 6150.973205][T10766] r4:ec4b1fb0 [ 6150.973220][T10766] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 6150.973274][T10766] r10:00006364 r9:00000000 r8:80234128 r7:ec4b1fb0 r6:76fc0e84 r5:00000a07 [ 6150.973294][T10766] r4:8281d0c8 [ 6150.973310][T10766] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 6150.973351][T10766] Exception stack(0xec4b1fb0 to 0xec4b1ff8) [ 6150.973381][T10766] 1fa0: 20000040 00000004 00000000 00000000 [ 6150.973445][T10766] 1fc0: 0001bfcc 20000040 00000000 001892b0 00300000 00000000 00006364 76fc20bc [ 6150.973478][T10766] 1fe0: 00000000 76fc0e80 00019584 0001bfd8 20000010 ffffffff [ 6150.973509][T10766] r8:826b8044 r7:84186000 r6:ffffffff r5:20000010 r4:0001bfd8 [ 6150.981160][T10766] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 6151.614054][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 6151.614506][ T29] audit: type=1400 audit(134223879.545:103299): avc: denied { create } for pid=10768 comm="syz.0.9985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6151.621739][ T29] audit: type=1400 audit(134223879.545:103300): avc: denied { write } for pid=10768 comm="syz.0.9985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6153.210487][ T29] audit: type=1400 audit(134223881.135:103301): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6153.211013][ T29] audit: type=1400 audit(134223881.135:103302): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6153.219142][ T29] audit: type=1400 audit(134223881.135:103303): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6153.289633][ T29] audit: type=1400 audit(134223881.215:103304): avc: denied { read write } for pid=10771 comm="syz.1.9986" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6153.290911][ T29] audit: type=1400 audit(134223881.215:103305): avc: denied { open } for pid=10771 comm="syz.1.9986" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6153.298928][ T29] audit: type=1400 audit(134223881.225:103306): avc: denied { mounton } for pid=10771 comm="syz.1.9986" path="/206/file0" dev="tmpfs" ino=1085 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6153.306565][ T29] audit: type=1400 audit(134223881.235:103307): avc: denied { mount } for pid=10771 comm="syz.1.9986" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6153.327370][ T29] audit: type=1400 audit(134223881.255:103308): avc: denied { unmount } for pid=9238 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6154.765981][T10783] FAULT_INJECTION: forcing a failure. [ 6154.765981][T10783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6154.768507][T10783] CPU: 0 UID: 0 PID: 10783 Comm: syz.0.9990 Not tainted syzkaller #0 PREEMPT [ 6154.768598][T10783] Hardware name: ARM-Versatile Express [ 6154.768634][T10783] Call trace: [ 6154.768682][T10783] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6154.768880][T10783] r7:b5403587 r6:00000000 r5:60000013 r4:82252544 [ 6154.768925][T10783] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6154.768981][T10783] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6154.769034][T10783] r5:83840c00 r4:8294f590 [ 6154.769052][T10783] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6154.769116][T10783] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6154.769180][T10783] r8:00000000 r7:b5403587 r6:76fe2bb8 r5:00000000 r4:ec7a5fb0 [ 6154.769199][T10783] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6154.769247][T10783] [<80986ef4>] (should_fail_usercopy) from [<8022b588>] (restore_sigframe+0x94/0x210) [ 6154.769301][T10783] [<8022b4f4>] (restore_sigframe) from [<8022b7a8>] (sys_rt_sigreturn+0x44/0x74) [ 6154.769359][T10783] r7:000000ad r6:001304b8 r5:76fe2b38 r4:ec7a5fb0 [ 6154.769416][T10783] [<8022b764>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6154.769532][T10783] Exception stack(0xec7a5fa8 to 0xec7a5ff0) [ 6154.769573][T10783] 5fa0: 00000000 00000000 000001c6 76fe2b38 76fe2bb8 00000000 [ 6154.769673][T10783] 5fc0: 00000000 00000000 001304b8 000000ad 00300000 00000000 00006364 76fe30bc [ 6154.769705][T10783] 5fe0: 76fe2ec0 76fe2b38 0015aea0 000ef5e8 [ 6154.769731][T10783] r5:00000000 r4:00000000 [ 6155.833152][T10798] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1537 sclass=netlink_tcpdiag_socket pid=10798 comm=syz.1.9993 [ 6157.062439][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 6157.063329][ T29] audit: type=1400 audit(134223884.985:103378): avc: denied { read } for pid=10800 comm="syz.0.9995" dev="nsfs" ino=4026532693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6157.063634][ T29] audit: type=1400 audit(134223884.985:103379): avc: denied { open } for pid=10800 comm="syz.0.9995" path="net:[4026532693]" dev="nsfs" ino=4026532693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6157.067578][ T29] audit: type=1400 audit(134223884.995:103380): avc: denied { create } for pid=10800 comm="syz.0.9995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6157.087081][ T29] audit: type=1400 audit(134223885.015:103381): avc: denied { module_request } for pid=10800 comm="syz.0.9995" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6157.142385][ T29] audit: type=1400 audit(134223885.065:103382): avc: denied { sys_module } for pid=10800 comm="syz.0.9995" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6157.146716][ T29] audit: type=1400 audit(134223885.065:103383): avc: denied { module_request } for pid=10800 comm="syz.0.9995" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6157.248833][ T29] audit: type=1400 audit(134223885.175:103384): avc: denied { module_request } for pid=10800 comm="syz.0.9995" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6157.338688][ T29] audit: type=1400 audit(134223885.265:103385): avc: denied { sys_module } for pid=10800 comm="syz.0.9995" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6157.341191][ T29] audit: type=1400 audit(134223885.265:103386): avc: denied { module_request } for pid=10800 comm="syz.0.9995" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6157.432437][ T29] audit: type=1400 audit(134223885.355:103387): avc: denied { ioctl } for pid=10800 comm="syz.0.9995" path="socket:[115049]" dev="sockfs" ino=115049 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6162.206987][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 6162.210161][ T29] audit: type=1400 audit(134223890.135:103448): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6162.220705][ T29] audit: type=1400 audit(134223890.135:103449): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6162.231261][ T29] audit: type=1400 audit(134223890.135:103450): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6162.739940][ T29] audit: type=1400 audit(134223890.665:103451): avc: denied { create } for pid=10832 comm="syz.1.10004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6162.776400][ T29] audit: type=1400 audit(134223890.695:103452): avc: denied { getopt } for pid=10832 comm="syz.1.10004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6162.788280][ T29] audit: type=1400 audit(134223890.715:103453): avc: denied { read write } for pid=10832 comm="syz.1.10004" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6162.809550][ T29] audit: type=1400 audit(134223890.735:103454): avc: denied { open } for pid=10832 comm="syz.1.10004" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6162.846076][ T29] audit: type=1400 audit(134223890.765:103455): avc: denied { ioctl } for pid=10832 comm="syz.1.10004" path="/dev/vcsa1" dev="devtmpfs" ino=18 ioctlcmd=0x4501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6162.875636][ T29] audit: type=1400 audit(134223890.805:103456): avc: denied { create } for pid=10832 comm="syz.1.10004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6162.886685][ T29] audit: type=1400 audit(134223890.815:103457): avc: denied { write } for pid=10832 comm="syz.1.10004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6164.977032][T10841] FAULT_INJECTION: forcing a failure. [ 6164.977032][T10841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6164.977692][T10841] CPU: 1 UID: 0 PID: 10841 Comm: syz.0.10007 Not tainted syzkaller #0 PREEMPT [ 6164.977845][T10841] Hardware name: ARM-Versatile Express [ 6164.977920][T10841] Call trace: [ 6164.978118][T10841] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6164.978644][T10841] r7:00006364 r6:00000000 r5:60010013 r4:82252544 [ 6164.978681][T10841] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6164.978756][T10841] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6164.978851][T10841] r5:83843c00 r4:8294f590 [ 6164.978870][T10841] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6164.978972][T10841] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6164.979142][T10841] r8:00000000 r7:00006364 r6:76fe30bc r5:83844430 r4:76fe2bb8 [ 6164.979202][T10841] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6164.979308][T10841] [<80986ef4>] (should_fail_usercopy) from [<8022b414>] (setup_sigframe+0xe4/0x1c4) [ 6164.979377][T10841] [<8022b330>] (setup_sigframe) from [<8022bbc4>] (do_work_pending+0x3ec/0x4e8) [ 6164.979456][T10841] r10:b5403587 r9:76fe2bb8 r8:00000000 r7:83844430 r6:76fe2b38 r5:ec9f1fb0 [ 6164.979482][T10841] r4:83843c00 [ 6164.979502][T10841] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 6164.979589][T10841] Exception stack(0xec9f1fb0 to 0xec9f1ff8) [ 6164.979724][T10841] 1fa0: 00000003 20000280 00000080 00000000 [ 6164.979781][T10841] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe30bc [ 6164.979851][T10841] 1fe0: 76fe2ec0 76fe2eb0 000195a4 0013250c 60000010 00000003 [ 6164.979888][T10841] r10:00000128 r9:83843c00 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 6164.979947][T10841] r4:00000000 [ 6167.273490][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 6167.273859][ T29] audit: type=1400 audit(134223895.195:103514): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6167.274082][ T29] audit: type=1400 audit(134223895.195:103515): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6167.274282][ T29] audit: type=1400 audit(134223895.195:103516): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6167.379107][ T29] audit: type=1400 audit(134223895.305:103517): avc: denied { create } for pid=10856 comm="syz.0.10012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6167.396145][ T29] audit: type=1400 audit(134223895.325:103518): avc: denied { write } for pid=10856 comm="syz.0.10012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6167.417384][ T29] audit: type=1400 audit(134223895.345:103519): avc: denied { read } for pid=10856 comm="syz.0.10012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6167.958529][T10858] FAULT_INJECTION: forcing a failure. [ 6167.958529][T10858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6167.963608][T10858] CPU: 1 UID: 0 PID: 10858 Comm: syz.0.10012 Not tainted syzkaller #0 PREEMPT [ 6167.963689][T10858] Hardware name: ARM-Versatile Express [ 6167.963707][T10858] Call trace: [ 6167.963730][T10858] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6167.963796][T10858] r7:df83de20 r6:00000000 r5:60000013 r4:82252544 [ 6167.963806][T10858] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6167.963834][T10858] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6167.963882][T10858] r5:83a99800 r4:8294f590 [ 6167.963892][T10858] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6167.963928][T10858] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6167.963961][T10858] r8:00000000 r7:df83de20 r6:20000180 r5:00000000 r4:df83df20 [ 6167.963970][T10858] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6167.963993][T10858] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 6167.964030][T10858] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 6167.964063][T10858] r8:00000000 r7:00000000 r6:834bb900 r5:df83df20 r4:df83de64 [ 6167.964072][T10858] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 6167.964108][T10858] r10:00000128 r9:83a99800 r8:848cee40 r7:00000000 r6:20000180 r5:848cee41 [ 6167.964118][T10858] r4:00000004 [ 6167.964127][T10858] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 6167.964162][T10858] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 6167.964170][T10858] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6167.964194][T10858] Exception stack(0xdf83dfa8 to 0xdf83dff0) [ 6167.964214][T10858] dfa0: 00000000 00000000 00000004 20000180 00000000 00000000 [ 6167.964231][T10858] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fc20bc [ 6167.964244][T10858] dfe0: 76fc1ec0 76fc1eb0 000195a4 00132510 [ 6169.059498][ T29] audit: type=1400 audit(134223896.985:103520): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6169.072501][ T29] audit: type=1400 audit(134223896.995:103521): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6169.080455][ T29] audit: type=1400 audit(134223897.005:103522): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6169.529589][ T29] audit: type=1400 audit(134223897.455:103523): avc: denied { read } for pid=10859 comm="syz.1.10013" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.457267][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 6172.458402][ T29] audit: type=1400 audit(134223900.385:103574): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.463431][ T29] audit: type=1400 audit(134223900.385:103575): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.465423][ T29] audit: type=1400 audit(134223900.385:103576): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.568598][ T29] audit: type=1400 audit(134223900.495:103577): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.569646][ T29] audit: type=1400 audit(134223900.495:103578): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.570509][ T29] audit: type=1400 audit(134223900.495:103579): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.653500][ T29] audit: type=1400 audit(134223900.575:103580): avc: denied { create } for pid=10878 comm="syz.1.10021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6172.663354][ T29] audit: type=1400 audit(134223900.585:103581): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.664658][ T29] audit: type=1400 audit(134223900.595:103582): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6172.666738][ T29] audit: type=1400 audit(134223900.595:103583): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6174.621685][T10903] FAULT_INJECTION: forcing a failure. [ 6174.621685][T10903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6174.625360][T10903] CPU: 1 UID: 0 PID: 10903 Comm: syz.0.10030 Not tainted syzkaller #0 PREEMPT [ 6174.625482][T10903] Hardware name: ARM-Versatile Express [ 6174.625505][T10903] Call trace: [ 6174.625545][T10903] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6174.625648][T10903] r7:76fe2b58 r6:00000000 r5:60000013 r4:82252544 [ 6174.625666][T10903] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6174.625780][T10903] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6174.625832][T10903] r5:84b35400 r4:8294f590 [ 6174.625847][T10903] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6174.625901][T10903] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6174.625954][T10903] r8:b5003587 r7:76fe2b58 r6:76fe2b38 r5:e002df58 r4:76fe2b38 [ 6174.625968][T10903] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6174.626005][T10903] [<80986ef4>] (should_fail_usercopy) from [<8026ad70>] (copy_siginfo_to_user+0x1c/0xa4) [ 6174.626059][T10903] [<8026ad54>] (copy_siginfo_to_user) from [<8022bb50>] (do_work_pending+0x378/0x4e8) [ 6174.626119][T10903] r9:fffffe00 r8:b5003587 r7:84b35c30 r6:76fe2b38 r5:e002dfb0 r4:84b35400 [ 6174.626136][T10903] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 6174.626177][T10903] Exception stack(0xe002dfb0 to 0xe002dff8) [ 6174.626210][T10903] dfa0: 00000003 200002c0 04004094 00000000 [ 6174.626239][T10903] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe30bc [ 6174.626266][T10903] dfe0: 76fe2ec0 76fe2eb0 000195a4 0013250c 60000010 00000003 [ 6174.626297][T10903] r10:00000128 r9:84b35400 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 6174.626315][T10903] r4:00000000 [ 6178.467671][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 6178.468063][ T29] audit: type=1400 audit(134223906.395:103724): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6178.468270][ T29] audit: type=1400 audit(134223906.395:103725): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6178.473300][ T29] audit: type=1400 audit(134223906.395:103726): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6178.550397][ T29] audit: type=1400 audit(134223906.475:103727): avc: denied { read } for pid=10935 comm="syz.0.10039" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6178.555206][ T29] audit: type=1400 audit(134223906.485:103728): avc: denied { open } for pid=10935 comm="syz.0.10039" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6178.561678][ T29] audit: type=1400 audit(134223906.485:103729): avc: denied { ioctl } for pid=10935 comm="syz.0.10039" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6178.573905][ T29] audit: type=1400 audit(134223906.505:103730): avc: denied { create } for pid=10935 comm="syz.0.10039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6178.579097][ T29] audit: type=1400 audit(134223906.505:103731): avc: denied { ioctl } for pid=10935 comm="syz.0.10039" path="socket:[114672]" dev="sockfs" ino=114672 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6178.590470][ T29] audit: type=1400 audit(134223906.515:103732): avc: denied { setattr } for pid=10935 comm="syz.0.10039" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6178.614813][ T29] audit: type=1400 audit(134223906.535:103733): avc: denied { create } for pid=10935 comm="syz.0.10039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6179.876348][T10959] FAULT_INJECTION: forcing a failure. [ 6179.876348][T10959] name failslab, interval 1, probability 0, space 0, times 0 [ 6179.876922][T10959] CPU: 1 UID: 0 PID: 10959 Comm: syz.1.10041 Not tainted syzkaller #0 PREEMPT [ 6179.877039][T10959] Hardware name: ARM-Versatile Express [ 6179.877076][T10959] Call trace: [ 6179.877116][T10959] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6179.877212][T10959] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 6179.877253][T10959] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6179.877366][T10959] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6179.877438][T10959] r5:83a9d400 r4:82918810 [ 6179.877542][T10959] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6179.877734][T10959] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 6179.877853][T10959] r8:00000028 r7:00000000 r6:00000dc0 r5:ea225f20 r4:83001240 [ 6179.877913][T10959] [<8052ef70>] (should_failslab) from [<8050f948>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 6179.878017][T10959] [<8050f8fc>] (__kmalloc_cache_noprof) from [<817594c0>] (tcp_sendmsg_fastopen+0x94/0x188) [ 6179.878186][T10959] r10:20000000 r9:ea225f20 r8:ea225e64 r7:ea225ce4 r6:00000000 r5:ea225f20 [ 6179.878213][T10959] r4:85768840 [ 6179.878232][T10959] [<8175942c>] (tcp_sendmsg_fastopen) from [<81759fac>] (tcp_sendmsg_locked+0x9f8/0xfd8) [ 6179.878343][T10959] r8:85768840 r7:00000000 r6:00000000 r5:00000000 r4:00000000 [ 6179.878433][T10959] [<817595b4>] (tcp_sendmsg_locked) from [<8175a5bc>] (tcp_sendmsg+0x30/0x44) [ 6179.878596][T10959] r10:00000000 r9:ea225dc4 r8:ea225dc4 r7:00000000 r6:00000000 r5:ea225f20 [ 6179.878618][T10959] r4:85768840 [ 6179.878656][T10959] [<8175a58c>] (tcp_sendmsg) from [<8183f5e0>] (inet6_sendmsg+0x40/0x4c) [ 6179.878900][T10959] r7:00000000 r6:85768840 r5:00000000 r4:ea225f20 [ 6179.879056][T10959] [<8183f5a0>] (inet6_sendmsg) from [<81556cc4>] (__sock_sendmsg+0x44/0x78) [ 6179.879194][T10959] r7:00000000 r6:8511b900 r5:ea225f20 r4:00000000 [ 6179.879309][T10959] [<81556c80>] (__sock_sendmsg) from [<8155748c>] (____sys_sendmsg+0x298/0x2cc) [ 6179.879386][T10959] r7:00000000 r6:8511b900 r5:20000000 r4:ea225f20 [ 6179.879612][T10959] [<815571f4>] (____sys_sendmsg) from [<81559454>] (___sys_sendmsg+0x9c/0xd0) [ 6179.879701][T10959] r10:ea225e24 r9:20000100 r8:20000000 r7:00000000 r6:8511b900 r5:ea225f20 [ 6179.879982][T10959] r4:00000000 [ 6179.880004][T10959] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 6179.880087][T10959] r10:00000128 r9:83a9d400 r8:84e190c0 r7:20000000 r6:20000100 r5:84e190c1 [ 6179.880608][T10959] r4:00000005 [ 6179.880675][T10959] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 6179.880945][T10959] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 6179.880969][T10959] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6179.881021][T10959] Exception stack(0xea225fa8 to 0xea225ff0) [ 6179.881112][T10959] 5fa0: 00000000 00000000 00000005 20000100 20000000 00000000 [ 6179.881181][T10959] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f5f0bc [ 6179.881276][T10959] 5fe0: 76f5eec0 76f5eeb0 000195a4 00132510 [ 6183.120551][T10990] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10990 comm=syz.1.10046 [ 6183.898922][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 6183.901008][ T29] audit: type=1400 audit(134223911.825:103860): avc: denied { nlmsg_read } for pid=10993 comm="syz.1.10048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 6183.906490][ T29] audit: type=1400 audit(134223911.835:103861): avc: denied { read } for pid=10993 comm="syz.1.10048" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6183.909267][ T29] audit: type=1400 audit(134223911.835:103862): avc: denied { read open } for pid=10993 comm="syz.1.10048" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6183.916070][ T29] audit: type=1400 audit(134223911.845:103863): avc: denied { ioctl } for pid=10993 comm="syz.1.10048" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6183.949761][ T29] audit: type=1400 audit(134223911.875:103864): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6183.953828][ T29] audit: type=1400 audit(134223911.875:103865): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6183.954221][ T29] audit: type=1400 audit(134223911.875:103866): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6183.998369][ T29] audit: type=1400 audit(134223911.925:103867): avc: denied { create } for pid=10999 comm="syz.1.10050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6184.002069][ T29] audit: type=1400 audit(134223911.925:103868): avc: denied { setopt } for pid=10999 comm="syz.1.10050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6184.006132][ T29] audit: type=1400 audit(134223911.935:103869): avc: denied { write } for pid=10999 comm="syz.1.10050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6184.564335][T11005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11005 comm=syz.0.10052 [ 6188.451997][T11060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2583 sclass=netlink_route_socket pid=11060 comm=syz.1.10062 [ 6188.976023][ T29] kauditd_printk_skb: 84 callbacks suppressed [ 6188.976271][ T29] audit: type=1400 audit(134223916.905:103954): avc: denied { create } for pid=11064 comm="syz.0.10065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6188.980208][ T29] audit: type=1400 audit(134223916.905:103955): avc: denied { write } for pid=11064 comm="syz.0.10065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6188.985988][ T29] audit: type=1400 audit(134223916.915:103956): avc: denied { module_request } for pid=11064 comm="syz.0.10065" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6189.066327][ T29] audit: type=1400 audit(134223916.995:103957): avc: denied { read } for pid=11062 comm="syz.1.10064" name="controlC2" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6189.067244][ T29] audit: type=1400 audit(134223916.995:103958): avc: denied { open } for pid=11062 comm="syz.1.10064" path="/dev/snd/controlC2" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6189.095092][ T29] audit: type=1400 audit(134223917.015:103959): avc: denied { read } for pid=11064 comm="syz.0.10065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6189.096899][ T29] audit: type=1400 audit(134223917.025:103960): avc: denied { create } for pid=11064 comm="syz.0.10065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6189.119589][ T29] audit: type=1400 audit(134223917.045:103961): avc: denied { ioctl } for pid=11062 comm="syz.1.10064" path="/dev/snd/controlC2" dev="devtmpfs" ino=747 ioctlcmd=0x5542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6189.119968][ T29] audit: type=1400 audit(134223917.045:103962): avc: denied { read } for pid=11064 comm="syz.0.10065" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6189.120330][ T29] audit: type=1400 audit(134223917.045:103963): avc: denied { open } for pid=11064 comm="syz.0.10065" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6190.781024][T11078] FAULT_INJECTION: forcing a failure. [ 6190.781024][T11078] name failslab, interval 1, probability 0, space 0, times 0 [ 6190.781966][T11078] CPU: 0 UID: 0 PID: 11078 Comm: syz.0.10068 Not tainted syzkaller #0 PREEMPT [ 6190.782041][T11078] Hardware name: ARM-Versatile Express [ 6190.782055][T11078] Call trace: [ 6190.782076][T11078] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6190.782145][T11078] r7:00000820 r6:00000000 r5:60000013 r4:82252544 [ 6190.782154][T11078] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6190.782179][T11078] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6190.782214][T11078] r5:83a90c00 r4:82918810 [ 6190.782222][T11078] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6190.782256][T11078] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 6190.782292][T11078] r8:00000000 r7:00000820 r6:00000017 r5:ea251bc4 r4:83001240 [ 6190.782304][T11078] [<8052ef70>] (should_failslab) from [<8051154c>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 6190.782332][T11078] [<805114ac>] (__kmalloc_node_track_caller_noprof) from [<804a475c>] (kmemdup_noprof+0x28/0x44) [ 6190.782365][T11078] r10:00000000 r9:85a41404 r8:ea251bcc r7:84206000 r6:84eaf398 r5:ea251bc4 [ 6190.782375][T11078] r4:00000017 [ 6190.782382][T11078] [<804a4734>] (kmemdup_noprof) from [<807b1bb0>] (sidtab_sid2str_get+0x54/0xa4) [ 6190.782414][T11078] r7:84206000 r6:ea251bcc r5:ea251bc4 r4:83ab60c0 [ 6190.782421][T11078] [<807b1b5c>] (sidtab_sid2str_get) from [<807b90cc>] (sidtab_entry_to_string+0x34/0x94) [ 6190.782449][T11078] r7:84206000 r6:83ab60c0 r5:ea251bc4 r4:0000005f [ 6190.782457][T11078] [<807b9098>] (sidtab_entry_to_string) from [<807b9244>] (security_sid_to_context_core+0x118/0x17c) [ 6190.782554][T11078] r9:ea251cec r8:84206000 r7:85a41404 r6:ea251bcc r5:ea251bc4 r4:0000005f [ 6190.782565][T11078] [<807b912c>] (security_sid_to_context_core) from [<807bc258>] (security_sid_to_context+0x1c/0x24) [ 6190.782625][T11078] r8:8079c3b4 r7:8079d3b8 r6:83a90c00 r5:84d40b28 r4:ea251c58 [ 6190.782636][T11078] [<807bc23c>] (security_sid_to_context) from [<8079d400>] (avc_audit_post_callback+0x48/0x2f4) [ 6190.782663][T11078] [<8079d3b8>] (avc_audit_post_callback) from [<807c4814>] (common_lsm_audit+0x104/0x148) [ 6190.782695][T11078] r10:00000000 r9:ea251cec r8:8079c3b4 r7:8079d3b8 r6:ea251cec r5:84d40b28 [ 6190.782704][T11078] r4:83a913f0 [ 6190.782711][T11078] [<807c4710>] (common_lsm_audit) from [<8079d8c4>] (slow_avc_audit+0xbc/0x114) [ 6190.782746][T11078] r8:00000028 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 6190.782755][T11078] [<8079d808>] (slow_avc_audit) from [<8079e348>] (avc_has_perm+0xd8/0xe8) [ 6190.782818][T11078] r5:00000000 r4:00000004 [ 6190.782856][T11078] [<8079e270>] (avc_has_perm) from [<807a46a8>] (sock_has_perm+0xd0/0xfc) [ 6190.782887][T11078] r9:ea251dc4 r8:83a90c00 r7:84959dc0 r6:00000004 r5:855cbc00 r4:00000000 [ 6190.782896][T11078] [<807a45d8>] (sock_has_perm) from [<807a475c>] (selinux_socket_sendmsg+0x18/0x1c) [ 6190.782924][T11078] r8:ea251dc4 r7:00000000 r6:00000f0c r5:ea251f20 r4:8511b900 [ 6190.782934][T11078] [<807a4744>] (selinux_socket_sendmsg) from [<80796c90>] (security_socket_sendmsg+0x64/0x1e4) [ 6190.782960][T11078] [<80796c2c>] (security_socket_sendmsg) from [<81556c9c>] (__sock_sendmsg+0x1c/0x78) [ 6190.782993][T11078] r7:00000000 r6:8511b900 r5:ea251f20 r4:ea251f20 [ 6190.783002][T11078] [<81556c80>] (__sock_sendmsg) from [<8155748c>] (____sys_sendmsg+0x298/0x2cc) [ 6190.783029][T11078] r7:00000000 r6:8511b900 r5:000080c4 r4:ea251f20 [ 6190.783037][T11078] [<815571f4>] (____sys_sendmsg) from [<81559454>] (___sys_sendmsg+0x9c/0xd0) [ 6190.783067][T11078] r10:ea251e24 r9:20000100 r8:000080c4 r7:00000000 r6:8511b900 r5:ea251f20 [ 6190.783076][T11078] r4:00000000 [ 6190.783084][T11078] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 6190.783114][T11078] r10:00000128 r9:83a90c00 r8:84e15540 r7:000080c4 r6:20000100 r5:84e15541 [ 6190.783124][T11078] r4:00000003 [ 6190.783132][T11078] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 6190.783166][T11078] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 6190.783174][T11078] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6190.783197][T11078] Exception stack(0xea251fa8 to 0xea251ff0) [ 6190.783215][T11078] 1fa0: 00000000 00000000 00000003 20000100 000080c4 00000000 [ 6190.783230][T11078] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe30bc [ 6190.783243][T11078] 1fe0: 76fe2ec0 76fe2eb0 000195a4 00132510 [ 6194.117603][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 6194.117902][ T29] audit: type=1400 audit(134223922.045:104084): avc: denied { write } for pid=11105 comm="syz.0.10076" name="mouse0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6194.118019][ T29] audit: type=1400 audit(134223922.045:104085): avc: denied { open } for pid=11105 comm="syz.0.10076" path="/dev/input/mouse0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6194.125789][ T29] audit: type=1400 audit(134223922.055:104086): avc: denied { create } for pid=11105 comm="syz.0.10076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6194.128161][ T29] audit: type=1400 audit(134223922.055:104087): avc: denied { write } for pid=11105 comm="syz.0.10076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6194.232090][ T29] audit: type=1400 audit(134223922.155:104088): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6194.232412][ T29] audit: type=1400 audit(134223922.155:104089): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6194.240741][ T29] audit: type=1400 audit(134223922.165:104090): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6194.313617][ T29] audit: type=1400 audit(134223922.235:104091): avc: denied { create } for pid=11113 comm="syz.0.10079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6194.320209][ T29] audit: type=1400 audit(134223922.245:104092): avc: denied { setopt } for pid=11113 comm="syz.0.10079" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6194.326661][ T29] audit: type=1400 audit(134223922.255:104093): avc: denied { getopt } for pid=11113 comm="syz.0.10079" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6198.483353][ T9699] usb 1-1: new high-speed USB device number 71 using dummy_hcd [ 6198.656499][ T9699] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 6198.656883][ T9699] usb 1-1: config 1 has no interface number 0 [ 6198.657097][ T9699] usb 1-1: config 1 interface 7 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 6198.657161][ T9699] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 32 [ 6198.687904][ T9699] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 6198.688254][ T9699] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6198.688314][ T9699] usb 1-1: Product: syz [ 6198.688344][ T9699] usb 1-1: Manufacturer: syz [ 6198.688415][ T9699] usb 1-1: SerialNumber: syz [ 6198.733708][T11136] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 6198.735620][T11136] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 6198.747753][ T9699] usb 1-1: Expected 3 endpoints, found: 2 [ 6199.215607][ T29] kauditd_printk_skb: 88 callbacks suppressed [ 6199.216057][ T29] audit: type=1400 audit(134223927.135:104182): avc: denied { read } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6199.216341][ T29] audit: type=1400 audit(134223927.145:104183): avc: denied { write } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6199.235493][ T29] audit: type=1400 audit(134223927.165:104184): avc: denied { module_request } for pid=11148 comm="syz.1.10087" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6199.330823][ T29] audit: type=1400 audit(134223927.255:104185): avc: denied { read } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6199.336311][ T29] audit: type=1400 audit(134223927.265:104186): avc: denied { write } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6199.346248][ T29] audit: type=1400 audit(134223927.275:104187): avc: denied { read } for pid=11148 comm="syz.1.10087" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6199.351167][ T29] audit: type=1400 audit(134223927.275:104188): avc: denied { open } for pid=11148 comm="syz.1.10087" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6199.351626][ T29] audit: type=1400 audit(134223927.275:104189): avc: denied { create } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6199.362321][ T29] audit: type=1400 audit(134223927.285:104190): avc: denied { write } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6199.366989][ T29] audit: type=1400 audit(134223927.295:104191): avc: denied { create } for pid=11148 comm="syz.1.10087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6199.652788][T11156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=11156 comm=syz.1.10088 [ 6204.263776][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 6204.264006][ T29] audit: type=1400 audit(134223932.195:104261): avc: denied { read } for pid=11170 comm="syz.1.10093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6204.664310][ T29] audit: type=1400 audit(134223932.585:104262): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.673181][ T29] audit: type=1400 audit(134223932.595:104263): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.673548][ T29] audit: type=1400 audit(134223932.595:104264): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.738857][ T29] audit: type=1400 audit(134223932.665:104265): avc: denied { create } for pid=11174 comm="syz.1.10094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6204.745865][ T29] audit: type=1400 audit(134223932.675:104266): avc: denied { write } for pid=11174 comm="syz.1.10094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6204.781840][ T29] audit: type=1400 audit(134223932.705:104267): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.803242][ T29] audit: type=1400 audit(134223932.725:104268): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.803585][ T29] audit: type=1400 audit(134223932.725:104269): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6204.858116][ T29] audit: type=1400 audit(134223932.785:104270): avc: denied { create } for pid=11176 comm="syz.1.10095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6205.404554][T11177] FAULT_INJECTION: forcing a failure. [ 6205.404554][T11177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6205.404955][T11177] CPU: 1 UID: 0 PID: 11177 Comm: syz.1.10095 Not tainted syzkaller #0 PREEMPT [ 6205.405042][T11177] Hardware name: ARM-Versatile Express [ 6205.405072][T11177] Call trace: [ 6205.405117][T11177] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6205.405230][T11177] r7:000000ad r6:00000000 r5:60000013 r4:82252544 [ 6205.405256][T11177] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6205.405313][T11177] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6205.405371][T11177] r5:840b4800 r4:8294f590 [ 6205.405388][T11177] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6205.405447][T11177] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6205.405508][T11177] r8:00000000 r7:000000ad r6:001304b8 r5:76f7fb38 r4:76f7fbc0 [ 6205.405528][T11177] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6205.405572][T11177] [<80986ef4>] (should_fail_usercopy) from [<8026bf94>] (restore_altstack+0x34/0xf8) [ 6205.405627][T11177] [<8026bf60>] (restore_altstack) from [<8022b7c8>] (sys_rt_sigreturn+0x64/0x74) [ 6205.405685][T11177] r5:76f7fb38 r4:ea995fb0 [ 6205.405704][T11177] [<8022b764>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6205.405795][T11177] Exception stack(0xea995fa8 to 0xea995ff0) [ 6205.405875][T11177] 5fa0: 00000000 00000000 00000003 20000480 00000014 00000000 [ 6205.405927][T11177] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f800bc [ 6205.405955][T11177] 5fe0: 76f7fec0 76f7feb0 000195a4 0013250c [ 6205.406006][T11177] r5:00000000 r4:00000000 [ 6209.585613][T11182] FAULT_INJECTION: forcing a failure. [ 6209.585613][T11182] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6209.586085][T11182] CPU: 1 UID: 0 PID: 11182 Comm: syz.1.10097 Not tainted syzkaller #0 PREEMPT [ 6209.586162][T11182] Hardware name: ARM-Versatile Express [ 6209.586187][T11182] Call trace: [ 6209.586230][T11182] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6209.588030][T11182] r7:00000000 r6:00000000 r5:60000013 r4:82252544 [ 6209.588187][T11182] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6209.588364][T11182] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6209.588775][T11182] r5:840b4800 r4:8294f590 [ 6209.588959][T11182] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6209.589192][T11182] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6209.589375][T11182] r8:76f7ff30 r7:00000000 r6:00000000 r5:ea9d1f68 r4:00000002 [ 6209.589395][T11182] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6209.589442][T11182] [<80986ef4>] (should_fail_usercopy) from [<8059a064>] (simple_read_from_buffer+0x80/0x13c) [ 6209.589831][T11182] [<80599fe4>] (simple_read_from_buffer) from [<8061618c>] (proc_fail_nth_read+0xb8/0x108) [ 6209.589986][T11182] r10:00000001 r9:806160d4 r8:00000002 r7:ea9d1f68 r6:0000000f r5:76f7ff30 [ 6209.590085][T11182] r4:840b4800 r3:ea9d1e9f [ 6209.590317][T11182] [<806160d4>] (proc_fail_nth_read) from [<8055f014>] (vfs_read+0x98/0x324) [ 6209.590388][T11182] r8:76f7ff30 r7:ea9d1f68 r6:840b4800 r5:0000000f r4:848ced80 [ 6209.590464][T11182] [<8055ef7c>] (vfs_read) from [<8055fd24>] (ksys_read+0x74/0xe8) [ 6209.590888][T11182] r10:00000003 r9:840b4800 r8:8020029c r7:00000000 r6:00000000 r5:848ced80 [ 6209.591120][T11182] r4:848ced83 [ 6209.591147][T11182] [<8055fcb0>] (ksys_read) from [<8055fda8>] (sys_read+0x10/0x14) [ 6209.591255][T11182] r7:00000003 r6:00000005 r5:76f7ff30 r4:0000000f [ 6209.591729][T11182] [<8055fd98>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6209.591835][T11182] Exception stack(0xea9d1fa8 to 0xea9d1ff0) [ 6209.591953][T11182] 1fa0: 0000000f 76f7ff30 00000005 76f7ff30 0000000f 00000000 [ 6209.591997][T11182] 1fc0: 0000000f 76f7ff30 00000005 00000003 00300000 00000000 00006364 76f800bc [ 6209.592286][T11182] 1fe0: 00000158 76f7fed0 000d81d0 001303dc [ 6209.637494][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 6209.637820][ T29] audit: type=1400 audit(134223937.565:104284): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6209.653726][ T29] audit: type=1400 audit(134223937.575:104285): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6209.663439][ T29] audit: type=1400 audit(134223937.585:104286): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6209.799213][ T29] audit: type=1400 audit(134223937.725:104287): avc: denied { create } for pid=11184 comm="syz.1.10098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6209.801302][ T29] audit: type=1400 audit(134223937.725:104288): avc: denied { write } for pid=11184 comm="syz.1.10098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6209.807712][ T29] audit: type=1400 audit(134223937.735:104289): avc: denied { read } for pid=11184 comm="syz.1.10098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6209.918362][ T29] audit: type=1400 audit(134223937.845:104290): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6209.919393][ T29] audit: type=1400 audit(134223937.845:104291): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6209.920764][ T29] audit: type=1400 audit(134223937.845:104292): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6210.096581][ T29] audit: type=1400 audit(134223938.025:104293): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6212.527595][ T6666] usb 1-1: USB disconnect, device number 71 [ 6214.656542][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 6214.657822][ T29] audit: type=1400 audit(134223942.585:104335): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6214.659904][ T29] audit: type=1400 audit(134223942.585:104336): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6214.663385][ T29] audit: type=1400 audit(134223942.585:104337): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6214.727925][ T29] audit: type=1400 audit(134223942.655:104338): avc: denied { create } for pid=11213 comm="syz.1.10107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6214.732162][ T29] audit: type=1400 audit(134223942.655:104339): avc: denied { write } for pid=11213 comm="syz.1.10107" path="socket:[116018]" dev="sockfs" ino=116018 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6214.758686][ T29] audit: type=1400 audit(134223942.685:104340): avc: denied { create } for pid=11213 comm="syz.1.10107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6214.783252][ T29] audit: type=1400 audit(134223942.705:104341): avc: denied { read write } for pid=11213 comm="syz.1.10107" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6214.785784][ T29] audit: type=1400 audit(134223942.705:104342): avc: denied { open } for pid=11213 comm="syz.1.10107" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6214.787851][ T29] audit: type=1400 audit(134223942.705:104343): avc: denied { setattr } for pid=11213 comm="syz.1.10107" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6214.790051][ T29] audit: type=1400 audit(134223942.715:104344): avc: denied { create } for pid=11213 comm="syz.1.10107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6216.147290][T11230] FAULT_INJECTION: forcing a failure. [ 6216.147290][T11230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6216.147697][T11230] CPU: 1 UID: 0 PID: 11230 Comm: syz.0.10111 Not tainted syzkaller #0 PREEMPT [ 6216.147781][T11230] Hardware name: ARM-Versatile Express [ 6216.147804][T11230] Call trace: [ 6216.147844][T11230] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6216.147945][T11230] r7:b5403587 r6:00000000 r5:60000113 r4:82252544 [ 6216.147966][T11230] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6216.148014][T11230] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6216.148065][T11230] r5:841bbc00 r4:8294f590 [ 6216.148100][T11230] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6216.148167][T11230] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6216.148324][T11230] r8:00000000 r7:b5403587 r6:00000000 r5:841bc430 r4:76fe2bb8 [ 6216.148349][T11230] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6216.148394][T11230] [<80986ef4>] (should_fail_usercopy) from [<8022b454>] (setup_sigframe+0x124/0x1c4) [ 6216.148443][T11230] [<8022b330>] (setup_sigframe) from [<8022bbc4>] (do_work_pending+0x3ec/0x4e8) [ 6216.148500][T11230] r10:b5403587 r9:76fe2bb8 r8:00000000 r7:841bc430 r6:76fe2b38 r5:eac05fb0 [ 6216.148520][T11230] r4:841bbc00 [ 6216.148534][T11230] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 6216.148576][T11230] Exception stack(0xeac05fb0 to 0xeac05ff8) [ 6216.148608][T11230] 5fa0: 00000003 20000180 00040005 00000000 [ 6216.148638][T11230] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe30bc [ 6216.148664][T11230] 5fe0: 76fe2ec0 76fe2eb0 000195a4 0013250c 60000010 00000003 [ 6216.148695][T11230] r10:00000128 r9:841bbc00 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 6216.148725][T11230] r4:00000000 [ 6219.693679][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 6219.694134][ T29] audit: type=1400 audit(134223947.615:104489): avc: denied { create } for pid=11269 comm="syz.1.10124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6219.699322][ T29] audit: type=1400 audit(134223947.625:104490): avc: denied { write } for pid=11269 comm="syz.1.10124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6219.755746][ T29] audit: type=1400 audit(134223947.685:104491): avc: denied { read write } for pid=9238 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6219.757380][ T29] audit: type=1400 audit(134223947.685:104492): avc: denied { open } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6219.760559][ T29] audit: type=1400 audit(134223947.685:104493): avc: denied { ioctl } for pid=9238 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6219.783943][ T29] audit: type=1400 audit(134223947.715:104494): avc: denied { read } for pid=11262 comm="syz.0.10123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6219.790654][ T29] audit: type=1400 audit(134223947.715:104495): avc: denied { create } for pid=11262 comm="syz.0.10123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6219.794218][ T29] audit: type=1400 audit(134223947.715:104496): avc: denied { write } for pid=11262 comm="syz.0.10123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6219.796215][ T29] audit: type=1400 audit(134223947.715:104497): avc: denied { module_request } for pid=11262 comm="syz.0.10123" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6219.883742][ T29] audit: type=1400 audit(134223947.805:104498): avc: denied { create } for pid=11272 comm="syz.1.10125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6220.955143][T11290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11290 comm=syz.1.10125 [ 6224.244214][T11320] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10133'. [ 6224.280703][T11320] bond1: entered promiscuous mode [ 6224.289016][T11320] 8021q: adding VLAN 0 to HW filter on device bond1 [ 6224.811232][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 6224.822866][ T29] audit: type=1400 audit(134223952.735:104694): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6224.824554][ T29] audit: type=1400 audit(134223952.745:104695): avc: denied { read write open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6224.824791][ T29] audit: type=1400 audit(134223952.745:104696): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6224.920309][ T29] audit: type=1400 audit(134223952.845:104697): avc: denied { allowed } for pid=11358 comm="syz.0.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6224.935963][ T29] audit: type=1400 audit(134223952.865:104698): avc: denied { create } for pid=11358 comm="syz.0.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6224.943583][ T29] audit: type=1400 audit(134223952.865:104699): avc: denied { write } for pid=11358 comm="syz.0.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6224.943929][ T29] audit: type=1400 audit(134223952.865:104700): avc: denied { read } for pid=11358 comm="syz.0.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6224.972026][ T29] audit: type=1400 audit(134223952.895:104701): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6224.978237][ T29] audit: type=1400 audit(134223952.905:104702): avc: denied { read write open } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6224.979637][ T29] audit: type=1400 audit(134223952.905:104703): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6225.426911][T11369] FAULT_INJECTION: forcing a failure. [ 6225.426911][T11369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6225.427868][T11369] CPU: 1 UID: 0 PID: 11369 Comm: syz.1.10140 Not tainted syzkaller #0 PREEMPT [ 6225.427938][T11369] Hardware name: ARM-Versatile Express [ 6225.427954][T11369] Call trace: [ 6225.427976][T11369] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6225.428039][T11369] r7:eb7e9e20 r6:00000000 r5:60000013 r4:82252544 [ 6225.428049][T11369] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 6225.428117][T11369] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 6225.428148][T11369] r5:84911800 r4:8294f590 [ 6225.428156][T11369] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 6225.428190][T11369] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 6225.428222][T11369] r8:2000c091 r7:eb7e9e20 r6:20001e00 r5:00000000 r4:eb7e9f20 [ 6225.428231][T11369] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 6225.428252][T11369] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 6225.428282][T11369] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 6225.428314][T11369] r8:2000c091 r7:00000000 r6:8514a780 r5:eb7e9f20 r4:eb7e9e64 [ 6225.428323][T11369] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 6225.428357][T11369] r10:00000128 r9:84911800 r8:85a31000 r7:2000c091 r6:20001e00 r5:85a31001 [ 6225.428368][T11369] r4:00000003 [ 6225.428376][T11369] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 6225.428409][T11369] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 6225.428417][T11369] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6225.428441][T11369] Exception stack(0xeb7e9fa8 to 0xeb7e9ff0) [ 6225.428460][T11369] 9fa0: 00000000 00000000 00000003 20001e00 2000c091 00000000 [ 6225.428478][T11369] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f800bc [ 6225.428492][T11369] 9fe0: 76f7fec0 76f7feb0 000195a4 00132510 [ 6227.518067][T11383] 8<--- cut here --- [ 6227.518236][T11383] Unable to handle kernel paging request at virtual address fee00006 when write [ 6227.518377][T11383] [fee00006] *pgd=80000080007003, *pmd=00000000 [ 6227.519303][T11383] Internal error: Oops: a06 [#1] SMP ARM [ 6227.521947][T11383] Modules linked in: [ 6227.522464][T11383] CPU: 1 UID: 0 PID: 11383 Comm: syz.1.10145 Not tainted syzkaller #0 PREEMPT [ 6227.522972][T11383] Hardware name: ARM-Versatile Express [ 6227.523396][T11383] PC is at subdev_8255_io+0x60/0x6c [ 6227.523736][T11383] LR is at subdev_8255_io+0x4c/0x6c [ 6227.524550][T11383] pc : [<813db598>] lr : [<813db584>] psr: 60000013 [ 6227.525370][T11383] sp : eb94dcb8 ip : eb94dcb8 fp : eb94dcd4 [ 6227.525980][T11383] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 6227.526319][T11383] r7 : 00000003 r6 : 0000009b r5 : 841ca9c0 r4 : 00000006 [ 6227.526710][T11383] r3 : 0000009b r2 : fee00006 r1 : 00000001 r0 : 841ca9c0 [ 6227.527276][T11383] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 6227.527740][T11383] Control: 30c5387d Table: 855a6280 DAC: 00000000 [ 6227.528103][T11383] Register r0 information: slab kmalloc-192 start 841ca9c0 pointer offset 0 size 192 [ 6227.529298][T11383] Register r1 information: non-paged memory [ 6227.529808][T11383] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 6227.530375][T11383] Register r3 information: non-paged memory [ 6227.530628][T11383] Register r4 information: non-paged memory [ 6227.530921][T11383] Register r5 information: slab kmalloc-192 start 841ca9c0 pointer offset 0 size 192 [ 6227.531439][T11383] Register r6 information: non-paged memory [ 6227.531720][T11383] Register r7 information: non-paged memory [ 6227.532011][T11383] Register r8 information: non-paged memory [ 6227.532336][T11383] Register r9 information: NULL pointer [ 6227.532720][T11383] Register r10 information: NULL pointer [ 6227.532972][T11383] Register r11 information: 2-page vmalloc region starting at 0xeb94c000 allocated at kernel_clone+0xac/0x3ec [ 6227.533405][T11383] Register r12 information: 2-page vmalloc region starting at 0xeb94c000 allocated at kernel_clone+0xac/0x3ec [ 6227.533892][T11383] Process syz.1.10145 (pid: 11383, stack limit = 0xeb94c000) [ 6227.534206][T11383] Stack: (0xeb94dcb8 to 0xeb94e000) [ 6227.534439][T11383] dca0: 813db538 841ca9c0 [ 6227.534764][T11383] dcc0: 00000003 00000003 eb94dcf4 eb94dcd8 813db270 813db544 00000003 8050a430 [ 6227.535086][T11383] dce0: 84dea800 84dea800 eb94dd14 eb94dcf8 813db630 813db224 84dea800 841ca9c0 [ 6227.535386][T11383] dd00: eb94dda4 00000003 eb94dd54 eb94dd18 813db824 813db5b0 eb94dd3c eb94dd28 [ 6227.535713][T11383] dd20: 81a649e8 00000000 813c6244 829d238c 841ca9c0 841caa04 eb94dd90 841ca9c0 [ 6227.536028][T11383] dd40: 00000000 82b25910 eb94dd8c eb94dd58 813ca720 813db774 b5403587 00000000 [ 6227.536334][T11383] dd60: 84183000 200002c0 841ca9c0 b5403587 200002c0 84183000 40946400 00000000 [ 6227.536804][T11383] dd80: eb94de4c eb94dd90 813c626c 813ca624 35353238 00000000 00000000 00000000 [ 6227.537166][T11383] dda0: 00000000 00000003 fdfffffd 00000003 00000005 0000002f 0000000a 00000007 [ 6227.537465][T11383] ddc0: 00000005 00000ffe 00000001 00000000 00008500 00001003 0000000f 0000ffff [ 6227.537817][T11383] dde0: 0000ffff ffffffa8 7ffffffd 000003ff 00000001 00000010 00000000 0000000f [ 6227.538187][T11383] de00: 00000005 0000746f 00000007 00000005 00000003 00000000 fffffffe 00008049 [ 6227.538640][T11383] de20: 00000000 3512c6a4 00000000 85a31d80 841ca9c0 200002c0 200002c0 84183000 [ 6227.539150][T11383] de40: eb94df14 eb94de50 813c7238 813c6178 00000000 00000000 00000000 3512c6a4 [ 6227.539615][T11383] de60: 00000000 00000000 824625b4 0000005f 83e30a30 841ca9f0 840e8684 84183000 [ 6227.540065][T11383] de80: eb94dee4 eb94de90 807a7684 8079da7c 00000064 00000001 00000000 eb94deac [ 6227.540390][T11383] dea0: 896d90d0 83430880 00006400 0000000b eb94dea0 00000000 eb94dd30 3512c6a4 [ 6227.540687][T11383] dec0: 85a31d80 40946400 200002c0 200002c0 85a31d80 00000005 eb94def4 eb94dee8 [ 6227.541477][T11383] dee0: 807a77a4 3512c6a4 eb94df14 40946400 00000000 85a31d81 200002c0 85a31d80 [ 6227.541818][T11383] df00: 00000005 84183000 eb94dfa4 eb94df18 805788b8 813c6c68 ecac8b10 84183000 [ 6227.542170][T11383] df20: eb94df3c eb94df30 81a60ab8 81a60988 eb94df54 eb94df40 8025c484 8028d914 [ 6227.542475][T11383] df40: eb94dfb0 40000000 eb94df84 eb94df58 802229ec 8025c440 00000000 8281cfb4 [ 6227.542934][T11383] df60: eb94dfb0 0014ca70 ecac8b10 80222940 00000000 3512c6a4 eb94dfac 00000000 [ 6227.543366][T11383] df80: 00000000 00316308 00000036 8020029c 84183000 00000036 00000000 eb94dfa8 [ 6227.543959][T11383] dfa0: 80200060 80578794 00000000 00000000 00000005 40946400 200002c0 00000000 [ 6227.544432][T11383] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f800bc [ 6227.544785][T11383] dfe0: 76f7fec0 76f7feb0 000195a4 00132510 60000010 00000005 00000000 00000000 [ 6227.545113][T11383] Call trace: [ 6227.545345][T11383] [<813db538>] (subdev_8255_io) from [<813db270>] (subdev_8255_do_config+0x58/0x60) [ 6227.545734][T11383] r7:00000003 r6:00000003 r5:841ca9c0 r4:813db538 [ 6227.545970][T11383] [<813db218>] (subdev_8255_do_config) from [<813db630>] (subdev_8255_io_init+0x8c/0x9c) [ 6227.546327][T11383] r4:84dea800 [ 6227.546475][T11383] [<813db5a4>] (subdev_8255_io_init) from [<813db824>] (dev_8255_attach+0xbc/0x114) [ 6227.546817][T11383] r7:00000003 r6:eb94dda4 r5:841ca9c0 r4:84dea800 [ 6227.547041][T11383] [<813db768>] (dev_8255_attach) from [<813ca720>] (comedi_device_attach+0x108/0x250) [ 6227.547398][T11383] r10:82b25910 r9:00000000 r8:841ca9c0 r7:eb94dd90 r6:841caa04 r5:841ca9c0 [ 6227.547715][T11383] r4:829d238c [ 6227.547869][T11383] [<813ca618>] (comedi_device_attach) from [<813c626c>] (do_devconfig_ioctl+0x100/0x220) [ 6227.548259][T11383] r10:00000000 r9:40946400 r8:84183000 r7:200002c0 r6:b5403587 r5:841ca9c0 [ 6227.548567][T11383] r4:200002c0 [ 6227.548718][T11383] [<813c616c>] (do_devconfig_ioctl) from [<813c7238>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 6227.549056][T11383] r8:84183000 r7:200002c0 r6:200002c0 r5:841ca9c0 r4:85a31d80 [ 6227.549288][T11383] [<813c6c5c>] (comedi_unlocked_ioctl) from [<805788b8>] (sys_ioctl+0x130/0xba0) [ 6227.549606][T11383] r10:84183000 r9:00000005 r8:85a31d80 r7:200002c0 r6:85a31d81 r5:00000000 [ 6227.549866][T11383] r4:40946400 [ 6227.550004][T11383] [<80578788>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6227.550344][T11383] Exception stack(0xeb94dfa8 to 0xeb94dff0) [ 6227.550594][T11383] dfa0: 00000000 00000000 00000005 40946400 200002c0 00000000 [ 6227.550931][T11383] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f800bc [ 6227.551271][T11383] dfe0: 76f7fec0 76f7feb0 000195a4 00132510 [ 6227.551523][T11383] r10:00000036 r9:84183000 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 6227.551838][T11383] r4:00000000 [ 6227.552232][T11383] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 6227.552987][T11383] ---[ end trace 0000000000000000 ]--- [ 6227.553921][T11383] Kernel panic - not syncing: Fatal exception [ 6227.555928][T11383] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:22:10 Registers: info registers vcpu 0 CPU#0 R00=006991d8 R01=00000060 R02=00558870 R03=00000000 R04=00539ca4 R05=00000103 R06=7e865bf4 R07=0053a194 R08=7e865c74 R09=0053101c R10=0000284c R11=7e8662bc R12=00000000 R13=7e866160 R14=004ce690 R15=004d7bdc PSR=80010010 N--- A S usr32 s00=00000000 s01=4c280000 d00=4c28000000000000 s02=03000800 s03=08000690 d01=0800069003000800 s04=80020208 s05=50080002 d02=5008000280020208 s06=00018003 s07=88030008 d03=8803000800018003 s08=10080001 s09=00019003 d04=0001900310080001 s10=98030008 s11=80080001 d05=8008000198030008 s12=c6399c9c s13=00080172 d06=00080172c6399c9c s14=08000008 s15=01800200 d07=0180020008000008 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=fe100802 s33=4e9f7c01 d16=4e9f7c01fe100802 s34=9642f795 s35=060a0169 d17=060a01699642f795 s36=00000208 s37=b4080001 d18=b408000100000208 s38=02080004 s39=00028002 d19=0002800202080004 s40=80035008 s41=00080001 d20=0008000180035008 s42=00018803 s43=90031008 d21=9003100800018803 s44=00080001 s45=00019803 d22=0001980300080001 s46=9c9c8008 s47=0172c639 d23=0172c6399c9c8008 s48=8068e92a s49=5cfd4a93 d24=5cfd4a938068e92a s50=056d9af8 s51=064c488d d25=064c488d056d9af8 s52=03869b8c s53=3463f007 d26=3463f00703869b8c s54=7180265e s55=93709f72 d27=93709f727180265e s56=9dbc2143 s57=8f553515 d28=8f5535159dbc2143 s58=51e4b930 s59=cbafe348 d29=cbafe34851e4b930 s60=8a275968 s61=67ca3eb6 d30=67ca3eb68a275968 s62=dca9b2e1 s63=d33f3695 d31=d33f3695dca9b2e1 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=8400b040 R01=00000062 R02=ead33000 R03=ead33018 R04=83ab203b R05=8400b040 R06=80a8efac R07=83ab2042 R08=82827128 R09=00000000 R10=000066f4 R11=eb94d924 R12=00000002 R13=eb94d918 R14=82959484 R15=80a8efbc PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000