last executing test programs: 1.794836613s ago: executing program 0 (id=1709): r0 = socket$inet6(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x6c}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 1.633279305s ago: executing program 0 (id=1711): r0 = socket$kcm(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x84, @rand_addr=0x64010100, 0x4e24, 0x3, 'lc\x00', 0x8, 0x323b, 0x55}, {@rand_addr=0x64010100, 0x4e23, 0x10000, 0x44, 0x12d5c, 0x12d5c}}, 0x44) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x15, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 1.424444771s ago: executing program 0 (id=1712): r0 = getpid() r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000380)}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', r4}, 0x94) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000b00)) socket$packet(0x11, 0x3, 0x300) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000380)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20040000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000b40)) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0xc2ddb5edb7ba9069, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 1.263100284s ago: executing program 1 (id=1713): r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) syz_emit_ethernet(0x66, &(0x7f0000000080)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00318e", 0x30, 0x3a, 0x0, @remote, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x4f, '\x00', {0x0, 0x6, "050006", 0xda34, 0x3a, 0xff, @mcast1, @empty}}}}}}}, 0x0) 1.107163245s ago: executing program 1 (id=1714): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth0_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 889.731142ms ago: executing program 1 (id=1715): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000007c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01072bbd70000000001a05"], 0x14}, 0x1, 0x0, 0x0, 0x20004074}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) 655.38734ms ago: executing program 1 (id=1716): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0}, 0x50) syz_open_dev$hidraw(&(0x7f0000000940), 0x0, 0x4a141) syz_usb_disconnect(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001, 0x1000009}, 0x8) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 278.106839ms ago: executing program 1 (id=1717): r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x800, 0x4, 0x24}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000001a40)=ANY=[], 0x17) write$binfmt_script(r1, &(0x7f00000000c0), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x360, 0x108, 0x288, 0xffffffff, 0x288, 0x1e0, 0x380, 0x380, 0xffffffff, 0x380, 0x380, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0x70, 0xd0, 0x0, {0x22e}}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x7f, 0xe, [0x2f, 0x4, 0x3, 0x4, 0x31, 0x2, 0x1, 0x15, 0x21, 0x2c, 0x3e, 0xe, 0x29, 0x3a, 0x0, 0xa], 0x2, 0xd577, 0x300000000000}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0xc, @local, @multicast2, @gre_key=0x7, @icmp_id=0x65}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_hsr\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @private, @multicast2, @gre_key}}}}, {{@ip={@remote, @empty, 0x0, 0x0, 'veth1_to_batadv\x00', 'pim6reg\x00', {0xff}}, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x16, @remote, @multicast1, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c0) 209.895614ms ago: executing program 0 (id=1718): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x8, 0xf}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10, 0x1, {0x7, 0xa, 0xfffffff3}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000006080)=@newtfilter={0x44, 0x2c, 0xd2b, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x6}, {}, {0x7, 0xf}}, [@filter_kind_options=@f_route={{0xa}, {0x14, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x32}, @TCA_ROUTE4_IIF={0x8, 0x4, r3}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2404c044}, 0x240440d4) 87.809423ms ago: executing program 0 (id=1719): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)={0x114, 0x2c, 0x1, 0x0, 0x25dfdbfc, "", [@nested={0x102, 0xf2, 0x0, 0x1, [@typed={0xc, 0x18, 0x0, 0x0, @u64=0xfac0b}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb43d9621dc08c029d1608a46cf26fbe816b89f7cb81bff81a8b9482565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875ec58e9a3ddb9ad02a078cf0d972df9e99f079767734f69ce475f00ac64337803f5eb4e5842f4d98fe3fa370d47eb640dc506", @typed={0xc, 0x145, 0x0, 0x0, @u64=0x7}]}]}, 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) 1.39836ms ago: executing program 1 (id=1720): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x8001, 0x9, 0x1, 0x0, 0x0, 0xcc7, 0x8, 0x7, 0xa, 0x100, 0x1002, 0x1, 0x8, 0x4, 0x3, 0xffffffff, 0x1, 0x1a449, 0x3, 0x40000003, 0x89, 0x2, 0xf27, 0x6, 0x7, 0x8, 0x4, 0x8, 0x8, 0x10000, 0xfffffff8]}) 0s ago: executing program 0 (id=1721): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/comedi4\x00', 0x400, 0x0) ioctl$COMEDI_INSNLIST(r0, 0x8010640b, &(0x7f00000be640)={0x829, &(0x7f00000be500)=[{0x8000000, 0x58, 0x0, 0x1, 0xfffffffc}]}) kernel console output (not intermixed with test programs): [ T6147] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 533.754634][ T6147] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 533.754692][ T6147] r10:00000001 r9:80615fb4 r8:00000002 r7:ee029f68 r6:0000000f r5:76fa9f30 [ 533.754715][ T6147] r4:854c8000 r3:ee029e9f [ 533.754732][ T6147] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 533.754791][ T6147] r8:76fa9f30 r7:ee029f68 r6:854c8000 r5:0000000f r4:858cbcc0 [ 533.754808][ T6147] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 533.754862][ T6147] r10:00000003 r9:854c8000 r8:8020029c r7:00000000 r6:00000000 r5:858cbcc0 [ 533.754880][ T6147] r4:858cbcc3 [ 533.754894][ T6147] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 533.754948][ T6147] r7:00000003 r6:00000006 r5:76fa9f30 r4:0000000f [ 533.754963][ T6147] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 533.755008][ T6147] Exception stack(0xee029fa8 to 0xee029ff0) [ 533.755043][ T6147] 9fa0: 0000000f 76fa9f30 00000006 76fa9f30 0000000f 00000000 [ 533.755073][ T6147] 9fc0: 0000000f 76fa9f30 00000006 00000003 00300000 00000000 00006364 76faa0bc [ 533.755097][ T6147] 9fe0: 00000158 76fa9ed0 000d81d0 001303dc [ 534.061727][ T6151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6151 comm=syz.1.778 [ 535.182615][ T29] audit: type=1400 audit(535.090:208): avc: denied { map_create } for pid=6161 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 535.194047][ T29] audit: type=1400 audit(535.100:209): avc: denied { map_read map_write } for pid=6161 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 535.367186][ T29] audit: type=1400 audit(535.270:210): avc: denied { prog_run } for pid=6161 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 536.411518][ T6166] capability: warning: `syz.1.786' uses 32-bit capabilities (legacy support in use) [ 545.925064][ T6185] FAULT_INJECTION: forcing a failure. [ 545.925064][ T6185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 545.961876][ T6185] CPU: 0 UID: 0 PID: 6185 Comm: syz.0.793 Not tainted syzkaller #0 PREEMPT [ 545.962060][ T6185] Hardware name: ARM-Versatile Express [ 545.962105][ T6185] Call trace: [ 545.962153][ T6185] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 545.962277][ T6185] r7:00000000 r6:00000000 r5:60000113 r4:822523c8 [ 545.962295][ T6185] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 545.962409][ T6185] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 545.962465][ T6185] r5:854cb000 r4:8294f590 [ 545.962483][ T6185] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 545.962727][ T6185] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 545.962869][ T6185] r8:76fa9f30 r7:00000000 r6:00000000 r5:ee275f68 r4:00000002 [ 545.962889][ T6185] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 545.962944][ T6185] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 545.963000][ T6185] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 545.963061][ T6185] r10:00000001 r9:80615fb4 r8:00000002 r7:ee275f68 r6:0000000f r5:76fa9f30 [ 545.963165][ T6185] r4:854cb000 r3:ee275e9f [ 545.963190][ T6185] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 545.963304][ T6185] r8:76fa9f30 r7:ee275f68 r6:854cb000 r5:0000000f r4:858c7300 [ 545.963325][ T6185] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 545.963395][ T6185] r10:00000003 r9:854cb000 r8:8020029c r7:00000000 r6:00000000 r5:858c7300 [ 545.963416][ T6185] r4:858c7300 [ 545.963432][ T6185] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 545.963486][ T6185] r7:00000003 r6:00000005 r5:76fa9f30 r4:0000000f [ 545.963504][ T6185] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 545.963661][ T6185] Exception stack(0xee275fa8 to 0xee275ff0) [ 545.963769][ T6185] 5fa0: 0000000f 76fa9f30 00000005 76fa9f30 0000000f 00000000 [ 545.963808][ T6185] 5fc0: 0000000f 76fa9f30 00000005 00000003 00300000 00000000 00006364 76faa0bc [ 545.963836][ T6185] 5fe0: 00000158 76fa9ed0 000d81d0 001303dc [ 552.941663][ T29] audit: type=1400 audit(552.830:211): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 573.545386][ T6252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6252 comm=syz.0.818 [ 581.763258][ T29] audit: type=1400 audit(581.670:212): avc: denied { create } for pid=6259 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 582.591931][ T6267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6267 comm=syz.0.821 [ 583.663634][ T29] audit: type=1400 audit(583.570:213): avc: denied { read } for pid=6271 comm="syz.0.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 583.697328][ T29] audit: type=1400 audit(583.600:214): avc: denied { getopt } for pid=6271 comm="syz.0.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 589.472463][ T29] audit: type=1400 audit(589.350:215): avc: denied { connect } for pid=6285 comm="syz.1.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 594.912501][ T29] audit: type=1400 audit(594.820:216): avc: denied { read } for pid=6297 comm="syz.1.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 627.762818][ T29] audit: type=1400 audit(627.620:217): avc: denied { read write } for pid=6335 comm="syz.1.841" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 627.763445][ T29] audit: type=1400 audit(627.620:218): avc: denied { open } for pid=6335 comm="syz.1.841" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 678.616574][ T29] audit: type=1400 audit(678.520:219): avc: denied { ioctl } for pid=6402 comm="syz.1.859" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 680.836814][ T6420] FAULT_INJECTION: forcing a failure. [ 680.836814][ T6420] name failslab, interval 1, probability 0, space 0, times 0 [ 680.837308][ T6420] CPU: 1 UID: 0 PID: 6420 Comm: syz.1.862 Not tainted syzkaller #0 PREEMPT [ 680.837400][ T6420] Hardware name: ARM-Versatile Express [ 680.837442][ T6420] Call trace: [ 680.837495][ T6420] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 680.837629][ T6420] r7:00000cc0 r6:00000000 r5:60000013 r4:822523c8 [ 680.837741][ T6420] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 680.837801][ T6420] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 680.837898][ T6420] r5:84084800 r4:82918810 [ 680.838028][ T6420] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 680.838130][ T6420] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 680.838369][ T6420] r8:00000000 r7:00000cc0 r6:0000000f r5:0000000e r4:83001240 [ 680.838689][ T6420] [<8052ee50>] (should_failslab) from [<8051142c>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 680.838802][ T6420] [<8051138c>] (__kmalloc_node_track_caller_noprof) from [<804a46ec>] (kstrdup+0x38/0x64) [ 680.838875][ T6420] r10:200008c0 r9:ea819ecb r8:828f5680 r7:8031c60c r6:ea819e08 r5:0000000e [ 680.838951][ T6420] r4:00000cc0 [ 680.839054][ T6420] [<804a46b4>] (kstrdup) from [<8031c60c>] (__request_module+0xfc/0x2c0) [ 680.839183][ T6420] r7:84084800 r6:815c93dc r5:00000002 r4:84c11a80 [ 680.839443][ T6420] [<8031c510>] (__request_module) from [<815c93dc>] (dev_load+0x80/0x8c) [ 680.839944][ T6420] r3:00400140 r2:ea819ecc r1:8241bb7c [ 680.839976][ T6420] r8:00000000 r7:855b0f00 r6:ea819ecc r5:00000000 r4:ea819ecc [ 680.840030][ T6420] [<815c935c>] (dev_load) from [<815cab9c>] (dev_ioctl+0x51c/0x62c) [ 680.840198][ T6420] r5:00000003 r4:000089f3 [ 680.840369][ T6420] [<815ca680>] (dev_ioctl) from [<815579d0>] (sock_ioctl+0x464/0x600) [ 680.840547][ T6420] r10:84084800 r9:00000005 r8:8587a300 r7:b5403587 r6:855b0f00 r5:20000980 [ 680.840677][ T6420] r4:000089f3 r3:200008c0 [ 680.840835][ T6420] [<8155756c>] (sock_ioctl) from [<80578798>] (sys_ioctl+0x130/0xba0) [ 680.841061][ T6420] r9:00000005 r8:8587a300 r7:20000980 r6:8587a301 r5:00000000 r4:000089f3 [ 680.841106][ T6420] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 680.841159][ T6420] Exception stack(0xea819fa8 to 0xea819ff0) [ 680.841198][ T6420] 9fa0: 00000000 00000000 00000005 000089f3 20000980 00000000 [ 680.841229][ T6420] 9fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f280bc [ 680.841254][ T6420] 9fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 680.841286][ T6420] r10:00000036 r9:84084800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 680.841305][ T6420] r4:00000000 [ 690.669492][ T29] audit: type=1400 audit(690.530:220): avc: denied { ioctl } for pid=6442 comm="syz.0.866" path="socket:[12340]" dev="sockfs" ino=12340 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 698.372706][ T29] audit: type=1400 audit(698.270:221): avc: denied { connect } for pid=6455 comm="syz.0.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 703.523819][ T29] audit: type=1400 audit(703.430:222): avc: denied { sqpoll } for pid=6462 comm="syz.0.872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 705.963290][ T29] audit: type=1400 audit(705.870:223): avc: denied { ioctl } for pid=6469 comm="syz.1.874" path="socket:[12391]" dev="sockfs" ino=12391 ioctlcmd=0x6686 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 705.991952][ T29] audit: type=1400 audit(705.880:224): avc: denied { setattr } for pid=6469 comm="syz.1.874" name="NETLINK" dev="sockfs" ino=12391 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 715.571302][ T29] audit: type=1400 audit(715.460:225): avc: denied { create } for pid=6494 comm="syz.1.880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 715.722253][ T6493] FAULT_INJECTION: forcing a failure. [ 715.722253][ T6493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.722654][ T6493] CPU: 1 UID: 0 PID: 6493 Comm: syz.0.879 Not tainted syzkaller #0 PREEMPT [ 715.722754][ T6493] Hardware name: ARM-Versatile Express [ 715.722785][ T6493] Call trace: [ 715.722827][ T6493] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 715.722945][ T6493] r7:00006364 r6:00000000 r5:60000013 r4:822523c8 [ 715.722967][ T6493] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 715.723022][ T6493] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 715.723079][ T6493] r5:83ab1800 r4:8294f590 [ 715.723096][ T6493] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 715.723150][ T6493] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 715.723201][ T6493] r8:00000000 r7:00006364 r6:76faa0bc r5:83ab2030 r4:76fa9bd8 [ 715.723216][ T6493] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 715.723255][ T6493] [<80986df4>] (should_fail_usercopy) from [<8022b414>] (setup_sigframe+0xe4/0x1c4) [ 715.723308][ T6493] [<8022b330>] (setup_sigframe) from [<8022babc>] (do_work_pending+0x2e4/0x4e8) [ 715.723371][ T6493] r10:00000004 r9:b5403587 r8:00000000 r7:83ab2030 r6:76fa9bd8 r5:ea7c5fb0 [ 715.723396][ T6493] r4:83ab1800 [ 715.723414][ T6493] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 715.723467][ T6493] Exception stack(0xea7c5fb0 to 0xea7c5ff8) [ 715.723506][ T6493] 5fa0: 00000001 76fa9f20 00000001 00000000 [ 715.723542][ T6493] 5fc0: 00000001 76fa9f20 00000008 00000004 00300000 00000000 00006364 76faa0bc [ 715.723572][ T6493] 5fe0: 00000158 76fa9ed0 000d81d0 001304a4 40000010 00000008 [ 715.723603][ T6493] r10:00000004 r9:83ab1800 r8:8020029c r7:00000004 r6:00000008 r5:76fa9f20 [ 715.723623][ T6493] r4:00000001 [ 716.942245][ T29] audit: type=1400 audit(716.840:226): avc: denied { listen } for pid=6501 comm="syz.1.882" path=2F3535372FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 723.584138][ T6522] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6522 comm=syz.1.888 [ 723.982577][ T6526] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=6526 comm=syz.0.890 [ 724.191642][ T29] audit: type=1400 audit(724.070:227): avc: denied { map } for pid=6524 comm="syz.1.889" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 724.192058][ T29] audit: type=1400 audit(724.070:228): avc: denied { execute } for pid=6524 comm="syz.1.889" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 725.672567][ T6537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=6537 comm=syz.1.893 [ 726.465483][ T6542] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=6542 comm=syz.1.895 [ 727.463663][ T6546] FAULT_INJECTION: forcing a failure. [ 727.463663][ T6546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 727.464039][ T6546] CPU: 1 UID: 0 PID: 6546 Comm: syz.0.897 Not tainted syzkaller #0 PREEMPT [ 727.464124][ T6546] Hardware name: ARM-Versatile Express [ 727.464153][ T6546] Call trace: [ 727.464195][ T6546] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 727.464299][ T6546] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 727.464393][ T6546] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 727.464486][ T6546] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 727.464576][ T6546] r5:84231800 r4:8294f590 [ 727.464648][ T6546] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 727.464805][ T6546] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 727.464929][ T6546] r8:76fa9f30 r7:00000000 r6:00000000 r5:ead21f68 r4:00000002 [ 727.465065][ T6546] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 727.465114][ T6546] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 727.465171][ T6546] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 727.465232][ T6546] r10:00000001 r9:80615fb4 r8:00000002 r7:ead21f68 r6:0000000f r5:76fa9f30 [ 727.465278][ T6546] r4:84231800 r3:ead21e9f [ 727.465298][ T6546] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 727.465385][ T6546] r8:76fa9f30 r7:ead21f68 r6:84231800 r5:0000000f r4:8587a000 [ 727.465464][ T6546] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 727.465552][ T6546] r10:00000003 r9:84231800 r8:8020029c r7:00000000 r6:00000000 r5:8587a000 [ 727.465616][ T6546] r4:8587a003 [ 727.465751][ T6546] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 727.465918][ T6546] r7:00000003 r6:00000006 r5:76fa9f30 r4:0000000f [ 727.465944][ T6546] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 727.466054][ T6546] Exception stack(0xead21fa8 to 0xead21ff0) [ 727.466092][ T6546] 1fa0: 0000000f 76fa9f30 00000006 76fa9f30 0000000f 00000000 [ 727.466124][ T6546] 1fc0: 0000000f 76fa9f30 00000006 00000003 00300000 00000000 00006364 76faa0bc [ 727.466285][ T6546] 1fe0: 00000158 76fa9ed0 000d81d0 001303dc [ 731.174713][ T6554] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=6554 comm=syz.0.900 [ 740.948233][ T6574] FAULT_INJECTION: forcing a failure. [ 740.948233][ T6574] name failslab, interval 1, probability 0, space 0, times 0 [ 740.951726][ T6574] CPU: 0 UID: 0 PID: 6574 Comm: syz.1.907 Not tainted syzkaller #0 PREEMPT [ 740.951846][ T6574] Hardware name: ARM-Versatile Express [ 740.951880][ T6574] Call trace: [ 740.951941][ T6574] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 740.952081][ T6574] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 740.952103][ T6574] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 740.952155][ T6574] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 740.952209][ T6574] r5:83a16000 r4:82918810 [ 740.952226][ T6574] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 740.952282][ T6574] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 740.952347][ T6574] r8:83a16000 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 740.952406][ T6574] [<8052ee50>] (should_failslab) from [<8050f3e4>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 740.952470][ T6574] [<8050f394>] (kmem_cache_alloc_node_noprof) from [<81564244>] (__alloc_skb+0x138/0x160) [ 740.952540][ T6574] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 740.952565][ T6574] r4:828060c0 [ 740.952582][ T6574] [<8156410c>] (__alloc_skb) from [<81686020>] (netlink_alloc_large_skb+0x8c/0xa4) [ 740.952662][ T6574] r8:00000000 r7:84ea1400 r6:00000014 r5:850c8a00 r4:00000140 [ 740.952683][ T6574] [<81685f94>] (netlink_alloc_large_skb) from [<816867e0>] (netlink_sendmsg+0x134/0x444) [ 740.952792][ T6574] r5:850c8a00 r4:eacf9f20 [ 740.952811][ T6574] [<816866ac>] (netlink_sendmsg) from [<81556a34>] (__sock_sendmsg+0x44/0x78) [ 740.952883][ T6574] r10:00000000 r9:eacf9dc4 r8:eacf9dc4 r7:00000000 r6:850c8a00 r5:eacf9f20 [ 740.952902][ T6574] r4:00000000 [ 740.952917][ T6574] [<815569f0>] (__sock_sendmsg) from [<815571fc>] (____sys_sendmsg+0x298/0x2cc) [ 740.952973][ T6574] r7:00000000 r6:850c8a00 r5:00000010 r4:eacf9f20 [ 740.952991][ T6574] [<81556f64>] (____sys_sendmsg) from [<815591c4>] (___sys_sendmsg+0x9c/0xd0) [ 740.953052][ T6574] r10:eacf9e24 r9:200001c0 r8:00000010 r7:00000000 r6:850c8a00 r5:eacf9f20 [ 740.953071][ T6574] r4:00000000 [ 740.953086][ T6574] [<81559128>] (___sys_sendmsg) from [<8155965c>] (__sys_sendmsg+0x8c/0xe0) [ 740.953149][ T6574] r10:00000128 r9:83a16000 r8:8571a600 r7:00000010 r6:200001c0 r5:8571a601 [ 740.953168][ T6574] r4:00000003 [ 740.953183][ T6574] [<815595d0>] (__sys_sendmsg) from [<815596c4>] (sys_sendmsg+0x14/0x18) [ 740.953242][ T6574] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 740.953260][ T6574] [<815596b0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 740.953308][ T6574] Exception stack(0xeacf9fa8 to 0xeacf9ff0) [ 740.953342][ T6574] 9fa0: 00000000 00000000 00000003 200001c0 00000010 00000000 [ 740.953372][ T6574] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f280bc [ 740.953403][ T6574] 9fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 746.108245][ T6594] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6594 comm=syz.1.913 [ 747.464307][ T6587] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6587 comm=syz.0.911 [ 752.973817][ T6610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6610 comm=syz.0.917 [ 754.607701][ T6612] FAULT_INJECTION: forcing a failure. [ 754.607701][ T6612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 754.609762][ T6612] CPU: 0 UID: 0 PID: 6612 Comm: syz.0.918 Not tainted syzkaller #0 PREEMPT [ 754.609883][ T6612] Hardware name: ARM-Versatile Express [ 754.609912][ T6612] Call trace: [ 754.609952][ T6612] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 754.610108][ T6612] r7:eb7d1e20 r6:00000000 r5:60000013 r4:822523c8 [ 754.610144][ T6612] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 754.610243][ T6612] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 754.610297][ T6612] r5:83a16c00 r4:8294f590 [ 754.610334][ T6612] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 754.610387][ T6612] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 754.610437][ T6612] r8:00008000 r7:eb7d1e20 r6:200000c0 r5:00000000 r4:eb7d1f20 [ 754.610452][ T6612] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 754.610495][ T6612] [<80986df4>] (should_fail_usercopy) from [<81559048>] (copy_msghdr_from_user+0x50/0x130) [ 754.610547][ T6612] [<81558ff8>] (copy_msghdr_from_user) from [<815591a0>] (___sys_sendmsg+0x78/0xd0) [ 754.610615][ T6612] r8:00008000 r7:00000000 r6:850c8f00 r5:eb7d1f20 r4:eb7d1e64 [ 754.610633][ T6612] [<81559128>] (___sys_sendmsg) from [<8155965c>] (__sys_sendmsg+0x8c/0xe0) [ 754.610788][ T6612] r10:00000128 r9:83a16c00 r8:8571a900 r7:00008000 r6:200000c0 r5:8571a901 [ 754.610816][ T6612] r4:00000003 [ 754.610835][ T6612] [<815595d0>] (__sys_sendmsg) from [<815596c4>] (sys_sendmsg+0x14/0x18) [ 754.610902][ T6612] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 754.610920][ T6612] [<815596b0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 754.610970][ T6612] Exception stack(0xeb7d1fa8 to 0xeb7d1ff0) [ 754.611007][ T6612] 1fa0: 00000000 00000000 00000003 200000c0 00008000 00000000 [ 754.611041][ T6612] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76faa0bc [ 754.611065][ T6612] 1fe0: 76fa9ec0 76fa9eb0 000195a4 00132510 [ 764.045680][ T6635] binder: Unknown parameter 'permit_directio' [ 764.284336][ T6635] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6635 comm=syz.0.926 [ 764.293751][ T6635] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6635 comm=syz.0.926 [ 765.046583][ T29] audit: type=1400 audit(764.950:229): avc: denied { ioctl } for pid=6642 comm="syz.0.929" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 765.957181][ T29] audit: type=1400 audit(765.850:230): avc: denied { name_bind } for pid=6649 comm="syz.0.931" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 770.361889][ T29] audit: type=1400 audit(770.270:231): avc: denied { setopt } for pid=6660 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 770.403154][ T29] audit: type=1400 audit(770.310:232): avc: denied { read } for pid=6660 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 773.125680][ T29] audit: type=1400 audit(773.030:233): avc: denied { audit_write } for pid=6666 comm="syz.1.938" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 773.134918][ T29] audit: type=1107 audit(773.040:234): pid=6666 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E; [ 773.134918][ T29] zͭwՙ@fNBI_yuP  mJ-5d@H&4|iO\1xe\K(]X A.kz;-jq؝)m [ 773.134918][ T29] 8Ct1<ٔ5zF1Q}~o16U9lT=G+[1[' [ 789.257749][ T6697] FAULT_INJECTION: forcing a failure. [ 789.257749][ T6697] name failslab, interval 1, probability 0, space 0, times 0 [ 789.258143][ T6697] CPU: 1 UID: 0 PID: 6697 Comm: syz.1.949 Not tainted syzkaller #0 PREEMPT [ 789.258221][ T6697] Hardware name: ARM-Versatile Express [ 789.258246][ T6697] Call trace: [ 789.258288][ T6697] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 789.258468][ T6697] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 789.258486][ T6697] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 789.258594][ T6697] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 789.258724][ T6697] r5:84235400 r4:82918810 [ 789.258818][ T6697] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 789.258927][ T6697] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 789.259078][ T6697] r8:84235400 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 789.259153][ T6697] [<8052ee50>] (should_failslab) from [<8050f3e4>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 789.259257][ T6697] [<8050f394>] (kmem_cache_alloc_node_noprof) from [<81564244>] (__alloc_skb+0x138/0x160) [ 789.259347][ T6697] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 789.259437][ T6697] r4:828060c0 [ 789.259454][ T6697] [<8156410c>] (__alloc_skb) from [<81686020>] (netlink_alloc_large_skb+0x8c/0xa4) [ 789.259558][ T6697] r8:00000000 r7:863e3000 r6:00000014 r5:850a1180 r4:00000140 [ 789.259608][ T6697] [<81685f94>] (netlink_alloc_large_skb) from [<816867e0>] (netlink_sendmsg+0x134/0x444) [ 789.259734][ T6697] r5:850a1180 r4:ebbf5f20 [ 789.259853][ T6697] [<816866ac>] (netlink_sendmsg) from [<81556a34>] (__sock_sendmsg+0x44/0x78) [ 789.260026][ T6697] r10:00000000 r9:ebbf5dc4 r8:ebbf5dc4 r7:00000000 r6:850a1180 r5:ebbf5f20 [ 789.260118][ T6697] r4:00000000 [ 789.260150][ T6697] [<815569f0>] (__sock_sendmsg) from [<815571fc>] (____sys_sendmsg+0x298/0x2cc) [ 789.260295][ T6697] r7:00000000 r6:850a1180 r5:00008000 r4:ebbf5f20 [ 789.260367][ T6697] [<81556f64>] (____sys_sendmsg) from [<815591c4>] (___sys_sendmsg+0x9c/0xd0) [ 789.260573][ T6697] r10:ebbf5e24 r9:200000c0 r8:00008000 r7:00000000 r6:850a1180 r5:ebbf5f20 [ 789.260625][ T6697] r4:00000000 [ 789.260640][ T6697] [<81559128>] (___sys_sendmsg) from [<8155965c>] (__sys_sendmsg+0x8c/0xe0) [ 789.260895][ T6697] r10:00000128 r9:84235400 r8:8587aa80 r7:00008000 r6:200000c0 r5:8587aa81 [ 789.260955][ T6697] r4:00000003 [ 789.261005][ T6697] [<815595d0>] (__sys_sendmsg) from [<815596c4>] (sys_sendmsg+0x14/0x18) [ 789.261092][ T6697] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 789.261109][ T6697] [<815596b0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 789.261159][ T6697] Exception stack(0xebbf5fa8 to 0xebbf5ff0) [ 789.261195][ T6697] 5fa0: 00000000 00000000 00000003 200000c0 00008000 00000000 [ 789.261225][ T6697] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f280bc [ 789.261248][ T6697] 5fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 792.264288][ T29] audit: type=1400 audit(792.170:235): avc: denied { map } for pid=6705 comm="syz.1.953" path="pipe:[12815]" dev="pipefs" ino=12815 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 793.667059][ T6714] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6714 comm=syz.1.954 [ 794.421433][ T29] audit: type=1400 audit(794.310:236): avc: denied { name_bind } for pid=6717 comm="syz.0.956" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 795.142498][ T29] audit: type=1400 audit(795.050:237): avc: denied { accept } for pid=6719 comm="syz.0.957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 800.401201][ T29] audit: type=1400 audit(800.300:238): avc: denied { connect } for pid=6742 comm="syz.1.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 801.474493][ T6755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1000 sclass=netlink_route_socket pid=6755 comm=syz.1.965 [ 802.242364][ T1810] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 802.471491][ T1810] usb 2-1: config 1 has an invalid interface number: 7 but max is 0 [ 802.471822][ T1810] usb 2-1: config 1 has no interface number 0 [ 802.472164][ T1810] usb 2-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 802.472387][ T1810] usb 2-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 802.472810][ T1810] usb 2-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 802.571585][ T1810] usb 2-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 802.571894][ T1810] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 802.572375][ T1810] usb 2-1: Product: syz [ 802.572535][ T1810] usb 2-1: Manufacturer: syz [ 802.572583][ T1810] usb 2-1: SerialNumber: syz [ 802.624621][ T6757] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 802.914563][ T6757] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 803.309534][ T1810] usb 2-1: Incompatible driver and firmware versions [ 803.324268][ T1810] usb 2-1: USB disconnect, device number 4 [ 846.982281][ T6842] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6842 comm=syz.0.992 [ 849.387748][ T6852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6852 comm=syz.1.997 [ 849.421869][ T6852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10035 sclass=netlink_route_socket pid=6852 comm=syz.1.997 [ 867.003991][ T6884] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6884 comm=syz.1.1007 [ 867.482375][ T29] audit: type=1400 audit(867.390:239): avc: denied { create } for pid=6885 comm="syz.0.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 877.647348][ T6907] FAULT_INJECTION: forcing a failure. [ 877.647348][ T6907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 877.651275][ T6907] CPU: 1 UID: 0 PID: 6907 Comm: syz.0.1014 Not tainted syzkaller #0 PREEMPT [ 877.651408][ T6907] Hardware name: ARM-Versatile Express [ 877.651448][ T6907] Call trace: [ 877.651494][ T6907] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 877.651636][ T6907] r7:20000040 r6:00000000 r5:60000113 r4:822523c8 [ 877.651697][ T6907] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 877.651757][ T6907] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 877.651810][ T6907] r5:84232400 r4:8294f590 [ 877.651843][ T6907] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 877.651900][ T6907] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 877.651951][ T6907] r8:00000000 r7:20000040 r6:8400afc0 r5:00000000 r4:ec61df20 [ 877.651967][ T6907] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 877.652006][ T6907] [<80986df4>] (should_fail_usercopy) from [<808c74bc>] (_copy_from_iter+0x6c/0x7d8) [ 877.652055][ T6907] [<808c7450>] (_copy_from_iter) from [<81686838>] (netlink_sendmsg+0x18c/0x444) [ 877.652129][ T6907] r10:00000000 r9:00000000 r8:ec61df30 r7:863f4400 r6:00000014 r5:85967b40 [ 877.652152][ T6907] r4:ec61df20 [ 877.652232][ T6907] [<816866ac>] (netlink_sendmsg) from [<81556a34>] (__sock_sendmsg+0x44/0x78) [ 877.652430][ T6907] r10:00000000 r9:ec61ddc4 r8:ec61ddc4 r7:00000000 r6:850d5180 r5:ec61df20 [ 877.652598][ T6907] r4:00000000 [ 877.652650][ T6907] [<815569f0>] (__sock_sendmsg) from [<815571fc>] (____sys_sendmsg+0x298/0x2cc) [ 877.652797][ T6907] r7:00000000 r6:850d5180 r5:00008000 r4:ec61df20 [ 877.652952][ T6907] [<81556f64>] (____sys_sendmsg) from [<815591c4>] (___sys_sendmsg+0x9c/0xd0) [ 877.653938][ T6907] r10:ec61de24 r9:200000c0 r8:00008000 r7:00000000 r6:850d5180 r5:ec61df20 [ 877.654401][ T6907] r4:00000000 [ 877.655460][ T6907] [<81559128>] (___sys_sendmsg) from [<8155965c>] (__sys_sendmsg+0x8c/0xe0) [ 877.655559][ T6907] r10:00000128 r9:84232400 r8:848e19c0 r7:00008000 r6:200000c0 r5:848e19c1 [ 877.655711][ T6907] r4:00000003 [ 877.655836][ T6907] [<815595d0>] (__sys_sendmsg) from [<815596c4>] (sys_sendmsg+0x14/0x18) [ 877.656022][ T6907] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 877.656061][ T6907] [<815596b0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 877.656126][ T6907] Exception stack(0xec61dfa8 to 0xec61dff0) [ 877.656182][ T6907] dfa0: 00000000 00000000 00000003 200000c0 00008000 00000000 [ 877.656278][ T6907] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76faa0bc [ 877.656384][ T6907] dfe0: 76fa9ec0 76fa9eb0 000195a4 00132510 [ 911.025118][ T6944] ucma_write: process 975 (syz.0.1026) changed security contexts after opening file descriptor, this is not allowed. [ 941.078373][ T7037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7037 comm=syz.0.1048 [ 958.461171][ T7062] FAULT_INJECTION: forcing a failure. [ 958.461171][ T7062] name failslab, interval 1, probability 0, space 0, times 0 [ 958.461526][ T7062] CPU: 1 UID: 0 PID: 7062 Comm: syz.1.1058 Not tainted syzkaller #0 PREEMPT [ 958.461601][ T7062] Hardware name: ARM-Versatile Express [ 958.461623][ T7062] Call trace: [ 958.461656][ T7062] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 958.461751][ T7062] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 958.461765][ T7062] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 958.461805][ T7062] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 958.461847][ T7062] r5:84234800 r4:82918810 [ 958.461858][ T7062] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 958.461898][ T7062] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 958.461950][ T7062] r8:84234800 r7:00000000 r6:00000cc0 r5:ecdd1e28 r4:830a4b40 [ 958.461962][ T7062] [<8052ee50>] (should_failslab) from [<8050ef9c>] (kmem_cache_alloc_lru_noprof+0x50/0x448) [ 958.462006][ T7062] [<8050ef4c>] (kmem_cache_alloc_lru_noprof) from [<8057cf3c>] (__d_alloc+0x30/0x21c) [ 958.462061][ T7062] r10:829f09ac r9:824578ac r8:830b1610 r7:8309f800 r6:81e48540 r5:ecdd1e28 [ 958.462079][ T7062] r4:00000002 [ 958.462090][ T7062] [<8057cf0c>] (__d_alloc) from [<805801c4>] (d_alloc_pseudo+0x10/0x3c) [ 958.462140][ T7062] r9:8309f800 r8:830b1610 r7:84234800 r6:81e48540 r5:850d9200 r4:00000002 [ 958.462154][ T7062] [<805801b4>] (d_alloc_pseudo) from [<805618e0>] (alloc_file_pseudo+0x6c/0x104) [ 958.462271][ T7062] [<80561874>] (alloc_file_pseudo) from [<81554dd4>] (sock_alloc_file+0x48/0xc4) [ 958.462350][ T7062] r10:81e6cbc8 r9:858b09c0 r8:00000000 r7:00000000 r6:850d9200 r5:850d9180 [ 958.462367][ T7062] r4:850d8f00 [ 958.462379][ T7062] [<81554d8c>] (sock_alloc_file) from [<81558328>] (do_accept+0xa0/0x174) [ 958.462443][ T7062] r6:ecdd1f5c r5:850d9180 r4:850d8f00 [ 958.462460][ T7062] [<81558288>] (do_accept) from [<81558484>] (__sys_accept4+0x88/0xf4) [ 958.462533][ T7062] r10:0000016e r9:858b09c0 r8:00000000 r7:00000000 r6:00000006 r5:00000000 [ 958.462548][ T7062] r4:858b09c1 [ 958.462560][ T7062] [<815583fc>] (__sys_accept4) from [<81558500>] (sys_accept4+0x10/0x14) [ 958.462609][ T7062] r9:84234800 r8:8020029c r7:0000016e r6:001304b8 r5:00000000 r4:00000000 [ 958.462622][ T7062] [<815584f0>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 958.462657][ T7062] Exception stack(0xecdd1fa8 to 0xecdd1ff0) [ 958.462691][ T7062] 1fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 958.462717][ T7062] 1fc0: 00000000 00000000 001304b8 0000016e 00300000 00000000 00006364 76f280bc [ 958.462741][ T7062] 1fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 960.764004][ T29] audit: type=1400 audit(960.670:240): avc: denied { read } for pid=7073 comm="syz.0.1063" path="socket:[14447]" dev="sockfs" ino=14447 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 961.086363][ T7077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7077 comm=syz.0.1064 [ 968.153649][ T7083] trusted_key: encrypted_key: insufficient parameters specified [ 974.744156][ T7102] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=7102 comm=syz.1.1071 [ 983.475306][ T7110] FAULT_INJECTION: forcing a failure. [ 983.475306][ T7110] name failslab, interval 1, probability 0, space 0, times 0 [ 983.512218][ T7110] CPU: 1 UID: 0 PID: 7110 Comm: syz.0.1074 Not tainted syzkaller #0 PREEMPT [ 983.512375][ T7110] Hardware name: ARM-Versatile Express [ 983.512401][ T7110] Call trace: [ 983.512444][ T7110] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 983.512560][ T7110] r7:00000c40 r6:00000000 r5:60000013 r4:822523c8 [ 983.512581][ T7110] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 983.512647][ T7110] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 983.512699][ T7110] r5:84236c00 r4:82918810 [ 983.512713][ T7110] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 983.512766][ T7110] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 983.512832][ T7110] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 983.512853][ T7110] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 983.512905][ T7110] [<8050a304>] (__kmalloc_noprof) from [<807d3130>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 983.512970][ T7110] r10:84236c00 r9:8309dc00 r8:00000000 r7:85136bb0 r6:858b09e8 r5:00001000 [ 983.512990][ T7110] r4:00000000 [ 983.513005][ T7110] [<807d30f4>] (tomoyo_realpath_from_path) from [<807cf274>] (tomoyo_path_number_perm+0xcc/0x22c) [ 983.513062][ T7110] r10:84236c00 r9:00000000 r8:858b09c0 r7:0000894c r6:00000004 r5:81cd6588 [ 983.513084][ T7110] r4:858b09e8 r3:826c1240 [ 983.513101][ T7110] [<807cf1a8>] (tomoyo_path_number_perm) from [<807d3b54>] (tomoyo_file_ioctl+0x1c/0x20) [ 983.513161][ T7110] r9:00000003 r8:858b09c0 r7:00000000 r6:00000000 r5:0000894c r4:858b09c0 [ 983.513181][ T7110] [<807d3b38>] (tomoyo_file_ioctl) from [<80780418>] (security_file_ioctl+0x64/0x1e4) [ 983.513234][ T7110] [<807803b4>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 983.513290][ T7110] r7:00000000 r6:858b09c1 r5:00000000 r4:0000894c [ 983.513307][ T7110] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 983.513352][ T7110] Exception stack(0xecfadfa8 to 0xecfadff0) [ 983.513393][ T7110] dfa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 983.513427][ T7110] dfc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76faa0bc [ 983.513453][ T7110] dfe0: 76fa9ec0 76fa9eb0 000195a4 00132510 [ 983.513488][ T7110] r10:00000036 r9:84236c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 983.513507][ T7110] r4:00000000 [ 983.701821][ T7110] ERROR: Out of memory at tomoyo_realpath_from_path. [ 984.561687][ T7113] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=7113 comm=syz.0.1075 [ 986.698825][ T7115] FAULT_INJECTION: forcing a failure. [ 986.698825][ T7115] name failslab, interval 1, probability 0, space 0, times 0 [ 986.699240][ T7115] CPU: 0 UID: 0 PID: 7115 Comm: syz.0.1076 Not tainted syzkaller #0 PREEMPT [ 986.699323][ T7115] Hardware name: ARM-Versatile Express [ 986.699348][ T7115] Call trace: [ 986.699401][ T7115] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 986.699505][ T7115] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 986.699526][ T7115] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 986.699580][ T7115] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 986.699635][ T7115] r5:854cc800 r4:82918810 [ 986.699652][ T7115] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 986.699770][ T7115] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 986.699888][ T7115] r8:854cc800 r7:00000000 r6:00000cc0 r5:8291b72c r4:830a4cc0 [ 986.700610][ T7115] [<8052ee50>] (should_failslab) from [<8050eb54>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 986.701182][ T7115] [<8050eb08>] (kmem_cache_alloc_noprof) from [<8056178c>] (alloc_empty_file+0x54/0x13c) [ 986.701441][ T7115] r10:829f09ac r9:8309f800 r8:82805cc0 r7:8335e680 r6:00000002 r5:8291b72c [ 986.701510][ T7115] r4:82457898 [ 986.701530][ T7115] [<80561738>] (alloc_empty_file) from [<80561914>] (alloc_file_pseudo+0xa0/0x104) [ 986.701603][ T7115] r8:830b1610 r7:854cc800 r6:81e48540 r5:851aea80 r4:00000002 [ 986.701622][ T7115] [<80561874>] (alloc_file_pseudo) from [<81554dd4>] (sock_alloc_file+0x48/0xc4) [ 986.701693][ T7115] r10:81e6cbc8 r9:864616c0 r8:00000000 r7:00000000 r6:851aea80 r5:851aea00 [ 986.701714][ T7115] r4:851ae280 [ 986.701730][ T7115] [<81554d8c>] (sock_alloc_file) from [<81558328>] (do_accept+0xa0/0x174) [ 986.701785][ T7115] r6:ecf55f5c r5:851aea00 r4:851ae280 [ 986.701802][ T7115] [<81558288>] (do_accept) from [<81558484>] (__sys_accept4+0x88/0xf4) [ 986.701861][ T7115] r10:0000016e r9:864616c0 r8:00000000 r7:00000000 r6:00000006 r5:00000000 [ 986.701883][ T7115] r4:864616c1 [ 986.701899][ T7115] [<815583fc>] (__sys_accept4) from [<81558500>] (sys_accept4+0x10/0x14) [ 986.702061][ T7115] r9:854cc800 r8:8020029c r7:0000016e r6:001304b8 r5:00000000 r4:00000000 [ 986.702082][ T7115] [<815584f0>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 986.702132][ T7115] Exception stack(0xecf55fa8 to 0xecf55ff0) [ 986.702169][ T7115] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 986.702461][ T7115] 5fc0: 00000000 00000000 001304b8 0000016e 00300000 00000000 00006364 76faa0bc [ 986.702567][ T7115] 5fe0: 76fa9ec0 76fa9eb0 000195a4 00132510 [ 987.362025][ T7117] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=867 sclass=netlink_audit_socket pid=7117 comm=syz.0.1077 [ 998.733301][ T29] audit: type=1400 audit(998.640:241): avc: denied { setattr } for pid=7127 comm="syz.0.1082" name="NETLINK" dev="sockfs" ino=13746 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1019.820238][ T7164] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=7164 comm=syz.0.1096 [ 1023.271606][ T29] audit: type=1400 audit(1023.160:242): avc: denied { read } for pid=7159 comm="syz.1.1095" path="socket:[13788]" dev="sockfs" ino=13788 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1024.025622][ T7175] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=7175 comm=syz.0.1101 [ 1042.702671][ T7196] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=7196 comm=syz.0.1107 [ 1048.416053][ T7209] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=7209 comm=syz.1.1112 [ 1062.371324][ T29] audit: type=1400 audit(1062.270:243): avc: denied { accept } for pid=7227 comm="syz.0.1119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1066.732839][ T7239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=269 sclass=netlink_route_socket pid=7239 comm=syz.1.1123 [ 1070.856557][ T7260] FAULT_INJECTION: forcing a failure. [ 1070.856557][ T7260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1070.856915][ T7260] CPU: 0 UID: 0 PID: 7260 Comm: syz.1.1131 Not tainted syzkaller #0 PREEMPT [ 1070.856984][ T7260] Hardware name: ARM-Versatile Express [ 1070.857005][ T7260] Call trace: [ 1070.857039][ T7260] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1070.857127][ T7260] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 1070.857141][ T7260] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1070.857183][ T7260] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1070.857361][ T7260] r5:83abbc00 r4:8294f590 [ 1070.857394][ T7260] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1070.857441][ T7260] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 1070.857501][ T7260] r8:76f27f30 r7:00000000 r6:00000000 r5:ed7f5f68 r4:00000002 [ 1070.857553][ T7260] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 1070.857718][ T7260] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 1070.857781][ T7260] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 1070.857875][ T7260] r10:00000001 r9:80615fb4 r8:00000002 r7:ed7f5f68 r6:0000000f r5:76f27f30 [ 1070.857950][ T7260] r4:83abbc00 r3:ed7f5e9f [ 1070.857988][ T7260] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 1070.858111][ T7260] r8:76f27f30 r7:ed7f5f68 r6:83abbc00 r5:0000000f r4:864610c0 [ 1070.858126][ T7260] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 1070.858249][ T7260] r10:00000003 r9:83abbc00 r8:8020029c r7:00000000 r6:00000000 r5:864610c0 [ 1070.858264][ T7260] r4:864610c3 [ 1070.858276][ T7260] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 1070.861332][ T7260] r7:00000003 r6:00000005 r5:76f27f30 r4:0000000f [ 1070.861389][ T7260] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1070.861431][ T7260] Exception stack(0xed7f5fa8 to 0xed7f5ff0) [ 1070.861462][ T7260] 5fa0: 0000000f 76f27f30 00000005 76f27f30 0000000f 00000000 [ 1070.861487][ T7260] 5fc0: 0000000f 76f27f30 00000005 00000003 00300000 00000000 00006364 76f280bc [ 1070.861507][ T7260] 5fe0: 00000158 76f27ed0 000d81d0 001303dc [ 1080.684761][ T7287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7287 comm=syz.0.1139 [ 1081.173670][ T7292] mmap: syz.0.1140 (7292) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1081.481303][ T29] audit: type=1400 audit(1081.300:244): avc: denied { ioctl } for pid=7291 comm="syz.0.1140" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14016 ioctlcmd=0x620c scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1090.311599][ T29] audit: type=1400 audit(1090.200:245): avc: denied { create } for pid=7301 comm="syz.1.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1098.405279][ T7319] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=7319 comm=syz.1.1149 [ 1102.889016][ T29] audit: type=1400 audit(1102.790:246): avc: granted { setsecparam } for pid=7324 comm="syz.1.1152" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1104.136441][ T29] audit: type=1400 audit(1104.040:247): avc: denied { create } for pid=7324 comm="syz.1.1152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1104.139743][ T29] audit: type=1400 audit(1104.040:248): avc: denied { getopt } for pid=7324 comm="syz.1.1152" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1107.915507][ T7342] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=7342 comm=syz.0.1159 [ 1114.339738][ T7353] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7353 comm=syz.0.1161 [ 1121.381640][ T7376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7376 comm=syz.0.1169 [ 1121.401396][ T29] audit: type=1400 audit(1121.280:249): avc: denied { create } for pid=7373 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1126.133545][ T29] audit: type=1400 audit(1126.040:250): avc: denied { remount } for pid=7384 comm="syz.0.1173" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1128.701606][ T29] audit: type=1400 audit(1128.590:251): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1129.355784][ T7390] FAULT_INJECTION: forcing a failure. [ 1129.355784][ T7390] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.356281][ T7390] CPU: 0 UID: 0 PID: 7390 Comm: syz.0.1175 Not tainted syzkaller #0 PREEMPT [ 1129.356368][ T7390] Hardware name: ARM-Versatile Express [ 1129.356395][ T7390] Call trace: [ 1129.356443][ T7390] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1129.356559][ T7390] r7:00000c40 r6:00000000 r5:60000013 r4:822523c8 [ 1129.356580][ T7390] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1129.356635][ T7390] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1129.356702][ T7390] r5:854cc800 r4:82918810 [ 1129.356720][ T7390] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1129.356777][ T7390] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 1129.356847][ T7390] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 1129.356866][ T7390] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 1129.356922][ T7390] [<8050a304>] (__kmalloc_noprof) from [<807d3130>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1129.356992][ T7390] r10:854cc800 r9:8309e400 r8:00000000 r7:85134cc0 r6:864610e8 r5:00001000 [ 1129.357013][ T7390] r4:00000000 [ 1129.357031][ T7390] [<807d30f4>] (tomoyo_realpath_from_path) from [<807cf274>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1129.357094][ T7390] r10:854cc800 r9:00000000 r8:864610c0 r7:00005450 r6:00000004 r5:81cd6588 [ 1129.357118][ T7390] r4:864610e8 r3:826c1240 [ 1129.357136][ T7390] [<807cf1a8>] (tomoyo_path_number_perm) from [<807d3b54>] (tomoyo_file_ioctl+0x1c/0x20) [ 1129.357197][ T7390] r9:00000003 r8:864610c0 r7:00000000 r6:00000000 r5:00005450 r4:864610c0 [ 1129.357216][ T7390] [<807d3b38>] (tomoyo_file_ioctl) from [<80780418>] (security_file_ioctl+0x64/0x1e4) [ 1129.357266][ T7390] [<807803b4>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 1129.357326][ T7390] r7:00000000 r6:864610c1 r5:00000000 r4:00005450 [ 1129.357345][ T7390] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1129.357393][ T7390] Exception stack(0xedd8dfa8 to 0xedd8dff0) [ 1129.357430][ T7390] dfa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 1129.357465][ T7390] dfc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76faa0bc [ 1129.357492][ T7390] dfe0: 76fa9ec0 76fa9eb0 000195a4 00132510 [ 1129.357527][ T7390] r10:00000036 r9:854cc800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 1129.357546][ T7390] r4:00000000 [ 1129.357948][ T7390] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1146.715677][ T7428] FAULT_INJECTION: forcing a failure. [ 1146.715677][ T7428] name failslab, interval 1, probability 0, space 0, times 0 [ 1146.717240][ T7428] CPU: 1 UID: 0 PID: 7428 Comm: syz.1.1190 Not tainted syzkaller #0 PREEMPT [ 1146.717342][ T7428] Hardware name: ARM-Versatile Express [ 1146.717364][ T7428] Call trace: [ 1146.717398][ T7428] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1146.717501][ T7428] r7:00000d40 r6:00000000 r5:60000013 r4:822523c8 [ 1146.717516][ T7428] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1146.717558][ T7428] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1146.717602][ T7428] r5:84230c00 r4:82918810 [ 1146.717614][ T7428] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1146.717657][ T7428] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 1146.717710][ T7428] r8:00000000 r7:00000d40 r6:0000001d r5:85980ffc r4:83001240 [ 1146.717724][ T7428] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 1146.717768][ T7428] [<8050a304>] (__kmalloc_noprof) from [<807d3038>] (tomoyo_encode2+0x64/0xf0) [ 1146.717820][ T7428] r10:00000fff r9:8309e400 r8:00000000 r7:85134cc0 r6:858cb568 r5:85980ffc [ 1146.717837][ T7428] r4:85980fea [ 1146.717850][ T7428] [<807d2fd4>] (tomoyo_encode2) from [<807d30e8>] (tomoyo_encode+0x24/0x30) [ 1146.717898][ T7428] r9:8309e400 r8:00000000 r7:85134cc0 r6:858cb568 r5:00001000 r4:85980feb [ 1146.717911][ T7428] [<807d30c4>] (tomoyo_encode) from [<807d3174>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1146.717951][ T7428] r5:00001000 r4:85980000 [ 1146.717963][ T7428] [<807d30f4>] (tomoyo_realpath_from_path) from [<807cf274>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1146.718011][ T7428] r10:84230c00 r9:00000000 r8:858cb540 r7:00005450 r6:00000004 r5:81cd6588 [ 1146.718028][ T7428] r4:858cb568 r3:826c1240 [ 1146.718040][ T7428] [<807cf1a8>] (tomoyo_path_number_perm) from [<807d3b54>] (tomoyo_file_ioctl+0x1c/0x20) [ 1146.718088][ T7428] r9:00000003 r8:858cb540 r7:00000000 r6:00000000 r5:00005450 r4:858cb540 [ 1146.718101][ T7428] [<807d3b38>] (tomoyo_file_ioctl) from [<80780418>] (security_file_ioctl+0x64/0x1e4) [ 1146.718142][ T7428] [<807803b4>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 1146.718188][ T7428] r7:00000000 r6:858cb541 r5:00000000 r4:00005450 [ 1146.718200][ T7428] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1146.718235][ T7428] Exception stack(0xedf79fa8 to 0xedf79ff0) [ 1146.718264][ T7428] 9fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 1146.718289][ T7428] 9fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f280bc [ 1146.718360][ T7428] 9fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 1146.718389][ T7428] r10:00000036 r9:84230c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 1146.718403][ T7428] r4:00000000 [ 1146.744237][ T7428] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1147.457261][ T7432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7432 comm=syz.0.1192 [ 1153.068611][ T29] audit: type=1400 audit(1152.970:252): avc: denied { setopt } for pid=7449 comm="syz.0.1198" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1160.344987][ T7459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7459 comm=syz.0.1202 [ 1161.252190][ T7459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=531 sclass=netlink_audit_socket pid=7459 comm=syz.0.1202 [ 1167.452299][ T7470] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=7470 comm=syz.0.1207 [ 1168.226983][ T29] audit: type=1400 audit(1168.130:253): avc: denied { create } for pid=7471 comm="syz.0.1208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1175.043916][ T29] audit: type=1400 audit(1174.920:254): avc: denied { write } for pid=7487 comm="syz.1.1213" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1190.081778][ T2887] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 1190.281377][ T2887] usb 1-1: Invalid ep0 maxpacket: 64 [ 1190.421375][ T2887] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 1190.571309][ T2887] usb 1-1: Invalid ep0 maxpacket: 64 [ 1190.572171][ T2887] usb usb1-port1: attempt power cycle [ 1190.921374][ T2887] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 1190.974742][ T2887] usb 1-1: Invalid ep0 maxpacket: 64 [ 1191.101538][ T2887] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 1191.154158][ T2887] usb 1-1: Invalid ep0 maxpacket: 64 [ 1191.155107][ T2887] usb usb1-port1: unable to enumerate USB device [ 1217.057689][ T29] audit: type=1400 audit(1216.960:255): avc: denied { ioctl } for pid=7543 comm="syz.1.1228" path="socket:[15457]" dev="sockfs" ino=15457 ioctlcmd=0x9410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1217.063473][ T29] audit: type=1400 audit(1216.970:256): avc: denied { read } for pid=7543 comm="syz.1.1228" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1217.282006][ T29] audit: type=1400 audit(1217.180:257): avc: denied { lock } for pid=7543 comm="syz.1.1228" path="socket:[15457]" dev="sockfs" ino=15457 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1242.683137][ T7579] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7579 comm=syz.0.1239 [ 1260.031385][ T7597] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7597 comm=syz.1.1246 [ 1282.041606][ T29] audit: type=1400 audit(1281.900:258): avc: denied { write } for pid=7619 comm="syz.0.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1282.360303][ T29] audit: type=1400 audit(1282.260:259): avc: denied { create } for pid=7622 comm="syz.0.1255" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1282.376977][ T29] audit: type=1400 audit(1282.280:260): avc: denied { map } for pid=7622 comm="syz.0.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15569 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1282.377260][ T29] audit: type=1400 audit(1282.280:261): avc: denied { read write } for pid=7622 comm="syz.0.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15569 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1282.413949][ T29] audit: type=1400 audit(1282.320:262): avc: denied { ioctl } for pid=7622 comm="syz.0.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15570 ioctlcmd=0x661b scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1285.357201][ T29] audit: type=1400 audit(1285.210:263): avc: denied { map } for pid=7633 comm="syz.0.1257" path="/511" dev="tmpfs" ino=2775 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1285.357675][ T29] audit: type=1400 audit(1285.210:264): avc: denied { execute } for pid=7633 comm="syz.0.1257" path="/511" dev="tmpfs" ino=2775 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1285.357974][ T29] audit: type=1400 audit(1285.220:265): avc: denied { lock } for pid=7633 comm="syz.0.1257" path="socket:[16517]" dev="sockfs" ino=16517 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1295.102746][ T7644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7644 comm=syz.1.1261 [ 1296.483901][ T29] audit: type=1400 audit(1296.390:266): avc: denied { kexec_image_load } for pid=7652 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1298.436208][ T29] audit: type=1400 audit(1298.340:267): avc: denied { ioctl } for pid=7658 comm="syz.1.1266" path="socket:[16563]" dev="sockfs" ino=16563 ioctlcmd=0x4521 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1305.103044][ T7684] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7684 comm=syz.0.1275 [ 1310.432990][ T7709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7709 comm=syz.1.1286 [ 1313.028044][ T7726] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=7726 comm=syz.1.1292 [ 1316.349883][ T7697] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7697 comm=syz.0.1280 [ 1320.663289][ T29] audit: type=1400 audit(1320.570:268): avc: denied { bind } for pid=7739 comm="syz.0.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1320.717105][ T29] audit: type=1400 audit(1320.620:269): avc: denied { accept } for pid=7739 comm="syz.0.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1321.974177][ T29] audit: type=1400 audit(1321.880:270): avc: denied { write } for pid=7739 comm="syz.0.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1332.944167][ T7766] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=7766 comm=syz.1.1305 [ 1333.361472][ T29] audit: type=1400 audit(1333.250:271): avc: denied { create } for pid=7769 comm="syz.1.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1333.394198][ T29] audit: type=1400 audit(1333.300:272): avc: denied { write } for pid=7769 comm="syz.1.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1343.063803][ T29] audit: type=1400 audit(1342.970:273): avc: granted { setsecparam } for pid=7822 comm="syz.1.1329" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1343.212451][ T29] audit: type=1400 audit(1343.110:274): avc: granted { setsecparam } for pid=7822 comm="syz.1.1329" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1343.647923][ T29] audit: type=1400 audit(1343.550:275): avc: granted { setsecparam } for pid=7822 comm="syz.1.1329" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1345.021889][ T29] audit: type=1400 audit(1344.920:276): avc: denied { create } for pid=7838 comm="syz.1.1335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1345.872384][ T7841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=7841 comm=syz.1.1335 [ 1345.931150][ T29] audit: type=1400 audit(1345.810:277): avc: denied { lock } for pid=7838 comm="syz.1.1335" path="/dev/nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1348.695828][ T7850] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56085 sclass=netlink_tcpdiag_socket pid=7850 comm=syz.0.1338 [ 1352.187167][ T29] audit: type=1400 audit(1352.090:278): avc: denied { nlmsg_write } for pid=7876 comm="syz.0.1348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1353.326404][ T7877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7877 comm=syz.0.1348 [ 1378.699223][ T29] audit: type=1400 audit(1378.580:279): avc: denied { setopt } for pid=7951 comm="syz.1.1362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1403.872902][ T29] audit: type=1400 audit(1403.780:280): avc: denied { execute } for pid=7987 comm="syz.1.1377" path="/sys/kernel/debug/binder/state" dev="debugfs" ino=1376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file permissive=1 [ 1411.825646][ T8013] fuse: Unknown parameter 'f' [ 1415.102181][ T29] audit: type=1400 audit(1415.000:281): avc: denied { getopt } for pid=8020 comm="syz.0.1387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1415.396276][ T29] audit: type=1400 audit(1415.280:282): avc: denied { lock } for pid=8020 comm="syz.0.1387" path="socket:[17110]" dev="sockfs" ino=17110 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1422.342865][ T8032] FAULT_INJECTION: forcing a failure. [ 1422.342865][ T8032] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.343334][ T8032] CPU: 0 UID: 0 PID: 8032 Comm: syz.1.1391 Not tainted syzkaller #0 PREEMPT [ 1422.343422][ T8032] Hardware name: ARM-Versatile Express [ 1422.343447][ T8032] Call trace: [ 1422.343490][ T8032] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1422.343720][ T8032] r7:00000c40 r6:00000000 r5:60000013 r4:822523c8 [ 1422.343740][ T8032] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1422.343812][ T8032] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1422.343862][ T8032] r5:854ce000 r4:82918810 [ 1422.343877][ T8032] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1422.343927][ T8032] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 1422.343987][ T8032] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 1422.344003][ T8032] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 1422.344053][ T8032] [<8050a304>] (__kmalloc_noprof) from [<807d3130>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1422.344204][ T8032] r10:854ce000 r9:8309e400 r8:00000000 r7:85077330 r6:85bd09e8 r5:00001000 [ 1422.344225][ T8032] r4:00000000 [ 1422.344242][ T8032] [<807d30f4>] (tomoyo_realpath_from_path) from [<807cf274>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1422.344301][ T8032] r10:854ce000 r9:00000000 r8:85bd09c0 r7:00005450 r6:00000004 r5:81cd6588 [ 1422.344320][ T8032] r4:85bd09e8 r3:826c1240 [ 1422.344336][ T8032] [<807cf1a8>] (tomoyo_path_number_perm) from [<807d3b54>] (tomoyo_file_ioctl+0x1c/0x20) [ 1422.344389][ T8032] r9:00000003 r8:85bd09c0 r7:00000000 r6:00000000 r5:00005450 r4:85bd09c0 [ 1422.344407][ T8032] [<807d3b38>] (tomoyo_file_ioctl) from [<80780418>] (security_file_ioctl+0x64/0x1e4) [ 1422.344456][ T8032] [<807803b4>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 1422.344533][ T8032] r7:00000000 r6:85bd09c1 r5:00000000 r4:00005450 [ 1422.344561][ T8032] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1422.344616][ T8032] Exception stack(0xec161fa8 to 0xec161ff0) [ 1422.344665][ T8032] 1fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 1422.344697][ T8032] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f280bc [ 1422.344722][ T8032] 1fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 1422.344755][ T8032] r10:00000036 r9:854ce000 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 1422.344772][ T8032] r4:00000000 [ 1422.411856][ T8032] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1425.406359][ T29] audit: type=1400 audit(1425.310:283): avc: denied { accept } for pid=8047 comm="syz.1.1396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1434.834798][ T8055] FAULT_INJECTION: forcing a failure. [ 1434.834798][ T8055] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.835063][ T8055] CPU: 0 UID: 0 PID: 8055 Comm: syz.0.1398 Not tainted syzkaller #0 PREEMPT [ 1434.835109][ T8055] Hardware name: ARM-Versatile Express [ 1434.835122][ T8055] Call trace: [ 1434.835145][ T8055] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1434.835203][ T8055] r7:00000d40 r6:00000000 r5:60000013 r4:822523c8 [ 1434.835212][ T8055] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1434.835238][ T8055] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1434.835263][ T8055] r5:854cbc00 r4:82918810 [ 1434.835270][ T8055] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1434.835295][ T8055] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 1434.835327][ T8055] r8:00000000 r7:00000d40 r6:0000001d r5:84e0effc r4:83001240 [ 1434.835334][ T8055] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 1434.835360][ T8055] [<8050a304>] (__kmalloc_noprof) from [<807d3038>] (tomoyo_encode2+0x64/0xf0) [ 1434.835391][ T8055] r10:00000fff r9:8309e400 r8:00000000 r7:85077330 r6:85bd0f28 r5:84e0effc [ 1434.835400][ T8055] r4:84e0efea [ 1434.835407][ T8055] [<807d2fd4>] (tomoyo_encode2) from [<807d30e8>] (tomoyo_encode+0x24/0x30) [ 1434.835442][ T8055] r9:8309e400 r8:00000000 r7:85077330 r6:85bd0f28 r5:00001000 r4:84e0efeb [ 1434.835450][ T8055] [<807d30c4>] (tomoyo_encode) from [<807d3174>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1434.835475][ T8055] r5:00001000 r4:84e0e000 [ 1434.835482][ T8055] [<807d30f4>] (tomoyo_realpath_from_path) from [<807cf274>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1434.835510][ T8055] r10:854cbc00 r9:00000000 r8:85bd0f00 r7:00005450 r6:00000004 r5:81cd6588 [ 1434.835520][ T8055] r4:85bd0f28 r3:826c1240 [ 1434.835527][ T8055] [<807cf1a8>] (tomoyo_path_number_perm) from [<807d3b54>] (tomoyo_file_ioctl+0x1c/0x20) [ 1434.835555][ T8055] r9:00000003 r8:85bd0f00 r7:00000000 r6:00000000 r5:00005450 r4:85bd0f00 [ 1434.835563][ T8055] [<807d3b38>] (tomoyo_file_ioctl) from [<80780418>] (security_file_ioctl+0x64/0x1e4) [ 1434.835587][ T8055] [<807803b4>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 1434.835615][ T8055] r7:00000000 r6:85bd0f01 r5:00000000 r4:00005450 [ 1434.835623][ T8055] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1434.835644][ T8055] Exception stack(0xec211fa8 to 0xec211ff0) [ 1434.835660][ T8055] 1fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 1434.835674][ T8055] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76faa0bc [ 1434.835686][ T8055] 1fe0: 76fa9ec0 76fa9eb0 000195a4 00132510 [ 1434.835702][ T8055] r10:00000036 r9:854cbc00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 1434.835710][ T8055] r4:00000000 [ 1434.852458][ T8055] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1445.737758][ T8067] FAULT_INJECTION: forcing a failure. [ 1445.737758][ T8067] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1445.738181][ T8067] CPU: 1 UID: 0 PID: 8067 Comm: syz.0.1403 Not tainted syzkaller #0 PREEMPT [ 1445.738268][ T8067] Hardware name: ARM-Versatile Express [ 1445.738294][ T8067] Call trace: [ 1445.738396][ T8067] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1445.738509][ T8067] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 1445.738529][ T8067] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1445.738584][ T8067] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1445.738643][ T8067] r5:84232400 r4:8294f590 [ 1445.738660][ T8067] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1445.738725][ T8067] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 1445.738782][ T8067] r8:76fa9f30 r7:00000000 r6:00000000 r5:ec2d9f68 r4:00000002 [ 1445.738800][ T8067] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 1445.738846][ T8067] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 1445.738903][ T8067] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 1445.738968][ T8067] r10:00000001 r9:80615fb4 r8:00000002 r7:ec2d9f68 r6:0000000f r5:76fa9f30 [ 1445.738992][ T8067] r4:84232400 r3:ec2d9e9f [ 1445.739009][ T8067] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 1445.739072][ T8067] r8:76fa9f30 r7:ec2d9f68 r6:84232400 r5:0000000f r4:858cb6c0 [ 1445.739090][ T8067] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 1445.739154][ T8067] r10:00000003 r9:84232400 r8:8020029c r7:00000000 r6:00000000 r5:858cb6c0 [ 1445.739174][ T8067] r4:858cb6c3 [ 1445.739190][ T8067] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 1445.739250][ T8067] r7:00000003 r6:00000004 r5:76fa9f30 r4:0000000f [ 1445.739268][ T8067] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1445.739316][ T8067] Exception stack(0xec2d9fa8 to 0xec2d9ff0) [ 1445.739353][ T8067] 9fa0: 0000000f 76fa9f30 00000004 76fa9f30 0000000f 00000000 [ 1445.739386][ T8067] 9fc0: 0000000f 76fa9f30 00000004 00000003 00300000 00000000 00006364 76faa0bc [ 1445.739413][ T8067] 9fe0: 00000158 76fa9ed0 000d81d0 001303dc [ 1465.303076][ T29] audit: type=1400 audit(1465.210:284): avc: denied { create } for pid=8099 comm="syz.0.1416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1471.821610][ T29] audit: type=1400 audit(1471.720:285): avc: denied { block_suspend } for pid=8118 comm="syz.0.1422" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1477.640327][ T8164] ======================================================= [ 1477.640327][ T8164] WARNING: The mand mount option has been deprecated and [ 1477.640327][ T8164] and is ignored by this kernel. Remove the mand [ 1477.640327][ T8164] option from the mount to silence this warning. [ 1477.640327][ T8164] ======================================================= [ 1477.651656][ T8164] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1477.808875][ T29] audit: type=1400 audit(1477.700:286): avc: granted { setsecparam } for pid=8163 comm="syz.1.1437" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1498.386246][ T8219] block nbd1: NBD_DISCONNECT [ 1504.715091][ T8243] binder: 8242:8243 ioctl 4018f514 20005e40 returned -22 [ 1508.745469][ T8258] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=4 sclass=netlink_audit_socket pid=8258 comm=syz.0.1460 [ 1515.135782][ T29] audit: type=1400 audit(1515.040:287): avc: denied { lock } for pid=8279 comm="syz.0.1466" path="socket:[17786]" dev="sockfs" ino=17786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1515.489755][ T8284] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8284 comm=syz.1.1468 [ 1526.391404][ T29] audit: type=1400 audit(1526.270:288): avc: denied { lock } for pid=8311 comm="syz.1.1472" path="socket:[17811]" dev="sockfs" ino=17811 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1527.644296][ T8319] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8319 comm=syz.1.1475 [ 1531.965607][ T8335] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8335 comm=syz.0.1480 [ 1532.031989][ T8335] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=8335 comm=syz.0.1480 [ 1546.552039][ T29] audit: type=1400 audit(1546.450:289): avc: denied { create } for pid=8349 comm="syz.0.1484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1548.674202][ T8360] FAULT_INJECTION: forcing a failure. [ 1548.674202][ T8360] name failslab, interval 1, probability 0, space 0, times 0 [ 1548.675507][ T8360] CPU: 0 UID: 0 PID: 8360 Comm: syz.1.1487 Not tainted syzkaller #0 PREEMPT [ 1548.675599][ T8360] Hardware name: ARM-Versatile Express [ 1548.675622][ T8360] Call trace: [ 1548.675656][ T8360] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1548.675752][ T8360] r7:00000000 r6:00000000 r5:60000013 r4:822523c8 [ 1548.675767][ T8360] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 1548.675808][ T8360] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1548.675850][ T8360] r5:83210c00 r4:82918810 [ 1548.675863][ T8360] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 1548.675904][ T8360] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 1548.675956][ T8360] r8:83210c00 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 1548.675969][ T8360] [<8052ee50>] (should_failslab) from [<8050f3e4>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 1548.676013][ T8360] [<8050f394>] (kmem_cache_alloc_node_noprof) from [<81564244>] (__alloc_skb+0x138/0x160) [ 1548.676068][ T8360] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 1548.676083][ T8360] r4:828060c0 [ 1548.676096][ T8360] [<8156410c>] (__alloc_skb) from [<81686020>] (netlink_alloc_large_skb+0x8c/0xa4) [ 1548.676151][ T8360] r8:00000000 r7:863e3800 r6:00000007 r5:850d5400 r4:00000140 [ 1548.676164][ T8360] [<81685f94>] (netlink_alloc_large_skb) from [<816867e0>] (netlink_sendmsg+0x134/0x444) [ 1548.676210][ T8360] r5:850d5400 r4:ecf7de68 [ 1548.676222][ T8360] [<816866ac>] (netlink_sendmsg) from [<81556a34>] (__sock_sendmsg+0x44/0x78) [ 1548.676274][ T8360] r10:81e48540 r9:20000180 r8:00000000 r7:850d5400 r6:850d5400 r5:ecf7de68 [ 1548.676289][ T8360] r4:00000000 [ 1548.676301][ T8360] [<815569f0>] (__sock_sendmsg) from [<81556b20>] (sock_write_iter+0xb8/0x104) [ 1548.676346][ T8360] r7:850d5400 r6:858c7f00 r5:ecf7df08 r4:ecf7def0 [ 1548.676358][ T8360] [<81556a68>] (sock_write_iter) from [<8055fae8>] (vfs_write+0x3a4/0x44c) [ 1548.676406][ T8360] r7:83210c00 r6:00000007 r5:858c7f00 r4:00004004 [ 1548.676419][ T8360] [<8055f744>] (vfs_write) from [<8055fd54>] (ksys_write+0xc8/0xe8) [ 1548.676471][ T8360] r10:00000004 r9:83210c00 r8:8020029c r7:00000007 r6:20000180 r5:858c7f00 [ 1548.676486][ T8360] r4:858c7f01 [ 1548.676498][ T8360] [<8055fc8c>] (ksys_write) from [<8055fd84>] (sys_write+0x10/0x14) [ 1548.676544][ T8360] r7:00000004 r6:001304b8 r5:00000000 r4:00000000 [ 1548.676556][ T8360] [<8055fd74>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1548.676592][ T8360] Exception stack(0xecf7dfa8 to 0xecf7dff0) [ 1548.676620][ T8360] dfa0: 00000000 00000000 00000003 20000180 00000007 00000000 [ 1548.676645][ T8360] dfc0: 00000000 00000000 001304b8 00000004 00300000 00000000 00006364 76f280bc [ 1548.676665][ T8360] dfe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 1549.394464][ T29] audit: type=1400 audit(1549.300:290): avc: granted { setsecparam } for pid=8364 comm="syz.1.1488" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1569.189806][ T29] audit: type=1400 audit(1569.090:291): avc: denied { append } for pid=8384 comm="syz.0.1494" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.984520][ T8444] SELinux: Context system_u:object_r:mount_exec_t:s0 is not valid (left unmapped). [ 1609.991288][ T29] audit: type=1400 audit(1609.890:292): avc: denied { relabelfrom } for pid=8440 comm="syz.0.1512" name="UDP" dev="sockfs" ino=18016 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1609.991521][ T29] audit: type=1400 audit(1609.890:293): avc: denied { relabelto } for pid=8440 comm="syz.0.1512" name="UDP" dev="sockfs" ino=18016 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=udp_socket permissive=1 trawcon="system_u:object_r:mount_exec_t:s0" [ 1619.991947][ T29] audit: type=1400 audit(1619.890:294): avc: denied { getattr } for pid=8477 comm="syz.1.1517" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1628.192295][ T29] audit: type=1400 audit(1628.090:295): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1628.192671][ T29] audit: type=1400 audit(1628.090:296): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1628.193125][ T29] audit: type=1400 audit(1628.090:297): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1628.535996][ T29] audit: type=1400 audit(1628.440:298): avc: denied { read } for pid=8488 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1629.009062][ T29] audit: type=1400 audit(1628.910:299): avc: denied { open } for pid=8490 comm="syz.1.1522" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1629.019584][ T29] audit: type=1400 audit(1628.920:300): avc: denied { create } for pid=8490 comm="syz.1.1522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1629.034636][ T29] audit: type=1400 audit(1628.940:301): avc: denied { write } for pid=8490 comm="syz.1.1522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1629.034961][ T29] audit: type=1400 audit(1628.940:302): avc: denied { module_request } for pid=8490 comm="syz.1.1522" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1629.220244][ T29] audit: type=1400 audit(1629.120:303): avc: denied { read } for pid=8490 comm="syz.1.1522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1629.236794][ T29] audit: type=1400 audit(1629.140:304): avc: denied { ioctl } for pid=8490 comm="syz.1.1522" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 ioctlcmd=0x541c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1638.421729][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1638.422015][ T29] audit: type=1400 audit(1638.320:306): avc: denied { read } for pid=8498 comm="syz.0.1525" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1638.422240][ T29] audit: type=1400 audit(1638.320:307): avc: denied { open } for pid=8498 comm="syz.0.1525" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1638.456133][ T29] audit: type=1400 audit(1638.360:308): avc: denied { create } for pid=8498 comm="syz.0.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1638.911629][ T29] audit: type=1400 audit(1638.810:309): avc: denied { ioctl } for pid=8498 comm="syz.0.1525" path="socket:[18104]" dev="sockfs" ino=18104 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1639.052149][ T29] audit: type=1400 audit(1638.960:310): avc: denied { sys_module } for pid=8498 comm="syz.0.1525" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1640.424809][ T29] audit: type=1400 audit(1640.330:311): avc: denied { append } for pid=8512 comm="syz.0.1526" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1640.565335][ T8513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8513 comm=syz.0.1526 [ 1640.781369][ T29] audit: type=1400 audit(1640.670:312): avc: denied { create } for pid=8512 comm="syz.0.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1640.801796][ T29] audit: type=1400 audit(1640.690:313): avc: denied { bind } for pid=8512 comm="syz.0.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1640.803201][ T29] audit: type=1400 audit(1640.690:314): avc: denied { accept } for pid=8512 comm="syz.0.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1640.804579][ T29] audit: type=1400 audit(1640.690:315): avc: denied { read } for pid=8512 comm="syz.0.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1645.837109][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1645.837471][ T29] audit: type=1400 audit(1645.740:318): avc: denied { mount } for pid=8520 comm="syz.1.1529" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1648.691283][ T29] audit: type=1400 audit(1648.560:319): avc: denied { map_create } for pid=8523 comm="syz.0.1530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1648.843471][ T29] audit: type=1400 audit(1648.750:320): avc: denied { create } for pid=8523 comm="syz.0.1530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1649.492463][ T29] audit: type=1400 audit(1649.400:321): avc: denied { setcheckreqprot } for pid=8531 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1650.021336][ T29] audit: type=1400 audit(1649.890:322): avc: denied { create } for pid=8531 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1650.021690][ T29] audit: type=1400 audit(1649.890:323): avc: denied { ioctl } for pid=8531 comm="syz.0.1531" path="socket:[18151]" dev="sockfs" ino=18151 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1650.063185][ T29] audit: type=1400 audit(1649.970:324): avc: denied { bind } for pid=8531 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1650.193157][ T29] audit: type=1400 audit(1650.100:325): avc: denied { write } for pid=8531 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1650.733231][ T29] audit: type=1400 audit(1650.640:326): avc: denied { execmem } for pid=8531 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1651.941967][ T29] audit: type=1400 audit(1651.820:327): avc: denied { create } for pid=8534 comm="syz.0.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1651.942351][ T29] audit: type=1400 audit(1651.830:328): avc: denied { connect } for pid=8534 comm="syz.0.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1651.942686][ T29] audit: type=1400 audit(1651.840:329): avc: denied { listen } for pid=8534 comm="syz.0.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1651.942869][ T29] audit: type=1400 audit(1651.840:330): avc: denied { accept } for pid=8534 comm="syz.0.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1657.499920][ T29] audit: type=1400 audit(1657.400:331): avc: denied { execute } for pid=8540 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1657.503094][ T29] audit: type=1400 audit(1657.400:332): avc: denied { execute_no_trans } for pid=8540 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1657.542969][ T29] audit: type=1400 audit(1657.450:333): avc: denied { mounton } for pid=8541 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1657.965811][ T52] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1658.042475][ T52] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1658.095467][ T52] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1658.179800][ T52] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1658.525612][ T52] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1658.546291][ T52] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1658.553831][ T52] bond0 (unregistering): Released all slaves [ 1658.653247][ T52] hsr_slave_0: left promiscuous mode [ 1658.657005][ T52] hsr_slave_1: left promiscuous mode [ 1658.666521][ T52] veth1_macvtap: left promiscuous mode [ 1658.667656][ T52] veth0_macvtap: left promiscuous mode [ 1658.668703][ T52] veth1_vlan: left promiscuous mode [ 1658.669612][ T52] veth0_vlan: left promiscuous mode [ 1658.773461][ T52] pimreg (unregistering): left allmulticast mode [ 1659.328136][ T29] audit: type=1400 audit(1659.230:334): avc: denied { write } for pid=8574 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1659.330669][ T29] audit: type=1400 audit(1659.230:335): avc: denied { open } for pid=8574 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1659.543454][ T29] audit: type=1400 audit(1659.450:336): avc: denied { search } for pid=8594 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1659.549761][ T29] audit: type=1400 audit(1659.450:337): avc: denied { search } for pid=8594 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1659.551092][ T29] audit: type=1400 audit(1659.450:338): avc: denied { search } for pid=8594 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1659.552026][ T29] audit: type=1400 audit(1659.450:339): avc: denied { search } for pid=8594 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1659.620027][ T29] audit: type=1400 audit(1659.520:340): avc: denied { read open } for pid=8598 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1660.637010][ T8541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1660.646910][ T8541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1661.737748][ T8541] hsr_slave_0: entered promiscuous mode [ 1661.739451][ T8541] hsr_slave_1: entered promiscuous mode [ 1662.519685][ T8541] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1662.546870][ T8541] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1662.557516][ T8541] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1662.569650][ T8541] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1663.427360][ T8541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1663.999815][ T8541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1666.179756][ T8541] veth0_vlan: entered promiscuous mode [ 1666.218718][ T8541] veth1_vlan: entered promiscuous mode [ 1666.362964][ T8541] veth0_macvtap: entered promiscuous mode [ 1666.374276][ T8541] veth1_macvtap: entered promiscuous mode [ 1666.500303][ T56] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.502464][ T56] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.503031][ T56] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.503521][ T56] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.635568][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1666.635992][ T29] audit: type=1400 audit(1666.540:352): avc: denied { mounton } for pid=8541 comm="syz-executor" path="/syzkaller.ih4JsH/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1666.648551][ T29] audit: type=1400 audit(1666.550:353): avc: denied { mount } for pid=8541 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1666.650209][ T29] audit: type=1400 audit(1666.550:354): avc: denied { mounton } for pid=8541 comm="syz-executor" path="/syzkaller.ih4JsH/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1666.666914][ T29] audit: type=1400 audit(1666.550:355): avc: denied { mount } for pid=8541 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1666.683577][ T29] audit: type=1400 audit(1666.590:356): avc: denied { mounton } for pid=8541 comm="syz-executor" path="/syzkaller.ih4JsH/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1666.686819][ T29] audit: type=1400 audit(1666.590:357): avc: denied { mounton } for pid=8541 comm="syz-executor" path="/syzkaller.ih4JsH/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=19155 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1666.709476][ T29] audit: type=1400 audit(1666.610:358): avc: denied { unmount } for pid=8541 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1666.735709][ T29] audit: type=1400 audit(1666.640:359): avc: denied { mounton } for pid=8541 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1666.737504][ T29] audit: type=1400 audit(1666.640:360): avc: denied { mount } for pid=8541 comm="syz-executor" name="/" dev="gadgetfs" ino=2237 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1666.752657][ T29] audit: type=1400 audit(1666.660:361): avc: denied { mount } for pid=8541 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1667.072217][ T8970] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8970 comm=syz.1.1535 [ 1668.784781][ T56] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.846110][ T56] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.858475][ T8988] SELinux: ebitmap: start bit 0 comes after start bit 0 [ 1668.866858][ T8988] SELinux: failed to load policy [ 1668.932551][ T56] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1669.003401][ T56] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1669.277768][ T56] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1669.292819][ T56] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1669.299526][ T56] bond0 (unregistering): Released all slaves [ 1669.401888][ T56] hsr_slave_0: left promiscuous mode [ 1669.406833][ T56] hsr_slave_1: left promiscuous mode [ 1669.428839][ T56] veth1_macvtap: left promiscuous mode [ 1669.429975][ T56] veth0_macvtap: left promiscuous mode [ 1669.431732][ T56] veth0_vlan: left promiscuous mode [ 1670.867111][ T8982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1670.875318][ T8982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1671.637576][ T8982] hsr_slave_0: entered promiscuous mode [ 1671.639486][ T8982] hsr_slave_1: entered promiscuous mode [ 1671.645587][ T8982] debugfs: 'hsr0' already exists in 'hsr' [ 1671.645880][ T8982] Cannot create hsr debugfs directory [ 1672.196924][ T8982] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1672.209450][ T8982] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1672.219691][ T8982] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1672.232758][ T8982] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1672.794001][ T8982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1675.154453][ T8982] veth0_vlan: entered promiscuous mode [ 1675.175897][ T8982] veth1_vlan: entered promiscuous mode [ 1675.230599][ T8982] veth0_macvtap: entered promiscuous mode [ 1675.244830][ T8982] veth1_macvtap: entered promiscuous mode [ 1675.302498][ T8544] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.302728][ T8544] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.302901][ T8544] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.302967][ T8544] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1676.268298][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 1676.271693][ T29] audit: type=1400 audit(1676.170:377): avc: denied { prog_load } for pid=9425 comm="syz.0.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1676.271968][ T29] audit: type=1400 audit(1676.170:378): avc: denied { perfmon } for pid=9425 comm="syz.0.1545" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1676.273490][ T29] audit: type=1400 audit(1676.170:379): avc: denied { prog_run } for pid=9425 comm="syz.0.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1676.432029][ T29] audit: type=1400 audit(1676.330:380): avc: denied { create } for pid=9428 comm="syz.0.1546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1676.432446][ T29] audit: type=1400 audit(1676.330:381): avc: denied { connect } for pid=9428 comm="syz.0.1546" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1678.494962][ T29] audit: type=1400 audit(1678.400:382): avc: denied { read } for pid=9445 comm="syz.0.1550" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1678.495422][ T29] audit: type=1400 audit(1678.400:383): avc: denied { open } for pid=9445 comm="syz.0.1550" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1678.513973][ T29] audit: type=1400 audit(1678.420:384): avc: denied { ioctl } for pid=9445 comm="syz.0.1550" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1678.514420][ T29] audit: type=1400 audit(1678.420:385): avc: denied { set_context_mgr } for pid=9445 comm="syz.0.1550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1678.560506][ T29] audit: type=1400 audit(1678.460:386): avc: denied { write } for pid=9445 comm="syz.0.1550" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1679.441806][ T6623] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1679.662787][ T6623] usb 1-1: Using ep0 maxpacket: 8 [ 1679.763165][ T6623] usb 1-1: config 0 has an invalid interface number: 55 but max is 0 [ 1679.764735][ T6623] usb 1-1: config 0 has no interface number 0 [ 1679.766508][ T6623] usb 1-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 1679.768662][ T6623] usb 1-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 1679.772333][ T6623] usb 1-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 1679.773517][ T6623] usb 1-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 1679.774600][ T6623] usb 1-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 1679.775471][ T6623] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1679.780785][ T6623] usb 1-1: config 0 descriptor?? [ 1679.851872][ T6623] ldusb 1-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 1680.144342][ T9415] usb 1-1: USB disconnect, device number 7 [ 1680.163890][ T9415] ldusb 1-1:0.55: LD USB Device #0 now disconnected [ 1682.095575][ T9474] syz.0.1554 uses obsolete (PF_INET,SOCK_PACKET) [ 1682.142959][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1682.151246][ T29] audit: type=1400 audit(1682.020:393): avc: denied { create } for pid=9473 comm="syz.0.1554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1682.164790][ T29] audit: type=1400 audit(1682.070:394): avc: denied { ioctl } for pid=9473 comm="syz.0.1554" path="socket:[19803]" dev="sockfs" ino=19803 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1683.138271][ T29] audit: type=1400 audit(1683.020:395): avc: denied { unmount } for pid=8541 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1683.376427][ T29] audit: type=1400 audit(1683.280:396): avc: denied { unmount } for pid=8982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1683.484173][ T9486] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1556'. [ 1684.256232][ T29] audit: type=1400 audit(1684.160:397): avc: denied { wake_alarm } for pid=9491 comm="syz.1.1560" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1684.524054][ T29] audit: type=1400 audit(1684.430:398): avc: denied { bind } for pid=9494 comm="syz.0.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1684.526783][ T29] audit: type=1400 audit(1684.430:399): avc: denied { setopt } for pid=9494 comm="syz.0.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1684.546459][ T29] audit: type=1400 audit(1684.450:400): avc: denied { write } for pid=9494 comm="syz.0.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1684.606896][ T29] audit: type=1400 audit(1684.510:401): avc: denied { create } for pid=9491 comm="syz.1.1560" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1684.651025][ T29] audit: type=1400 audit(1684.550:402): avc: denied { ioctl } for pid=9491 comm="syz.1.1560" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=20705 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1685.367814][ T1810] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1685.598237][ T1810] usb 2-1: too many configurations: 137, using maximum allowed: 8 [ 1685.802349][ T1810] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1685.808863][ T1810] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1685.813298][ T1810] usb 2-1: Product: syz [ 1685.814150][ T1810] usb 2-1: Manufacturer: syz [ 1685.815025][ T1810] usb 2-1: SerialNumber: syz [ 1687.498838][ T29] audit: type=1400 audit(1687.400:403): avc: denied { read } for pid=9514 comm="syz.0.1565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1688.411811][ T45] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 1688.568720][ T45] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1688.569070][ T45] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1688.569411][ T45] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1688.570019][ T45] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1688.570086][ T45] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1688.578658][ T45] usb 1-1: config 0 descriptor?? [ 1689.007074][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.007644][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.007778][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.007888][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.007997][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.008103][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.008208][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.008317][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.008431][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.008532][ T45] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 1689.019468][ T45] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1689.276034][ T45] usb 1-1: USB disconnect, device number 8 [ 1689.854086][ T29] audit: type=1400 audit(1689.760:404): avc: denied { setopt } for pid=9542 comm="syz.0.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1689.995827][ T29] audit: type=1400 audit(1689.900:405): avc: denied { create } for pid=9556 comm="syz.0.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1690.323288][ T29] audit: type=1400 audit(1690.230:406): avc: denied { setopt } for pid=9564 comm="syz.0.1571" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1692.970728][ T29] audit: type=1400 audit(1692.870:407): avc: denied { execute } for pid=9571 comm="syz.0.1573" path="/25/cpuacct.usage_percpu" dev="tmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1694.916029][ T9456] usb 2-1: USB disconnect, device number 5 [ 1695.006093][ T29] audit: type=1400 audit(1694.910:408): avc: denied { read } for pid=9586 comm="syz.1.1576" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1695.513171][ T29] audit: type=1400 audit(1695.420:409): avc: denied { write } for pid=9586 comm="syz.1.1576" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1695.862024][ T9590] comedi: valid board names for 8255 driver are: [ 1695.862528][ T9590] 8255 [ 1695.862802][ T9590] comedi: valid board names for vmk80xx driver are: [ 1695.862847][ T9590] vmk80xx [ 1695.862883][ T9590] comedi: valid board names for usbduxsigma driver are: [ 1695.862902][ T9590] usbduxsigma [ 1695.862996][ T9590] comedi: valid board names for usbduxfast driver are: [ 1695.863019][ T9590] usbduxfast [ 1695.863033][ T9590] comedi: valid board names for usbdux driver are: [ 1695.863049][ T9590] usbdux [ 1695.863062][ T9590] comedi: valid board names for ni6501 driver are: [ 1695.863092][ T9590] ni6501 [ 1695.863108][ T9590] comedi: valid board names for dt9812 driver are: [ 1695.863123][ T9590] dt9812 [ 1695.863136][ T9590] comedi: valid board names for ni_labpc_cs driver are: [ 1695.863150][ T9590] ni_labpc_cs [ 1695.863160][ T9590] comedi: valid board names for ni_daq_700 driver are: [ 1695.863174][ T9590] ni_daq_700 [ 1695.863187][ T9590] comedi: valid board names for labpc_pci driver are: [ 1695.863202][ T9590] labpc_pci [ 1695.863217][ T9590] comedi: valid board names for adl_pci9118 driver are: [ 1695.863249][ T9590] pci9118dg [ 1695.863346][ T9590] pci9118hg [ 1695.863366][ T9590] pci9118hr [ 1695.863381][ T9590] comedi: valid board names for 8255_pci driver are: [ 1695.863399][ T9590] 8255_pci [ 1695.863415][ T9590] comedi: valid board names for comedi_parport driver are: [ 1695.863476][ T9590] comedi_parport [ 1695.863494][ T9590] comedi: valid board names for comedi_test driver are: [ 1695.863509][ T9590] comedi_test [ 1695.863522][ T9590] comedi: valid board names for comedi_bond driver are: [ 1695.863589][ T9590] comedi_bond [ 1698.713180][ T29] audit: type=1400 audit(1698.620:410): avc: denied { read write } for pid=9636 comm="syz.1.1584" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1698.713626][ T29] audit: type=1400 audit(1698.620:411): avc: denied { open } for pid=9636 comm="syz.1.1584" path="/17/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1699.052039][ T9456] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1699.201676][ T9456] usb 2-1: Using ep0 maxpacket: 32 [ 1699.209905][ T9456] usb 2-1: config index 0 descriptor too short (expected 29220, got 36) [ 1699.211856][ T9456] usb 2-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 1699.212954][ T9456] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 1699.213889][ T9456] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1699.215630][ T9456] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 1699.216812][ T9456] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 14385, setting to 1024 [ 1699.218021][ T9456] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1699.219265][ T9456] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1699.220575][ T9456] usb 2-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 1699.221938][ T9456] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1699.226593][ T9456] usb 2-1: config 0 descriptor?? [ 1699.230786][ T9642] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1699.445827][ T9456] usblp 2-1:0.0: usblp0: USB Bidirectional printer dev 6 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 1699.655832][ T8966] usb 2-1: USB disconnect, device number 6 [ 1699.664103][ T8966] usblp0: removed [ 1700.991730][ T9673] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9673 comm=syz.1.1590 [ 1703.038798][ T29] audit: type=1400 audit(1702.940:412): avc: denied { create } for pid=9674 comm="syz.1.1591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1704.067839][ T29] audit: type=1400 audit(1703.970:413): avc: denied { create } for pid=9674 comm="syz.1.1591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1707.076832][ T9683] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1707.149324][ T29] audit: type=1326 audit(1707.050:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9688 comm="syz.0.1594" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 1710.074114][ T29] audit: type=1400 audit(1709.980:415): avc: denied { create } for pid=9693 comm="syz.0.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1710.123608][ T29] audit: type=1400 audit(1710.030:416): avc: denied { write } for pid=9693 comm="syz.0.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1713.103786][ T29] audit: type=1400 audit(1713.010:417): avc: denied { create } for pid=9701 comm="syz.1.1598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1713.117818][ T29] audit: type=1400 audit(1713.020:418): avc: denied { write } for pid=9701 comm="syz.1.1598" path="socket:[20896]" dev="sockfs" ino=20896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1713.132165][ T29] audit: type=1400 audit(1713.040:419): avc: denied { read } for pid=9701 comm="syz.1.1598" path="socket:[20893]" dev="sockfs" ino=20893 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1716.110640][ T29] audit: type=1400 audit(1716.010:420): avc: denied { allowed } for pid=9710 comm="syz.0.1602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1716.192924][ T29] audit: type=1400 audit(1716.100:421): avc: denied { create } for pid=9710 comm="syz.0.1602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1716.279278][ T29] audit: type=1400 audit(1716.180:422): avc: denied { setopt } for pid=9714 comm="syz.0.1603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1716.307670][ T29] audit: type=1400 audit(1716.210:423): avc: denied { kexec_image_load } for pid=9714 comm="syz.0.1603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1716.479058][ T29] audit: type=1400 audit(1716.380:424): avc: denied { ioctl } for pid=9714 comm="syz.0.1603" path="socket:[20001]" dev="sockfs" ino=20001 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1716.844340][ T29] audit: type=1400 audit(1716.750:425): avc: denied { ioctl } for pid=9714 comm="syz.0.1603" path="socket:[20930]" dev="sockfs" ino=20930 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1720.789988][ T9734] ubi31: attaching mtd0 [ 1720.809812][ T9734] ubi31: scanning is finished [ 1720.810870][ T9734] ubi31 error: ubi_read_volume_table: the layout volume was not found [ 1720.910887][ T9734] ubi31 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 1720.950632][ T29] audit: type=1400 audit(1720.839:426): avc: denied { write } for pid=9735 comm="syz.0.1608" path="socket:[20028]" dev="sockfs" ino=20028 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1721.132268][ T29] audit: type=1400 audit(1721.008:427): avc: denied { setopt } for pid=9738 comm="syz.1.1609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1721.142891][ T29] audit: type=1400 audit(1721.017:428): avc: denied { ioctl } for pid=9738 comm="syz.1.1609" path="socket:[20040]" dev="sockfs" ino=20040 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1721.391589][ T29] audit: type=1400 audit(1721.251:429): avc: denied { ioctl } for pid=9741 comm="syz.1.1611" path="socket:[20954]" dev="sockfs" ino=20954 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1722.224861][ T29] audit: type=1400 audit(1722.018:430): avc: denied { ioctl } for pid=9741 comm="syz.1.1611" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x941c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1722.408772][ T29] audit: type=1400 audit(1722.205:431): avc: denied { mount } for pid=9755 comm="syz.1.1612" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1724.421204][ T9760] random: crng reseeded on system resumption P+ H:[ 1733.295745][ T29] audit: type=1400 audit(1732.387:432): avc: denied { create } for pid=9832 comm="syz.1.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1733.326385][ T29] audit: type=1400 audit(1732.405:433): avc: denied { setopt } for pid=9832 comm="syz.1.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1733.329190][ T29] audit: type=1400 audit(1732.415:434): avc: denied { connect } for pid=9832 comm="syz.1.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1733.392912][ T29] audit: type=1400 audit(1732.471:435): avc: denied { write } for pid=9832 comm="syz.1.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1735.797793][ T29] audit: type=1400 audit(1734.677:436): avc: denied { map } for pid=9845 comm="syz.1.1640" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20179 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1735.799233][ T29] audit: type=1400 audit(1734.724:437): avc: denied { read write } for pid=9845 comm="syz.1.1640" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20179 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1735.849474][ T9846] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1640'. [ 1735.850439][ T9846] bridge_slave_0: default FDB implementation only supports local addresses [ 1737.241656][ T9851] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1737.927981][ T9857] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1643'. [ 1746.558363][ T9888] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1655'. [ 1746.647732][ T9888] macvlan2: entered promiscuous mode [ 1746.664030][ T9888] macvlan2: entered allmulticast mode [ 1746.666900][ T9888] bond1: entered promiscuous mode [ 1746.668856][ T9888] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1747.061880][ T9888] bond1: left promiscuous mode [ 1748.099424][ T29] audit: type=1400 audit(1746.225:438): avc: denied { bind } for pid=9931 comm="syz.1.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.099815][ T29] audit: type=1400 audit(1746.225:439): avc: denied { name_bind } for pid=9931 comm="syz.1.1659" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1748.099882][ T29] audit: type=1400 audit(1746.225:440): avc: denied { node_bind } for pid=9931 comm="syz.1.1659" saddr=::ffff:0.0.0.0 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1751.903898][ C0] vcan0: j1939_tp_rxtimer: 0x84913c00: rx timeout, send abort [ 1751.904964][ C0] vcan0: j1939_tp_rxtimer: 0x84913e00: rx timeout, send abort [ 1751.906030][ C0] vcan0: j1939_xtp_rx_abort_one: 0x84913c00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 1751.907505][ C0] vcan0: j1939_xtp_rx_abort_one: 0x84913e00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 1751.935917][ T29] audit: type=1400 audit(1749.806:441): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1751.936372][ T29] audit: type=1400 audit(1749.806:442): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1751.936567][ T29] audit: type=1400 audit(1749.806:443): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1751.936744][ T29] audit: type=1400 audit(1749.806:444): avc: denied { add_name } for pid=2909 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1751.936913][ T29] audit: type=1400 audit(1749.806:445): avc: denied { create } for pid=2909 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1751.937079][ T29] audit: type=1400 audit(1749.806:446): avc: denied { append open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1751.937243][ T29] audit: type=1400 audit(1749.806:447): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1755.165040][ T29] audit: type=1400 audit(1752.826:448): avc: denied { getopt } for pid=9975 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1756.402701][ T9987] netlink: 64 bytes leftover after parsing attributes in process `syz.0.1675'. [ 1756.448224][ T29] audit: type=1400 audit(1754.013:449): avc: denied { name_bind } for pid=9985 comm="syz.0.1675" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1758.363838][ T9456] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1758.585986][ T9456] usb 2-1: Using ep0 maxpacket: 32 [ 1758.617705][ T9456] usb 2-1: config 0 has an invalid interface number: 1 but max is 0 [ 1758.619057][ T9456] usb 2-1: config 0 has no interface number 0 [ 1758.628056][ T9456] usb 2-1: New USB device found, idVendor=8086, idProduct=9500, bcdDevice=b6.d8 [ 1758.628903][ T9456] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1758.629585][ T9456] usb 2-1: Product: syz [ 1758.630183][ T9456] usb 2-1: Manufacturer: syz [ 1758.631611][ T9456] usb 2-1: SerialNumber: syz [ 1758.636439][ T9456] usb 2-1: config 0 descriptor?? [ 1758.956818][ T6623] usb 2-1: USB disconnect, device number 7 [ 1759.644963][ T29] audit: type=1400 audit(1757.015:450): avc: denied { ioctl } for pid=10019 comm="syz.1.1680" path="/69/file0/file0" dev="fuse" ino=64 ioctlcmd=0x5417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1759.893111][ T29] audit: type=1400 audit(1757.248:451): avc: denied { mounton } for pid=10024 comm="syz.1.1681" path="/70/file0" dev="tmpfs" ino=378 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 1760.342715][ T9507] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 1760.521471][ T9507] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 1760.521844][ T9507] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1760.522192][ T9507] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1760.522260][ T9507] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 1760.544797][ T9507] usb 1-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 1760.545769][ T9507] usb 1-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 1760.545848][ T9507] usb 1-1: Manufacturer: syz [ 1760.552864][ T9507] usb 1-1: config 0 descriptor?? [ 1761.078866][ T9507] hid_parser_main: 5 callbacks suppressed [ 1761.079095][ T9507] appleir 0003:05AC:8243.0002: unknown main item tag 0x0 [ 1761.120689][ T9507] appleir 0003:05AC:8243.0002: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.0-1/input0 [ 1761.388420][ T9507] usb 1-1: USB disconnect, device number 9 [ 1764.407935][ T8966] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1764.576791][ T8966] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1764.577552][ T8966] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 1764.577811][ T8966] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1764.590590][ T8966] usb 2-1: config 0 descriptor?? [ 1764.857491][ T8966] usbhid 2-1:0.0: can't add hid device: -71 [ 1764.858039][ T8966] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1764.860593][ T8966] usb 2-1: USB disconnect, device number 8 [ 1765.298529][T10087] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1691'. [ 1765.326694][ T6623] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1765.498521][ T6623] usb 2-1: Using ep0 maxpacket: 32 [ 1765.524672][ T6623] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1765.525866][ T6623] usb 2-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice= 0.40 [ 1765.527019][ T6623] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1765.544349][ T6623] usb 2-1: config 0 descriptor?? [ 1765.575833][ T6623] ldusb 2-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 1765.584218][ T6623] ldusb 2-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 1765.842766][ T9507] usb 2-1: USB disconnect, device number 9 [ 1765.846000][ T9507] ldusb 2-1:0.0: LD USB Device #0 now disconnected [ 1769.028961][T10160] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1769.085691][T10160] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1769.129625][T10160] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1769.195188][T10160] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1769.306980][ T6963] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.307243][ T6963] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.307297][ T6963] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.312825][ T6963] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.573047][T10205] netlink: 'syz.0.1719': attribute type 24 has an invalid length. [ 1769.573488][T10205] netlink: 'syz.0.1719': attribute type 1 has an invalid length. [ 1769.573520][T10205] netlink: 224 bytes leftover after parsing attributes in process `syz.0.1719'. [ 1769.695999][T10208] 8<--- cut here --- [ 1769.696186][T10208] Unable to handle kernel paging request at virtual address fee08001 when write [ 1769.696297][T10208] [fee08001] *pgd=80000080007003, *pmd=00000000 [ 1769.697030][T10208] Internal error: Oops: a06 [#1] SMP ARM [ 1769.699847][T10208] Modules linked in: [ 1769.700361][T10208] CPU: 0 UID: 0 PID: 10208 Comm: syz.1.1720 Not tainted syzkaller #0 PREEMPT [ 1769.700774][T10208] Hardware name: ARM-Versatile Express [ 1769.701028][T10208] PC is at parport_attach+0x174/0x1d0 [ 1769.701332][T10208] LR is at parport_attach+0x164/0x1d0 [ 1769.701585][T10208] pc : [<813ce490>] lr : [<813ce480>] psr: 60000013 [ 1769.701870][T10208] sp : ea505d30 ip : ea505d30 fp : ea505d54 [ 1769.702137][T10208] r10: 82b25910 r9 : 00000003 r8 : 84102e40 [ 1769.702435][T10208] r7 : ea505d90 r6 : 84102e40 r5 : 00000000 r4 : 00000000 [ 1769.702694][T10208] r3 : fee08001 r2 : 81e1771c r1 : 00000001 r0 : 813ce100 [ 1769.703444][T10208] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1769.703997][T10208] Control: 30c5387d Table: 8582fac0 DAC: fffffffd [ 1769.704232][T10208] Register r0 information: non-slab/vmalloc memory [ 1769.705455][T10208] Register r1 information: non-paged memory [ 1769.705694][T10208] Register r2 information: non-slab/vmalloc memory [ 1769.705993][T10208] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1769.706643][T10208] Register r4 information: NULL pointer [ 1769.706926][T10208] Register r5 information: NULL pointer [ 1769.707197][T10208] Register r6 information: slab kmalloc-192 start 84102e40 pointer offset 0 size 192 [ 1769.708592][T10208] Register r7 information: 2-page vmalloc region starting at 0xea504000 allocated at kernel_clone+0xac/0x3ec [ 1769.709323][T10208] Register r8 information: slab kmalloc-192 start 84102e40 pointer offset 0 size 192 [ 1769.710101][T10208] Register r9 information: non-paged memory [ 1769.710439][T10208] Register r10 information: non-slab/vmalloc memory [ 1769.711047][T10208] Register r11 information: 2-page vmalloc region starting at 0xea504000 allocated at kernel_clone+0xac/0x3ec [ 1769.711904][T10208] Register r12 information: 2-page vmalloc region starting at 0xea504000 allocated at kernel_clone+0xac/0x3ec [ 1769.712509][T10208] Process syz.1.1720 (pid: 10208, stack limit = 0xea504000) [ 1769.712865][T10208] Stack: (0xea505d30 to 0xea506000) [ 1769.713029][T10208] 5d20: 823f123c 84102e40 829d1bf4 829d1bf4 [ 1769.713309][T10208] 5d40: 81e17bdc 84102e84 ea505d8c ea505d58 813ca520 813ce328 200000c0 00000000 [ 1769.713667][T10208] 5d60: ea505d7c 200000c0 84102e40 b5403587 200000c0 841c9800 40946400 00000003 [ 1769.713990][T10208] 5d80: ea505e4c ea505d90 813c606c 813ca424 656d6f63 705f6964 6f707261 00007472 [ 1769.714436][T10208] 5da0: 00000000 00008001 00000009 00000001 00000000 00000000 00000cc7 00000008 [ 1769.714877][T10208] 5dc0: 00000007 0000000a 00000100 00001002 00000001 00000008 00000004 00000003 [ 1769.715307][T10208] 5de0: ffffffff 00000001 0001a449 00000003 40000003 00000089 00000002 00000f27 [ 1769.715692][T10208] 5e00: 00000006 00000007 00000008 00000004 00000008 00000008 00010000 fffffff8 [ 1769.715962][T10208] 5e20: 00000000 9a1755be 00000000 858c7240 84102e40 200000c0 200000c0 841c9800 [ 1769.716472][T10208] 5e40: ea505f14 ea505e50 813c7038 813c5f78 00000000 00000000 00000000 9a1755be [ 1769.716951][T10208] 5e60: 00000000 00000000 824625b4 0000005f 83fea058 84102e70 8414b51c 841c9800 [ 1769.717440][T10208] 5e80: ea505ee4 ea505e90 807a755c 8079d954 00000064 00000001 00000000 ea505eac [ 1769.717939][T10208] 5ea0: 849a1cd0 834e6550 00006400 0000000b ea505ea0 00000000 00000000 9a1755be [ 1769.718440][T10208] 5ec0: 858c7240 40946400 200000c0 200000c0 858c7240 00000003 ea505ef4 ea505ee8 [ 1769.718895][T10208] 5ee0: 807a767c 9a1755be ea505f14 40946400 00000000 858c7241 200000c0 858c7240 [ 1769.719304][T10208] 5f00: 00000003 841c9800 ea505fa4 ea505f18 80578798 813c6a68 ecac8b10 841c9800 [ 1769.719800][T10208] 5f20: ea505f3c ea505f30 81a606f8 81a605c8 ea505f54 ea505f40 8025c484 8028d914 [ 1769.720239][T10208] 5f40: ea505fb0 40000000 ea505f84 ea505f58 802229ec 8025c440 00000000 8281cfb4 [ 1769.720763][T10208] 5f60: ea505fb0 0014ca70 ecac8b10 80222940 00000000 9a1755be ea505fac 00000000 [ 1769.721374][T10208] 5f80: 00000000 00316308 00000036 8020029c 841c9800 00000036 00000000 ea505fa8 [ 1769.722246][T10208] 5fa0: 80200060 80578674 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1769.722706][T10208] 5fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f810bc [ 1769.723192][T10208] 5fe0: 76f80ec0 76f80eb0 000195a4 00132510 60000010 00000003 00000000 00000000 [ 1769.723684][T10208] Call trace: [ 1769.723985][T10208] [<813ce31c>] (parport_attach) from [<813ca520>] (comedi_device_attach+0x108/0x250) [ 1769.724526][T10208] r6:84102e84 r5:81e17bdc r4:829d1bf4 [ 1769.724774][T10208] [<813ca418>] (comedi_device_attach) from [<813c606c>] (do_devconfig_ioctl+0x100/0x220) [ 1769.725462][T10208] r10:00000003 r9:40946400 r8:841c9800 r7:200000c0 r6:b5403587 r5:84102e40 [ 1769.725906][T10208] r4:200000c0 [ 1769.726117][T10208] [<813c5f6c>] (do_devconfig_ioctl) from [<813c7038>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 1769.726646][T10208] r8:841c9800 r7:200000c0 r6:200000c0 r5:84102e40 r4:858c7240 [ 1769.726951][T10208] [<813c6a5c>] (comedi_unlocked_ioctl) from [<80578798>] (sys_ioctl+0x130/0xba0) [ 1769.727422][T10208] r10:841c9800 r9:00000003 r8:858c7240 r7:200000c0 r6:858c7241 r5:00000000 [ 1769.727753][T10208] r4:40946400 [ 1769.727992][T10208] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1769.728413][T10208] Exception stack(0xea505fa8 to 0xea505ff0) [ 1769.728669][T10208] 5fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1769.729087][T10208] 5fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f810bc [ 1769.729365][T10208] 5fe0: 76f80ec0 76f80eb0 000195a4 00132510 [ 1769.729540][T10208] r10:00000036 r9:841c9800 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 1769.729821][T10208] r4:00000000 [ 1769.730153][T10208] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 1769.730657][T10208] ---[ end trace 0000000000000000 ]--- [ 1769.731208][T10208] Kernel panic - not syncing: Fatal exception [ 1769.733129][T10208] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:30:57 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=82acbf38 R02=81000000 R03=00000000 R04=813ce100 R05=000013ce R06=00000001 R07=60000193 R08=82a7845c R09=8281cfb0 R10=841c9800 R11=ea505bcc R12=ffffffff R13=ea505b10 R14=81400000 R15=804b258c PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00300000 R09=00000000 R10=00006364 R11=76f810bc R12=20004e90 R13=20004e90 R14=000197b4 R15=000197b4 PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000