last executing test programs: 3m33.489873624s ago: executing program 1 (id=1250): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r2, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x27) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r3, 0x0, 0x31, &(0x7f0000000040)=0x1, 0x4) 3m33.28237378s ago: executing program 1 (id=1252): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/current\x00') write$cgroup_int(r0, 0x0, 0x0) 3m33.057043059s ago: executing program 1 (id=1254): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x9, 0x1, 0x2}, 0x50) gettid() timer_create(0x1, 0x0, &(0x7f0000000000)) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001b40)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x1}) 3m32.711811003s ago: executing program 1 (id=1257): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1c1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00', 0x272) 3m32.050576148s ago: executing program 1 (id=1260): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x24, 0x2c, 0xf3f, 0x130bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xb, 0xfff3}, {0x0, 0x2}, {0x7, 0x300}}}, 0x24}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) 3m31.413365748s ago: executing program 1 (id=1261): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000a80)=@framed={{}, [@alu={0x4, 0x0, 0xb, 0x9, 0xb, 0xfffffffffffffff4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400}, 0x94) 3m31.413218308s ago: executing program 32 (id=1261): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000a80)=@framed={{}, [@alu={0x4, 0x0, 0xb, 0x9, 0xb, 0xfffffffffffffff4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400}, 0x94) 6.511241581s ago: executing program 0 (id=1617): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="f7", 0x1}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/83, 0x53}], 0x1}, 0x40000103) 5.909344628s ago: executing program 0 (id=1618): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000000c0)={0xc}) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000400)={0xc, 0x0, 0x0}) ioctl$IOMMU_DESTROY$ioas(r0, 0x3b80, &(0x7f0000000540)={0x8, r1}) ioctl$IOMMU_DESTROY$ioas(r0, 0x3b80, &(0x7f00000006c0)={0x8, r1}) 5.631823743s ago: executing program 0 (id=1619): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) inotify_init() socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_clone3(&(0x7f0000000080)={0x180801400, &(0x7f0000000000), 0x0, 0x0, {0x3d}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00010429bd7000ffdbdf2507000000", @ANYRES32=r1, @ANYBLOB="e0ff8b0a0a0002"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x24040040) 5.352501548s ago: executing program 0 (id=1621): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)={0x28, 0x3e, 0x9, 0x70bd27, 0x0, {0x4}, [@nested={0xc, 0x146, 0x0, 0x1, [@nested={0x8, 0xc7, 0x0, 0x1, [@nested={0x4, 0xfa}]}]}, @typed={0x8, 0x9, 0x0, 0x0, @uid}]}, 0x28}, 0x1, 0x0, 0x0, 0x42804}, 0x0) 4.777650522s ago: executing program 0 (id=1622): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="1f", 0x1}], 0x1}, 0x8c0) 4.513999965s ago: executing program 0 (id=1623): r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000001c0)=ANY=[@ANYBLOB="120100009dea7840b418fbff7bdc01020301090212000100000000090401"], 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f00000008c0)={0x1c, &(0x7f0000000100)=ANY=[@ANYBLOB="00000100000001"], 0x0, 0x0}) r1 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) ioctl$I2C_RDWR(r1, 0x707, &(0x7f0000000200)={&(0x7f00000000c0)=[{0x4, 0x5201, 0x2000, &(0x7f0000000300)='/'}, {0xfffc, 0xd010, 0x0, 0x0}], 0x2}) 480.079968ms ago: executing program 2 (id=1626): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="840000001000010029bd7000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="4db20200201a0100140003006e657464657673696d3000000000000048001680440001"], 0x84}, 0x1, 0x0, 0x0, 0xc1}, 0x0) 396.390879ms ago: executing program 2 (id=1627): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x28040041, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="1f", 0x1}], 0x1}, 0x8c0) 307.605811ms ago: executing program 2 (id=1628): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x6f800, 0xffffffffffffffff, 0x2}, 0x2d) 249.134318ms ago: executing program 2 (id=1629): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b0451a6cc55c", 0x98}) ptrace$setregset(0x4205, r0, 0x1, &(0x7f00000001c0)={&(0x7f0000000000)="c9e6b241eb6a3f6dedf11f1508685636", 0x10}) 156.90376ms ago: executing program 2 (id=1630): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 0s ago: executing program 2 (id=1631): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x5d032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000540)}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, &(0x7f0000000900)) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000940), 0x200000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@delchain={0x38, 0x65, 0x8, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0xe, 0x2}, {0x0, 0xe}, {0x6, 0xb}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}, @TCA_RATE={0x6, 0x5, {0xff, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000080) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000600)=""/191, 0xbf, 0xa1}}], 0x1, 0x2040000, &(0x7f0000003700)={0x77359400}) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xffe0}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}}, 0x4000010) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)='\x00'/16, 0x10) r6 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(r6, &(0x7f0000003b80)=[{{0x0, 0xd, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e6", 0x1}], 0x1, 0x0, 0x0, 0x7000000}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000440)='&', 0x23fff}], 0x1}, 0xff03}], 0x4000070, 0x8000) kernel console output (not intermixed with test programs): [ 48.359925][ T29] audit: type=1400 audit(48.280:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.387745][ T29] audit: type=1400 audit(48.290:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:14890' (ED25519) to the list of known hosts. [ 61.335180][ T29] audit: type=1400 audit(61.250:58): avc: denied { name_bind } for pid=3088 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.807596][ T29] audit: type=1400 audit(63.720:59): avc: denied { execute } for pid=3089 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.834897][ T29] audit: type=1400 audit(63.750:60): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.704382][ T29] audit: type=1400 audit(66.620:61): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.708905][ T29] audit: type=1400 audit(66.630:62): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.721228][ T3089] cgroup: Unknown subsys name 'net' [ 66.728174][ T29] audit: type=1400 audit(66.650:63): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.877120][ T3089] cgroup: Unknown subsys name 'cpuset' [ 66.880599][ T3089] cgroup: Unknown subsys name 'hugetlb' [ 66.882604][ T3089] cgroup: Unknown subsys name 'rlimit' [ 67.064279][ T29] audit: type=1400 audit(66.980:64): avc: denied { setattr } for pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.065972][ T29] audit: type=1400 audit(66.990:65): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.067541][ T29] audit: type=1400 audit(66.990:66): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.261045][ T3091] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.262374][ T29] audit: type=1400 audit(67.180:67): avc: denied { relabelto } for pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.272903][ T29] audit: type=1400 audit(67.190:68): avc: denied { write } for pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.317274][ T29] audit: type=1400 audit(67.240:69): avc: denied { read } for pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.320484][ T29] audit: type=1400 audit(67.240:70): avc: denied { open } for pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.017281][ T3089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.277784][ T29] audit: type=1400 audit(78.200:71): avc: denied { execmem } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.353999][ T29] audit: type=1400 audit(78.270:72): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.364520][ T29] audit: type=1400 audit(78.280:73): avc: denied { open } for pid=3094 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.368430][ T29] audit: type=1400 audit(78.280:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.390256][ T29] audit: type=1400 audit(78.310:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.392000][ T29] audit: type=1400 audit(78.310:76): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.475597][ T29] audit: type=1400 audit(78.400:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.210930][ T29] audit: type=1400 audit(79.130:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.359683][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.382568][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.391268][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.418231][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.336695][ T3095] hsr_slave_0: entered promiscuous mode [ 81.341757][ T3095] hsr_slave_1: entered promiscuous mode [ 81.359712][ T3094] hsr_slave_0: entered promiscuous mode [ 81.361302][ T3094] hsr_slave_1: entered promiscuous mode [ 81.365774][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 81.366379][ T3094] Cannot create hsr debugfs directory [ 81.886013][ T29] audit: type=1400 audit(81.810:79): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.887644][ T29] audit: type=1400 audit(81.810:80): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.908445][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.930512][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.943430][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.960526][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.021980][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.039098][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.055465][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.066810][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.736857][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.841911][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.609728][ T3095] veth0_vlan: entered promiscuous mode [ 85.632255][ T3095] veth1_vlan: entered promiscuous mode [ 85.690116][ T3095] veth0_macvtap: entered promiscuous mode [ 85.700966][ T3095] veth1_macvtap: entered promiscuous mode [ 85.780047][ T127] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.781620][ T127] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.781763][ T127] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.781837][ T127] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.973623][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 85.976357][ T29] audit: type=1400 audit(85.890:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.978345][ T3094] veth0_vlan: entered promiscuous mode [ 85.987209][ T29] audit: type=1400 audit(85.910:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.8AxvrZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.992710][ T29] audit: type=1400 audit(85.910:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.006392][ T29] audit: type=1400 audit(85.930:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.8AxvrZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.011010][ T29] audit: type=1400 audit(85.930:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.8AxvrZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.027564][ T3094] veth1_vlan: entered promiscuous mode [ 86.039085][ T29] audit: type=1400 audit(85.960:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.049408][ T29] audit: type=1400 audit(85.970:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.053137][ T29] audit: type=1400 audit(85.970:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=1687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.064823][ T29] audit: type=1400 audit(85.990:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.068531][ T29] audit: type=1400 audit(85.990:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.151476][ T3094] veth0_macvtap: entered promiscuous mode [ 86.156562][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.172933][ T3094] veth1_macvtap: entered promiscuous mode [ 86.296518][ T127] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.300544][ T127] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.301069][ T127] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.301336][ T127] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.345237][ T3042] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 87.584098][ T3042] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 87.586629][ T3042] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 87.588109][ T3042] usb 1-1: Product: syz [ 87.588873][ T3042] usb 1-1: Manufacturer: syz [ 87.589567][ T3042] usb 1-1: SerialNumber: syz [ 88.059939][ T3042] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPIPE [ 88.061086][ T3042] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to sync IRQ enable register: -EPIPE [ 89.097465][ T3042] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000118. ret = -EPIPE [ 89.099915][ T3042] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 89.104738][ T3042] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 89.111062][ T3042] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -32 [ 91.061886][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 91.063129][ T29] audit: type=1400 audit(90.980:103): avc: denied { create } for pid=3723 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.074974][ T3724] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 91.080157][ T29] audit: type=1400 audit(91.000:104): avc: denied { ioctl } for pid=3723 comm="syz.1.6" path="socket:[2752]" dev="sockfs" ino=2752 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.169205][ T29] audit: type=1400 audit(91.090:105): avc: denied { create } for pid=3723 comm="syz.1.6" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.172237][ T29] audit: type=1400 audit(91.090:106): avc: denied { append } for pid=3723 comm="syz.1.6" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 91.235570][ T3724] Zero length message leads to an empty skb [ 91.421750][ T3726] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 91.428710][ T29] audit: type=1400 audit(91.350:107): avc: denied { setopt } for pid=3725 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.594779][ T3729] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3729 comm=syz.1.8 [ 92.079732][ T29] audit: type=1400 audit(92.000:108): avc: denied { create } for pid=3734 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 92.089717][ T29] audit: type=1400 audit(92.010:109): avc: denied { write } for pid=3734 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 92.615333][ T29] audit: type=1400 audit(92.540:110): avc: denied { create } for pid=3734 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.745272][ T29] audit: type=1400 audit(92.670:111): avc: denied { write } for pid=3734 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.563223][ T29] audit: type=1400 audit(93.480:112): avc: denied { map } for pid=3734 comm="syz.1.10" path="/dev/dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 98.195118][ T3751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3751 comm=syz.1.14 [ 98.741752][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 98.744439][ T29] audit: type=1400 audit(98.660:119): avc: denied { ioctl } for pid=3760 comm="syz.1.17" path="socket:[1800]" dev="sockfs" ino=1800 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.126186][ T41] usb 1-1: USB disconnect, device number 2 [ 101.942187][ T3782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3782 comm=syz.1.22 [ 102.028425][ T29] audit: type=1400 audit(101.950:120): avc: denied { map } for pid=3771 comm="syz.0.19" path="socket:[1830]" dev="sockfs" ino=1830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 102.129641][ T29] audit: type=1400 audit(102.050:121): avc: denied { mounton } for pid=3783 comm="syz.1.23" path="/20/file0" dev="tmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 102.699824][ T29] audit: type=1400 audit(102.620:122): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 102.856842][ T29] audit: type=1400 audit(102.780:123): avc: denied { connect } for pid=3788 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.892388][ T29] audit: type=1400 audit(102.810:124): avc: denied { setopt } for pid=3788 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 102.943232][ T3789] *** NOT YET: opcode c3 *** [ 102.969457][ T3789] netlink: 56 bytes leftover after parsing attributes in process `syz.1.24'. [ 103.482381][ T29] audit: type=1400 audit(103.400:125): avc: denied { write } for pid=3788 comm="syz.1.24" path="socket:[1837]" dev="sockfs" ino=1837 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.597879][ T38] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 103.598323][ T38] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 103.598404][ T38] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 103.598455][ T38] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 103.791229][ T29] audit: type=1400 audit(103.710:126): avc: denied { mounton } for pid=3791 comm="syz.1.25" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 103.828507][ T29] audit: type=1400 audit(103.750:127): avc: denied { read } for pid=3791 comm="syz.1.25" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 103.834765][ T29] audit: type=1400 audit(103.750:128): avc: denied { open } for pid=3791 comm="syz.1.25" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 103.838068][ T29] audit: type=1400 audit(103.750:129): avc: denied { ioctl } for pid=3791 comm="syz.1.25" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 103.849004][ T29] audit: type=1400 audit(103.750:130): avc: denied { set_context_mgr } for pid=3791 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 107.158429][ T29] audit: type=1400 audit(107.080:131): avc: denied { write } for pid=3800 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 107.393567][ T29] audit: type=1400 audit(107.310:132): avc: denied { create } for pid=3802 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.396288][ T29] audit: type=1400 audit(107.320:133): avc: denied { bind } for pid=3802 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.405874][ T29] audit: type=1400 audit(107.330:134): avc: denied { accept } for pid=3802 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.865724][ T29] audit: type=1400 audit(107.790:135): avc: denied { wake_alarm } for pid=3806 comm="syz.1.32" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.911694][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 108.913499][ T29] audit: type=1400 audit(108.830:139): avc: denied { write } for pid=3816 comm="syz.1.35" name="rt_cache" dev="proc" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 109.498374][ T29] audit: type=1400 audit(109.420:140): avc: denied { create } for pid=3820 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 109.502853][ T29] audit: type=1400 audit(109.420:141): avc: denied { setopt } for pid=3820 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 109.708640][ T3824] capability: warning: `syz.1.38' uses 32-bit capabilities (legacy support in use) [ 110.382507][ T3832] netlink: 16 bytes leftover after parsing attributes in process `syz.0.41'. [ 110.390380][ T29] audit: type=1400 audit(110.310:142): avc: denied { associate } for pid=3831 comm="syz.1.42" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 110.621707][ T29] audit: type=1400 audit(110.540:143): avc: denied { write } for pid=3836 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 110.983274][ T29] audit: type=1400 audit(110.900:144): avc: denied { write } for pid=3848 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.540299][ T3870] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3870 comm=syz.1.54 [ 114.935475][ T3887] capability: warning: `syz.0.60' uses deprecated v2 capabilities in a way that may be insecure [ 114.940974][ T29] audit: type=1400 audit(114.860:145): avc: denied { write } for pid=3886 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.649721][ T29] audit: type=1400 audit(115.570:146): avc: denied { listen } for pid=3890 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 115.682155][ T29] audit: type=1400 audit(115.600:147): avc: denied { bind } for pid=3890 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.513516][ T29] audit: type=1400 audit(116.430:148): avc: denied { append } for pid=3901 comm="syz.1.64" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 116.706156][ T29] audit: type=1400 audit(116.630:149): avc: denied { read } for pid=3903 comm="syz.1.65" path="socket:[3033]" dev="sockfs" ino=3033 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 116.885111][ T29] audit: type=1400 audit(116.800:150): avc: denied { create } for pid=3905 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 116.896903][ T29] audit: type=1400 audit(116.820:151): avc: denied { write } for pid=3905 comm="syz.1.66" path="socket:[3083]" dev="sockfs" ino=3083 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 118.349379][ T29] audit: type=1400 audit(118.270:152): avc: denied { ioctl } for pid=3921 comm="syz.0.70" path="socket:[3204]" dev="sockfs" ino=3204 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 120.096365][ T29] audit: type=1400 audit(120.020:153): avc: denied { ioctl } for pid=3938 comm="syz.1.77" path="socket:[3071]" dev="sockfs" ino=3071 ioctlcmd=0x5011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 121.135584][ T29] audit: type=1400 audit(121.060:154): avc: denied { create } for pid=3958 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 121.139859][ T29] audit: type=1400 audit(121.060:155): avc: denied { write } for pid=3958 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 121.162447][ T29] audit: type=1400 audit(121.080:156): avc: denied { read } for pid=3958 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 121.879354][ T29] audit: type=1400 audit(121.800:157): avc: denied { ioctl } for pid=3963 comm="syz.0.85" path="socket:[3279]" dev="sockfs" ino=3279 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 122.903488][ T29] audit: type=1400 audit(122.820:158): avc: denied { read } for pid=3974 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 124.476654][ T29] audit: type=1400 audit(124.400:159): avc: denied { allowed } for pid=3982 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 124.490971][ T29] audit: type=1400 audit(124.410:160): avc: denied { map } for pid=3982 comm="syz.1.89" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3308 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 124.491833][ T29] audit: type=1400 audit(124.410:161): avc: denied { read write } for pid=3982 comm="syz.1.89" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3308 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 124.618596][ T29] audit: type=1400 audit(124.540:162): avc: denied { ioctl } for pid=3982 comm="syz.1.89" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3309 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 124.885339][ T41] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 125.083443][ T41] usb 2-1: not running at top speed; connect to a high speed hub [ 125.127325][ T41] usb 2-1: config 1 interface 0 has no altsetting 0 [ 125.164336][ T41] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 125.164696][ T41] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 125.166362][ T41] usb 2-1: Product: syz [ 125.166663][ T41] usb 2-1: Manufacturer: syz [ 125.166712][ T41] usb 2-1: SerialNumber: syz [ 125.598614][ T41] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -71 [ 125.627496][ T41] usb 2-1: USB disconnect, device number 2 [ 125.970342][ T29] audit: type=1400 audit(125.890:163): avc: denied { create } for pid=4004 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 125.975865][ T29] audit: type=1400 audit(125.900:164): avc: denied { write } for pid=4004 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 126.402650][ T29] audit: type=1400 audit(126.320:165): avc: denied { map } for pid=4009 comm="syz.1.95" path="socket:[3324]" dev="sockfs" ino=3324 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 129.365608][ T29] audit: type=1400 audit(129.280:166): avc: denied { getopt } for pid=4037 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 137.001795][ T29] audit: type=1400 audit(136.920:167): avc: denied { getopt } for pid=4075 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 137.080539][ T29] audit: type=1400 audit(137.000:168): avc: denied { create } for pid=4087 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 137.083450][ T29] audit: type=1400 audit(137.000:169): avc: denied { write } for pid=4087 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 137.180544][ T29] audit: type=1400 audit(137.080:170): avc: denied { name_bind } for pid=4073 comm="syz.0.119" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 137.180899][ T29] audit: type=1400 audit(137.090:171): avc: denied { node_bind } for pid=4073 comm="syz.0.119" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 139.310876][ T29] audit: type=1400 audit(139.230:172): avc: denied { remount } for pid=4093 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 139.326272][ T29] audit: type=1400 audit(139.240:173): avc: denied { create } for pid=4093 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 143.591583][ T29] audit: type=1400 audit(143.510:174): avc: denied { create } for pid=4118 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 143.605686][ T29] audit: type=1400 audit(143.530:175): avc: denied { setopt } for pid=4118 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 147.798808][ T4164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4164 comm=syz.0.152 [ 156.114390][ T4263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4263 comm=syz.1.191 [ 156.664788][ T4274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4274 comm=syz.1.196 [ 158.571027][ T4316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4316 comm=syz.0.216 [ 165.343268][ T4417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4417 comm=syz.0.266 [ 168.687456][ T4442] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 169.293950][ T29] audit: type=1400 audit(169.210:176): avc: denied { read } for pid=4441 comm="syz.1.278" dev="sockfs" ino=5239 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 172.315381][ T4501] netlink: 16 bytes leftover after parsing attributes in process `syz.0.306'. [ 181.939791][ T29] audit: type=1400 audit(181.860:177): avc: denied { getopt } for pid=4565 comm="syz.0.326" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 186.767473][ T29] audit: type=1400 audit(186.690:178): avc: denied { read } for pid=4589 comm="syz.1.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 200.329815][ T4684] FAULT_INJECTION: forcing a failure. [ 200.329815][ T4684] name failslab, interval 1, probability 0, space 0, times 1 [ 200.331157][ T4684] CPU: 1 UID: 0 PID: 4684 Comm: syz.1.373 Not tainted syzkaller #0 PREEMPT [ 200.331385][ T4684] Hardware name: ARM-Versatile Express [ 200.331680][ T4684] Call trace: [ 200.332487][ T4684] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 200.333992][ T4684] r7:00000c40 r6:00000000 r5:60000013 r4:82295754 [ 200.334079][ T4684] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 200.334354][ T4684] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 200.334414][ T4684] r5:8539c800 r4:82918c08 [ 200.334429][ T4684] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 200.334484][ T4684] [<80999328>] (should_fail_ex) from [<8053a058>] (should_failslab+0x6c/0x94) [ 200.334545][ T4684] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 200.334562][ T4684] [<80539fec>] (should_failslab) from [<80514c64>] (__kmalloc_noprof+0x9c/0x568) [ 200.334610][ T4684] [<80514bc8>] (__kmalloc_noprof) from [<807e3aa0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 200.334706][ T4684] r10:8539c800 r9:830a6000 r8:00000000 r7:834344c8 r6:857bd4a8 r5:00001000 [ 200.334738][ T4684] r4:00000000 [ 200.334756][ T4684] [<807e3a64>] (tomoyo_realpath_from_path) from [<807dfbe4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 200.334824][ T4684] r10:8539c800 r9:00000000 r8:857bd480 r7:4004af77 r6:00000004 r5:81cd6ac0 [ 200.334846][ T4684] r4:857bd4a8 r3:826c2240 [ 200.334861][ T4684] [<807dfb18>] (tomoyo_path_number_perm) from [<807e44c4>] (tomoyo_file_ioctl+0x1c/0x20) [ 200.334927][ T4684] r9:00000003 r8:857bd480 r7:00000000 r6:00000000 r5:4004af77 r4:857bd480 [ 200.334944][ T4684] [<807e44a8>] (tomoyo_file_ioctl) from [<807906d0>] (security_file_ioctl+0x64/0x1e4) [ 200.334999][ T4684] [<8079066c>] (security_file_ioctl) from [<805850f4>] (sys_ioctl+0x4c/0xba0) [ 200.335087][ T4684] r7:00000000 r6:857bd481 r5:00000000 r4:4004af77 [ 200.335105][ T4684] [<805850a8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 200.335230][ T4684] Exception stack(0xec43dfa8 to 0xec43dff0) [ 200.335396][ T4684] dfa0: 00000000 00000000 00000003 4004af77 00000000 00000000 [ 200.335444][ T4684] dfc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76fd90bc [ 200.335470][ T4684] dfe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 200.335570][ T4684] r10:00000036 r9:8539c800 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 200.335592][ T4684] r4:00000000 [ 200.345980][ T4684] ERROR: Out of memory at tomoyo_realpath_from_path. [ 200.643336][ T4692] FAULT_INJECTION: forcing a failure. [ 200.643336][ T4692] name failslab, interval 1, probability 0, space 0, times 0 [ 200.645417][ T4692] CPU: 1 UID: 0 PID: 4692 Comm: syz.1.377 Not tainted syzkaller #0 PREEMPT [ 200.645613][ T4692] Hardware name: ARM-Versatile Express [ 200.645777][ T4692] Call trace: [ 200.646085][ T4692] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 200.646719][ T4692] r7:00000c40 r6:00000000 r5:60000013 r4:82295754 [ 200.646775][ T4692] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 200.646807][ T4692] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 200.646837][ T4692] r5:8539bc00 r4:82918c08 [ 200.646845][ T4692] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 200.646878][ T4692] [<80999328>] (should_fail_ex) from [<8053a058>] (should_failslab+0x6c/0x94) [ 200.646914][ T4692] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 200.646932][ T4692] [<80539fec>] (should_failslab) from [<80514c64>] (__kmalloc_noprof+0x9c/0x568) [ 200.646962][ T4692] [<80514bc8>] (__kmalloc_noprof) from [<807e3aa0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 200.647019][ T4692] r10:8539bc00 r9:8339cc00 r8:00000000 r7:858a8cc0 r6:857bde68 r5:00001000 [ 200.647038][ T4692] r4:00000000 [ 200.647047][ T4692] [<807e3a64>] (tomoyo_realpath_from_path) from [<807dfbe4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 200.647086][ T4692] r10:8539bc00 r9:00000000 r8:857bde40 r7:00005450 r6:00000004 r5:81cd6ac0 [ 200.647098][ T4692] r4:857bde68 r3:826c2240 [ 200.647106][ T4692] [<807dfb18>] (tomoyo_path_number_perm) from [<807e44c4>] (tomoyo_file_ioctl+0x1c/0x20) [ 200.647144][ T4692] r9:00000003 r8:857bde40 r7:00000000 r6:00000000 r5:00005450 r4:857bde40 [ 200.647153][ T4692] [<807e44a8>] (tomoyo_file_ioctl) from [<807906d0>] (security_file_ioctl+0x64/0x1e4) [ 200.647184][ T4692] [<8079066c>] (security_file_ioctl) from [<805850f4>] (sys_ioctl+0x4c/0xba0) [ 200.647235][ T4692] r7:00000000 r6:857bde41 r5:00000000 r4:00005450 [ 200.647244][ T4692] [<805850a8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 200.647315][ T4692] Exception stack(0xec639fa8 to 0xec639ff0) [ 200.647427][ T4692] 9fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 200.647458][ T4692] 9fc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76fd90bc [ 200.647474][ T4692] 9fe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 200.647515][ T4692] r10:00000036 r9:8539bc00 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 200.647526][ T4692] r4:00000000 [ 200.652237][ T4692] ERROR: Out of memory at tomoyo_realpath_from_path. [ 200.822899][ T29] audit: type=1400 audit(200.740:179): avc: denied { accept } for pid=4693 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 200.833200][ T29] audit: type=1400 audit(200.750:180): avc: denied { listen } for pid=4693 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 200.937416][ T29] audit: type=1400 audit(200.860:181): avc: denied { create } for pid=4693 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 204.030570][ T4711] FAULT_INJECTION: forcing a failure. [ 204.030570][ T4711] name failslab, interval 1, probability 0, space 0, times 0 [ 204.030859][ T4711] CPU: 1 UID: 0 PID: 4711 Comm: syz.1.383 Not tainted syzkaller #0 PREEMPT [ 204.030926][ T4711] Hardware name: ARM-Versatile Express [ 204.030942][ T4711] Call trace: [ 204.030968][ T4711] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 204.031026][ T4711] r7:00000c40 r6:00000000 r5:60000013 r4:82295754 [ 204.031037][ T4711] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 204.031065][ T4711] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 204.031222][ T4711] r5:8539a400 r4:82918c08 [ 204.031390][ T4711] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 204.031439][ T4711] [<80999328>] (should_fail_ex) from [<8053a058>] (should_failslab+0x6c/0x94) [ 204.031508][ T4711] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 204.031573][ T4711] [<80539fec>] (should_failslab) from [<80514c64>] (__kmalloc_noprof+0x9c/0x568) [ 204.031620][ T4711] [<80514bc8>] (__kmalloc_noprof) from [<807e3aa0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 204.031744][ T4711] r10:8539a400 r9:830a6000 r8:00000000 r7:8342c198 r6:857bde68 r5:00001000 [ 204.031937][ T4711] r4:00000000 [ 204.032062][ T4711] [<807e3a64>] (tomoyo_realpath_from_path) from [<807dfbe4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 204.032118][ T4711] r10:8539a400 r9:00000000 r8:857bde40 r7:c0185879 r6:00000004 r5:81cd6ac0 [ 204.032210][ T4711] r4:857bde68 r3:826c2240 [ 204.032274][ T4711] [<807dfb18>] (tomoyo_path_number_perm) from [<807e44c4>] (tomoyo_file_ioctl+0x1c/0x20) [ 204.032317][ T4711] r9:00000003 r8:857bde40 r7:00000000 r6:00000000 r5:c0185879 r4:857bde40 [ 204.032327][ T4711] [<807e44a8>] (tomoyo_file_ioctl) from [<807906d0>] (security_file_ioctl+0x64/0x1e4) [ 204.032407][ T4711] [<8079066c>] (security_file_ioctl) from [<805850f4>] (sys_ioctl+0x4c/0xba0) [ 204.032578][ T4711] r7:00000000 r6:857bde41 r5:00000000 r4:c0185879 [ 204.032622][ T4711] [<805850a8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 204.032796][ T4711] Exception stack(0xec639fa8 to 0xec639ff0) [ 204.033071][ T4711] 9fa0: 00000000 00000000 00000003 c0185879 00000000 00000000 [ 204.033277][ T4711] 9fc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76fd90bc [ 204.033349][ T4711] 9fe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 204.033370][ T4711] r10:00000036 r9:8539a400 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 204.033381][ T4711] r4:00000000 [ 204.036883][ T4711] ERROR: Out of memory at tomoyo_realpath_from_path. [ 204.547744][ T29] audit: type=1400 audit(204.470:182): avc: denied { create } for pid=4723 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 204.652658][ T4729] FAULT_INJECTION: forcing a failure. [ 204.652658][ T4729] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 204.652965][ T4729] CPU: 1 UID: 0 PID: 4729 Comm: syz.0.390 Not tainted syzkaller #0 PREEMPT [ 204.653020][ T4729] Hardware name: ARM-Versatile Express [ 204.653038][ T4729] Call trace: [ 204.653061][ T4729] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 204.653367][ T4729] r7:8539c800 r6:00000000 r5:60000013 r4:82295754 [ 204.653401][ T4729] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 204.653446][ T4729] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 204.653556][ T4729] r5:8539c800 r4:8294fc50 [ 204.653567][ T4729] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 204.653617][ T4729] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 204.653732][ T4729] r8:00010000 r7:8539c800 r6:00000003 r5:20000340 r4:ec865f5c [ 204.653812][ T4729] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 204.654133][ T4729] [<80999568>] (should_fail_usercopy) from [<806058e0>] (sys_open_by_handle_at+0x58/0x610) [ 204.654165][ T4729] [<80605888>] (sys_open_by_handle_at) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 204.654427][ T4729] Exception stack(0xec865fa8 to 0xec865ff0) [ 204.654476][ T4729] 5fa0: 00000000 00000000 00000003 20000340 00010000 00000000 [ 204.654512][ T4729] 5fc0: 00000000 00000000 001302c8 00000173 00300000 00000000 00006364 76ffd0bc [ 204.654542][ T4729] 5fe0: 76ffcec0 76ffceb0 0001929c 00132320 [ 204.654575][ T4729] r10:00000173 r9:8539c800 r8:8020029c r7:00000173 r6:001302c8 r5:00000000 [ 204.654598][ T4729] r4:00000000 [ 204.958524][ T4737] FAULT_INJECTION: forcing a failure. [ 204.958524][ T4737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.961748][ T4737] CPU: 0 UID: 0 PID: 4737 Comm: syz.0.394 Not tainted syzkaller #0 PREEMPT [ 204.961861][ T4737] Hardware name: ARM-Versatile Express [ 204.961894][ T4737] Call trace: [ 204.961938][ T4737] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 204.962043][ T4737] r7:00000000 r6:00000000 r5:60000013 r4:82295754 [ 204.962065][ T4737] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 204.962126][ T4737] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 204.962193][ T4737] r5:8539c800 r4:8294fc50 [ 204.962211][ T4737] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 204.962274][ T4737] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 204.962339][ T4737] r8:76ffcf30 r7:00000000 r6:00000000 r5:ec869f68 r4:00000002 [ 204.962356][ T4737] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 204.962410][ T4737] [<80999568>] (should_fail_usercopy) from [<805a6a18>] (simple_read_from_buffer+0x80/0x13c) [ 204.962479][ T4737] [<805a6998>] (simple_read_from_buffer) from [<8062474c>] (proc_fail_nth_read+0xb8/0x108) [ 204.962555][ T4737] r10:00000001 r9:80624694 r8:00000002 r7:ec869f68 r6:0000000f r5:76ffcf30 [ 204.962584][ T4737] r4:8539c800 r3:ec869e9f [ 204.962605][ T4737] [<80624694>] (proc_fail_nth_read) from [<8056a224>] (vfs_read+0x98/0x324) [ 204.962673][ T4737] r8:76ffcf30 r7:ec869f68 r6:8539c800 r5:0000000f r4:84c7e480 [ 204.962695][ T4737] [<8056a18c>] (vfs_read) from [<8056af34>] (ksys_read+0x74/0xe8) [ 204.962753][ T4737] r10:00000003 r9:8539c800 r8:8020029c r7:00000000 r6:00000000 r5:84c7e480 [ 204.962777][ T4737] r4:84c7e483 [ 204.962794][ T4737] [<8056aec0>] (ksys_read) from [<8056afb8>] (sys_read+0x10/0x14) [ 204.962848][ T4737] r7:00000003 r6:00000004 r5:76ffcf30 r4:0000000f [ 204.962866][ T4737] [<8056afa8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 204.962917][ T4737] Exception stack(0xec869fa8 to 0xec869ff0) [ 204.962959][ T4737] 9fa0: 0000000f 76ffcf30 00000004 76ffcf30 0000000f 00000000 [ 204.962995][ T4737] 9fc0: 0000000f 76ffcf30 00000004 00000003 00300000 00000000 00006364 76ffd0bc [ 204.963022][ T4737] 9fe0: 00000158 76ffced0 000d7fdc 001301ec [ 205.084428][ T29] audit: type=1400 audit(205.010:183): avc: denied { bind } for pid=4738 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 205.085967][ T29] audit: type=1400 audit(205.010:184): avc: denied { node_bind } for pid=4738 comm="syz.0.395" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 213.099114][ T29] audit: type=1400 audit(213.020:185): avc: denied { create } for pid=4775 comm="syz.0.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 214.424564][ C0] hrtimer: interrupt took 536144 ns [ 215.478095][ T4786] FAULT_INJECTION: forcing a failure. [ 215.478095][ T4786] name failslab, interval 1, probability 0, space 0, times 0 [ 215.478632][ T4786] CPU: 1 UID: 0 PID: 4786 Comm: syz.1.415 Not tainted syzkaller #0 PREEMPT [ 215.478729][ T4786] Hardware name: ARM-Versatile Express [ 215.478763][ T4786] Call trace: [ 215.478814][ T4786] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 215.479081][ T4786] r7:00000c40 r6:00000000 r5:60000013 r4:82295754 [ 215.479127][ T4786] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 215.479286][ T4786] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 215.479418][ T4786] r5:85399800 r4:82918c08 [ 215.479463][ T4786] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 215.479562][ T4786] [<80999328>] (should_fail_ex) from [<8053a058>] (should_failslab+0x6c/0x94) [ 215.479729][ T4786] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 215.479827][ T4786] [<80539fec>] (should_failslab) from [<80514c64>] (__kmalloc_noprof+0x9c/0x568) [ 215.479929][ T4786] [<80514bc8>] (__kmalloc_noprof) from [<807e3aa0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 215.480097][ T4786] r10:85399800 r9:833aec00 r8:00000000 r7:834c6330 r6:857bdda8 r5:00001000 [ 215.480189][ T4786] r4:00000000 [ 215.480360][ T4786] [<807e3a64>] (tomoyo_realpath_from_path) from [<807dfbe4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 215.480437][ T4786] r10:85399800 r9:00000000 r8:857bdd80 r7:00005450 r6:00000004 r5:81cd6ac0 [ 215.480527][ T4786] r4:857bdda8 r3:826c2240 [ 215.480622][ T4786] [<807dfb18>] (tomoyo_path_number_perm) from [<807e44c4>] (tomoyo_file_ioctl+0x1c/0x20) [ 215.480791][ T4786] r9:00000003 r8:857bdd80 r7:00000000 r6:00000000 r5:00005450 r4:857bdd80 [ 215.480832][ T4786] [<807e44a8>] (tomoyo_file_ioctl) from [<807906d0>] (security_file_ioctl+0x64/0x1e4) [ 215.480981][ T4786] [<8079066c>] (security_file_ioctl) from [<805850f4>] (sys_ioctl+0x4c/0xba0) [ 215.481022][ T4786] r7:00000000 r6:857bdd81 r5:00000000 r4:00005450 [ 215.481070][ T4786] [<805850a8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 215.481184][ T4786] Exception stack(0xeca85fa8 to 0xeca85ff0) [ 215.481213][ T4786] 5fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 215.481232][ T4786] 5fc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76fd90bc [ 215.481411][ T4786] 5fe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 215.481548][ T4786] r10:00000036 r9:85399800 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 215.481568][ T4786] r4:00000000 [ 215.488116][ T4786] ERROR: Out of memory at tomoyo_realpath_from_path. [ 230.931128][ T4823] FAULT_INJECTION: forcing a failure. [ 230.931128][ T4823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.931565][ T4823] CPU: 1 UID: 0 PID: 4823 Comm: syz.0.430 Not tainted syzkaller #0 PREEMPT [ 230.931641][ T4823] Hardware name: ARM-Versatile Express [ 230.931667][ T4823] Call trace: [ 230.931705][ T4823] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 230.931946][ T4823] r7:eccbde20 r6:00000000 r5:60000013 r4:82295754 [ 230.932180][ T4823] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 230.932435][ T4823] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 230.932618][ T4823] r5:85755400 r4:8294fc50 [ 230.932742][ T4823] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 230.933146][ T4823] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 230.933240][ T4823] r8:04048040 r7:eccbde20 r6:200000c0 r5:00000000 r4:eccbdf20 [ 230.933261][ T4823] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 230.933553][ T4823] [<80999568>] (should_fail_usercopy) from [<8159910c>] (copy_msghdr_from_user+0x50/0x130) [ 230.933716][ T4823] [<815990bc>] (copy_msghdr_from_user) from [<81599264>] (___sys_sendmsg+0x78/0xd0) [ 230.933790][ T4823] r8:04048040 r7:00000000 r6:85831180 r5:eccbdf20 r4:eccbde64 [ 230.934224][ T4823] [<815991ec>] (___sys_sendmsg) from [<81599720>] (__sys_sendmsg+0x8c/0xe0) [ 230.934357][ T4823] r10:00000128 r9:85755400 r8:857bd600 r7:04048040 r6:200000c0 r5:857bd601 [ 230.934390][ T4823] r4:00000003 [ 230.934410][ T4823] [<81599694>] (__sys_sendmsg) from [<81599788>] (sys_sendmsg+0x14/0x18) [ 230.934480][ T4823] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 230.934498][ T4823] [<81599774>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 230.934548][ T4823] Exception stack(0xeccbdfa8 to 0xeccbdff0) [ 230.934618][ T4823] dfa0: 00000000 00000000 00000003 200000c0 04048040 00000000 [ 230.934661][ T4823] dfc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76ffd0bc [ 230.934695][ T4823] dfe0: 76ffcec0 76ffceb0 0001929c 00132320 [ 242.916847][ T4865] FAULT_INJECTION: forcing a failure. [ 242.916847][ T4865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.921083][ T4865] CPU: 0 UID: 0 PID: 4865 Comm: syz.0.445 Not tainted syzkaller #0 PREEMPT [ 242.921175][ T4865] Hardware name: ARM-Versatile Express [ 242.921277][ T4865] Call trace: [ 242.921318][ T4865] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 242.921426][ T4865] r7:eceb5e20 r6:00000000 r5:60000013 r4:82295754 [ 242.921477][ T4865] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 242.921513][ T4865] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 242.921541][ T4865] r5:8539e000 r4:8294fc50 [ 242.921551][ T4865] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 242.921583][ T4865] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 242.921617][ T4865] r8:00008000 r7:eceb5e20 r6:20000280 r5:00000000 r4:eceb5f20 [ 242.921626][ T4865] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 242.921652][ T4865] [<80999568>] (should_fail_usercopy) from [<8159910c>] (copy_msghdr_from_user+0x50/0x130) [ 242.921688][ T4865] [<815990bc>] (copy_msghdr_from_user) from [<81599264>] (___sys_sendmsg+0x78/0xd0) [ 242.921723][ T4865] r8:00008000 r7:00000000 r6:85832000 r5:eceb5f20 r4:eceb5e64 [ 242.921733][ T4865] [<815991ec>] (___sys_sendmsg) from [<81599720>] (__sys_sendmsg+0x8c/0xe0) [ 242.921848][ T4865] r10:00000128 r9:8539e000 r8:84c7e9c0 r7:00008000 r6:20000280 r5:84c7e9c1 [ 242.921864][ T4865] r4:00000003 [ 242.921874][ T4865] [<81599694>] (__sys_sendmsg) from [<81599788>] (sys_sendmsg+0x14/0x18) [ 242.921916][ T4865] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 242.921926][ T4865] [<81599774>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 242.921954][ T4865] Exception stack(0xeceb5fa8 to 0xeceb5ff0) [ 242.921979][ T4865] 5fa0: 00000000 00000000 00000003 20000280 00008000 00000000 [ 242.921998][ T4865] 5fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76ffd0bc [ 242.922012][ T4865] 5fe0: 76ffcec0 76ffceb0 0001929c 00132320 [ 247.129758][ T4878] FAULT_INJECTION: forcing a failure. [ 247.129758][ T4878] name failslab, interval 1, probability 0, space 0, times 0 [ 247.130156][ T4878] CPU: 1 UID: 0 PID: 4878 Comm: syz.1.450 Not tainted syzkaller #0 PREEMPT [ 247.130249][ T4878] Hardware name: ARM-Versatile Express [ 247.130281][ T4878] Call trace: [ 247.130327][ T4878] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 247.130437][ T4878] r7:00000d40 r6:00000000 r5:60000013 r4:82295754 [ 247.130458][ T4878] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 247.130558][ T4878] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 247.130619][ T4878] r5:85399800 r4:82918c08 [ 247.130637][ T4878] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 247.130697][ T4878] [<80999328>] (should_fail_ex) from [<8053a058>] (should_failslab+0x6c/0x94) [ 247.130864][ T4878] r8:00000000 r7:00000d40 r6:00000021 r5:85445ffc r4:83001240 [ 247.130915][ T4878] [<80539fec>] (should_failslab) from [<80514c64>] (__kmalloc_noprof+0x9c/0x568) [ 247.130981][ T4878] [<80514bc8>] (__kmalloc_noprof) from [<807e39a8>] (tomoyo_encode2+0x64/0xf0) [ 247.131086][ T4878] r10:00000fff r9:830a6000 r8:00000000 r7:834344c8 r6:857bd7a8 r5:85445ffc [ 247.131131][ T4878] r4:85445fe6 [ 247.131276][ T4878] [<807e3944>] (tomoyo_encode2) from [<807e3a58>] (tomoyo_encode+0x24/0x30) [ 247.131392][ T4878] r9:830a6000 r8:00000000 r7:834344c8 r6:857bd7a8 r5:00001000 r4:85445fe7 [ 247.131736][ T4878] [<807e3a34>] (tomoyo_encode) from [<807e3ae4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 247.131901][ T4878] r5:00001000 r4:85445000 [ 247.131944][ T4878] [<807e3a64>] (tomoyo_realpath_from_path) from [<807dfbe4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 247.132599][ T4878] r10:85399800 r9:00000000 r8:857bd780 r7:4004af77 r6:00000004 r5:81cd6ac0 [ 247.132672][ T4878] r4:857bd7a8 r3:826c2240 [ 247.132991][ T4878] [<807dfb18>] (tomoyo_path_number_perm) from [<807e44c4>] (tomoyo_file_ioctl+0x1c/0x20) [ 247.133251][ T4878] r9:00000003 r8:857bd780 r7:00000000 r6:00000000 r5:4004af77 r4:857bd780 [ 247.133367][ T4878] [<807e44a8>] (tomoyo_file_ioctl) from [<807906d0>] (security_file_ioctl+0x64/0x1e4) [ 247.133784][ T4878] [<8079066c>] (security_file_ioctl) from [<805850f4>] (sys_ioctl+0x4c/0xba0) [ 247.133921][ T4878] r7:00000000 r6:857bd781 r5:00000000 r4:4004af77 [ 247.134045][ T4878] [<805850a8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 247.134169][ T4878] Exception stack(0xece85fa8 to 0xece85ff0) [ 247.134238][ T4878] 5fa0: 00000000 00000000 00000003 4004af77 00000000 00000000 [ 247.134271][ T4878] 5fc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76fd90bc [ 247.134297][ T4878] 5fe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 247.134330][ T4878] r10:00000036 r9:85399800 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 247.134349][ T4878] r4:00000000 [ 247.156254][ T4878] ERROR: Out of memory at tomoyo_realpath_from_path. [ 247.265041][ T4880] FAULT_INJECTION: forcing a failure. [ 247.265041][ T4880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 247.265418][ T4880] CPU: 1 UID: 0 PID: 4880 Comm: syz.1.451 Not tainted syzkaller #0 PREEMPT [ 247.265503][ T4880] Hardware name: ARM-Versatile Express [ 247.265530][ T4880] Call trace: [ 247.265569][ T4880] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 247.265665][ T4880] r7:00000000 r6:00000000 r5:60000013 r4:82295754 [ 247.265683][ T4880] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 247.265794][ T4880] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 247.265945][ T4880] r5:8539e000 r4:8294fc50 [ 247.266275][ T4880] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 247.266468][ T4880] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 247.266647][ T4880] r8:76fd8f30 r7:00000000 r6:00000000 r5:ecf59f68 r4:00000002 [ 247.266757][ T4880] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 247.267044][ T4880] [<80999568>] (should_fail_usercopy) from [<805a6a18>] (simple_read_from_buffer+0x80/0x13c) [ 247.267244][ T4880] [<805a6998>] (simple_read_from_buffer) from [<8062474c>] (proc_fail_nth_read+0xb8/0x108) [ 247.267312][ T4880] r10:00000001 r9:80624694 r8:00000002 r7:ecf59f68 r6:0000000f r5:76fd8f30 [ 247.267334][ T4880] r4:8539e000 r3:ecf59e9f [ 247.267350][ T4880] [<80624694>] (proc_fail_nth_read) from [<8056a224>] (vfs_read+0x98/0x324) [ 247.267405][ T4880] r8:76fd8f30 r7:ecf59f68 r6:8539e000 r5:0000000f r4:857bd480 [ 247.267459][ T4880] [<8056a18c>] (vfs_read) from [<8056af34>] (ksys_read+0x74/0xe8) [ 247.267512][ T4880] r10:00000003 r9:8539e000 r8:8020029c r7:00000000 r6:00000000 r5:857bd480 [ 247.267530][ T4880] r4:857bd483 [ 247.267546][ T4880] [<8056aec0>] (ksys_read) from [<8056afb8>] (sys_read+0x10/0x14) [ 247.267592][ T4880] r7:00000003 r6:00000005 r5:76fd8f30 r4:0000000f [ 247.267608][ T4880] [<8056afa8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 247.267647][ T4880] Exception stack(0xecf59fa8 to 0xecf59ff0) [ 247.267685][ T4880] 9fa0: 0000000f 76fd8f30 00000005 76fd8f30 0000000f 00000000 [ 247.267726][ T4880] 9fc0: 0000000f 76fd8f30 00000005 00000003 00300000 00000000 00006364 76fd90bc [ 247.267751][ T4880] 9fe0: 00000158 76fd8ed0 000d7fdc 001301ec [ 248.719323][ T4887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4887 comm=syz.0.454 [ 248.727994][ T29] audit: type=1400 audit(248.650:186): avc: denied { accept } for pid=4886 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 249.815531][ T29] audit: type=1400 audit(249.740:187): avc: denied { setattr } for pid=4897 comm="syz.0.458" name="NFC_RAW" dev="sockfs" ino=7219 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 249.833347][ T29] audit: type=1400 audit(249.750:188): avc: denied { read } for pid=4897 comm="syz.0.458" path="socket:[7219]" dev="sockfs" ino=7219 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 250.222906][ T4902] FAULT_INJECTION: forcing a failure. [ 250.222906][ T4902] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 250.223367][ T4902] CPU: 1 UID: 0 PID: 4902 Comm: syz.1.460 Not tainted syzkaller #0 PREEMPT [ 250.223462][ T4902] Hardware name: ARM-Versatile Express [ 250.223490][ T4902] Call trace: [ 250.223535][ T4902] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 250.223687][ T4902] r7:ecf89e20 r6:00000000 r5:60000013 r4:82295754 [ 250.223710][ T4902] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 250.223768][ T4902] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 250.223821][ T4902] r5:85398c00 r4:8294fc50 [ 250.223838][ T4902] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 250.223968][ T4902] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 250.224033][ T4902] r8:00004000 r7:ecf89e20 r6:20000800 r5:00000000 r4:ecf89f20 [ 250.224053][ T4902] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 250.224188][ T4902] [<80999568>] (should_fail_usercopy) from [<8159910c>] (copy_msghdr_from_user+0x50/0x130) [ 250.224641][ T4902] [<815990bc>] (copy_msghdr_from_user) from [<81599264>] (___sys_sendmsg+0x78/0xd0) [ 250.224928][ T4902] r8:00004000 r7:00000000 r6:8583c280 r5:ecf89f20 r4:ecf89e64 [ 250.225021][ T4902] [<815991ec>] (___sys_sendmsg) from [<81599720>] (__sys_sendmsg+0x8c/0xe0) [ 250.225273][ T4902] r10:00000128 r9:85398c00 r8:857bd600 r7:00004000 r6:20000800 r5:857bd601 [ 250.225406][ T4902] r4:00000005 [ 250.225445][ T4902] [<81599694>] (__sys_sendmsg) from [<81599788>] (sys_sendmsg+0x14/0x18) [ 250.225549][ T4902] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 250.225570][ T4902] [<81599774>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 250.225631][ T4902] Exception stack(0xecf89fa8 to 0xecf89ff0) [ 250.225673][ T4902] 9fa0: 00000000 00000000 00000005 20000800 00004000 00000000 [ 250.225710][ T4902] 9fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76fd90bc [ 250.225738][ T4902] 9fe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 250.349767][ T29] audit: type=1400 audit(250.270:189): avc: denied { ioctl } for pid=4897 comm="syz.0.458" path="socket:[7219]" dev="sockfs" ino=7219 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 250.373292][ T29] audit: type=1400 audit(250.290:190): avc: denied { connect } for pid=4897 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 250.374625][ T29] audit: type=1400 audit(250.290:191): avc: denied { setattr } for pid=4897 comm="syz.0.458" name="NETLINK" dev="sockfs" ino=7243 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 253.830446][ T4937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4937 comm=syz.0.474 [ 253.926806][ T29] audit: type=1400 audit(253.850:192): avc: denied { read } for pid=4938 comm="syz.0.475" path="socket:[7332]" dev="sockfs" ino=7332 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 254.435945][ T4941] netlink: 240 bytes leftover after parsing attributes in process `syz.0.475'. [ 254.970229][ T4941] netlink: 16 bytes leftover after parsing attributes in process `syz.0.475'. [ 255.136602][ T29] audit: type=1400 audit(255.060:193): avc: denied { write } for pid=4942 comm="syz.1.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 255.810107][ T4955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4955 comm=syz.0.479 [ 256.339287][ T4965] FAULT_INJECTION: forcing a failure. [ 256.339287][ T4965] name failslab, interval 1, probability 0, space 0, times 0 [ 256.342704][ T4965] CPU: 0 UID: 0 PID: 4965 Comm: syz.0.483 Not tainted syzkaller #0 PREEMPT [ 256.342902][ T4965] Hardware name: ARM-Versatile Express [ 256.342939][ T4965] Call trace: [ 256.342981][ T4965] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 256.343087][ T4965] r7:00000d40 r6:00000000 r5:60000013 r4:82295754 [ 256.343111][ T4965] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 256.343201][ T4965] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 256.343262][ T4965] r5:85753c00 r4:82918c08 [ 256.343280][ T4965] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 256.343335][ T4965] [<80999328>] (should_fail_ex) from [<8053a058>] (should_failslab+0x6c/0x94) [ 256.343441][ T4965] r8:00000000 r7:00000d40 r6:0000001d r5:85f3fffc r4:83001240 [ 256.343463][ T4965] [<80539fec>] (should_failslab) from [<80514c64>] (__kmalloc_noprof+0x9c/0x568) [ 256.343602][ T4965] [<80514bc8>] (__kmalloc_noprof) from [<807e39a8>] (tomoyo_encode2+0x64/0xf0) [ 256.343689][ T4965] r10:00000fff r9:830a6000 r8:00000000 r7:83419cc0 r6:84c7eb68 r5:85f3fffc [ 256.343714][ T4965] r4:85f3ffea [ 256.343733][ T4965] [<807e3944>] (tomoyo_encode2) from [<807e3a58>] (tomoyo_encode+0x24/0x30) [ 256.343804][ T4965] r9:830a6000 r8:00000000 r7:83419cc0 r6:84c7eb68 r5:00001000 r4:85f3ffeb [ 256.343821][ T4965] [<807e3a34>] (tomoyo_encode) from [<807e3ae4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 256.343888][ T4965] r5:00001000 r4:85f3f000 [ 256.343907][ T4965] [<807e3a64>] (tomoyo_realpath_from_path) from [<807dfbe4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 256.343985][ T4965] r10:85753c00 r9:00000000 r8:84c7eb40 r7:00005451 r6:00000004 r5:81cd6ac0 [ 256.344010][ T4965] r4:84c7eb68 r3:826c2240 [ 256.344029][ T4965] [<807dfb18>] (tomoyo_path_number_perm) from [<807e44c4>] (tomoyo_file_ioctl+0x1c/0x20) [ 256.344098][ T4965] r9:00000003 r8:84c7eb40 r7:00000000 r6:00000000 r5:00005451 r4:84c7eb40 [ 256.344118][ T4965] [<807e44a8>] (tomoyo_file_ioctl) from [<807906d0>] (security_file_ioctl+0x64/0x1e4) [ 256.344193][ T4965] [<8079066c>] (security_file_ioctl) from [<805850f4>] (sys_ioctl+0x4c/0xba0) [ 256.344260][ T4965] r7:00000000 r6:84c7eb41 r5:00000000 r4:00005451 [ 256.344280][ T4965] [<805850a8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 256.344330][ T4965] Exception stack(0xed8c1fa8 to 0xed8c1ff0) [ 256.344369][ T4965] 1fa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 256.344406][ T4965] 1fc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76ffd0bc [ 256.344433][ T4965] 1fe0: 76ffcec0 76ffceb0 0001929c 00132320 [ 256.344468][ T4965] r10:00000036 r9:85753c00 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 256.344489][ T4965] r4:00000000 [ 256.372158][ T4965] ERROR: Out of memory at tomoyo_realpath_from_path. [ 256.685277][ T4969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4969 comm=syz.0.485 [ 257.130201][ T4978] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4978 comm=syz.1.488 [ 257.135332][ T4978] FAULT_INJECTION: forcing a failure. [ 257.135332][ T4978] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.136918][ T4978] CPU: 0 UID: 0 PID: 4978 Comm: syz.1.488 Not tainted syzkaller #0 PREEMPT [ 257.137022][ T4978] Hardware name: ARM-Versatile Express [ 257.137045][ T4978] Call trace: [ 257.137079][ T4978] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 257.137179][ T4978] r7:ecf59ea4 r6:00000000 r5:60000013 r4:82295754 [ 257.137196][ T4978] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 257.137239][ T4978] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 257.137286][ T4978] r5:85755400 r4:8294fc50 [ 257.137299][ T4978] [<8021ee30>] (dump_stack) from [<809994ec>] (should_fail_ex+0x1c4/0x228) [ 257.137349][ T4978] [<80999328>] (should_fail_ex) from [<80999564>] (should_fail+0x14/0x18) [ 257.137403][ T4978] r8:85832a00 r7:ecf59ea4 r6:20000140 r5:ecf59ea8 r4:ecf59f20 [ 257.137417][ T4978] [<80999550>] (should_fail) from [<80999584>] (should_fail_usercopy+0x1c/0x20) [ 257.137461][ T4978] [<80999568>] (should_fail_usercopy) from [<8159910c>] (copy_msghdr_from_user+0x50/0x130) [ 257.137513][ T4978] [<815990bc>] (copy_msghdr_from_user) from [<81599320>] (___sys_recvmsg+0x64/0xbc) [ 257.137571][ T4978] r8:85832a00 r7:00000000 r6:20000140 r5:ecf59f20 r4:ecf59eac [ 257.137586][ T4978] [<815992bc>] (___sys_recvmsg) from [<81599a30>] (__sys_recvmsg+0x88/0xdc) [ 257.137643][ T4978] r8:84c7ed80 r7:00000000 r6:20000140 r5:84c7ed81 r4:00000003 [ 257.137658][ T4978] [<815999a8>] (__sys_recvmsg) from [<81599a98>] (sys_recvmsg+0x14/0x18) [ 257.137739][ T4978] r8:8020029c r7:00000129 r6:001302c8 r5:00000000 r4:00000000 [ 257.137754][ T4978] [<81599a84>] (sys_recvmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 257.137796][ T4978] Exception stack(0xecf59fa8 to 0xecf59ff0) [ 257.137828][ T4978] 9fa0: 00000000 00000000 00000003 20000140 00000000 00000000 [ 257.137858][ T4978] 9fc0: 00000000 00000000 001302c8 00000129 00300000 00000000 00006364 76fd90bc [ 257.137881][ T4978] 9fe0: 76fd8ec0 76fd8eb0 0001929c 00132320 [ 261.093424][ T5018] fuse: Unknown parameter 'd5' [ 261.101611][ T29] audit: type=1400 audit(261.020:194): avc: denied { create } for pid=5017 comm="syz.0.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 266.050791][ T5053] trusted_key: encrypted_key: keylen parameter is missing [ 266.162994][ T29] audit: type=1400 audit(266.080:195): avc: denied { read } for pid=5054 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 266.270224][ T5057] raw_sendmsg: syz.1.514 forgot to set AF_INET. Fix it! [ 269.209378][ T29] audit: type=1400 audit(269.130:196): avc: denied { map_read map_write } for pid=5091 comm="syz.0.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 269.239526][ T29] audit: type=1400 audit(269.160:197): avc: denied { prog_run } for pid=5091 comm="syz.0.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 277.993353][ T5175] 8021q: adding VLAN 0 to HW filter on device bond1 [ 278.294541][ T29] audit: type=1400 audit(278.210:198): avc: denied { module_load } for pid=5211 comm="syz.0.559" path="/]" dev="mqueue" ino=7087 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 278.294452][ T5213] kernel read not supported for file /] (pid: 5213 comm: syz.0.559) [ 279.695586][ T5230] pimreg1: tun_chr_ioctl cmd 1074025676 [ 279.696151][ T5230] pimreg1: owner set to 0 [ 281.841030][ T29] audit: type=1400 audit(281.760:199): avc: denied { write } for pid=5260 comm="syz.1.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 282.134210][ T29] audit: type=1400 audit(282.050:200): avc: denied { name_bind } for pid=5263 comm="syz.0.579" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 283.030199][ T5275] bond0: default FDB implementation only supports local addresses [ 283.158764][ T29] audit: type=1400 audit(283.080:201): avc: denied { mount } for pid=5277 comm="syz.1.586" name="/" dev="ramfs" ino=7812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 285.801597][ T29] audit: type=1400 audit(285.720:202): avc: denied { mount } for pid=5304 comm="syz.0.595" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 285.806673][ T29] audit: type=1400 audit(285.730:203): avc: denied { search } for pid=5304 comm="syz.0.595" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 285.812439][ T29] audit: type=1400 audit(285.730:204): avc: denied { search } for pid=5304 comm="syz.0.595" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 285.815339][ T29] audit: type=1400 audit(285.730:205): avc: denied { read open } for pid=5304 comm="syz.0.595" path="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 287.472516][ T29] audit: type=1400 audit(287.390:206): avc: denied { watch watch_reads } for pid=5315 comm="syz.1.598" path="/proc/655" dev="proc" ino=8325 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 287.481620][ T29] audit: type=1400 audit(287.400:207): avc: denied { name_bind } for pid=5316 comm="syz.0.599" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 288.410122][ T5346] netlink: 4 bytes leftover after parsing attributes in process `syz.0.603'. [ 288.686071][ T5351] netlink: 20 bytes leftover after parsing attributes in process `syz.1.604'. [ 289.346900][ T29] audit: type=1400 audit(289.270:208): avc: denied { block_suspend } for pid=5357 comm="syz.1.607" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 289.494794][ T29] audit: type=1400 audit(289.420:209): avc: denied { unmount } for pid=5352 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 292.444421][ T29] audit: type=1400 audit(292.360:210): avc: denied { name_bind } for pid=5389 comm="syz.0.617" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 293.359061][ T29] audit: type=1400 audit(293.280:211): avc: denied { create } for pid=5395 comm="syz.0.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 295.325705][ T29] audit: type=1400 audit(295.240:212): avc: denied { read } for pid=5407 comm="syz.0.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 301.559008][ T5447] fuse: Bad value for 'fd' [ 301.828740][ T29] audit: type=1400 audit(301.750:213): avc: denied { watch } for pid=5448 comm="syz.0.643" path="/345" dev="tmpfs" ino=1770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 306.255990][ T5481] sch_tbf: burst 9 is lower than device lo mtu (65550) ! [ 307.072251][ T5487] mmap: syz.0.660 (5487) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 313.538687][ T5520] fuse: Bad value for 'fd' [ 328.175291][ T29] audit: type=1400 audit(328.100:214): avc: denied { accept } for pid=5559 comm="syz.1.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 336.504466][ T29] audit: type=1400 audit(336.410:215): avc: denied { read } for pid=5592 comm="syz.0.694" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 338.066406][ T29] audit: type=1400 audit(337.990:216): avc: denied { nlmsg_tty_audit } for pid=5606 comm="syz.0.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 342.985829][ T5617] netlink: 8 bytes leftover after parsing attributes in process `syz.1.706'. [ 358.490197][ T5658] veth1_to_hsr: entered promiscuous mode [ 358.496878][ T29] audit: type=1400 audit(358.420:217): avc: denied { bind } for pid=5657 comm="syz.0.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 358.508460][ T5658] veth1_to_hsr: left promiscuous mode [ 359.691324][ T29] audit: type=1400 audit(359.610:218): avc: denied { nlmsg_read } for pid=5667 comm="syz.0.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 363.098396][ T5713] netlink: 25 bytes leftover after parsing attributes in process `syz.0.727'. [ 363.119766][ T5713] netlink: 'syz.0.727': attribute type 4 has an invalid length. [ 363.996931][ T5721] batadv_slave_1: entered promiscuous mode [ 364.012655][ T5720] batadv_slave_1: left promiscuous mode [ 368.501362][ T5751] SELinux: Context system_u:object_r:man_t:s0 is not valid (left unmapped). [ 368.503339][ T29] audit: type=1400 audit(368.420:219): avc: denied { relabelto } for pid=5750 comm="syz.1.738" name="317" dev="tmpfs" ino=1629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 368.504520][ T29] audit: type=1400 audit(368.420:220): avc: denied { associate } for pid=5750 comm="syz.1.738" name="317" dev="tmpfs" ino=1629 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:man_t:s0" [ 368.513181][ T29] audit: type=1400 audit(368.430:221): avc: denied { add_name } for pid=5750 comm="syz.1.738" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 368.515434][ T29] audit: type=1400 audit(368.440:222): avc: denied { create } for pid=5750 comm="syz.1.738" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 368.515825][ T29] audit: type=1400 audit(368.440:223): avc: denied { associate } for pid=5750 comm="syz.1.738" name="file2" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 368.516798][ T29] audit: type=1400 audit(368.440:224): avc: denied { read write open } for pid=5750 comm="syz.1.738" path="/317/file2" dev="tmpfs" ino=1634 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 368.532014][ T29] audit: type=1400 audit(368.450:225): avc: denied { remove_name } for pid=3095 comm="syz-executor" name="file2" dev="tmpfs" ino=1634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 368.542158][ T29] audit: type=1400 audit(368.460:226): avc: denied { unlink } for pid=3095 comm="syz-executor" name="file2" dev="tmpfs" ino=1634 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 368.560892][ T29] audit: type=1400 audit(368.480:227): avc: denied { rmdir } for pid=3095 comm="syz-executor" name="317" dev="tmpfs" ino=1629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 369.765068][ T29] audit: type=1400 audit(369.690:228): avc: denied { setopt } for pid=5769 comm="syz.0.745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 370.592212][ T5778] lo: entered allmulticast mode [ 370.648021][ T5777] lo: left allmulticast mode [ 371.807287][ T5780] netlink: 220 bytes leftover after parsing attributes in process `syz.0.749'. [ 394.640188][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 394.645416][ T29] audit: type=1400 audit(394.560:230): avc: denied { bind } for pid=5821 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 394.647892][ T29] audit: type=1400 audit(394.570:231): avc: denied { listen } for pid=5821 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 394.656511][ T29] audit: type=1400 audit(394.580:232): avc: denied { connect } for pid=5821 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 394.676377][ T29] audit: type=1400 audit(394.600:233): avc: denied { accept } for pid=5821 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 394.679059][ T29] audit: type=1400 audit(394.600:234): avc: denied { read } for pid=5821 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 397.495652][ T29] audit: type=1400 audit(397.380:235): avc: denied { create } for pid=5827 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 435.824569][ T5441] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 435.989826][ T5441] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 435.998815][ T5441] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 435.999018][ T5441] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 436.000686][ T5441] usb 2-1: Product: syz [ 436.000773][ T5441] usb 2-1: Manufacturer: syz [ 436.000809][ T5441] usb 2-1: SerialNumber: syz [ 436.469991][ T29] audit: type=1400 audit(436.390:236): avc: denied { read } for pid=5897 comm="syz.0.789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 436.565209][ T29] audit: type=1400 audit(436.490:237): avc: denied { setopt } for pid=5890 comm="syz.1.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 436.584968][ T5441] cdc_ncm 2-1:1.0: bind() failure [ 436.607382][ T5441] cdc_ncm 2-1:1.1: probe with driver cdc_ncm failed with error -71 [ 436.608903][ T5441] cdc_mbim 2-1:1.1: probe with driver cdc_mbim failed with error -71 [ 436.611645][ T5441] usbtest 2-1:1.1: probe with driver usbtest failed with error -71 [ 436.618381][ T5441] usb 2-1: USB disconnect, device number 3 [ 436.964580][ T5441] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 437.124999][ T5441] usb 2-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 437.125366][ T5441] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 437.135867][ T5441] usb 2-1: config 0 descriptor?? [ 437.152329][ T5441] asix 2-1:0.0: probe with driver asix failed with error -22 [ 446.380869][ T29] audit: type=1400 audit(446.300:238): avc: denied { getopt } for pid=5992 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 446.626728][ T29] audit: type=1400 audit(446.540:239): avc: denied { unlink } for pid=3094 comm="syz-executor" name="file0" dev="tmpfs" ino=2443 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 447.386630][ T5441] usb 2-1: USB disconnect, device number 4 [ 447.564989][ T6007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14385 sclass=netlink_route_socket pid=6007 comm=syz.1.817 [ 451.159139][ T29] audit: type=1326 audit(451.080:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.161060][ T29] audit: type=1326 audit(451.080:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.167137][ T29] audit: type=1326 audit(451.090:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.167884][ T29] audit: type=1326 audit(451.090:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.172394][ T29] audit: type=1326 audit(451.090:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.177864][ T29] audit: type=1326 audit(451.100:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.198068][ T29] audit: type=1326 audit(451.110:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 451.198474][ T29] audit: type=1326 audit(451.110:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6043 comm="syz.1.833" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 452.985393][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 452.987524][ T29] audit: type=1400 audit(452.910:260): avc: denied { watch_reads } for pid=6064 comm="syz.1.842" path="/349" dev="tmpfs" ino=1793 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 453.191445][ T29] audit: type=1400 audit(453.110:261): avc: denied { allowed } for pid=6067 comm="syz.0.844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 463.908145][ T29] audit: type=1400 audit(463.830:262): avc: denied { checkpoint_restore } for pid=6121 comm="syz.1.866" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 467.586098][ T6152] syz.1.878 uses obsolete (PF_INET,SOCK_PACKET) [ 477.447440][ T6191] futex_wake_op: syz.0.888 tries to shift op by 32; fix this program [ 484.011151][ T6218] netlink: 36 bytes leftover after parsing attributes in process `syz.0.896'. [ 484.012942][ T6218] netlink: 36 bytes leftover after parsing attributes in process `syz.0.896'. [ 497.439365][ T29] audit: type=1400 audit(497.360:263): avc: denied { setopt } for pid=6232 comm="syz.0.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 498.705535][ T29] audit: type=1326 audit(498.630:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 498.707179][ T29] audit: type=1326 audit(498.630:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 498.716260][ T29] audit: type=1326 audit(498.640:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x132320 code=0x7ffc0000 [ 498.718157][ T29] audit: type=1326 audit(498.640:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 498.726754][ T29] audit: type=1326 audit(498.650:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=380 compat=0 ip=0x132320 code=0x7ffc0000 [ 498.814487][ T29] audit: type=1326 audit(498.730:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.016260][ T29] audit: type=1326 audit(498.930:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.085698][ T29] audit: type=1326 audit(499.010:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.145393][ T29] audit: type=1326 audit(499.070:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.0.903" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 505.456973][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 505.457568][ T29] audit: type=1400 audit(505.380:292): avc: denied { connect } for pid=6246 comm="syz.1.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 536.655125][ T29] audit: type=1400 audit(536.580:293): avc: denied { getopt } for pid=6344 comm="syz.1.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 536.758655][ T29] audit: type=1400 audit(536.680:294): avc: denied { override_creds } for pid=6346 comm="syz.1.944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 537.195679][ T29] audit: type=1400 audit(537.120:295): avc: denied { bind } for pid=6356 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 537.384800][ T5141] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 537.535477][ T5141] usb 2-1: Using ep0 maxpacket: 16 [ 537.589658][ T5141] usb 2-1: config 8 has an invalid interface number: 159 but max is 0 [ 537.590116][ T5141] usb 2-1: config 8 has no interface number 0 [ 537.595122][ T5141] usb 2-1: config 8 interface 159 has no altsetting 0 [ 537.707066][ T5141] usb 2-1: New USB device found, idVendor=0c45, idProduct=612a, bcdDevice=29.9c [ 537.707395][ T5141] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 537.714803][ T5141] usb 2-1: Product: syz [ 537.717311][ T5141] usb 2-1: Manufacturer: syz [ 537.717617][ T5141] usb 2-1: SerialNumber: syz [ 538.041070][ T5141] usb 2-1: USB disconnect, device number 5 [ 540.778632][ T6399] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6399 comm=syz.0.962 [ 545.492463][ T6410] netlink: 16 bytes leftover after parsing attributes in process `syz.0.966'. [ 551.665289][ T6412] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6412 comm=syz.1.967 [ 552.922115][ T29] audit: type=1400 audit(552.840:296): avc: denied { create } for pid=6413 comm="syz.0.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 553.417850][ T6418] netlink: 24 bytes leftover after parsing attributes in process `syz.0.969'. [ 556.376074][ T6435] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6435 comm=syz.1.977 [ 557.221149][ T29] audit: type=1400 audit(557.140:297): avc: denied { create } for pid=6440 comm="syz.0.980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 557.227495][ T29] audit: type=1400 audit(557.150:298): avc: denied { setopt } for pid=6440 comm="syz.0.980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 559.510922][ T6448] x_tables: duplicate underflow at hook 4 [ 568.599973][ T29] audit: type=1400 audit(568.520:299): avc: denied { ioctl } for pid=6472 comm="syz.0.992" path="socket:[10631]" dev="sockfs" ino=10631 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.582018][ T6513] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1004'. [ 580.352384][ T6527] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1008'. [ 583.586987][ T6531] netlink: 68 bytes leftover after parsing attributes in process `syz.1.1009'. [ 588.216890][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.358990][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.428041][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.488348][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.935089][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 588.958605][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 588.967756][ T12] bond0 (unregistering): Released all slaves [ 589.429491][ T12] bond1 (unregistering): Released all slaves [ 589.578101][ T12] hsr_slave_0: left promiscuous mode [ 589.589079][ T12] hsr_slave_1: left promiscuous mode [ 589.620704][ T12] veth1_macvtap: left promiscuous mode [ 589.621517][ T12] veth0_macvtap: left promiscuous mode [ 589.622385][ T12] veth1_vlan: left promiscuous mode [ 589.622569][ T12] veth0_vlan: left promiscuous mode [ 592.430912][ T6558] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 592.461720][ T6558] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 593.851395][ T6558] hsr_slave_0: entered promiscuous mode [ 593.860583][ T6558] hsr_slave_1: entered promiscuous mode [ 593.862997][ T6558] debugfs: 'hsr0' already exists in 'hsr' [ 593.867862][ T6558] Cannot create hsr debugfs directory [ 594.730435][ T6558] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 594.750913][ T6558] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 594.773493][ T6558] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 594.799449][ T6558] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 595.829386][ T6558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 600.508988][ T6558] veth0_vlan: entered promiscuous mode [ 600.541442][ T6558] veth1_vlan: entered promiscuous mode [ 600.646251][ T6558] veth0_macvtap: entered promiscuous mode [ 600.665554][ T6558] veth1_macvtap: entered promiscuous mode [ 600.811846][ T2416] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 600.813396][ T2416] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 600.816027][ T2416] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 600.819485][ T2416] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 601.010841][ T29] audit: type=1400 audit(600.930:300): avc: denied { unmount } for pid=6558 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 601.956188][ T29] audit: type=1400 audit(601.870:301): avc: denied { shutdown } for pid=6950 comm="syz.0.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 602.442073][ T6957] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1023'. [ 602.445000][ T6957] ip6gretap0: entered promiscuous mode [ 602.446877][ T6957] ip6gretap0: entered allmulticast mode [ 602.695310][ T6961] veth2: entered promiscuous mode [ 602.696265][ T6961] veth2: entered allmulticast mode [ 604.730215][ T6981] bond0: (slave bond_slave_0): Releasing backup interface [ 604.742161][ T6981] bond0: (slave bond_slave_1): Releasing backup interface [ 604.749255][ T6981] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 605.880229][ T6992] [U] [ 605.965263][ T6997] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1034'. [ 615.554614][ T7038] syzkaller0: entered promiscuous mode [ 615.555699][ T7038] syzkaller0: entered allmulticast mode [ 633.918570][ T7081] netlink: 182 bytes leftover after parsing attributes in process `syz.1.1055'. [ 641.805776][ T5160] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 641.960230][ T5160] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 641.962546][ T5160] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 641.967651][ T5160] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 641.968710][ T5160] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 641.969851][ T5160] usb 1-1: Manufacturer: syz [ 641.975532][ T5160] usb 1-1: config 0 descriptor?? [ 642.124567][ T5160] rc_core: IR keymap rc-hauppauge not found [ 642.125772][ T5160] Registered IR keymap rc-empty [ 642.129413][ T5160] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0 [ 642.132464][ T5160] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0/input3 [ 644.186353][ T7091] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 644.187463][ T7091] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 644.208347][ T5381] usb 1-1: USB disconnect, device number 3 [ 647.726274][ T7134] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1067'. [ 651.794263][ T5140] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 651.955993][ T5140] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 651.957264][ T5140] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 651.958641][ T5140] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 651.960220][ T5140] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 651.964076][ T5140] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 651.969924][ T5140] usb 1-1: config 0 descriptor?? [ 652.434051][ T5140] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 653.874843][ T7168] input: syz1 as /devices/virtual/input/input5 [ 653.875759][ T7168] input: failed to attach handler leds to device input5, error: -6 [ 654.508103][ T5140] usb 1-1: USB disconnect, device number 4 [ 655.404924][ T5140] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 655.563996][ T5140] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 655.565232][ T5140] usb 1-1: New USB device found, idVendor=041e, idProduct=2801, bcdDevice= 0.00 [ 655.566818][ T5140] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 655.578389][ T5140] usb 1-1: config 0 descriptor?? [ 656.010098][ T5140] prodikeys 0003:041E:2801.0002: hidraw0: USB HID v0.02 Device [HID 041e:2801] on usb-dummy_hcd.0-1/input0 [ 656.209999][ T7176] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7176 comm=syz.0.1076 [ 656.223116][ T5441] usb 1-1: USB disconnect, device number 5 [ 658.395211][ T7216] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1079'. [ 658.444578][ T29] audit: type=1400 audit(658.280:302): avc: denied { map } for pid=7212 comm="syz.0.1079" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 661.389447][ T29] audit: type=1400 audit(661.310:303): avc: denied { mounton } for pid=7227 comm="syz.1.1082" path="/435/file0" dev="tmpfs" ino=2241 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 661.854664][ T5381] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 662.015624][ T5381] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 662.016007][ T5381] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 662.016257][ T5381] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 662.016297][ T5381] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 662.035403][ T7232] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 662.048496][ T5381] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 662.389234][ T5381] usb 2-1: USB disconnect, device number 6 [ 662.535612][ T712] hid-generic 0006:0E5A:06C8.0003: item fetching failed at offset 0/5 [ 662.537282][ T712] hid-generic 0006:0E5A:06C8.0003: probe with driver hid-generic failed with error -22 [ 668.616444][ T29] audit: type=1400 audit(668.540:304): avc: denied { setopt } for pid=7278 comm="syz.0.1089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 668.627557][ T7281] netlink: 'syz.0.1089': attribute type 13 has an invalid length. [ 681.547545][ T7285] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1090'. [ 681.549335][ T7285] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1090'. [ 681.550578][ T7285] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1090'. [ 681.551966][ T7285] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1090'. [ 681.623533][ T7285] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 683.957558][ T7292] netlink: 666 bytes leftover after parsing attributes in process `syz.0.1093'. [ 684.145610][ T7297] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1095'. [ 684.501392][ T29] audit: type=1400 audit(684.420:305): avc: denied { setopt } for pid=7304 comm="syz.0.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 685.222699][ T29] audit: type=1400 audit(685.140:306): avc: denied { getopt } for pid=7306 comm="syz.1.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 699.936498][ T7447] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1108'. [ 699.974326][ T7447] hsr_slave_0: left promiscuous mode [ 699.994911][ T7447] hsr_slave_1: left promiscuous mode [ 700.598681][ T7455] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1110'. [ 702.094929][ T5160] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 702.336064][ T5160] usb 1-1: New USB device found, idVendor=1660, idProduct=0932, bcdDevice=80.ea [ 702.336385][ T5160] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 702.339758][ T5160] usb 1-1: Product: syz [ 702.340180][ T5160] usb 1-1: Manufacturer: syz [ 702.340233][ T5160] usb 1-1: SerialNumber: syz [ 702.346357][ T5160] usb 1-1: config 0 descriptor?? [ 702.614442][ T5156] usb 1-1: USB disconnect, device number 6 [ 702.894536][ T7283] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 703.100401][ T7283] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 703.102102][ T7283] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 703.104485][ T7283] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 703.105501][ T7283] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 703.118162][ T7283] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 703.118798][ T7283] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 703.128417][ T7283] usb 2-1: Manufacturer: syz [ 703.135501][ T7283] usb 2-1: config 0 descriptor?? [ 703.572169][ T7283] appleir 0003:05AC:8243.0004: unknown main item tag 0x0 [ 703.596119][ T7283] appleir 0003:05AC:8243.0004: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.1-1/input0 [ 705.920923][ T5160] usb 2-1: USB disconnect, device number 7 [ 706.074416][ T5160] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 706.238134][ T5160] usb 2-1: config 0 interface 0 altsetting 251 endpoint 0x9 has invalid wMaxPacketSize 0 [ 706.238384][ T5160] usb 2-1: config 0 interface 0 has no altsetting 0 [ 706.258226][ T5160] usb 2-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=99.0b [ 706.258496][ T5160] usb 2-1: New USB device strings: Mfr=1, Product=228, SerialNumber=2 [ 706.260294][ T5160] usb 2-1: Product: syz [ 706.261094][ T5160] usb 2-1: Manufacturer: syz [ 706.261241][ T5160] usb 2-1: SerialNumber: syz [ 706.265214][ T5160] usb 2-1: config 0 descriptor?? [ 706.290758][ T5160] usb 2-1: selecting invalid altsetting 0 [ 707.024306][ T5160] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 707.174143][ T5160] usb 1-1: Using ep0 maxpacket: 16 [ 707.186535][ T5160] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 707.186815][ T5160] usb 1-1: New USB device found, idVendor=04d8, idProduct=00dd, bcdDevice= 0.00 [ 707.189015][ T5160] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 707.191211][ T5160] usb 1-1: config 0 descriptor?? [ 707.659321][ T5160] mcp2221 0003:04D8:00DD.0005: USB HID v0.05 Device [HID 04d8:00dd] on usb-dummy_hcd.0-1/input0 [ 708.157389][ T5156] usb 2-1: USB disconnect, device number 8 [ 716.015484][ T41] usb 1-1: USB disconnect, device number 7 [ 732.130921][ T7656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7656 comm=syz.0.1154 [ 732.132400][ T7656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=7656 comm=syz.0.1154 [ 732.396369][ T7659] netlink: 'syz.1.1155': attribute type 12 has an invalid length. [ 740.630787][ T7701] netlink: 'syz.0.1172': attribute type 1 has an invalid length. [ 740.684713][ T7701] 8021q: adding VLAN 0 to HW filter on device bond1 [ 740.698104][ T29] audit: type=1400 audit(740.620:307): avc: denied { mount } for pid=7700 comm="syz.0.1172" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 740.730821][ T7701] bond1: (slave gretap1): making interface the new active one [ 740.742247][ T7701] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 741.139433][ T29] audit: type=1326 audit(741.060:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7744 comm="syz.1.1177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 741.142670][ T29] audit: type=1326 audit(741.060:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7744 comm="syz.1.1177" exe="/syz-executor" sig=0 arch=40000028 syscall=315 compat=0 ip=0x132320 code=0x7ffc0000 [ 741.146944][ T29] audit: type=1326 audit(741.070:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7744 comm="syz.1.1177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 741.149516][ T29] audit: type=1326 audit(741.070:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7744 comm="syz.1.1177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 747.685807][ T7773] process 'syz.0.1188' launched './file1' with NULL argv: empty string added [ 747.687226][ T29] audit: type=1400 audit(747.610:312): avc: denied { execute_no_trans } for pid=7772 comm="syz.0.1188" path="/113/file1" dev="tmpfs" ino=593 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 747.757161][ T7775] trusted_key: encrypted_key: keylen parameter is missing [ 755.661157][ T29] audit: type=1400 audit(755.580:313): avc: denied { read } for pid=7835 comm="syz.1.1215" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 755.664714][ T29] audit: type=1400 audit(755.590:314): avc: denied { open } for pid=7835 comm="syz.1.1215" path="/479/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 755.726677][ T7839] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 755.727228][ T7839] block device autoloading is deprecated and will be removed. [ 755.741709][ T29] audit: type=1400 audit(755.660:315): avc: denied { ioctl } for pid=7835 comm="syz.1.1215" path="/479/file0/file0" dev="fuse" ino=64 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 755.764663][ T29] audit: type=1326 audit(755.670:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 755.767000][ T29] audit: type=1326 audit(755.690:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 755.769464][ T29] audit: type=1326 audit(755.690:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132320 code=0x7ffc0000 [ 755.772000][ T29] audit: type=1326 audit(755.690:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 755.774322][ T29] audit: type=1326 audit(755.690:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 755.805819][ T29] audit: type=1326 audit(755.730:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=217 compat=0 ip=0x132320 code=0x7ffc0000 [ 755.817395][ T29] audit: type=1326 audit(755.740:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7840 comm="syz.0.1216" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 761.758493][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 761.765012][ T29] audit: type=1400 audit(761.670:324): avc: denied { watch } for pid=7890 comm="syz.1.1234" path="/488/mnt" dev="tmpfs" ino=2516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 768.133241][ T29] audit: type=1326 audit(768.050:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.1.1245" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7fc00000 [ 768.156149][ T29] audit: type=1326 audit(768.070:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.1.1245" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x132320 code=0x7fc00000 [ 768.171202][ T29] audit: type=1326 audit(768.090:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.1.1245" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7fc00000 [ 769.942260][ T29] audit: type=1400 audit(769.860:328): avc: denied { setcurrent } for pid=7941 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 770.066252][ T7945] IPv6: Can't replace route, no match found [ 770.856936][ T7957] ======================================================= [ 770.856936][ T7957] WARNING: The mand mount option has been deprecated and [ 770.856936][ T7957] and is ignored by this kernel. Remove the mand [ 770.856936][ T7957] option from the mount to silence this warning. [ 770.856936][ T7957] ======================================================= [ 771.988289][ T7731] bond0 (unregistering): Released all slaves [ 777.088732][ T7973] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 777.106917][ T7973] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 778.345404][ T7973] hsr_slave_0: entered promiscuous mode [ 778.352710][ T7973] hsr_slave_1: entered promiscuous mode [ 778.666758][ T7973] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 778.676568][ T7973] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 778.686404][ T7973] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 778.694499][ T7973] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 779.559374][ T7973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 782.401101][ T7973] veth0_vlan: entered promiscuous mode [ 782.429949][ T7973] veth1_vlan: entered promiscuous mode [ 782.526318][ T7973] veth0_macvtap: entered promiscuous mode [ 782.540068][ T7973] veth1_macvtap: entered promiscuous mode [ 782.645705][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.647297][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.651292][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.653119][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 788.271821][ T29] audit: type=1400 audit(789.187:329): avc: denied { create } for pid=8439 comm="syz.0.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 810.147019][ T8729] syzkaller0: entered allmulticast mode [ 820.110817][ T29] audit: type=1400 audit(821.007:330): avc: denied { relabelfrom } for pid=8860 comm="syz.0.1450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 820.121631][ T29] audit: type=1400 audit(821.027:331): avc: denied { relabelto } for pid=8860 comm="syz.0.1450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 844.682598][ T8912] comedi: valid board names for 8255 driver are: [ 844.683049][ T8912] 8255 [ 844.684742][ T8912] comedi: valid board names for vmk80xx driver are: [ 844.685139][ T8912] vmk80xx [ 844.685335][ T8912] comedi: valid board names for usbduxsigma driver are: [ 844.685383][ T8912] usbduxsigma [ 844.685436][ T8912] comedi: valid board names for usbduxfast driver are: [ 844.685489][ T8912] usbduxfast [ 844.685541][ T8912] comedi: valid board names for usbdux driver are: [ 844.685565][ T8912] usbdux [ 844.685579][ T8912] comedi: valid board names for ni6501 driver are: [ 844.685613][ T8912] ni6501 [ 844.685629][ T8912] comedi: valid board names for dt9812 driver are: [ 844.685663][ T8912] dt9812 [ 844.685710][ T8912] comedi: valid board names for ni_labpc_cs driver are: [ 844.685731][ T8912] ni_labpc_cs [ 844.685809][ T8912] comedi: valid board names for ni_daq_700 driver are: [ 844.685831][ T8912] ni_daq_700 [ 844.685844][ T8912] comedi: valid board names for labpc_pci driver are: [ 844.685858][ T8912] labpc_pci [ 844.685888][ T8912] comedi: valid board names for adl_pci9118 driver are: [ 844.685967][ T8912] pci9118dg [ 844.686098][ T8912] pci9118hg [ 844.686119][ T8912] pci9118hr [ 844.686139][ T8912] comedi: valid board names for 8255_pci driver are: [ 844.686203][ T8912] 8255_pci [ 844.686264][ T8912] comedi: valid board names for comedi_parport driver are: [ 844.686319][ T8912] comedi_parport [ 844.686372][ T8912] comedi: valid board names for comedi_test driver are: [ 844.686408][ T8912] comedi_test [ 844.686498][ T8912] comedi: valid board names for comedi_bond driver are: [ 844.686520][ T8912] comedi_bond [ 845.424612][ T8856] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 845.575350][ T8856] usb 1-1: Using ep0 maxpacket: 32 [ 845.620046][ T8856] usb 1-1: config index 0 descriptor too short (expected 6683, got 27) [ 845.620413][ T8856] usb 1-1: config 0 has an invalid interface number: 85 but max is 0 [ 845.624508][ T8856] usb 1-1: config 0 has no interface number 0 [ 845.625780][ T8856] usb 1-1: config 0 interface 85 altsetting 7 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 845.626163][ T8856] usb 1-1: config 0 interface 85 altsetting 7 endpoint 0x82 has invalid wMaxPacketSize 0 [ 845.626234][ T8856] usb 1-1: config 0 interface 85 has no altsetting 0 [ 845.697776][ T8856] usb 1-1: New USB device found, idVendor=05ac, idProduct=0219, bcdDevice=f0.72 [ 845.698146][ T8856] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 845.699844][ T8856] usb 1-1: Product: syz [ 845.700135][ T8856] usb 1-1: Manufacturer: syz [ 845.700299][ T8856] usb 1-1: SerialNumber: syz [ 845.709051][ T8856] usb 1-1: config 0 descriptor?? [ 846.148462][ T8856] appletouch 1-1:0.85: Failed to request geyser raw mode [ 846.150480][ T8856] appletouch 1-1:0.85: probe with driver appletouch failed with error -5 [ 846.171005][ T8856] usb 1-1: USB disconnect, device number 8 [ 855.885430][ T29] audit: type=1400 audit(856.797:332): avc: denied { mounton } for pid=8941 comm="syz.0.1472" path="/proc/612/cgroup" dev="proc" ino=15889 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 858.034904][ T29] audit: type=1400 audit(858.947:333): avc: denied { sqpoll } for pid=8943 comm="syz.2.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 872.849091][ T8964] netlink: 'syz.2.1480': attribute type 13 has an invalid length. [ 872.853028][ T8964] netlink: 'syz.2.1480': attribute type 27 has an invalid length. [ 880.055300][ T29] audit: type=1400 audit(880.967:334): avc: denied { name_bind 0x1000000 } for pid=8995 comm="syz.2.1493" path="socket:[15968]" dev="sockfs" ino=15968 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 880.311047][ T29] audit: type=1400 audit(881.227:335): avc: denied { lock } for pid=8997 comm="syz.2.1494" path="socket:[15099]" dev="sockfs" ino=15099 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 885.301017][ T9010] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1499'. [ 886.000835][ T29] audit: type=1400 audit(886.917:336): avc: denied { map } for pid=9024 comm="syz.2.1504" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 892.184869][ T9050] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 892.187852][ T9050] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 893.018656][ T9056] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1514'. [ 893.020865][ T9056] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1514'. [ 893.049110][ T9056] ipvlan2: entered promiscuous mode [ 894.099477][ T29] audit: type=1400 audit(895.017:337): avc: denied { create } for pid=9068 comm="syz.2.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 895.297666][ T9079] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1521'. [ 896.518047][ T9091] netlink: 256 bytes leftover after parsing attributes in process `syz.0.1526'. [ 897.125378][ T29] audit: type=1400 audit(898.047:338): avc: denied { create } for pid=9096 comm="syz.2.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 897.130978][ T29] audit: type=1400 audit(898.047:339): avc: denied { ioctl } for pid=9096 comm="syz.2.1529" path="socket:[15222]" dev="sockfs" ino=15222 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 897.777222][ T9102] geneve2: entered promiscuous mode [ 897.777603][ T9102] geneve2: entered allmulticast mode [ 898.750078][ T9114] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 898.752794][ T9114] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 899.600266][ T9122] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1537'. [ 901.772927][ T9136] i2c i2c-0: readbytes: invalid block length (255) [ 901.825201][ T9137] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 901.826140][ T9137] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 902.977541][ T29] audit: type=1400 audit(903.897:340): avc: denied { connect } for pid=9144 comm="syz.2.1546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 905.274887][ T9156] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 905.286432][ T9156] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 905.487740][ T9160] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1551'. [ 905.969101][ T29] audit: type=1326 audit(906.887:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9163 comm="syz.2.1553" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 909.262810][ T29] audit: type=1400 audit(910.177:342): avc: denied { setopt } for pid=9171 comm="syz.2.1557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 922.507749][ T29] audit: type=1400 audit(923.427:343): avc: denied { mount } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 922.528063][ T29] audit: type=1400 audit(923.447:344): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.531917][ T29] audit: type=1400 audit(923.447:345): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.545491][ T29] audit: type=1400 audit(923.467:346): avc: denied { read open } for pid=9206 comm="syz.0.1570" path="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.549746][ T29] audit: type=1400 audit(923.467:347): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.555950][ T29] audit: type=1400 audit(923.477:348): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.565435][ T29] audit: type=1400 audit(923.477:349): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.568710][ T29] audit: type=1400 audit(923.487:350): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.572088][ T29] audit: type=1400 audit(923.487:351): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 922.585788][ T29] audit: type=1400 audit(923.497:352): avc: denied { search } for pid=9206 comm="syz.0.1570" name="/" dev="configfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 938.488580][ T9222] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 938.490673][ T9222] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 938.578551][ T9226] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 938.584206][ T9226] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 954.218411][ T9254] netlink: 308 bytes leftover after parsing attributes in process `syz.2.1585'. [ 954.790973][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 954.791383][ T29] audit: type=1326 audit(955.707:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9257 comm="syz.2.1587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 954.820117][ T29] audit: type=1326 audit(955.727:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9257 comm="syz.2.1587" exe="/syz-executor" sig=0 arch=40000028 syscall=287 compat=0 ip=0x132320 code=0x7ffc0000 [ 954.820491][ T29] audit: type=1326 audit(955.737:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9257 comm="syz.2.1587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 956.595736][ T9276] netlink: 200 bytes leftover after parsing attributes in process `syz.2.1591'. [ 969.063056][ T9298] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9298 comm=syz.0.1601 [ 969.904991][ T9304] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1604'. [ 971.424584][ T5381] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 971.614363][ T5381] usb 1-1: Using ep0 maxpacket: 32 [ 971.617939][ T5381] usb 1-1: too many configurations: 37, using maximum allowed: 8 [ 971.631784][ T5381] usb 1-1: config 0 has no interfaces? [ 971.650905][ T5381] usb 1-1: config 0 has no interfaces? [ 971.667249][ T5381] usb 1-1: config 0 has no interfaces? [ 971.674200][ T5381] usb 1-1: config 0 has no interfaces? [ 971.692150][ T5381] usb 1-1: config 0 has no interfaces? [ 971.708596][ T5381] usb 1-1: config 0 has no interfaces? [ 971.715935][ T5381] usb 1-1: config 0 has no interfaces? [ 971.731935][ T5381] usb 1-1: config 0 has no interfaces? [ 971.768499][ T5381] usb 1-1: New USB device found, idVendor=0000, idProduct=0000, bcdDevice=eb.3a [ 971.769604][ T5381] usb 1-1: New USB device strings: Mfr=163, Product=244, SerialNumber=76 [ 971.770630][ T5381] usb 1-1: Product: syz [ 971.771284][ T5381] usb 1-1: Manufacturer: syz [ 971.771978][ T5381] usb 1-1: SerialNumber: syz [ 971.786880][ T5381] usb 1-1: config 0 descriptor?? [ 972.087423][ T5381] usb 1-1: USB disconnect, device number 9 [ 972.225629][ T9326] tmpfs: Unsupported parameter 'mpol' [ 978.919361][ T8857] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 979.229257][ T8857] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 979.229559][ T8857] usb 1-1: config 0 has no interface number 0 [ 979.259363][ T8857] usb 1-1: New USB device found, idVendor=18b4, idProduct=fffb, bcdDevice=dc.7b [ 979.259664][ T8857] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 979.261326][ T8857] usb 1-1: Product: syz [ 979.263289][ T8857] usb 1-1: Manufacturer: syz [ 979.263324][ T8857] usb 1-1: SerialNumber: syz [ 979.279397][ T8857] usb 1-1: config 0 descriptor?? [ 982.302724][ T9368] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9368 comm=syz.2.1624 [ 982.571409][ T9387] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1626'. [ 982.572122][ T9387] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 982.574459][ T9387] netlink: 64 bytes leftover after parsing attributes in process `syz.2.1626'. [ 1386.294051][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 431s! [swapper/1:0] [ 1386.294274][ C1] Modules linked in: [ 1386.294874][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 1386.294962][ C1] Tainted: [L]=SOFTLOCKUP [ 1386.294979][ C1] Hardware name: ARM-Versatile Express [ 1386.295032][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 1386.295102][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 1386.295140][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 1386.295161][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 1386.295179][ C1] r10: 81c05450 r9 : 840eb240 r8 : 83f21688 [ 1386.295202][ C1] r7 : 840eb368 r6 : 00000001 r5 : 00000001 r4 : 840eb368 [ 1386.295232][ C1] r3 : 0000259b r2 : 0000259c r1 : 00000000 r0 : 00000001 [ 1386.295343][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1386.295390][ C1] Control: 30c5387d Table: 85dc3b40 DAC: 00000000 [ 1386.295428][ C1] Call trace: frame pointer underflow [ 1386.295500][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 1386.295564][ C1] r5:00000001 r4:840eb240 [ 1386.295575][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 1386.295612][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8413af00 [ 1386.295621][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1386.295648][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 1386.295679][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00010c03 r6:00000007 r5:00000001 [ 1386.295689][ C1] r4:8413af00 [ 1386.295701][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 1386.295754][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 1386.295788][ C1] r5:83307044 r4:83307044 [ 1386.295797][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 1386.295822][ C1] r5:83307044 r4:84fe808c [ 1386.295830][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 1386.295855][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 1386.295893][ C1] r7:00010c03 r6:809cd4b4 r5:84fe808c r4:83216000 [ 1386.295902][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 1386.295950][ C1] r9:df805ebc r8:00010c03 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:84fe808c [ 1386.295975][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 1386.296024][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 1386.296036][ C1] r4:dddd9f00 [ 1386.296044][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 1386.296073][ C1] r4:82804084 [ 1386.296080][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 1386.296111][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 1386.296157][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 1386.296170][ C1] r4:83216000 [ 1386.296189][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 1386.296241][ C1] r5:8247f0cc r4:826c3a9c [ 1386.296250][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 1386.296284][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 1386.296322][ C1] r9:83216000 r8:83f21688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c832c [ 1386.296331][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1386.296359][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 1386.296380][ C1] 5e00: e028f008 0000000c 0000259b 00000000 e028f008 0000000c [ 1386.296399][ C1] 5e20: 00000001 840eb368 83f21688 840eb240 00000000 df865e6c df865e58 df865e58 [ 1386.296426][ C1] 5e40: 809c8328 809c832c 60000013 ffffffff [ 1386.296452][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 1386.296497][ C1] r5:00000008 r4:840eb240 [ 1386.296505][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 1386.296540][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8413af3c [ 1386.296548][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1386.296578][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 1386.296613][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838cc1d8 r5:00000001 [ 1386.296634][ C1] r4:8413af3c [ 1386.296651][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 1386.296700][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 1386.296786][ C1] r5:000000ff r4:83307314 [ 1386.296807][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 1386.296838][ C1] r5:000000ff r4:83307314 [ 1386.296853][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 1386.296886][ C1] r5:000000ff r4:83307314 [ 1386.296894][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 1386.296957][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1386.296974][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1386.297024][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 1386.297035][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 1386.297066][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 1386.297103][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 1386.297122][ C1] r4:00000092 [ 1386.297133][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 1386.297194][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 1386.297245][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 1386.297478][ C1] Sending NMI from CPU 1 to CPUs 0: [ 1396.315153][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 1396.335756][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 1396.336197][ C1] Tainted: [L]=SOFTLOCKUP [ 1396.336392][ C1] Hardware name: ARM-Versatile Express [ 1396.336627][ C1] Call trace: frame pointer underflow [ 1396.337028][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1396.337410][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 1396.337660][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 1396.338048][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 1396.338405][ C1] r5:00000000 r4:82a7bd14 [ 1396.338601][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 1396.338954][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 1396.339311][ C1] r7:82ac27f8 [ 1396.339478][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 1396.339858][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 1396.340128][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 1396.340521][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 1396.340866][ C1] r4:ddddb5d8 [ 1396.341043][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 1396.341467][ C1] r10:c129ca30 r9:ddddb180 r8:ddddb130 r7:00000142 r6:00000003 r5:20000193 [ 1396.341881][ C1] r4:ddddb000 [ 1396.342047][ C1] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 1396.342319][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 1396.342504][ C1] r4:8309de40 [ 1396.342583][ C1] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 1396.342812][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 1396.343043][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 1396.343228][ C1] r4:8280cc44 [ 1396.343305][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 1396.343527][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 1396.343747][ C1] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 1396.344145][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 1396.344389][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1396.344688][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 1396.344893][ C1] 5d00: 00000001 00000000 [ 1396.345086][ C1] 5d20: 0000259c 0000259b 840eb368 00000001 00000001 840eb368 83f21688 840eb240 [ 1396.345334][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbfcc 81abc000 80000113 ffffffff [ 1396.345656][ C1] r9:83216000 r8:83f21688 r7:df805d4c r6:ffffffff r5:80000113 r4:81abc000 [ 1396.345988][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 1396.346357][ C1] r5:00000001 r4:840eb240 [ 1396.346550][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 1396.346929][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8413af00 [ 1396.347179][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1396.347561][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 1396.348012][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00010c03 r6:00000007 r5:00000001 [ 1396.348323][ C1] r4:8413af00 [ 1396.348482][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 1396.348883][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 1396.349249][ C1] r5:83307044 r4:83307044 [ 1396.349447][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 1396.349844][ C1] r5:83307044 r4:84fe808c [ 1396.350047][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 1396.350465][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 1396.350889][ C1] r7:00010c03 r6:809cd4b4 r5:84fe808c r4:83216000 [ 1396.351149][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 1396.351567][ C1] r9:df805ebc r8:00010c03 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:84fe808c [ 1396.351929][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 1396.352301][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 1396.352610][ C1] r4:dddd9f00 [ 1396.352793][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 1396.353184][ C1] r4:82804084 [ 1396.353341][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 1396.353703][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 1396.354073][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 1396.354365][ C1] r4:83216000 [ 1396.354534][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 1396.354894][ C1] r5:8247f0cc r4:826c3a9c [ 1396.355094][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 1396.355472][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 1396.355900][ C1] r9:83216000 r8:83f21688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c832c [ 1396.356223][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1396.356578][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 1396.356881][ C1] 5e00: e028f008 0000000c 0000259b 00000000 e028f008 0000000c [ 1396.357223][ C1] 5e20: 00000001 840eb368 83f21688 840eb240 00000000 df865e6c df865e58 df865e58 [ 1396.357591][ C1] 5e40: 809c8328 809c832c 60000013 ffffffff [ 1396.357860][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 1396.358251][ C1] r5:00000008 r4:840eb240 [ 1396.358586][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 1396.358979][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8413af3c [ 1396.359236][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1396.359612][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 1396.360042][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838cc1d8 r5:00000001 [ 1396.360349][ C1] r4:8413af3c [ 1396.360519][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 1396.360912][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 1396.361264][ C1] r5:000000ff r4:83307314 [ 1396.361449][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 1396.361829][ C1] r5:000000ff r4:83307314 [ 1396.362057][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 1396.362456][ C1] r5:000000ff r4:83307314 [ 1396.362660][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 1396.363033][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1396.363285][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1396.363668][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 1396.363983][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 1396.364356][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 1396.364716][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 1396.365073][ C1] r4:00000092 [ 1396.365240][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 1396.365634][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 1396.366024][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 1397.999058][ C1] SMP: failed to stop secondary CPUs [ 1398.000523][ C1] Rebooting in 86400 seconds..