last executing test programs: 13.641424258s ago: executing program 0 (id=3725): open(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x3bbc46ff9ddfa614, 0x8) r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = dup2(r2, r1) accept$inet(r3, 0x0, 0x0) shutdown(r2, 0x0) ioctl$TUNGETIFF(r0, 0x5451, 0x0) openat$ubi_ctrl(0xffffff9c, 0x0, 0x430000, 0x0) r4 = openat$vhost_vsock(0xffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$KDSKBENT(r4, 0x4b47, 0x0) r5 = epoll_create(0xfffffffa) timer_create(0x7, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r7, 0x0) r8 = dup3(r7, r6, 0x0) accept4$llc(r8, 0x0, 0x0, 0x800) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r5, 0x5452, &(0x7f0000000240)) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = epoll_create(0x1) r11 = creat(&(0x7f000000ecc0)='./file0\x00', 0x0) dup2(r11, r10) fsetxattr$trusted_overlay_upper(r10, &(0x7f0000000080), 0x0, 0x0, 0x1) getsockopt$inet_udp_int(r9, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0xffffffffffffff1a) ioctl$FS_IOC_GETFSUUID(r9, 0x80111500, &(0x7f0000000080)) 10.922485198s ago: executing program 0 (id=3727): r0 = openat$audio(0xffffff9c, &(0x7f0000000240), 0x80040, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x1, 0x40040) ioctl$EVIOCGPROP(r1, 0x80404509, 0x0) vmsplice(r0, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="488ca0062483433e814a6623c39f7f94fb6c82fd0eade44cab31d55041cbf9321e62b80c56271d5e1d1d5efa7de4815ad9e49f0f18e3acd7f0a53e739c969efd9c6a5cf1f35b51207e4e59fd1bc516d9f903f63eb7e75113ac18d0f1561318b7848e6cae663abd5316e576f0", 0x6c}, {&(0x7f0000001840)="e817aa834b7e030bd452ad680b93bc27f71a9960955f8e12be8084cef39003a32808f6e26998019094f69664d20caa0f35f21aa61f169cd4b9cf438f9c48650f04e45fcee0", 0x45}, {&(0x7f00000018c0)="f3082f435d7be48eead1215e61acfd768c180cc105d567fcd4f67f6582a6725ffc9ed7827f3c1fcb815d4640ab97b3e6c60e256dd6791e7ac510ac6c91f7793616a433e73b88b78459aaa72dd79b7fd1d0ed8a344b7eb08ad29b25cb048079427245b3e994df89f200862c2d154eaa9ce36480343000d6be939f2c6a0650587ec47c5a627eac4c8db70825e450e966f4f4b4959e7e5e755ada46b1ded17f21f91eec3c7ed75fcf206f885d39a2c4e63b3f7d025c693c82e5ef3e9a4b2275d8973a6cea5138f1f676e5f27e327c3d", 0xce}, {&(0x7f00000019c0)="6750836c03e6cf8db69963435739fa8d9b3aa001ed966f3873cc786cf318dc1e8f893e9588f5b73ba78b7f8b57ff9815944bc3a86b811b7d71aa237452d657e7c7ee84ad80169dcc053b55f2ba407ce04853dd02cb63f432b37ef04a8379f2ea8078ee36047fa8cb447bfed82f7cbccac1817a8245ebb6b0995f054ab969c13f20b74526d4a15b0a22b12e04bb8fcf83c7a59cbd87bbf37069605ad5202fa9013ef6078ded8d0ad3d3601dcb6544a7a0acfe0364247d08da2ef0f2f82f577ffb058198c773f21b", 0xc7}], 0x5, 0x2) close$binfmt(0xffffffffffffffff) socket(0x1d, 0x2, 0x4) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r3, 0x2}, 0x18) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000000) sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002d40)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002c40)=[{&(0x7f00000000c0)="a933e77153539d3536b50452f6a6a1499236b458cae5cf1c73514fc9918e4b5fea4eb86da6c32002a1e46cf7128b579ea85978dcf438bcc6036f683c690b2f53442c8836607b94a9a0ad3bc9143ae6", 0x4f}, {&(0x7f0000000140)="aefa0b3c443db1693327f4f6a1785eaaa99530f91769a80eb86566d0b481cdfefc6517476e056f8cfd2895e7884b140ee981e44afae114b59ae6eb9a147403368c0d501dc2e854ef9b10683fd38a885dca6e64", 0x53}, {&(0x7f00000001c0)="628c2d2b8113db01311be8", 0xb}, {&(0x7f0000000280)="7124848feaf0cfe201487f2c48d9c17644adb90f681a130cb47f4b0bb6c61ad57c839e4318869a82ea71656d232fedbc217ef74cc593a9a99df718e38772bd809db4d1447ec933ec387c9834a62e53e73fca68dfea480920a9f2ec8d9768a5835373f3c95431bcfcf6f9c857b20fba48911ba92a5975aee277b154df024d0b2422965d7c2a1ed5e40a7898c746b45acc988be672f8c5760ccf158f84a98b92c9b7178f90ebd61536afbe", 0xaa}, {&(0x7f0000000340)="994c442d3bb3965bb259703418402512fa189dfdfe3935c452c9a928ee7b5b9a370518340475a8ffcaa002daa128329e72bf7ad3f0984f5c256676f1140d18cad7d1f9884403d2604533dc92a9e17025b9f21195d7a82e92688073ce1b7e12643c6e8b76d518b64268e019667a3b6aacc0c7f87bc4558554e318eb3b303b16cc37409c1a673a4fdd788ce53c5333a58eda741490c3da026e77c2ad642cc79cab2c0e7a0859a741aede23080c67259a739d35e1d4cdd43bb34b65d585ed998d", 0xbf}, {&(0x7f0000000400)="0aa8d17bcdf84524b42b4d79c35d33a882bb833696a62b76262a8a4b3b67386d0f6b947800e412d6d83accd9143199149c4277ef024d0320be5b794977f5fcde30ffedcc94e2e17cb68042f412a7897e1b60a18c0360ed40a4d01e66f893b8bd399f9fe2a62cd7dd2048d1", 0x6b}, {&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="385e45704d835396ab9e7830f61fc17c71c5fbfa276209573f9bd20756ea99d5a2e411819a60bbfe81291469176ba860aa145b28b787f0283936e46f48b0223daf87715794462af4ed6305383fca9c1bb75e9f6d5d141c93df66a9bb75240e72c0010cfe814d9f62b6caed52b4c730cf03f23d48de94b9b4b23ab70e7b418aee35197e6da458123bc593473539e91f86757e7dcf1931660af5c5b73910434bf708e57ff553f31a1f467ffdf2d049cf01a27dcbc1e1a4a5176b06dc291e5d17a3661a6eaef4fca05c8318f14e6e9db38880b93fd562cf965c30947ea02c763f83d812c3ab9d7b94f374f05bdb", 0xec}, {&(0x7f0000002c00)="6b147ae0", 0x4}], 0x9, &(0x7f00000005c0)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff}}}], 0x18, 0x800c000}, 0x40000) 10.28130833s ago: executing program 1 (id=3728): mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000004200)={0x2020}, 0x2020) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'syztnl2\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x7, 0x7, 0x20, @private2, @mcast2, 0x8000, 0x8, 0x2, 0x9}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x9}}, 0x18) 9.391163637s ago: executing program 1 (id=3729): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x2, 0x1}}, 0x18) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004044) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x4091) 8.051486732s ago: executing program 0 (id=3730): pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x20, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xfffffe00, 0x4d}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20000810) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) dup3(r3, r0, 0x0) bind$unix(r3, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = signalfd(0xffffffffffffffff, &(0x7f00000000c0)={[0x3]}, 0x8) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r4, 0x5421, &(0x7f0000000240)={0x0, 0x0, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5450, 0x0) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r6, 0x0, 0x0) r7 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r7, &(0x7f0000000080)={0x1d, r8, 0x1, {0x1, 0x0, 0x3}, 0xff}, 0x18) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r7) sendmsg$NL80211_CMD_RELOAD_REGDB(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r9, 0x100, 0x70bd2c, 0x25dfdc00}, 0x14}, 0x1, 0x0, 0x0, 0x4044810}, 0x40051) sendmsg$NL80211_CMD_NOTIFY_RADAR(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4080}, 0x40000) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r7) sendmsg$ETHTOOL_MSG_FEATURES_SET(r7, &(0x7f0000001ac0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001b00)=ANY=[@ANYBLOB="44179ff30d0ebfd95220138d52fc1a0a3a0fc704fcffffff0000a908aab2c523206c53406549bb43be77bb56a31b2861bd9d35527d7a28d4f098b0d841cf", @ANYRES16=r10, @ANYBLOB="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"], 0x1744}, 0x1, 0x0, 0x0, 0x4040001}, 0x40084) 8.051105741s ago: executing program 1 (id=3731): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000804) r1 = socket(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x1000}, 0x4008081) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000019c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000001a00)={0x14, r3, 0x1, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4004085}, 0x4004) r4 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x80246, 0x0) write$FUSE_GETXATTR(r4, 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r4}, @GTPA_TID={0xc, 0x3, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x8810}, 0x4000804) close_range(r0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5421, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 5.222167533s ago: executing program 1 (id=3732): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x2, 0x1}}, 0x18) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004044) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x48, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x4091) 2.941686576s ago: executing program 0 (id=3733): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x2}, 0x18) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000000) sendmsg$NFNL_MSG_ACCT_DEL(r0, 0x0, 0x0) 2.839979987s ago: executing program 1 (id=3734): openat$audio(0xffffff9c, &(0x7f0000000240), 0x80040, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x1, 0x40040) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) r1 = openat$dlm_control(0xffffff9c, &(0x7f0000000200), 0x210181, 0x0) close$binfmt(r1) socket(0x1d, 0x2, 0x4) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r3, 0x2}, 0x18) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000000) sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$unix(r1, &(0x7f0000002d40)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002c40)=[{&(0x7f00000000c0)="a933e77153539d3536b50452f6a6a1499236b458cae5cf1c73514fc9918e4b5fea4eb86da6c32002a1e46cf7128b579ea85978dcf438bcc6036f683c690b2f53442c8836607b94a9a0ad3bc9143ae6", 0x4f}, {&(0x7f0000000140)="aefa0b3c443db1693327f4f6a1785eaaa99530f91769a80eb86566d0b481cdfefc6517476e056f8cfd2895e7884b140ee981e44afae114b59ae6eb9a147403368c0d501dc2e854ef9b10683fd38a885dca6e64", 0x53}, {&(0x7f00000001c0)="628c2d2b8113db01311be8", 0xb}, {&(0x7f0000000280)="7124848feaf0cfe201487f2c48d9c17644adb90f681a130cb47f4b0bb6c61ad57c839e4318869a82ea71656d232fedbc217ef74cc593a9a99df718e38772bd809db4d1447ec933ec387c9834a62e53e73fca68dfea480920a9f2ec8d9768a5835373f3c95431bcfcf6f9c857b20fba48911ba92a5975aee277b154df024d0b2422965d7c2a1ed5e40a7898c746b45acc988be672f8c5760ccf158f84a98b92c9b7178f90ebd61536afbe", 0xaa}, {&(0x7f0000000340)="994c442d3bb3965bb259703418402512fa189dfdfe3935c452c9a928ee7b5b9a370518340475a8ffcaa002daa128329e72bf7ad3f0984f5c256676f1140d18cad7d1f9884403d2604533dc92a9e17025b9f21195d7a82e92688073ce1b7e12643c6e8b76d518b64268e019667a3b6aacc0c7f87bc4558554e318eb3b303b16cc37409c1a673a4fdd788ce53c5333a58eda741490c3da026e77c2ad642cc79cab2c0e7a0859a741aede23080c67259a739d35e1d4cdd43bb34b65d585ed998d", 0xbf}, {&(0x7f0000000400)="0aa8d17bcdf84524b42b4d79c35d33a882bb833696a62b76262a8a4b3b67386d0f6b947800e412d6d83accd9143199149c4277ef024d0320be5b794977f5fcde30ffedcc94e2e17cb68042f412a7897e1b60a18c0360ed40a4d01e66f893b8bd399f9fe2a62cd7dd2048d1", 0x6b}, {&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="385e45704d835396ab9e7830f61fc17c71c5fbfa276209573f9bd20756ea99d5a2e411819a60bbfe81291469176ba860aa145b28b787f0283936e46f48b0223daf87715794462af4ed6305383fca9c1bb75e9f6d5d141c93df66a9bb75240e72c0010cfe814d9f62b6caed52b4c730cf03f23d48de94b9b4b23ab70e7b418aee35197e6da458123bc593473539e91f86757e7dcf1931660af5c5b73910434bf708e57ff553f31a1f467ffdf2d049cf01a27dcbc1e1a4a5176b06dc291e5d17a3661a6eaef4fca05c8318f14e6e9db38880b93fd562cf965c30947ea02c763f83d812c3ab9d7b94f374f05bdb", 0xec}, {&(0x7f0000002c00)="6b147ae0", 0x4}], 0x9, &(0x7f00000005c0)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff}}}], 0x18, 0x800c000}, 0x40000) 932.664233ms ago: executing program 0 (id=3735): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x240d80, 0x0) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x80) 416.17µs ago: executing program 0 (id=3736): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000804) r1 = socket(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x1000}, 0x4008081) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000019c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000001a00)={0x14, r3, 0x1, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4004085}, 0x4004) r4 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x80246, 0x0) write$FUSE_GETXATTR(r4, 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r4}, @GTPA_TID={0xc, 0x3, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x8810}, 0x4000804) close_range(r0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5421, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 0s ago: executing program 1 (id=3737): r0 = syz_clone(0x21004280, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0xffff}, {0x6, 0x24, 0x1a, 0x0, 0x10}}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x4}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, &(0x7f0000000480)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x20, 0x80, 0x1c, {0x0, 0x7, 0x1000, 0x6, 0x5, 0x5, 0x800, 0x3, 0x3, 0x0, 0x8001, 0x8}}, 0x0, 0x0, 0x0, 0x0}) wait4(r0, &(0x7f0000000080), 0x8, 0x0) r2 = socket(0x1d, 0x2, 0x6) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$USBDEVFS_DISCARDURB(r3, 0x550b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r4, 0x1, {0x1, 0x1}}, 0x18) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x10}, 0x1, 0x0, 0x0, 0x24008048}, 0x20040000) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={0x0}, 0x1, 0x0, 0x0, 0x4008000}, 0x9810) kernel console output (not intermixed with test programs): t=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3341.251581][ T28] audit: type=1400 audit(3341.190:19892): avc: denied { read open } for pid=18315 comm="syz.1.3488" path="net:[4026532656]" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3341.291860][ T28] audit: type=1400 audit(3341.230:19893): avc: denied { create } for pid=18315 comm="syz.1.3488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3341.367343][ T28] audit: type=1400 audit(3341.300:19894): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3341.382373][ T28] audit: type=1400 audit(3341.310:19895): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3343.972048][T18325] FAULT_INJECTION: forcing a failure. [ 3343.972048][T18325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3343.972871][T18325] CPU: 0 UID: 0 PID: 18325 Comm: syz.1.3492 Tainted: G L syzkaller #0 PREEMPT [ 3343.972991][T18325] Tainted: [L]=SOFTLOCKUP [ 3343.973015][T18325] Hardware name: ARM-Versatile Express [ 3343.973037][T18325] Call trace: [ 3343.973076][T18325] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3343.973188][T18325] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3343.973211][T18325] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3343.973268][T18325] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3343.973328][T18325] r7:b5403587 r6:00000000 r5:850455c0 r4:82b4ee88 [ 3343.973344][T18325] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3343.973403][T18325] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 3343.973465][T18325] r8:003462d8 r7:b5403587 r6:00000000 r5:85045e2c r4:76f96b80 [ 3343.973482][T18325] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 3343.973536][T18325] [<809cd408>] (should_fail_usercopy) from [<8022a1a4>] (setup_sigframe+0x124/0x1c8) [ 3343.973593][T18325] [<8022a080>] (setup_sigframe) from [<8022a7f8>] (do_work_pending+0x2cc/0x4e8) [ 3343.973659][T18325] r10:00000128 r9:b5403587 r8:00000000 r7:85045e2c r6:76f96b80 r5:eb395fb0 [ 3343.973682][T18325] r4:850455c0 [ 3343.973699][T18325] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3343.973748][T18325] Exception stack(0xeb395fb0 to 0xeb395ff8) [ 3343.973781][T18325] 5fa0: fffffffc 20000c00 20084090 00000000 [ 3343.973828][T18325] 5fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f970dc [ 3343.973874][T18325] 5fe0: 76f96e88 76f96e78 00018e58 001307a0 60000010 00000004 [ 3343.973944][T18325] r10:00000128 r9:850455c0 r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 [ 3343.973994][T18325] r4:00000000 [ 3344.159810][T18301] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18301 comm=syz.0.3484 [ 3344.752553][T18330] FAULT_INJECTION: forcing a failure. [ 3344.752553][T18330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3344.801136][T18330] CPU: 1 UID: 0 PID: 18330 Comm: syz.1.3494 Tainted: G L syzkaller #0 PREEMPT [ 3344.801222][T18330] Tainted: [L]=SOFTLOCKUP [ 3344.801232][T18330] Hardware name: ARM-Versatile Express [ 3344.801246][T18330] Call trace: [ 3344.801267][T18330] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3344.801330][T18330] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3344.801352][T18330] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3344.801400][T18330] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3344.801429][T18330] r7:84e318c0 r6:00000000 r5:8318ee40 r4:82b4ee88 [ 3344.801440][T18330] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3344.801498][T18330] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 3344.801561][T18330] r8:845b3000 r7:84e318c0 r6:00000000 r5:200002c0 r4:200002c0 [ 3344.801570][T18330] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 3344.801598][T18330] [<809cd408>] (should_fail_usercopy) from [<805b65e4>] (sys_mount+0xa0/0x260) [ 3344.801626][T18330] [<805b6544>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3344.801648][T18330] Exception stack(0xeb3b1fa8 to 0xeb3b1ff0) [ 3344.801667][T18330] 1fa0: 200002c0 00000000 20000080 20000240 00000000 02180020 [ 3344.801684][T18330] 1fc0: 200002c0 00000000 0012f1a4 00000015 003462d8 00000000 00000001 76f970dc [ 3344.801697][T18330] 1fe0: 76f96e88 76f96e78 00018e58 001307a0 [ 3344.801714][T18330] r10:00000015 r9:8318ee40 r8:8020029c r7:00000015 r6:0012f1a4 r5:00000000 [ 3344.801724][T18330] r4:200002c0 [ 3346.183835][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 3346.184331][ T28] audit: type=1400 audit(3346.120:19947): avc: denied { create } for pid=18333 comm="syz.1.3495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3346.207401][ T28] audit: type=1400 audit(3346.140:19948): avc: denied { write } for pid=18333 comm="syz.1.3495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3347.216305][ T28] audit: type=1400 audit(3347.150:19949): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3347.231348][ T28] audit: type=1400 audit(3347.160:19950): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3347.231602][ T28] audit: type=1400 audit(3347.160:19951): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3347.328841][ T28] audit: type=1400 audit(3347.260:19952): avc: denied { create } for pid=18336 comm="syz.1.3496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3347.345368][ T28] audit: type=1400 audit(3347.280:19953): avc: denied { ioctl } for pid=18336 comm="syz.1.3496" path="socket:[42767]" dev="sockfs" ino=42767 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3347.356416][ T28] audit: type=1400 audit(3347.290:19954): avc: denied { bind } for pid=18336 comm="syz.1.3496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3347.370129][ T28] audit: type=1400 audit(3347.300:19955): avc: denied { write } for pid=18336 comm="syz.1.3496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3347.371894][ T28] audit: type=1400 audit(3347.300:19956): avc: denied { read } for pid=18336 comm="syz.1.3496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3351.563859][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 3351.564148][ T28] audit: type=1400 audit(3351.500:19966): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3351.581249][ T28] audit: type=1400 audit(3351.510:19967): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3351.609924][ T28] audit: type=1400 audit(3351.540:19968): avc: denied { write } for pid=18339 comm="syz.1.3497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3351.651531][ T28] audit: type=1400 audit(3351.580:19969): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3352.305976][ T28] audit: type=1400 audit(3352.240:19970): avc: denied { write } for pid=18339 comm="syz.1.3497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3352.363215][ T28] audit: type=1400 audit(3352.300:19971): avc: denied { write } for pid=18339 comm="syz.1.3497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3352.469834][ T28] audit: type=1400 audit(3352.400:19972): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3352.473175][ T28] audit: type=1400 audit(3352.400:19973): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3352.562617][ T28] audit: type=1400 audit(3352.400:19974): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3352.576392][ T28] audit: type=1400 audit(3352.510:19975): avc: denied { write } for pid=18339 comm="syz.1.3497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3355.895058][T18355] fuse: Bad value for 'user_id' [ 3355.934632][T18355] fuse: Bad value for 'user_id' [ 3356.882164][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 3356.882393][ T28] audit: type=1400 audit(3356.820:20006): avc: denied { mounton } for pid=18354 comm="syz.0.3503" path="/" dev="tmpfs" ino=2337 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3356.888937][ T28] audit: type=1400 audit(3356.820:20007): avc: denied { mount } for pid=18354 comm="syz.0.3503" name="/" dev="ramfs" ino=42788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3357.831640][ T28] audit: type=1400 audit(3357.760:20008): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3357.831960][ T28] audit: type=1400 audit(3357.760:20009): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3357.832259][ T28] audit: type=1400 audit(3357.760:20010): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3358.012982][ T28] audit: type=1400 audit(3357.950:20011): avc: denied { create } for pid=18358 comm="syz.1.3504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3358.044350][ T28] audit: type=1400 audit(3357.980:20012): avc: denied { create } for pid=18358 comm="syz.1.3504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3358.480449][ T28] audit: type=1400 audit(3358.410:20013): avc: denied { unmount } for pid=12325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3358.633825][ T28] audit: type=1400 audit(3358.570:20014): avc: denied { write } for pid=18358 comm="syz.1.3504" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3358.638066][ T28] audit: type=1400 audit(3358.570:20015): avc: denied { open } for pid=18358 comm="syz.1.3504" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3361.894441][ T28] kauditd_printk_skb: 55 callbacks suppressed [ 3361.894778][ T28] audit: type=1400 audit(3361.830:20071): avc: denied { write } for pid=18377 comm="syz.0.3509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3361.903564][ T28] audit: type=1400 audit(3361.840:20072): avc: denied { write } for pid=18381 comm="syz.1.3511" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3361.909305][ T28] audit: type=1400 audit(3361.840:20073): avc: denied { open } for pid=18381 comm="syz.1.3511" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3361.925776][ T28] audit: type=1400 audit(3361.860:20074): avc: denied { map } for pid=18377 comm="syz.0.3509" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3361.926072][ T28] audit: type=1400 audit(3361.860:20075): avc: denied { read } for pid=18377 comm="syz.0.3509" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3361.926239][ T28] audit: type=1400 audit(3361.860:20076): avc: denied { ioctl } for pid=18381 comm="syz.1.3511" path="/dev/ttynull" dev="devtmpfs" ino=609 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3361.927927][ T28] audit: type=1400 audit(3361.860:20077): avc: denied { read } for pid=18381 comm="syz.1.3511" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usr_t:s0" [ 3361.934978][ T28] audit: type=1400 audit(3361.870:20078): avc: denied { read open } for pid=18381 comm="syz.1.3511" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usr_t:s0" [ 3361.943407][ T28] audit: type=1400 audit(3361.880:20079): avc: denied { ioctl } for pid=18381 comm="syz.1.3511" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5351 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usr_t:s0" [ 3361.974787][ T28] audit: type=1400 audit(3361.900:20080): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3367.701520][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 3367.701918][ T28] audit: type=1400 audit(3367.620:20147): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3367.702156][ T28] audit: type=1400 audit(3367.620:20148): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3367.702245][ T28] audit: type=1400 audit(3367.620:20149): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3367.859419][ T28] audit: type=1400 audit(3367.790:20150): avc: denied { create } for pid=18411 comm="syz.1.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3367.877680][ T28] audit: type=1400 audit(3367.810:20151): avc: denied { create } for pid=18411 comm="syz.1.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3367.895246][ T28] audit: type=1400 audit(3367.830:20152): avc: denied { ioctl } for pid=18411 comm="syz.1.3520" path="socket:[42890]" dev="sockfs" ino=42890 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3367.924594][ T28] audit: type=1400 audit(3367.860:20153): avc: denied { read } for pid=18411 comm="syz.1.3520" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3367.925791][ T28] audit: type=1400 audit(3367.860:20154): avc: denied { open } for pid=18411 comm="syz.1.3520" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3367.967647][ T28] audit: type=1400 audit(3367.900:20155): avc: denied { create } for pid=18411 comm="syz.1.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3367.986358][ T28] audit: type=1400 audit(3367.920:20156): avc: denied { write } for pid=18411 comm="syz.1.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3373.939469][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 3373.943195][ T28] audit: type=1400 audit(3373.870:20180): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3373.945777][ T28] audit: type=1400 audit(3373.870:20181): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3373.949797][ T28] audit: type=1400 audit(3373.870:20182): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3374.013404][ T28] audit: type=1400 audit(3373.950:20183): avc: denied { create } for pid=18420 comm="syz.1.3524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3374.026322][ T28] audit: type=1400 audit(3373.960:20184): avc: denied { ioctl } for pid=18420 comm="syz.1.3524" path="socket:[42922]" dev="sockfs" ino=42922 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3374.074959][ T28] audit: type=1400 audit(3374.010:20185): avc: denied { bind } for pid=18420 comm="syz.1.3524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3376.673701][ T28] audit: type=1400 audit(3376.610:20186): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3376.722605][ T28] audit: type=1400 audit(3376.660:20187): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3376.725132][ T28] audit: type=1400 audit(3376.660:20188): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3376.832736][ T28] audit: type=1400 audit(3376.770:20189): avc: denied { read write } for pid=18423 comm="syz.1.3525" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3378.941681][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 3378.942134][ T28] audit: type=1400 audit(3378.860:20240): avc: denied { ioctl } for pid=18426 comm="syz.1.3526" path="socket:[41823]" dev="sockfs" ino=41823 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3378.992124][ T28] audit: type=1400 audit(3378.920:20241): avc: denied { module_request } for pid=18426 comm="syz.1.3526" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3379.134263][ T28] audit: type=1400 audit(3379.070:20242): avc: denied { read } for pid=18426 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3379.146034][ T28] audit: type=1400 audit(3379.080:20243): avc: denied { create } for pid=18426 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3379.156554][ T28] audit: type=1400 audit(3379.090:20244): avc: denied { write } for pid=18426 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3379.194267][ T28] audit: type=1400 audit(3379.130:20245): avc: denied { module_request } for pid=18426 comm="syz.1.3526" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3379.271910][ T28] audit: type=1400 audit(3379.210:20246): avc: denied { sys_module } for pid=18426 comm="syz.1.3526" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3379.279554][ T28] audit: type=1400 audit(3379.210:20247): avc: denied { module_request } for pid=18426 comm="syz.1.3526" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3379.298874][ T28] audit: type=1400 audit(3379.230:20248): avc: denied { read } for pid=18426 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3379.309682][ T28] audit: type=1400 audit(3379.240:20249): avc: denied { create } for pid=18426 comm="syz.1.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3384.068542][ T28] kauditd_printk_skb: 90 callbacks suppressed [ 3384.072775][ T28] audit: type=1400 audit(3384.000:20340): avc: denied { write } for pid=18460 comm="syz.0.3529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3384.294822][ T28] audit: type=1400 audit(3384.230:20341): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3384.301489][ T28] audit: type=1400 audit(3384.230:20342): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3384.301825][ T28] audit: type=1400 audit(3384.230:20343): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3384.613878][ T28] audit: type=1400 audit(3384.550:20344): avc: denied { read } for pid=18469 comm="syz.1.3531" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3384.623602][ T28] audit: type=1400 audit(3384.550:20345): avc: denied { open } for pid=18469 comm="syz.1.3531" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3384.652361][ T28] audit: type=1400 audit(3384.590:20346): avc: denied { ioctl } for pid=18469 comm="syz.1.3531" path="/dev/input/event1" dev="devtmpfs" ino=755 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3384.680036][ T28] audit: type=1400 audit(3384.610:20347): avc: denied { create } for pid=18469 comm="syz.1.3531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3384.691471][ T28] audit: type=1400 audit(3384.610:20348): avc: denied { module_request } for pid=18469 comm="syz.1.3531" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3384.753477][ T28] audit: type=1400 audit(3384.690:20349): avc: denied { write } for pid=18460 comm="syz.0.3529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3384.970279][T18470] can: request_module (can-proto-4) failed. [ 3389.152736][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 3389.153030][ T28] audit: type=1400 audit(3389.090:20376): avc: denied { unmount } for pid=12325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3389.339037][ T28] audit: type=1400 audit(3389.270:20377): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3389.381706][ T28] audit: type=1400 audit(3389.320:20378): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3389.384248][ T28] audit: type=1400 audit(3389.320:20379): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3389.672941][ T28] audit: type=1400 audit(3389.610:20380): avc: denied { allowed } for pid=18484 comm="syz.0.3535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3389.713151][ T28] audit: type=1400 audit(3389.650:20381): avc: denied { create } for pid=18484 comm="syz.0.3535" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3389.721931][ T28] audit: type=1400 audit(3389.660:20382): avc: denied { map } for pid=18484 comm="syz.0.3535" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41896 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3389.722452][ T28] audit: type=1400 audit(3389.660:20383): avc: denied { read write } for pid=18484 comm="syz.0.3535" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41896 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3390.018930][ T28] audit: type=1400 audit(3389.940:20384): avc: denied { allowed } for pid=18484 comm="syz.0.3535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3390.103822][ T28] audit: type=1400 audit(3390.040:20385): avc: denied { create } for pid=18484 comm="syz.0.3535" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3391.375926][T18492] fuse: Unknown parameter 'nws򉵠g?ck' [ 3394.193163][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 3394.193561][ T28] audit: type=1400 audit(3394.130:20432): avc: denied { create } for pid=18503 comm="syz.1.3542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3394.291562][ T28] audit: type=1400 audit(3394.210:20433): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3394.343121][ T28] audit: type=1400 audit(3394.280:20434): avc: denied { write } for pid=18503 comm="syz.1.3542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3394.344569][ T28] audit: type=1400 audit(3394.280:20435): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3394.345479][ T28] audit: type=1400 audit(3394.280:20436): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3394.423808][ T28] audit: type=1400 audit(3394.360:20437): avc: denied { ioctl } for pid=18503 comm="syz.1.3542" path="socket:[43019]" dev="sockfs" ino=43019 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3394.435105][ T28] audit: type=1400 audit(3394.370:20438): avc: denied { write } for pid=18503 comm="syz.1.3542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3395.439653][ T28] audit: type=1400 audit(3395.370:20439): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3395.476273][ T28] audit: type=1400 audit(3395.410:20440): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3395.477076][ T28] audit: type=1400 audit(3395.410:20441): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3399.219472][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 3399.219897][ T28] audit: type=1400 audit(3399.150:20507): avc: denied { create } for pid=18530 comm="syz.0.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3399.283612][ T28] audit: type=1400 audit(3399.220:20508): avc: denied { module_request } for pid=18530 comm="syz.0.3553" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3399.410462][T18531] can: request_module (can-proto-4) failed. [ 3399.476161][ T28] audit: type=1400 audit(3399.410:20509): avc: denied { create } for pid=18530 comm="syz.0.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3399.487952][ T28] audit: type=1400 audit(3399.420:20510): avc: denied { ioctl } for pid=18530 comm="syz.0.3553" path="socket:[41983]" dev="sockfs" ino=41983 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3399.508321][ T28] audit: type=1400 audit(3399.440:20511): avc: denied { bind } for pid=18530 comm="syz.0.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3399.532345][ T28] audit: type=1400 audit(3399.470:20512): avc: denied { write } for pid=18530 comm="syz.0.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3400.082368][ T28] audit: type=1400 audit(3400.020:20513): avc: denied { write } for pid=18530 comm="syz.0.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3400.836228][ T28] audit: type=1400 audit(3400.770:20514): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3400.844940][ T28] audit: type=1400 audit(3400.780:20515): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3400.847923][ T28] audit: type=1400 audit(3400.780:20516): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3405.946997][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 3405.947613][ T28] audit: type=1400 audit(3405.880:20559): avc: denied { create } for pid=18542 comm="syz.0.3557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3406.323718][ T28] audit: type=1400 audit(3406.260:20560): avc: denied { ioctl } for pid=18542 comm="syz.0.3557" path="socket:[43089]" dev="sockfs" ino=43089 ioctlcmd=0x5600 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3406.343290][ T28] audit: type=1400 audit(3406.270:20561): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3406.343694][ T28] audit: type=1400 audit(3406.270:20562): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3406.344036][ T28] audit: type=1400 audit(3406.270:20563): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3406.586855][ T28] audit: type=1400 audit(3406.520:20564): avc: denied { read } for pid=18548 comm="syz.1.3559" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3406.590464][ T28] audit: type=1400 audit(3406.520:20565): avc: denied { open } for pid=18548 comm="syz.1.3559" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3406.710959][ T28] audit: type=1400 audit(3406.640:20566): avc: denied { ioctl } for pid=18548 comm="syz.1.3559" path="/dev/input/event1" dev="devtmpfs" ino=755 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3406.764711][ T28] audit: type=1400 audit(3406.700:20567): avc: denied { create } for pid=18548 comm="syz.1.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3406.765748][ T28] audit: type=1400 audit(3406.700:20568): avc: denied { module_request } for pid=18548 comm="syz.1.3559" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3406.841661][T18549] can: request_module (can-proto-4) failed. [ 3410.404345][T18561] random: crng reseeded on system resumption [ 3411.006363][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 3411.008646][ T28] audit: type=1400 audit(3410.940:20602): avc: denied { kexec_image_load } for pid=18559 comm="syz.1.3563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 3411.876922][ T28] audit: type=1400 audit(3411.810:20603): avc: denied { unmount } for pid=12325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3411.988827][ T28] audit: type=1400 audit(3411.920:20604): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.022609][ T28] audit: type=1400 audit(3411.960:20605): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.025416][ T28] audit: type=1400 audit(3411.960:20606): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.770079][ T28] audit: type=1400 audit(3412.700:20607): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.775926][ T28] audit: type=1400 audit(3412.710:20608): avc: denied { read write } for pid=18564 comm="syz.0.3564" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3412.785421][ T28] audit: type=1400 audit(3412.720:20609): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.802740][ T28] audit: type=1400 audit(3412.730:20610): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.805267][ T28] audit: type=1400 audit(3412.730:20611): avc: denied { read write open } for pid=18564 comm="syz.0.3564" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3413.480253][T18569] can: request_module (can-proto-4) failed. [ 3417.739587][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 3417.739911][ T28] audit: type=1400 audit(3417.670:20635): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3417.743007][ T28] audit: type=1400 audit(3417.680:20636): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3417.743936][ T28] audit: type=1400 audit(3417.680:20637): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3418.025962][ T28] audit: type=1400 audit(3417.960:20638): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3418.026240][ T28] audit: type=1400 audit(3417.960:20639): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3418.082886][ T28] audit: type=1400 audit(3418.020:20640): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3418.322469][ T28] audit: type=1400 audit(3418.260:20641): avc: denied { create } for pid=18577 comm="syz.1.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3418.341942][ T28] audit: type=1400 audit(3418.270:20642): avc: denied { write } for pid=18577 comm="syz.1.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3418.404883][ T28] audit: type=1400 audit(3418.340:20643): avc: denied { create } for pid=18577 comm="syz.1.3569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3418.421476][ T28] audit: type=1400 audit(3418.350:20644): avc: denied { ioctl } for pid=18577 comm="syz.1.3569" path="socket:[44102]" dev="sockfs" ino=44102 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3421.542896][T18583] can: request_module (can-proto-4) failed. [ 3423.671889][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 3423.672276][ T28] audit: type=1400 audit(3423.600:20671): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3423.672536][ T28] audit: type=1400 audit(3423.610:20672): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3423.672751][ T28] audit: type=1400 audit(3423.610:20673): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3423.787755][ T28] audit: type=1400 audit(3423.720:20674): avc: denied { create } for pid=18589 comm="syz.1.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3423.843765][ T28] audit: type=1400 audit(3423.780:20675): avc: denied { write } for pid=18589 comm="syz.1.3573" name="event0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3423.846320][ T28] audit: type=1400 audit(3423.780:20676): avc: denied { open } for pid=18589 comm="syz.1.3573" path="/dev/input/event0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3423.868230][ T28] audit: type=1400 audit(3423.800:20677): avc: denied { read write } for pid=18589 comm="syz.1.3573" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3423.875136][ T28] audit: type=1400 audit(3423.810:20678): avc: denied { read write open } for pid=18589 comm="syz.1.3573" path="/dev/audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3423.889238][ T28] audit: type=1400 audit(3423.820:20679): avc: denied { ioctl } for pid=18589 comm="syz.1.3573" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3424.004655][ T28] audit: type=1400 audit(3423.940:20680): avc: denied { ioctl } for pid=18589 comm="syz.1.3573" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3424.131347][ T9809] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 3424.281062][ T9809] usb 2-1: Using ep0 maxpacket: 32 [ 3424.302762][ T9809] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x1 has invalid maxpacket 1023 [ 3424.302997][ T9809] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x82 has invalid maxpacket 16 [ 3424.303269][ T9809] usb 2-1: config 1 interface 0 has no altsetting 0 [ 3424.320760][ T9809] usb 2-1: New USB device found, idVendor=03f0, idProduct=0004, bcdDevice= 0.40 [ 3424.321533][ T9809] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3424.324571][ T9809] usb 2-1: Product: syz [ 3424.327533][ T9809] usb 2-1: Manufacturer: ࠓ [ 3424.328698][ T9809] usb 2-1: SerialNumber: syz [ 3424.351730][T18590] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3424.352319][T18590] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3424.608043][ T9809] usblp0: Disabling reads from problematic bidirectional printer [ 3424.625657][ T9809] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 20 if 0 alt 9 proto 1 vid 0x03F0 pid 0x0004 [ 3424.644540][ T9809] usb 2-1: USB disconnect, device number 20 [ 3424.655058][ T9809] usblp0: removed [ 3426.392389][T18615] can: request_module (can-proto-4) failed. [ 3428.733111][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 3428.733544][ T28] audit: type=1400 audit(3428.670:20735): avc: denied { write } for pid=18619 comm="syz.0.3578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3428.848801][ T28] audit: type=1400 audit(3428.780:20736): avc: denied { create } for pid=18621 comm="syz.1.3579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3429.428525][ T28] audit: type=1400 audit(3429.360:20737): avc: denied { ioctl } for pid=18621 comm="syz.1.3579" path="socket:[44165]" dev="sockfs" ino=44165 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3429.442757][ T28] audit: type=1400 audit(3429.380:20738): avc: denied { create } for pid=18621 comm="syz.1.3579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3429.613070][ T28] audit: type=1400 audit(3429.550:20739): avc: denied { ioctl } for pid=18621 comm="syz.1.3579" path="socket:[44165]" dev="sockfs" ino=44165 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3430.292624][ T28] audit: type=1400 audit(3430.230:20740): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3430.294189][ T28] audit: type=1400 audit(3430.230:20741): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3430.323634][ T28] audit: type=1400 audit(3430.260:20742): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3430.815013][ T28] audit: type=1400 audit(3430.750:20743): avc: denied { read } for pid=18629 comm="syz.0.3580" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3430.815514][ T28] audit: type=1400 audit(3430.750:20744): avc: denied { open } for pid=18629 comm="syz.0.3580" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3432.343053][T18640] can: request_module (can-proto-4) failed. [ 3433.111776][T18637] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16768 sclass=netlink_audit_socket pid=18637 comm=syz.0.3582 [ 3434.415315][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 3434.415696][ T28] audit: type=1400 audit(3434.350:20790): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3434.421364][ T28] audit: type=1400 audit(3434.350:20791): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3434.421845][ T28] audit: type=1400 audit(3434.350:20792): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3434.603098][ T28] audit: type=1400 audit(3434.540:20793): avc: denied { create } for pid=18646 comm="syz.1.3585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3434.621252][ T28] audit: type=1400 audit(3434.550:20794): avc: denied { ioctl } for pid=18646 comm="syz.1.3585" path="socket:[44191]" dev="sockfs" ino=44191 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3434.640452][ T28] audit: type=1400 audit(3434.570:20795): avc: denied { create } for pid=18646 comm="syz.1.3585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3434.678329][ T28] audit: type=1400 audit(3434.610:20796): avc: denied { write } for pid=18646 comm="syz.1.3585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3435.815455][ T28] audit: type=1400 audit(3435.750:20797): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3435.861956][ T28] audit: type=1400 audit(3435.790:20798): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3435.862327][ T28] audit: type=1400 audit(3435.790:20799): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3437.386537][T18650] FAULT_INJECTION: forcing a failure. [ 3437.386537][T18650] name failslab, interval 1, probability 0, space 0, times 0 [ 3437.391543][T18650] CPU: 0 UID: 0 PID: 18650 Comm: syz.0.3586 Tainted: G L syzkaller #0 PREEMPT [ 3437.391631][T18650] Tainted: [L]=SOFTLOCKUP [ 3437.391641][T18650] Hardware name: ARM-Versatile Express [ 3437.391653][T18650] Call trace: [ 3437.391675][T18650] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3437.391734][T18650] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3437.391743][T18650] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3437.391769][T18650] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3437.391797][T18650] r7:00000000 r6:00000000 r5:84760c40 r4:82b17e08 [ 3437.391806][T18650] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3437.391835][T18650] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 3437.391871][T18650] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 3437.391880][T18650] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 3437.391919][T18650] [<8052d190>] (__kmalloc_noprof) from [<8080b390>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 3437.391960][T18650] r10:00000000 r9:8672c400 r8:00000000 r7:858d95d8 r6:86349ea8 r5:00001000 [ 3437.391970][T18650] r4:00000000 [ 3437.391978][T18650] [<8080b354>] (tomoyo_realpath_from_path) from [<80807458>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3437.392013][T18650] r10:00000000 r9:00000004 r8:86349e80 r7:80047213 r6:81cda174 r5:00000004 [ 3437.392024][T18650] r4:86349ea8 r3:828d1400 [ 3437.392032][T18650] [<8080738c>] (tomoyo_path_number_perm) from [<8080bdac>] (tomoyo_file_ioctl+0x1c/0x20) [ 3437.392063][T18650] r10:84760c40 r9:00000004 r8:86349e80 r7:00000000 r6:00000000 r5:80047213 [ 3437.392072][T18650] r4:86349e80 [ 3437.392080][T18650] [<8080bd90>] (tomoyo_file_ioctl) from [<807b6e34>] (security_file_ioctl+0x80/0x1d4) [ 3437.392107][T18650] [<807b6db4>] (security_file_ioctl) from [<8059c0b4>] (sys_ioctl+0x4c/0xb5c) [ 3437.392139][T18650] r7:00000000 r6:80047213 r5:86349e81 r4:00000000 [ 3437.392147][T18650] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3437.392170][T18650] Exception stack(0xe4419fa8 to 0xe4419ff0) [ 3437.392189][T18650] 9fa0: 00000000 00000000 00000004 80047213 00000000 00000000 [ 3437.392206][T18650] 9fc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76fbf0dc [ 3437.392219][T18650] 9fe0: 76fbee88 76fbee78 00018e58 001307a0 [ 3437.392236][T18650] r10:00000036 r9:84760c40 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 3437.392245][T18650] r4:00000000 [ 3437.405486][T18650] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3440.260340][ T28] kauditd_printk_skb: 118 callbacks suppressed [ 3440.262045][ T28] audit: type=1400 audit(3440.190:20918): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3440.263966][ T28] audit: type=1400 audit(3440.190:20919): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3440.282150][ T28] audit: type=1400 audit(3440.210:20920): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3440.514550][ T28] audit: type=1400 audit(3440.450:20921): avc: denied { create } for pid=18672 comm="syz.1.3591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3440.536442][ T28] audit: type=1400 audit(3440.470:20922): avc: denied { ioctl } for pid=18672 comm="syz.1.3591" path="socket:[43220]" dev="sockfs" ino=43220 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3440.542662][ T28] audit: type=1400 audit(3440.480:20923): avc: denied { create } for pid=18672 comm="syz.1.3591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3440.558058][ T28] audit: type=1400 audit(3440.490:20924): avc: denied { write } for pid=18672 comm="syz.1.3591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3441.449033][ T28] audit: type=1400 audit(3441.380:20925): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3441.451843][ T28] audit: type=1400 audit(3441.380:20926): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3441.456900][ T28] audit: type=1400 audit(3441.380:20927): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3442.643046][T18677] fuse: Unknown parameter '0000000000000000000000000000000000000000' [ 3444.193413][T18681] fuse: Unknown parameter 'groKm:Ca"ŝT?_up_id' [ 3446.183834][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 3446.184199][ T28] audit: type=1400 audit(3446.120:20958): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3446.184433][ T28] audit: type=1400 audit(3446.120:20959): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3446.184517][ T28] audit: type=1400 audit(3446.120:20960): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3446.295223][ T28] audit: type=1400 audit(3446.230:20961): avc: denied { create } for pid=18687 comm="syz.0.3596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3446.318763][ T28] audit: type=1400 audit(3446.250:20962): avc: denied { ioctl } for pid=18687 comm="syz.0.3596" path="socket:[43254]" dev="sockfs" ino=43254 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3446.323189][ T28] audit: type=1400 audit(3446.260:20963): avc: denied { bind } for pid=18687 comm="syz.0.3596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3446.347630][ T28] audit: type=1400 audit(3446.280:20964): avc: denied { write } for pid=18687 comm="syz.0.3596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3446.842143][ T28] audit: type=1400 audit(3446.770:20965): avc: denied { unmount } for pid=17862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3446.865225][ T28] audit: type=1400 audit(3446.800:20966): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3446.866161][ T28] audit: type=1400 audit(3446.800:20967): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3447.778994][T18695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18695 comm=syz.0.3599 [ 3451.994584][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 3451.994976][ T28] audit: type=1400 audit(3451.930:21013): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3452.004360][ T28] audit: type=1400 audit(3451.940:21014): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3452.006123][ T28] audit: type=1400 audit(3451.940:21015): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3452.125363][ T28] audit: type=1400 audit(3452.060:21016): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3452.142609][ T28] audit: type=1400 audit(3452.080:21017): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3452.146613][ T28] audit: type=1400 audit(3452.080:21018): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3452.186633][ T28] audit: type=1400 audit(3452.120:21019): avc: denied { create } for pid=18708 comm="syz.1.3604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3452.205961][ T28] audit: type=1400 audit(3452.140:21020): avc: denied { write } for pid=18708 comm="syz.1.3604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3452.291503][ T28] audit: type=1400 audit(3452.220:21021): avc: denied { read } for pid=18708 comm="syz.1.3604" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3452.314040][ T28] audit: type=1400 audit(3452.250:21022): avc: denied { read open } for pid=18708 comm="syz.1.3604" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3453.112835][T18714] 8021q: VLANs not supported on sit0 [ 3456.945563][T18730] can: request_module (can-proto-4) failed. [ 3457.107064][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 3457.107393][ T28] audit: type=1400 audit(3457.040:21076): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3457.113597][ T28] audit: type=1400 audit(3457.050:21077): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3457.129670][ T28] audit: type=1400 audit(3457.060:21078): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3457.483190][ T28] audit: type=1400 audit(3457.420:21079): avc: denied { write } for pid=18729 comm="syz.1.3612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3457.582103][ T28] audit: type=1400 audit(3457.510:21080): avc: denied { read } for pid=18733 comm="syz.0.3613" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3457.582529][ T28] audit: type=1400 audit(3457.510:21081): avc: denied { open } for pid=18733 comm="syz.0.3613" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3457.602362][ T28] audit: type=1400 audit(3457.540:21082): avc: denied { ioctl } for pid=18733 comm="syz.0.3613" path="/dev/input/event1" dev="devtmpfs" ino=755 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3457.624830][ T28] audit: type=1400 audit(3457.560:21083): avc: denied { create } for pid=18733 comm="syz.0.3613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3457.625566][ T28] audit: type=1400 audit(3457.560:21084): avc: denied { module_request } for pid=18733 comm="syz.0.3613" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3457.936736][T18735] can: request_module (can-proto-4) failed. [ 3458.013686][ T28] audit: type=1400 audit(3457.950:21085): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3458.521300][ T3619] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 3458.651299][ T3619] usb 2-1: device descriptor read/64, error -71 [ 3458.911477][ T3619] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 3459.041854][ T3619] usb 2-1: device descriptor read/64, error -71 [ 3459.152878][ T3619] usb usb2-port1: attempt power cycle [ 3459.511900][ T3619] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 3459.538401][ T3619] usb 2-1: device descriptor read/8, error -71 [ 3459.792053][ T3619] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 3459.816953][ T3619] usb 2-1: device descriptor read/8, error -71 [ 3459.941863][ T3619] usb usb2-port1: unable to enumerate USB device [ 3462.123933][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 3462.124138][ T28] audit: type=1400 audit(3462.060:21121): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3462.133496][ T28] audit: type=1400 audit(3462.070:21122): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3462.134576][ T28] audit: type=1400 audit(3462.070:21123): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3462.422739][ T28] audit: type=1400 audit(3462.360:21124): avc: denied { read } for pid=18750 comm="syz.0.3618" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3462.424268][ T28] audit: type=1400 audit(3462.360:21125): avc: denied { open } for pid=18750 comm="syz.0.3618" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3462.466276][ T28] audit: type=1400 audit(3462.400:21126): avc: denied { read } for pid=18750 comm="syz.0.3618" name="event1" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3462.467677][ T28] audit: type=1400 audit(3462.400:21127): avc: denied { open } for pid=18750 comm="syz.0.3618" path="/dev/input/event1" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3462.512046][ T28] audit: type=1400 audit(3462.450:21128): avc: denied { ioctl } for pid=18750 comm="syz.0.3618" path="/dev/input/event1" dev="devtmpfs" ino=755 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3462.683647][ T28] audit: type=1400 audit(3462.620:21129): avc: denied { create } for pid=18750 comm="syz.0.3618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3462.692958][ T28] audit: type=1400 audit(3462.620:21130): avc: denied { module_request } for pid=18750 comm="syz.0.3618" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3462.842187][T18751] can: request_module (can-proto-4) failed. [ 3468.128660][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 3468.134347][ T28] audit: type=1400 audit(3468.060:21153): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3468.136434][ T28] audit: type=1400 audit(3468.060:21154): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3468.149272][ T28] audit: type=1400 audit(3468.060:21155): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3468.328731][ T28] audit: type=1400 audit(3468.260:21156): avc: denied { create } for pid=18764 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3468.331852][ T28] audit: type=1400 audit(3468.260:21157): avc: denied { ioctl } for pid=18764 comm="syz.1.3622" path="socket:[43376]" dev="sockfs" ino=43376 ioctlcmd=0x941c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3468.343971][ T28] audit: type=1400 audit(3468.280:21158): avc: denied { create } for pid=18764 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3468.386206][ T28] audit: type=1400 audit(3468.320:21159): avc: denied { getopt } for pid=18764 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3468.388616][ T28] audit: type=1400 audit(3468.320:21160): avc: denied { write } for pid=18764 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3468.391507][ T28] audit: type=1400 audit(3468.320:21161): avc: denied { read } for pid=18764 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3468.529803][ T28] audit: type=1400 audit(3468.460:21162): avc: denied { ioctl } for pid=18764 comm="syz.1.3622" path="socket:[43377]" dev="sockfs" ino=43377 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3469.261510][T18767] can: request_module (can-proto-4) failed. [ 3472.578821][T18781] can: request_module (can-proto-4) failed. [ 3473.168614][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 3473.168899][ T28] audit: type=1400 audit(3473.100:21222): avc: denied { create } for pid=18784 comm="syz.0.3630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3473.233199][ T28] audit: type=1400 audit(3473.170:21223): avc: denied { bind } for pid=18784 comm="syz.0.3630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3473.252300][ T28] audit: type=1400 audit(3473.190:21224): avc: denied { write } for pid=18784 comm="syz.0.3630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3473.329395][ T28] audit: type=1400 audit(3473.260:21225): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3473.432915][ T28] audit: type=1400 audit(3473.370:21226): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3473.444762][ T28] audit: type=1400 audit(3473.380:21227): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3473.631222][ T28] audit: type=1400 audit(3473.560:21228): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3473.641684][ T28] audit: type=1400 audit(3473.570:21229): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3473.642092][ T28] audit: type=1400 audit(3473.570:21230): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3473.762403][ T28] audit: type=1400 audit(3473.700:21231): avc: denied { create } for pid=18786 comm="syz.1.3632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3476.227687][T18799] can: request_module (can-proto-4) failed. [ 3477.850995][T18804] can: request_module (can-proto-4) failed. [ 3478.318343][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 3478.318710][ T28] audit: type=1400 audit(3478.250:21291): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3478.318838][ T28] audit: type=1400 audit(3478.250:21292): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3478.415302][ T28] audit: type=1400 audit(3478.250:21293): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3478.629414][ T28] audit: type=1400 audit(3478.560:21294): avc: denied { write } for pid=18806 comm="syz.0.3639" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3478.645539][ T28] audit: type=1400 audit(3478.580:21295): avc: denied { open } for pid=18806 comm="syz.0.3639" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3478.662028][ T28] audit: type=1400 audit(3478.600:21296): avc: denied { ioctl } for pid=18806 comm="syz.0.3639" path="/dev/sequencer2" dev="devtmpfs" ino=722 ioctlcmd=0x943e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3478.692965][ T28] audit: type=1400 audit(3478.630:21297): avc: denied { read } for pid=18806 comm="syz.0.3639" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3478.805990][ T28] audit: type=1400 audit(3478.740:21298): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3478.806327][ T28] audit: type=1400 audit(3478.740:21299): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3478.832486][ T28] audit: type=1400 audit(3478.770:21300): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3479.556009][T18811] can: request_module (can-proto-4) failed. [ 3481.938419][T18824] can: request_module (can-proto-4) failed. [ 3483.354818][ T28] kauditd_printk_skb: 60 callbacks suppressed [ 3483.355026][ T28] audit: type=1400 audit(3483.290:21361): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3483.371934][ T28] audit: type=1400 audit(3483.300:21362): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3483.391522][ T28] audit: type=1400 audit(3483.300:21363): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3483.494795][ T28] audit: type=1400 audit(3483.430:21364): avc: denied { read } for pid=18829 comm="syz.1.3647" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3483.497749][ T28] audit: type=1400 audit(3483.430:21365): avc: denied { open } for pid=18829 comm="syz.1.3647" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3483.505148][ T28] audit: type=1400 audit(3483.440:21366): avc: denied { read } for pid=18829 comm="syz.1.3647" name="event1" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3483.508475][ T28] audit: type=1400 audit(3483.440:21367): avc: denied { open } for pid=18829 comm="syz.1.3647" path="/dev/input/event1" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3483.512449][ T28] audit: type=1400 audit(3483.450:21368): avc: denied { ioctl } for pid=18829 comm="syz.1.3647" path="/dev/input/event1" dev="devtmpfs" ino=755 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3483.574925][ T28] audit: type=1400 audit(3483.510:21369): avc: denied { create } for pid=18829 comm="syz.1.3647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3483.576301][ T28] audit: type=1400 audit(3483.510:21370): avc: denied { module_request } for pid=18829 comm="syz.1.3647" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3483.782479][T18830] can: request_module (can-proto-4) failed. [ 3488.407368][T18838] can: request_module (can-proto-4) failed. [ 3488.416180][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 3488.416793][ T28] audit: type=1400 audit(3488.350:21397): avc: denied { create } for pid=18837 comm="syz.1.3650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3488.428382][ T28] audit: type=1400 audit(3488.360:21398): avc: denied { ioctl } for pid=18837 comm="syz.1.3650" path="socket:[44484]" dev="sockfs" ino=44484 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3488.431238][ T28] audit: type=1400 audit(3488.360:21399): avc: denied { bind } for pid=18837 comm="syz.1.3650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3488.435855][ T28] audit: type=1400 audit(3488.370:21400): avc: denied { write } for pid=18837 comm="syz.1.3650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3489.470195][ T28] audit: type=1400 audit(3489.400:21401): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3489.480867][ T28] audit: type=1400 audit(3489.410:21402): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3489.481051][ T28] audit: type=1400 audit(3489.410:21403): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3489.624048][ T28] audit: type=1400 audit(3489.560:21404): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3489.641839][ T28] audit: type=1400 audit(3489.570:21405): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3489.642173][ T28] audit: type=1400 audit(3489.570:21406): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3489.915324][T18843] can: request_module (can-proto-4) failed. [ 3493.143388][T18853] can: request_module (can-proto-4) failed. [ 3493.465333][T18858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=18858 comm=syz.1.3658 [ 3493.541203][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 3493.541580][ T28] audit: type=1400 audit(3493.470:21450): avc: denied { write } for pid=18856 comm="syz.1.3658" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3493.555729][ T28] audit: type=1400 audit(3493.490:21451): avc: denied { write open } for pid=18856 comm="syz.1.3658" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3493.559546][ T28] audit: type=1400 audit(3493.490:21452): avc: denied { create } for pid=18856 comm="syz.1.3658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3493.587637][ T28] audit: type=1400 audit(3493.520:21453): avc: denied { ioctl } for pid=18856 comm="syz.1.3658" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x5864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3493.651174][ T28] audit: type=1400 audit(3493.580:21454): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3493.651431][ T28] audit: type=1400 audit(3493.580:21455): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3493.651647][ T28] audit: type=1400 audit(3493.580:21456): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3493.765328][ T28] audit: type=1400 audit(3493.700:21457): avc: denied { read } for pid=18859 comm="syz.1.3659" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3493.765722][ T28] audit: type=1400 audit(3493.700:21458): avc: denied { open } for pid=18859 comm="syz.1.3659" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3493.871314][ T28] audit: type=1400 audit(3493.800:21459): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3494.644142][T18868] can: request_module (can-proto-4) failed. [ 3497.352066][T18880] can: request_module (can-proto-4) failed. [ 3498.677726][ T28] kauditd_printk_skb: 76 callbacks suppressed [ 3498.678110][ T28] audit: type=1400 audit(3498.610:21536): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3498.686864][ T28] audit: type=1400 audit(3498.620:21537): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3498.702258][ T28] audit: type=1400 audit(3498.620:21538): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3498.745480][ T28] audit: type=1400 audit(3498.680:21539): avc: denied { write } for pid=18866 comm="syz.0.3661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3498.974959][ T28] audit: type=1400 audit(3498.910:21540): avc: denied { read write } for pid=18884 comm="syz.1.3669" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3499.092786][ T28] audit: type=1400 audit(3499.030:21541): avc: denied { read write open } for pid=18884 comm="syz.1.3669" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3499.113364][ T28] audit: type=1400 audit(3499.050:21542): avc: denied { mounton } for pid=18884 comm="syz.1.3669" path="/119/file0" dev="tmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3499.153336][ T28] audit: type=1400 audit(3499.090:21543): avc: denied { mount } for pid=18884 comm="syz.1.3669" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3499.164253][T18885] FAULT_INJECTION: forcing a failure. [ 3499.164253][T18885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3499.201375][T18885] CPU: 1 UID: 0 PID: 18885 Comm: syz.1.3669 Tainted: G L syzkaller #0 PREEMPT [ 3499.201539][T18885] Tainted: [L]=SOFTLOCKUP [ 3499.201552][T18885] Hardware name: ARM-Versatile Express [ 3499.201566][T18885] Call trace: [ 3499.201590][T18885] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3499.201655][T18885] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3499.201671][T18885] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3499.201698][T18885] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3499.201728][T18885] r7:00000000 r6:00000000 r5:85048c40 r4:82b4ee88 [ 3499.201736][T18885] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3499.201766][T18885] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 3499.201799][T18885] r8:00000001 r7:00000000 r6:000000b4 r5:20000240 r4:83366540 [ 3499.201807][T18885] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 3499.201844][T18885] [<809cd408>] (should_fail_usercopy) from [<809d33a8>] (strncpy_from_user+0x20/0x1b0) [ 3499.201871][T18885] [<809d3388>] (strncpy_from_user) from [<805901d8>] (do_getname+0x4c/0x14c) [ 3499.201963][T18885] r10:8336654c r9:b5403587 r8:00000001 r7:00000000 r6:20000240 r5:825238b8 [ 3499.201980][T18885] r4:83366540 [ 3499.201990][T18885] [<8059018c>] (do_getname) from [<80596334>] (user_path_at+0x30/0x6c) [ 3499.202023][T18885] r10:00000015 r9:b5403587 r8:840a6000 r7:eb1fdf6c r6:ffffff9c r5:00000001 [ 3499.202034][T18885] r4:00000000 r3:eb1fdf6c [ 3499.202042][T18885] [<80596304>] (user_path_at) from [<805b6700>] (sys_mount+0x1bc/0x260) [ 3499.202071][T18885] r7:00000000 r6:00000000 r5:200002c0 r4:00000000 [ 3499.202080][T18885] [<805b6544>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3499.202112][T18885] Exception stack(0xeb1fdfa8 to 0xeb1fdff0) [ 3499.202133][T18885] dfa0: 200002c0 00000000 00000000 20000240 00000000 02180020 [ 3499.202149][T18885] dfc0: 200002c0 00000000 0012f1a4 00000015 003462d8 00000000 00000001 76f970dc [ 3499.202162][T18885] dfe0: 76f96e88 76f96e78 00018e58 001307a0 [ 3499.202179][T18885] r10:00000015 r9:85048c40 r8:8020029c r7:00000015 r6:0012f1a4 r5:00000000 [ 3499.202188][T18885] r4:200002c0 [ 3499.264542][ T28] audit: type=1400 audit(3499.200:21544): avc: denied { unmount } for pid=17862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3499.299706][ T28] audit: type=1400 audit(3499.230:21545): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3503.441699][T18896] can: request_module (can-proto-4) failed. [ 3503.709084][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 3503.709466][ T28] audit: type=1400 audit(3503.640:21572): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3503.713850][ T28] audit: type=1400 audit(3503.650:21573): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3503.715119][ T28] audit: type=1400 audit(3503.650:21574): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3503.771166][ T28] audit: type=1400 audit(3503.700:21575): avc: denied { write } for pid=18866 comm="syz.0.3661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3504.142273][ T28] audit: type=1400 audit(3504.080:21576): avc: denied { create } for pid=18898 comm="syz.1.3673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3504.152247][ T28] audit: type=1400 audit(3504.090:21577): avc: denied { setopt } for pid=18898 comm="syz.1.3673" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3504.168570][ T28] audit: type=1400 audit(3504.100:21578): avc: denied { create } for pid=18898 comm="syz.1.3673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3504.172548][ T28] audit: type=1400 audit(3504.100:21579): avc: denied { write } for pid=18898 comm="syz.1.3673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3504.172739][ T28] audit: type=1400 audit(3504.100:21580): avc: denied { module_request } for pid=18898 comm="syz.1.3673" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3504.295243][ T28] audit: type=1400 audit(3504.230:21581): avc: denied { write } for pid=18866 comm="syz.0.3661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3508.903674][T18912] FAULT_INJECTION: forcing a failure. [ 3508.903674][T18912] name failslab, interval 1, probability 0, space 0, times 0 [ 3508.911037][T18912] CPU: 1 UID: 0 PID: 18912 Comm: syz.1.3678 Tainted: G L syzkaller #0 PREEMPT [ 3508.911121][T18912] Tainted: [L]=SOFTLOCKUP [ 3508.911131][T18912] Hardware name: ARM-Versatile Express [ 3508.911144][T18912] Call trace: [ 3508.911167][T18912] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3508.911233][T18912] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3508.911242][T18912] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3508.911269][T18912] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3508.911298][T18912] r7:00000000 r6:00000000 r5:84fe6e40 r4:82b17e08 [ 3508.911306][T18912] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3508.911336][T18912] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 3508.911373][T18912] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 3508.911382][T18912] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 3508.911410][T18912] [<8052d190>] (__kmalloc_noprof) from [<8080b390>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 3508.911447][T18912] r10:00000000 r9:85cb1400 r8:00000000 r7:836a1f68 r6:854e4ba8 r5:00001000 [ 3508.911457][T18912] r4:00000000 [ 3508.911465][T18912] [<8080b354>] (tomoyo_realpath_from_path) from [<80807458>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3508.911500][T18912] r10:00000000 r9:00000004 r8:854e4b80 r7:80047213 r6:81cda174 r5:00000004 [ 3508.911511][T18912] r4:854e4ba8 r3:828d1400 [ 3508.911519][T18912] [<8080738c>] (tomoyo_path_number_perm) from [<8080bdac>] (tomoyo_file_ioctl+0x1c/0x20) [ 3508.911550][T18912] r10:84fe6e40 r9:00000004 r8:854e4b80 r7:00000000 r6:00000000 r5:80047213 [ 3508.911560][T18912] r4:854e4b80 [ 3508.911568][T18912] [<8080bd90>] (tomoyo_file_ioctl) from [<807b6e34>] (security_file_ioctl+0x80/0x1d4) [ 3508.911595][T18912] [<807b6db4>] (security_file_ioctl) from [<8059c0b4>] (sys_ioctl+0x4c/0xb5c) [ 3508.911627][T18912] r7:00000000 r6:80047213 r5:854e4b81 r4:00000000 [ 3508.911636][T18912] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3508.911659][T18912] Exception stack(0xeb339fa8 to 0xeb339ff0) [ 3508.911680][T18912] 9fa0: 00000000 00000000 00000004 80047213 00000000 00000000 [ 3508.911732][T18912] 9fc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76f970dc [ 3508.911758][T18912] 9fe0: 76f96e88 76f96e78 00018e58 001307a0 [ 3508.911776][T18912] r10:00000036 r9:84fe6e40 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 3508.911785][T18912] r4:00000000 [ 3508.920106][T18912] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3509.204424][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 3509.204637][ T28] audit: type=1400 audit(3509.140:21615): avc: denied { create } for pid=18915 comm="syz.0.3679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3509.263429][ T28] audit: type=1400 audit(3509.200:21616): avc: denied { ioctl } for pid=18915 comm="syz.0.3679" path="socket:[43624]" dev="sockfs" ino=43624 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3509.283826][ T28] audit: type=1400 audit(3509.220:21617): avc: denied { bind } for pid=18915 comm="syz.0.3679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3509.308672][ T28] audit: type=1400 audit(3509.240:21618): avc: denied { write } for pid=18915 comm="syz.0.3679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3510.635260][ T28] audit: type=1400 audit(3510.570:21619): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3510.671656][ T28] audit: type=1400 audit(3510.610:21620): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3510.673621][ T28] audit: type=1400 audit(3510.610:21621): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3511.042485][ T28] audit: type=1400 audit(3510.980:21622): avc: denied { create } for pid=18917 comm="syz.0.3680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3511.058737][ T28] audit: type=1400 audit(3510.990:21623): avc: denied { ioctl } for pid=18917 comm="syz.0.3680" path="socket:[44606]" dev="sockfs" ino=44606 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3511.139791][ T28] audit: type=1400 audit(3511.070:21624): avc: denied { create } for pid=18917 comm="syz.0.3680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3515.941760][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 3515.945531][ T28] audit: type=1400 audit(3515.870:21627): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3516.013623][ T28] audit: type=1400 audit(3515.950:21628): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3516.016591][ T28] audit: type=1400 audit(3515.950:21629): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3516.811963][T18921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18921 comm=syz.0.3681 [ 3517.161014][ T28] audit: type=1400 audit(3517.090:21630): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3517.252296][ T28] audit: type=1400 audit(3517.190:21631): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3517.253186][ T28] audit: type=1400 audit(3517.190:21632): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3517.693397][ T28] audit: type=1400 audit(3517.630:21633): avc: denied { create } for pid=18922 comm="syz.0.3682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3517.801738][ T28] audit: type=1400 audit(3517.740:21634): avc: denied { ioctl } for pid=18922 comm="syz.0.3682" path="socket:[44611]" dev="sockfs" ino=44611 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3521.014430][ T28] audit: type=1400 audit(3520.940:21635): avc: denied { unmount } for pid=17862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3521.145007][ T28] audit: type=1400 audit(3521.080:21636): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3521.151688][ T28] audit: type=1400 audit(3521.080:21637): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3521.158346][ T28] audit: type=1400 audit(3521.080:21638): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3521.792968][ T28] audit: type=1400 audit(3521.730:21639): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3521.795007][ T28] audit: type=1400 audit(3521.730:21640): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3521.802096][ T28] audit: type=1400 audit(3521.730:21641): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3522.161700][ T28] audit: type=1400 audit(3522.090:21642): avc: denied { create } for pid=18927 comm="syz.1.3684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3522.206188][ T28] audit: type=1400 audit(3522.140:21643): avc: denied { ioctl } for pid=18927 comm="syz.1.3684" path="socket:[43646]" dev="sockfs" ino=43646 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3522.227304][ T28] audit: type=1400 audit(3522.160:21644): avc: denied { bind } for pid=18927 comm="syz.1.3684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3527.284611][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 3527.284919][ T28] audit: type=1400 audit(3527.220:21653): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3527.288601][ T28] audit: type=1400 audit(3527.220:21654): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3527.292243][ T28] audit: type=1400 audit(3527.230:21655): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3527.511674][ T28] audit: type=1400 audit(3527.440:21656): avc: denied { create } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3527.551518][ T28] audit: type=1400 audit(3527.470:21657): avc: denied { write } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3527.753297][ T28] audit: type=1400 audit(3527.690:21658): avc: denied { write } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3528.276539][ T28] audit: type=1400 audit(3528.210:21659): avc: denied { create } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3528.293505][ T28] audit: type=1400 audit(3528.230:21660): avc: denied { write } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3528.301671][ T28] audit: type=1400 audit(3528.230:21661): avc: denied { read } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3528.314424][ T28] audit: type=1400 audit(3528.250:21662): avc: denied { write } for pid=18932 comm="syz.1.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3530.391727][T18940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=18940 comm=syz.1.3688 [ 3532.395314][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 3532.396530][ T28] audit: type=1400 audit(3532.330:21692): avc: denied { create } for pid=18943 comm="syz.1.3690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3532.434403][ T28] audit: type=1400 audit(3532.370:21693): avc: denied { ioctl } for pid=18943 comm="syz.1.3690" path="socket:[44651]" dev="sockfs" ino=44651 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3532.484353][ T28] audit: type=1400 audit(3532.420:21694): avc: denied { create } for pid=18943 comm="syz.1.3690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3532.502461][ T28] audit: type=1400 audit(3532.440:21695): avc: denied { write } for pid=18943 comm="syz.1.3690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3532.881360][ T28] audit: type=1400 audit(3532.810:21696): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3532.991530][ T28] audit: type=1400 audit(3532.920:21697): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3532.991933][ T28] audit: type=1400 audit(3532.920:21698): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3533.702961][ T28] audit: type=1400 audit(3533.640:21699): avc: denied { create } for pid=18946 comm="syz.0.3691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3533.730068][ T28] audit: type=1400 audit(3533.660:21700): avc: denied { write } for pid=18946 comm="syz.0.3691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3534.057189][ T28] audit: type=1400 audit(3533.990:21701): avc: denied { write } for pid=18946 comm="syz.0.3691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3537.493767][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 3537.494057][ T28] audit: type=1400 audit(3537.430:21733): avc: denied { write } for pid=18956 comm="syz.1.3696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3538.206537][ T28] audit: type=1400 audit(3538.140:21734): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3538.212357][ T28] audit: type=1400 audit(3538.150:21735): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3538.214058][ T28] audit: type=1400 audit(3538.150:21736): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3538.549150][ T28] audit: type=1400 audit(3538.480:21737): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3538.573264][ T28] audit: type=1400 audit(3538.510:21738): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3538.575063][ T28] audit: type=1400 audit(3538.510:21739): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3538.682939][ T28] audit: type=1400 audit(3538.620:21740): avc: denied { create } for pid=18959 comm="syz.1.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3538.689014][ T28] audit: type=1400 audit(3538.620:21741): avc: denied { write } for pid=18959 comm="syz.1.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3538.714895][ T28] audit: type=1400 audit(3538.650:21742): avc: denied { create } for pid=18958 comm="syz.0.3697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3542.937839][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 3542.951524][ T28] audit: type=1400 audit(3542.870:21773): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3542.952324][ T28] audit: type=1400 audit(3542.870:21774): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3542.952415][ T28] audit: type=1400 audit(3542.870:21775): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3543.164810][ T28] audit: type=1400 audit(3543.100:21776): avc: denied { create } for pid=18973 comm="syz.1.3702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3543.195195][ T28] audit: type=1400 audit(3543.110:21777): avc: denied { ioctl } for pid=18973 comm="syz.1.3702" path="socket:[44700]" dev="sockfs" ino=44700 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3543.205712][ T28] audit: type=1400 audit(3543.140:21778): avc: denied { bind } for pid=18973 comm="syz.1.3702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3543.233006][ T28] audit: type=1400 audit(3543.170:21779): avc: denied { write } for pid=18973 comm="syz.1.3702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3544.286524][ T28] audit: type=1400 audit(3544.220:21780): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3544.287696][ T28] audit: type=1400 audit(3544.220:21781): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3544.288718][ T28] audit: type=1400 audit(3544.220:21782): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.891404][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 3548.891832][ T28] audit: type=1400 audit(3548.820:21792): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.902204][ T28] audit: type=1400 audit(3548.840:21793): avc: denied { read write open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.902634][ T28] audit: type=1400 audit(3548.840:21794): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3549.044466][ T28] audit: type=1400 audit(3548.980:21795): avc: denied { create } for pid=18979 comm="syz.1.3705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3549.218474][ T28] audit: type=1400 audit(3549.150:21796): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3549.219044][ T28] audit: type=1400 audit(3549.150:21797): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3549.224925][ T28] audit: type=1400 audit(3549.160:21798): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3549.482669][ T28] audit: type=1400 audit(3549.420:21799): avc: denied { create } for pid=18981 comm="syz.1.3706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3549.514106][ T28] audit: type=1400 audit(3549.450:21800): avc: denied { ioctl } for pid=18981 comm="syz.1.3706" path="socket:[44707]" dev="sockfs" ino=44707 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3549.532587][ T28] audit: type=1400 audit(3549.470:21801): avc: denied { bind } for pid=18981 comm="syz.1.3706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3554.773841][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 3554.774274][ T28] audit: type=1400 audit(3554.710:21807): avc: denied { unmount } for pid=12325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3555.130433][ T28] audit: type=1400 audit(3555.060:21808): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.261033][ T28] audit: type=1400 audit(3555.190:21809): avc: denied { open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.263119][ T28] audit: type=1400 audit(3555.190:21810): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.558979][ T28] audit: type=1400 audit(3555.490:21811): avc: denied { create } for pid=18988 comm="syz.0.3708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3555.712801][ T28] audit: type=1400 audit(3555.650:21812): avc: denied { ioctl } for pid=18988 comm="syz.0.3708" path="socket:[43767]" dev="sockfs" ino=43767 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3555.852378][ T28] audit: type=1400 audit(3555.790:21813): avc: denied { bind } for pid=18988 comm="syz.0.3708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3555.963485][ T28] audit: type=1400 audit(3555.900:21814): avc: denied { write } for pid=18988 comm="syz.0.3708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3556.593815][ T28] audit: type=1400 audit(3556.530:21815): avc: denied { write } for pid=18988 comm="syz.0.3708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3556.974973][ T28] audit: type=1400 audit(3556.910:21816): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3559.871182][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 3559.874784][ T28] audit: type=1400 audit(3559.800:21838): avc: denied { read write } for pid=18999 comm="syz.1.3712" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3559.877029][ T28] audit: type=1400 audit(3559.800:21839): avc: denied { open } for pid=18999 comm="syz.1.3712" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3559.885992][ T28] audit: type=1400 audit(3559.810:21840): avc: denied { mounton } for pid=18999 comm="syz.1.3712" path="/149/file0" dev="tmpfs" ino=804 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3559.895360][ T28] audit: type=1400 audit(3559.830:21841): avc: denied { mount } for pid=18999 comm="syz.1.3712" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3559.918899][ T28] audit: type=1400 audit(3559.850:21842): avc: denied { module_request } for pid=18999 comm="syz.1.3712" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3560.004930][ T28] audit: type=1400 audit(3559.930:21843): avc: denied { write } for pid=18997 comm="syz.0.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3560.229226][ T28] audit: type=1400 audit(3560.160:21844): avc: denied { sys_module } for pid=18999 comm="syz.1.3712" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3560.234380][ T28] audit: type=1400 audit(3560.170:21845): avc: denied { module_request } for pid=18999 comm="syz.1.3712" kmod="syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3560.476832][ T28] audit: type=1400 audit(3560.410:21846): avc: denied { unmount } for pid=17862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3560.607068][ T28] audit: type=1400 audit(3560.540:21847): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3562.498661][T19014] can: request_module (can-proto-4) failed. [ 3564.942676][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 3564.943006][ T28] audit: type=1400 audit(3564.880:21893): avc: denied { create } for pid=19022 comm="syz.0.3718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3565.113110][ T28] audit: type=1400 audit(3565.050:21894): avc: denied { ioctl } for pid=19022 comm="syz.0.3718" path="socket:[44767]" dev="sockfs" ino=44767 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3565.243920][ T28] audit: type=1400 audit(3565.180:21895): avc: denied { bind } for pid=19022 comm="syz.0.3718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3565.247095][ T28] audit: type=1400 audit(3565.180:21896): avc: denied { write } for pid=19022 comm="syz.0.3718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3565.327450][ T28] audit: type=1400 audit(3565.260:21897): avc: denied { read write } for pid=19024 comm="syz.1.3719" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3565.330076][ T28] audit: type=1400 audit(3565.260:21898): avc: denied { open } for pid=19024 comm="syz.1.3719" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3565.573506][ T28] audit: type=1400 audit(3565.500:21899): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3565.573937][ T28] audit: type=1400 audit(3565.500:21900): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3565.574263][ T28] audit: type=1400 audit(3565.500:21901): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3565.821363][ T28] audit: type=1400 audit(3565.750:21902): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3566.362174][T19031] can: request_module (can-proto-4) failed. [ 3570.065841][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 3570.066656][ T28] audit: type=1400 audit(3570.000:21948): avc: denied { write } for pid=19043 comm="syz.1.3724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3571.180001][ T28] audit: type=1400 audit(3571.110:21949): avc: denied { read write } for pid=19046 comm="syz.0.3725" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3571.192537][ T28] audit: type=1400 audit(3571.130:21950): avc: denied { open } for pid=19046 comm="syz.0.3725" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3571.615078][ T28] audit: type=1400 audit(3571.550:21951): avc: denied { read write } for pid=17862 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3571.620458][ T28] audit: type=1400 audit(3571.550:21952): avc: denied { open } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3571.621387][ T28] audit: type=1400 audit(3571.550:21953): avc: denied { ioctl } for pid=17862 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3571.704701][ T28] audit: type=1400 audit(3571.640:21954): avc: denied { create } for pid=19049 comm="syz.1.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3571.717709][ T28] audit: type=1400 audit(3571.650:21955): avc: denied { ioctl } for pid=19049 comm="syz.1.3726" path="socket:[43859]" dev="sockfs" ino=43859 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3571.743850][ T28] audit: type=1400 audit(3571.670:21956): avc: denied { bind } for pid=19049 comm="syz.1.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3571.744234][ T28] audit: type=1400 audit(3571.680:21957): avc: denied { write } for pid=19049 comm="syz.1.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3573.606193][T19055] can: request_module (can-proto-4) failed. [ 3575.323168][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 3575.323587][ T28] audit: type=1400 audit(3575.260:21991): avc: denied { create } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3575.384744][ T28] audit: type=1400 audit(3575.320:21992): avc: denied { write } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3575.569289][ T28] audit: type=1400 audit(3575.500:21993): avc: denied { write } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3575.975654][ T28] audit: type=1400 audit(3575.910:21994): avc: denied { create } for pid=19064 comm="syz.0.3730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.033225][ T28] audit: type=1400 audit(3575.970:21995): avc: denied { write } for pid=19064 comm="syz.0.3730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.103254][ T28] audit: type=1400 audit(3576.040:21996): avc: denied { create } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.127622][ T28] audit: type=1400 audit(3576.060:21997): avc: denied { create } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.128633][ T28] audit: type=1400 audit(3576.060:21998): avc: denied { write } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.134477][ T28] audit: type=1400 audit(3576.070:21999): avc: denied { read } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3576.208544][ T28] audit: type=1400 audit(3576.140:22000): avc: denied { write } for pid=19063 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3580.364758][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 3580.368715][ T28] audit: type=1400 audit(3580.300:22018): avc: denied { read write } for pid=12325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3580.374359][ T28] audit: type=1400 audit(3580.310:22019): avc: denied { read write open } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3580.382662][ T28] audit: type=1400 audit(3580.320:22020): avc: denied { ioctl } for pid=12325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3580.524838][ T28] audit: type=1400 audit(3580.460:22021): avc: denied { read } for pid=19073 comm="syz.1.3734" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3580.526992][ T28] audit: type=1400 audit(3580.460:22022): avc: denied { open } for pid=19073 comm="syz.1.3734" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3580.574461][ T28] audit: type=1400 audit(3580.510:22023): avc: denied { ioctl } for pid=19073 comm="syz.1.3734" path="/dev/input/event1" dev="devtmpfs" ino=755 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3580.635515][ T28] audit: type=1400 audit(3580.570:22024): avc: denied { create } for pid=19073 comm="syz.1.3734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3580.637319][ T28] audit: type=1400 audit(3580.570:22025): avc: denied { module_request } for pid=19073 comm="syz.1.3734" kmod="can-proto-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3580.921675][T19074] can: request_module (can-proto-4) failed. [ 3580.924785][ T28] audit: type=1400 audit(3580.860:22026): avc: denied { create } for pid=19073 comm="syz.1.3734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3580.966103][ T28] audit: type=1400 audit(3580.900:22027): avc: denied { ioctl } for pid=19073 comm="syz.1.3734" path="socket:[43896]" dev="sockfs" ino=43896 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3583.961085][ T7626] usb 2-1: new high-speed USB device number 25 using dummy_hcd [ 3584.147990][ T7626] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 3584.148187][ T7626] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3584.148361][ T7626] usb 2-1: Product: syz [ 3584.148385][ T7626] usb 2-1: Manufacturer: syz [ 3584.148398][ T7626] usb 2-1: SerialNumber: syz [ 3584.775432][T19083] ------------[ cut here ]------------ [ 3584.775933][T19083] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#0: syz.1.3737/19083 [ 3584.778795][T19083] Modules linked in: [ 3584.779861][T19083] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3584.780467][T19083] CPU: 0 UID: 0 PID: 19083 Comm: syz.1.3737 Tainted: G L syzkaller #0 PREEMPT [ 3584.780998][T19083] Tainted: [L]=SOFTLOCKUP [ 3584.781266][T19083] Hardware name: ARM-Versatile Express [ 3584.781727][T19083] Call trace: [ 3584.782032][T19083] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3584.782702][T19083] r7:82a1e7b8 r6:00000000 r5:8231c350 r4:00000001 [ 3584.783140][T19083] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3584.783743][T19083] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3584.784423][T19083] r7:82a1e7b8 r6:00000000 r5:8409d5c0 r4:82c7bd3c [ 3584.784865][T19083] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 3584.785511][T19083] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 3584.786310][T19083] r7:80265f80 [ 3584.786654][T19083] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 3584.787380][T19083] r3:82a0b544 r2:00000001 r1:82302e38 r0:8230a718 [ 3584.787871][T19083] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 3584.788590][T19083] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 3584.789237][T19083] r8:00000009 r7:8230b914 r6:ec46debc r5:8409d5c0 r4:00000000 [ 3584.789829][T19083] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 3584.790537][T19083] r10:8409dcb4 r9:00000000 r8:ec46df68 r7:ec46d858 r6:00000080 r5:8409d5c0 [ 3584.790912][T19083] r4:8409d5c0 [ 3584.791191][T19083] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 3584.791688][T19083] r8:ec46df68 r7:ec46d858 r6:83149a40 r5:8409d5c0 r4:8409d5c0 [ 3584.792195][T19083] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 3584.792789][T19083] r7:00000001 [ 3584.793117][T19083] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3584.793619][T19083] Exception stack(0xec46dfa8 to 0xec46dff0) [ 3584.794041][T19083] dfa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 3584.794694][T19083] dfc0: 00000000 00000000 00000000 00000001 003462d8 00000000 003d0f00 76f970dc [ 3584.795328][T19083] dfe0: 76f96e60 76f96e50 000193b4 001307a0 [ 3584.797981][T19083] Rebooting in 86400 seconds..