last executing test programs: 1m4.4300223s ago: executing program 1 (id=6627): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r2 = openat$vcsu(0xffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NOTIFY_RADAR(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf258600e7ff07000300", @ANYRES32=r3, @ANYBLOB="08002201fb0000000800a100f6e3000008009f0007000000080026006c0900000800a00009000000080022016a010000"], 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf251500ff0008000300", @ANYRES32=r3, @ANYBLOB="0a001a00ffffffffffff0000"], 0x28}}, 0x80) 1m3.961312532s ago: executing program 1 (id=6630): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @private=0xa010101}, 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0xfffffbff, 0x4) 1m1.310002578s ago: executing program 1 (id=6631): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_inet6_SIOCDELRT(r2, 0x5452, &(0x7f0000000000)={@mcast1, @rand_addr=' \x01\x00', @private2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vsock(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r1) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x4, 0x8, 0xf, 0x5, 0x24, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, 0x40, 0x7, 0x6, 0xf}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000300)) getpeername$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) r10 = socket(0x1d, 0x2, 0x6) r11 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) r13 = dup3(r11, r10, 0x0) r14 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$uinput_user_dev(r14, &(0x7f0000000080)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], [0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_SET_PROPBIT(r14, 0x5501, 0x0) write$input_event(r14, &(0x7f00000005c0), 0x200005d8) ioctl$UI_SET_EVBIT(r13, 0x40045564, 0x1f) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bind$can_j1939(r10, &(0x7f0000000200)={0x1d, r12, 0x1, {}, 0xff}, 0x18) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000004180)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r15, 0xfe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff3c, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r17 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r16}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={r17, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001340)={r15, r18}, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r5, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000013c0)={0x174, r6, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@HEADER={0x94, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x10}, 0x400) dup3(r4, r3, 0x0) 5.82888719s ago: executing program 0 (id=6662): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$NFT_BATCH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x44}}, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x5) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000001c0)=@gcm_128={{0x303}, "752e35468c870ae1", "33bab011b32da82eaa41e7e351dc41bf", "f1056b3d", "fd0ae0d30230b810"}, 0x28) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x0, @loopback}}) 4.865464945s ago: executing program 1 (id=6638): r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002440)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='contention_end\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYRES64], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x38}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r3}, 0x10) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) mlockall(0x6) 4.451617683s ago: executing program 1 (id=6663): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, 0x0) ioctl$IOMMU_IOAS_ALLOC(r2, 0x3b81, 0x0) ioctl$IOMMU_IOAS_COPY(r4, 0x3b83, 0x0) 2.445724272s ago: executing program 0 (id=6664): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_SIOCDELRT(r0, 0x5450, 0x0) 1.260746397s ago: executing program 0 (id=6665): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0xfffc, @empty}], 0x10) sendmmsg$inet6(r1, &(0x7f000000cf00)=[{{&(0x7f00000084c0)={0xa, 0xfffc, 0x0, @loopback}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000140), 0x20) shutdown(r1, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 408.287093ms ago: executing program 1 (id=6666): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000000c0)={0xb11, {{0xa, 0x4e22, 0x100, @loopback, 0x8}}, 0x1}, 0x90) 310.956992ms ago: executing program 0 (id=6667): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000f00)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000c000000180001801400020076657468315f746f5f626174616476002000038018"], 0x4c}}, 0x0) 164.728165ms ago: executing program 0 (id=6668): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8003}, 0x4) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) 0s ago: executing program 0 (id=6669): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000480)={0x4c, 0x0, &(0x7f0000000580)=[@acquire, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000200)={@flat=@weak_binder={0x77622a85, 0x100a, 0x3}, @flat=@weak_binder={0x77622a85, 0x100, 0x1}, @flat=@weak_handle}, &(0x7f00000002c0)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x10, 0x0, &(0x7f00000004c0)=[@request_death={0x400c630e, 0x1}], 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): 0 r8:8020029c r7:8547cb40 r6:20000080 r5:00000004 r4:00000001 [ 3217.687420][T30645] [<80500208>] (do_pwritev) from [<80501b14>] (sys_pwritev+0x20/0x28) [ 3217.687635][T30645] r7:0000016a r6:00130730 r5:00000000 r4:00003100 [ 3217.687767][T30645] [<80501af4>] (sys_pwritev) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3217.688004][T30645] Exception stack(0xecc6dfa8 to 0xecc6dff0) [ 3217.688170][T30645] dfa0: 00003100 00000000 00000003 20000080 00000004 00000000 [ 3217.688414][T30645] dfc0: 00003100 00000000 00130730 0000016a 00000000 00006364 003d0f00 76b220bc [ 3217.688659][T30645] dfe0: 76b21ec0 76b21eb0 000188c0 00132780 [ 3220.232905][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 3220.232955][ T31] audit: type=1400 audit(3220.190:33912): avc: denied { create } for pid=30650 comm="syz.1.6321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3220.234760][ T31] audit: type=1400 audit(3220.190:33913): avc: denied { write } for pid=30650 comm="syz.1.6321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3220.236378][ T31] audit: type=1400 audit(3220.190:33914): avc: denied { module_request } for pid=30650 comm="syz.1.6321" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3220.291786][ T31] audit: type=1400 audit(3220.240:33915): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3220.305174][ T31] audit: type=1400 audit(3220.260:33916): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3220.322524][ T31] audit: type=1400 audit(3220.270:33917): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3220.323323][ T31] audit: type=1400 audit(3220.270:33918): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3220.323818][ T31] audit: type=1400 audit(3220.270:33919): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3220.359928][ T31] audit: type=1400 audit(3220.310:33920): avc: denied { read } for pid=30656 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3220.788909][ T31] audit: type=1400 audit(3220.740:33921): avc: denied { create } for pid=30650 comm="syz.1.6321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3221.668459][T30663] serio: Serial port pts0 [ 3225.304929][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 3225.304984][ T31] audit: type=1400 audit(3225.250:33973): avc: denied { read } for pid=30676 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3225.324144][ T31] audit: type=1400 audit(3225.280:33974): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3225.327490][ T31] audit: type=1400 audit(3225.280:33975): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3225.334232][ T31] audit: type=1400 audit(3225.290:33976): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3225.336354][ T31] audit: type=1400 audit(3225.290:33977): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3225.341077][ T31] audit: type=1400 audit(3225.290:33978): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3225.360715][ T31] audit: type=1400 audit(3225.310:33979): avc: denied { read } for pid=30676 comm="syz.0.6327" name="system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3225.361281][ T31] audit: type=1400 audit(3225.310:33980): avc: denied { read open } for pid=30676 comm="syz.0.6327" path="/dev/dma_heap/system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3225.628696][ T31] audit: type=1400 audit(3225.580:33981): avc: denied { create } for pid=30680 comm="syz.1.6329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3225.637353][ T31] audit: type=1400 audit(3225.590:33982): avc: denied { read } for pid=30680 comm="syz.1.6329" name="vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:zero_device_t:s0" [ 3225.670943][T30681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30681 comm=syz.1.6329 [ 3230.467267][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 3230.467338][ T31] audit: type=1400 audit(3230.420:34054): avc: denied { read write } for pid=30707 comm="syz.1.6336" name="dsp" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3230.468534][ T31] audit: type=1400 audit(3230.420:34055): avc: denied { read write open } for pid=30707 comm="syz.1.6336" path="/dev/dsp" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3230.485063][ T31] audit: type=1400 audit(3230.440:34056): avc: denied { create } for pid=30707 comm="syz.1.6336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3230.492714][ T31] audit: type=1400 audit(3230.440:34057): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3230.493499][ T31] audit: type=1400 audit(3230.440:34058): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3230.494245][ T31] audit: type=1400 audit(3230.440:34059): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3230.498174][ T31] audit: type=1400 audit(3230.450:34060): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3230.498815][ T31] audit: type=1400 audit(3230.450:34061): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3230.527097][ T31] audit: type=1400 audit(3230.480:34062): avc: denied { create } for pid=30707 comm="syz.1.6336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3230.530773][ T31] audit: type=1400 audit(3230.480:34063): avc: denied { write } for pid=30707 comm="syz.1.6336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3234.289047][T30728] serio: Serial port pts0 [ 3234.695961][T30731] fuse: Bad value for 'fd' [ 3235.308764][T30740] FAULT_INJECTION: forcing a failure. [ 3235.308764][T30740] name failslab, interval 1, probability 0, space 0, times 0 [ 3235.309229][T30740] CPU: 0 UID: 0 PID: 30740 Comm: syz.1.6342 Not tainted 6.11.0-rc2-syzkaller #0 [ 3235.309504][T30740] Hardware name: ARM-Versatile Express [ 3235.309695][T30740] Call trace: [ 3235.309837][T30740] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3235.310134][T30740] r7:00000d40 r6:851b22b0 r5:60000013 r4:8200bb20 [ 3235.310303][T30740] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3235.310533][T30740] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3235.310748][T30740] r5:00000000 r4:8271619c [ 3235.310867][T30740] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3235.311132][T30740] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 3235.311459][T30740] r6:851b22b0 r5:00000014 r4:82c01240 [ 3235.311623][T30740] [<804dac94>] (should_failslab) from [<804c0a98>] (__kmalloc_noprof+0x9c/0x458) [ 3235.311993][T30740] [<804c09fc>] (__kmalloc_noprof) from [<80720cb8>] (tomoyo_encode2+0x64/0xf0) [ 3235.312465][T30740] r10:00000fff r9:840ef800 r8:00000000 r7:831b1550 r6:851b22b0 r5:836feffc [ 3235.312828][T30740] r4:836feff3 [ 3235.312946][T30740] [<80720c54>] (tomoyo_encode2) from [<80720d68>] (tomoyo_encode+0x24/0x30) [ 3235.313212][T30740] r9:840ef800 r8:00000000 r7:831b1550 r6:851b22b0 r5:00001000 r4:836feff4 [ 3235.313444][T30740] [<80720d44>] (tomoyo_encode) from [<80720df4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3235.313704][T30740] r5:00001000 r4:836fe000 [ 3235.313835][T30740] [<80720d74>] (tomoyo_realpath_from_path) from [<8071cef4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3235.314160][T30740] r10:834b2400 r9:00000000 r8:851b2240 r7:40189429 r6:00000004 r5:81ad0da8 [ 3235.314380][T30740] r4:851b22b0 r3:824b7380 [ 3235.314510][T30740] [<8071ce28>] (tomoyo_path_number_perm) from [<807217c0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3235.314795][T30740] r9:00000004 r8:851b2240 r7:851b2240 r6:40189429 r5:00000000 r4:822061e4 [ 3235.315012][T30740] [<807217a4>] (tomoyo_file_ioctl) from [<806e4790>] (security_file_ioctl+0x40/0x5c) [ 3235.315284][T30740] [<806e4750>] (security_file_ioctl) from [<8051a0ec>] (sys_ioctl+0x50/0xda4) [ 3235.315545][T30740] r7:00000000 r6:851b2241 r5:00000000 r4:40189429 [ 3235.315704][T30740] [<8051a09c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3235.315932][T30740] Exception stack(0xdfad5fa8 to 0xdfad5ff0) [ 3235.316105][T30740] 5fa0: 00000000 00000000 00000004 40189429 00000000 00000000 [ 3235.316346][T30740] 5fc0: 00000000 00000000 00130730 00000036 00000000 00006364 003d0f00 76ae00bc [ 3235.316573][T30740] 5fe0: 76adfec0 76adfeb0 000188c0 00132780 [ 3235.316741][T30740] r10:00000036 r9:834b2400 r8:8020029c r7:00000036 r6:00130730 r5:00000000 [ 3235.316980][T30740] r4:00000000 [ 3235.352700][T30740] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3235.832036][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 3235.832734][ T31] audit: type=1400 audit(3235.780:34157): avc: denied { ioctl } for pid=30739 comm="syz.0.6347" path="socket:[74191]" dev="sockfs" ino=74191 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3236.136196][ T31] audit: type=1400 audit(3236.090:34158): avc: denied { create } for pid=30745 comm="syz.1.6348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3236.146898][ T31] audit: type=1400 audit(3236.100:34159): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3236.148644][ T31] audit: type=1400 audit(3236.100:34160): avc: denied { read } for pid=30745 comm="syz.1.6348" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3236.152486][ T31] audit: type=1400 audit(3236.100:34161): avc: denied { read open } for pid=30745 comm="syz.1.6348" path="net:[4026532651]" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3236.153100][ T31] audit: type=1400 audit(3236.100:34162): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.153747][ T31] audit: type=1400 audit(3236.100:34163): avc: denied { create } for pid=30745 comm="syz.1.6348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3236.168084][ T31] audit: type=1400 audit(3236.110:34164): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3236.168852][ T31] audit: type=1400 audit(3236.110:34165): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3236.169390][ T31] audit: type=1400 audit(3236.110:34166): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3238.175762][T30758] FAULT_INJECTION: forcing a failure. [ 3238.175762][T30758] name failslab, interval 1, probability 0, space 0, times 0 [ 3238.176217][T30758] CPU: 0 UID: 0 PID: 30758 Comm: syz.0.6353 Not tainted 6.11.0-rc2-syzkaller #0 [ 3238.176453][T30758] Hardware name: ARM-Versatile Express [ 3238.176576][T30758] Call trace: [ 3238.176694][T30758] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3238.176954][T30758] r7:83681800 r6:00000cc0 r5:60000013 r4:8200bb20 [ 3238.177394][T30758] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3238.177760][T30758] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3238.178077][T30758] r5:00000000 r4:8271619c [ 3238.178216][T30758] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3238.178469][T30758] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 3238.178723][T30758] r6:00000cc0 r5:20000000 r4:82c9fb40 [ 3238.178891][T30758] [<804dac94>] (should_failslab) from [<804c0714>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3238.179149][T30758] [<804c06c8>] (kmem_cache_alloc_noprof) from [<8050fcb4>] (getname_flags.part.0+0x28/0x18c) [ 3238.179423][T30758] r10:00000142 r9:83681800 r8:8020029c r7:00000000 r6:8220482c r5:20000000 [ 3238.179625][T30758] r4:20000000 [ 3238.179757][T30758] [<8050fc8c>] (getname_flags.part.0) from [<80514e60>] (getname+0x38/0x4c) [ 3238.180009][T30758] r9:83681800 r8:8020029c r7:ffffffff r6:00000000 r5:dfc4df58 r4:20000000 [ 3238.180254][T30758] [<80514e28>] (getname) from [<804fdb5c>] (do_sys_openat2+0x80/0xe4) [ 3238.180500][T30758] r5:dfc4df58 r4:20000000 [ 3238.180654][T30758] [<804fdadc>] (do_sys_openat2) from [<804fdfa0>] (sys_openat+0x98/0xd4) [ 3238.180928][T30758] r7:00000142 r6:00130730 r5:20000000 r4:ffffffff [ 3238.181119][T30758] [<804fdf08>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3238.181373][T30758] Exception stack(0xdfc4dfa8 to 0xdfc4dff0) [ 3238.181589][T30758] dfa0: 00000000 00000000 ffffffff 20000000 00000002 00000000 [ 3238.181848][T30758] dfc0: 00000000 00000000 00130730 00000142 00000000 00006364 003d0f00 76be10bc [ 3238.182289][T30758] dfe0: 76be0ec0 76be0eb0 000188c0 00132780 [ 3238.182648][T30758] r5:00000000 r4:00000000 [ 3241.454410][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 3241.454454][ T31] audit: type=1400 audit(3241.410:34227): avc: denied { read } for pid=30775 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3241.478069][ T31] audit: type=1400 audit(3241.430:34228): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3241.489223][ T31] audit: type=1400 audit(3241.440:34229): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.489719][ T31] audit: type=1400 audit(3241.440:34230): avc: denied { read } for pid=30775 comm="syz.0.6360" name="card0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3241.490222][ T31] audit: type=1400 audit(3241.440:34231): avc: denied { read open } for pid=30775 comm="syz.0.6360" path="/dev/dri/card0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3241.500906][ T31] audit: type=1400 audit(3241.450:34232): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3241.510134][ T31] audit: type=1400 audit(3241.460:34233): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3241.513065][ T31] audit: type=1400 audit(3241.460:34234): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3241.517387][T30776] FAULT_INJECTION: forcing a failure. [ 3241.517387][T30776] name failslab, interval 1, probability 0, space 0, times 0 [ 3241.517788][T30776] CPU: 0 UID: 0 PID: 30776 Comm: syz.0.6360 Not tainted 6.11.0-rc2-syzkaller #0 [ 3241.518015][T30776] Hardware name: ARM-Versatile Express [ 3241.518302][T30776] Call trace: [ 3241.518424][T30776] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3241.518660][T30776] r7:00000d40 r6:851b2d30 r5:60000013 r4:8200bb20 [ 3241.518784][T30776] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3241.519025][T30776] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3241.519251][T30776] r5:00000000 r4:8271619c [ 3241.519366][T30776] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3241.519593][T30776] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 3241.519897][T30776] r6:851b2d30 r5:00000021 r4:82c01240 [ 3241.520056][T30776] [<804dac94>] (should_failslab) from [<804c0a98>] (__kmalloc_noprof+0x9c/0x458) [ 3241.520291][T30776] [<804c09fc>] (__kmalloc_noprof) from [<80720cb8>] (tomoyo_encode2+0x64/0xf0) [ 3241.520563][T30776] r10:00000fff r9:82c9a800 r8:00000000 r7:83023330 r6:851b2d30 r5:836f9ffc [ 3241.520807][T30776] r4:836f9fe6 [ 3241.520899][T30776] [<80720c54>] (tomoyo_encode2) from [<80720d68>] (tomoyo_encode+0x24/0x30) [ 3241.521148][T30776] r9:82c9a800 r8:00000000 r7:83023330 r6:851b2d30 r5:00001000 r4:836f9fe7 [ 3241.521280][T30776] [<80720d44>] (tomoyo_encode) from [<80720df4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3241.521535][T30776] r5:00001000 r4:836f9000 [ 3241.521656][T30776] [<80720d74>] (tomoyo_realpath_from_path) from [<8071cef4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3241.521869][T30776] r10:83650000 r9:00000000 r8:851b2cc0 r7:c01464a6 r6:00000004 r5:81ad0da8 [ 3241.522082][T30776] r4:851b2d30 r3:824b7380 [ 3241.522433][T30776] [<8071ce28>] (tomoyo_path_number_perm) from [<807217c0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3241.522875][T30776] r9:00000003 r8:851b2cc0 r7:851b2cc0 r6:c01464a6 r5:200014c0 r4:822061e4 [ 3241.523257][T30776] [<807217a4>] (tomoyo_file_ioctl) from [<806e4790>] (security_file_ioctl+0x40/0x5c) [ 3241.523560][T30776] [<806e4750>] (security_file_ioctl) from [<8051a0ec>] (sys_ioctl+0x50/0xda4) [ 3241.523941][T30776] r7:200014c0 r6:851b2cc1 r5:00000000 r4:c01464a6 [ 3241.524197][T30776] [<8051a09c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3241.524431][T30776] Exception stack(0xdfda9fa8 to 0xdfda9ff0) [ 3241.524606][T30776] 9fa0: 00000000 00000000 00000003 c01464a6 200014c0 00000000 [ 3241.524853][T30776] 9fc0: 00000000 00000000 00130730 00000036 00000000 00006364 003d0f00 76be10bc [ 3241.525120][T30776] 9fe0: 76be0ec0 76be0eb0 000188c0 00132780 [ 3241.525399][T30776] r10:00000036 r9:83650000 r8:8020029c r7:00000036 r6:00130730 r5:00000000 [ 3241.525691][T30776] r4:00000000 [ 3241.526874][T30776] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3241.528987][ T31] audit: type=1400 audit(3241.480:34235): avc: denied { ioctl } for pid=30775 comm="syz.0.6360" path="/dev/dri/card0" dev="devtmpfs" ino=615 ioctlcmd=0x64a6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3241.735429][ T31] audit: type=1400 audit(3241.690:34236): avc: denied { read } for pid=30777 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3242.867287][T30786] FAULT_INJECTION: forcing a failure. [ 3242.867287][T30786] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3242.872656][T30786] CPU: 0 UID: 0 PID: 30786 Comm: syz.1.6365 Not tainted 6.11.0-rc2-syzkaller #0 [ 3242.872984][T30786] Hardware name: ARM-Versatile Express [ 3242.873127][T30786] Call trace: [ 3242.873245][T30786] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3242.873499][T30786] r7:200000c0 r6:dfa61e30 r5:60000113 r4:8200bb20 [ 3242.873707][T30786] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3242.874015][T30786] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3242.874237][T30786] r5:00000000 r4:82748bd4 [ 3242.874353][T30786] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3242.874584][T30786] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 3242.874852][T30786] r6:dfa61e30 r5:00000000 r4:dfa61f38 [ 3242.875019][T30786] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 3242.875264][T30786] [<808b6378>] (should_fail_usercopy) from [<81449d6c>] (copy_msghdr_from_user+0x50/0x130) [ 3242.875599][T30786] [<81449d1c>] (copy_msghdr_from_user) from [<81449ec4>] (___sys_sendmsg+0x78/0xd0) [ 3242.876049][T30786] r8:00000004 r7:00000000 r6:8321af00 r5:dfa61f38 r4:dfa61e74 [ 3242.876391][T30786] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 3242.876620][T30786] r10:00000128 r9:8426b000 r8:8020029c r7:00000004 r6:200000c0 r5:8321af00 [ 3242.876830][T30786] r4:00000000 [ 3242.876944][T30786] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3242.877192][T30786] Exception stack(0xdfa61fa8 to 0xdfa61ff0) [ 3242.877342][T30786] 1fa0: 00000000 00000000 00000003 200000c0 00000004 00000000 [ 3242.877563][T30786] 1fc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b220bc [ 3242.877775][T30786] 1fe0: 76b21ec0 76b21eb0 000188c0 00132780 [ 3242.877920][T30786] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 3246.664883][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 3246.664941][ T31] audit: type=1400 audit(3246.620:34320): avc: denied { create } for pid=30815 comm="syz.0.6378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3246.666548][ T31] audit: type=1400 audit(3246.620:34321): avc: denied { write } for pid=30815 comm="syz.0.6378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3246.668084][ T31] audit: type=1400 audit(3246.620:34322): avc: denied { module_request } for pid=30815 comm="syz.0.6378" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3246.680221][ T31] audit: type=1400 audit(3246.630:34323): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3246.685260][ T31] audit: type=1400 audit(3246.640:34324): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3246.692636][ T31] audit: type=1400 audit(3246.640:34325): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3246.693240][ T31] audit: type=1400 audit(3246.640:34326): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3246.693769][ T31] audit: type=1400 audit(3246.640:34327): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3246.927779][ T31] audit: type=1400 audit(3246.880:34328): avc: denied { read } for pid=30815 comm="syz.0.6378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3248.288524][ T31] audit: type=1400 audit(3248.240:34329): avc: denied { read } for pid=30826 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3249.178420][T30840] FAULT_INJECTION: forcing a failure. [ 3249.178420][T30840] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3249.178801][T30840] CPU: 1 UID: 0 PID: 30840 Comm: syz.0.6387 Not tainted 6.11.0-rc2-syzkaller #0 [ 3249.179017][T30840] Hardware name: ARM-Versatile Express [ 3249.179157][T30840] Call trace: [ 3249.179375][T30840] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3249.179739][T30840] r7:8426ec00 r6:8547c300 r5:60000013 r4:8200bb20 [ 3249.179910][T30840] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3249.180182][T30840] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3249.180386][T30840] r5:00000000 r4:82748bd4 [ 3249.180507][T30840] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3249.180733][T30840] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 3249.180931][T30840] r6:8547c300 r5:20001f00 r4:e0069e50 [ 3249.181068][T30840] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 3249.181292][T30840] [<808b6378>] (should_fail_usercopy) from [<808bc3dc>] (strncpy_from_user+0x20/0x194) [ 3249.181528][T30840] [<808bc3bc>] (strncpy_from_user) from [<80536740>] (setxattr_copy+0x2c/0x90) [ 3249.181771][T30840] r10:000000e4 r9:8426ec00 r8:20001f00 r7:8426ec00 r6:8547c300 r5:8547c301 [ 3249.181986][T30840] r4:e0069e50 [ 3249.182119][T30840] [<80536714>] (setxattr_copy) from [<80536a04>] (__do_sys_fsetxattr+0xa0/0x140) [ 3249.182426][T30840] r5:8547c301 r4:00000003 [ 3249.182590][T30840] [<80536964>] (__do_sys_fsetxattr) from [<80536b18>] (sys_fsetxattr+0x1c/0x24) [ 3249.182884][T30840] r8:8020029c r7:000000e4 r6:00130730 r5:00000000 r4:00000000 [ 3249.183081][T30840] [<80536afc>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3249.183323][T30840] Exception stack(0xe0069fa8 to 0xe0069ff0) [ 3249.183497][T30840] 9fa0: 00000000 00000000 00000003 20001f00 00000000 00000000 [ 3249.183743][T30840] 9fc0: 00000000 00000000 00130730 000000e4 00000000 00006364 003d0f00 76be10bc [ 3249.183963][T30840] 9fe0: 76be0ec0 76be0eb0 000188c0 00132780 [ 3249.874022][T30850] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30850 comm=syz.1.6392 [ 3251.845019][ T31] kauditd_printk_skb: 80 callbacks suppressed [ 3251.845069][ T31] audit: type=1400 audit(3251.800:34410): avc: denied { read write } for pid=30862 comm="syz.1.6396" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3251.846357][ T31] audit: type=1400 audit(3251.800:34411): avc: denied { read write open } for pid=30862 comm="syz.1.6396" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3251.857621][ T31] audit: type=1400 audit(3251.810:34412): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3251.859825][ T31] audit: type=1400 audit(3251.810:34413): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.861320][ T31] audit: type=1400 audit(3251.810:34414): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3251.873240][ T31] audit: type=1400 audit(3251.830:34415): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3251.875421][ T31] audit: type=1400 audit(3251.830:34416): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3252.147301][ T31] audit: type=1400 audit(3252.100:34417): avc: denied { read } for pid=30864 comm="syz.1.6397" name="rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3252.149233][ T31] audit: type=1400 audit(3252.100:34418): avc: denied { read open } for pid=30864 comm="syz.1.6397" path="/dev/rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3252.152112][ T31] audit: type=1400 audit(3252.100:34419): avc: denied { ioctl } for pid=30864 comm="syz.1.6397" path="/dev/rtc0" dev="devtmpfs" ino=713 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3252.732804][T30868] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30868 comm=syz.0.6398 [ 3253.526305][T30878] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30878 comm=syz.1.6403 [ 3255.738748][T30892] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30892 comm=syz.1.6406 [ 3256.539953][T30898] fuse: Bad value for 'group_id' [ 3256.540259][T30898] fuse: Bad value for 'group_id' [ 3256.888842][ T31] kauditd_printk_skb: 123 callbacks suppressed [ 3256.888903][ T31] audit: type=1400 audit(3256.840:34543): avc: denied { read } for pid=30902 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3256.908846][ T31] audit: type=1400 audit(3256.860:34544): avc: denied { create } for pid=30902 comm="syz.0.6411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3256.926227][ T31] audit: type=1400 audit(3256.880:34545): avc: denied { setopt } for pid=30902 comm="syz.0.6411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3256.929088][ T31] audit: type=1400 audit(3256.880:34546): avc: denied { connect } for pid=30902 comm="syz.0.6411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3257.440209][ T31] audit: type=1400 audit(3257.390:34547): avc: denied { write } for pid=30902 comm="syz.0.6411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3257.448183][ T31] audit: type=1400 audit(3257.400:34548): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3257.450328][ T31] audit: type=1400 audit(3257.400:34549): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3257.452073][ T31] audit: type=1400 audit(3257.400:34550): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3257.453854][ T31] audit: type=1400 audit(3257.410:34551): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3257.455347][ T31] audit: type=1400 audit(3257.410:34552): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3260.335770][T30914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30914 comm=syz.0.6414 [ 3262.147011][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 3262.147057][ T31] audit: type=1400 audit(3262.100:34630): avc: denied { read } for pid=30928 comm="syz.0.6419" name="system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3262.149130][ T31] audit: type=1400 audit(3262.100:34631): avc: denied { read open } for pid=30928 comm="syz.0.6419" path="/dev/dma_heap/system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3262.163169][ T31] audit: type=1400 audit(3262.110:34632): avc: denied { create } for pid=30928 comm="syz.0.6419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3262.166146][ T31] audit: type=1400 audit(3262.120:34633): avc: denied { write } for pid=30928 comm="syz.0.6419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3262.176443][ T31] audit: type=1400 audit(3262.130:34634): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3262.185131][ T31] audit: type=1400 audit(3262.140:34635): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3262.186291][ T31] audit: type=1400 audit(3262.140:34636): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3262.187543][ T31] audit: type=1400 audit(3262.140:34637): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3262.188949][ T31] audit: type=1400 audit(3262.140:34638): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3262.344341][ T31] audit: type=1400 audit(3262.300:34639): avc: denied { read } for pid=30933 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.490172][T30953] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=30953 comm=syz.0.6428 [ 3267.349581][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 3267.349640][ T31] audit: type=1400 audit(3267.300:34739): avc: denied { read } for pid=30979 comm="syz.1.6439" name="mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3267.351964][ T31] audit: type=1400 audit(3267.300:34740): avc: denied { read open } for pid=30979 comm="syz.1.6439" path="/dev/mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3267.367762][ T31] audit: type=1400 audit(3267.310:34741): avc: denied { read } for pid=30979 comm="syz.1.6439" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3267.368388][ T31] audit: type=1400 audit(3267.320:34742): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3267.369200][ T31] audit: type=1400 audit(3267.320:34743): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3267.379276][ T31] audit: type=1400 audit(3267.330:34744): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3267.380062][ T31] audit: type=1400 audit(3267.330:34745): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3267.381014][ T31] audit: type=1400 audit(3267.330:34746): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3267.401499][ T31] audit: type=1400 audit(3267.350:34747): avc: denied { read open } for pid=30979 comm="syz.1.6439" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3267.403011][ T31] audit: type=1400 audit(3267.350:34748): avc: denied { ioctl } for pid=30979 comm="syz.1.6439" path="/dev/mixer" dev="devtmpfs" ino=735 ioctlcmd=0x6409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3271.360498][T31018] FAULT_INJECTION: forcing a failure. [ 3271.360498][T31018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3271.360943][T31018] CPU: 1 UID: 0 PID: 31018 Comm: syz.0.6455 Not tainted 6.11.0-rc2-syzkaller #0 [ 3271.361236][T31018] Hardware name: ARM-Versatile Express [ 3271.361438][T31018] Call trace: [ 3271.361624][T31018] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3271.362002][T31018] r7:20000100 r6:eae2de30 r5:60000013 r4:8200bb20 [ 3271.362556][T31018] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3271.363942][T31018] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3271.364274][T31018] r5:00000000 r4:82748bd4 [ 3271.364452][T31018] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3271.364786][T31018] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 3271.365096][T31018] r6:eae2de30 r5:00000000 r4:eae2df38 [ 3271.365298][T31018] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 3271.365646][T31018] [<808b6378>] (should_fail_usercopy) from [<81449d6c>] (copy_msghdr_from_user+0x50/0x130) [ 3271.366034][T31018] [<81449d1c>] (copy_msghdr_from_user) from [<81449ec4>] (___sys_sendmsg+0x78/0xd0) [ 3271.366382][T31018] r8:20000008 r7:00000000 r6:84c2b180 r5:eae2df38 r4:eae2de74 [ 3271.366634][T31018] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 3271.366968][T31018] r10:00000128 r9:8426b000 r8:8020029c r7:20000008 r6:20000100 r5:84c2b180 [ 3271.367249][T31018] r4:00000000 [ 3271.367403][T31018] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3271.367726][T31018] Exception stack(0xeae2dfa8 to 0xeae2dff0) [ 3271.367968][T31018] dfa0: 00000000 00000000 00000003 20000100 20000008 00000000 [ 3271.368270][T31018] dfc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76be10bc [ 3271.368569][T31018] dfe0: 76be0ec0 76be0eb0 000188c0 00132780 [ 3271.368812][T31018] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 3272.453427][ T31] kauditd_printk_skb: 113 callbacks suppressed [ 3272.453486][ T31] audit: type=1400 audit(3272.410:34862): avc: denied { create } for pid=31030 comm="syz.1.6460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3272.459442][ T31] audit: type=1400 audit(3272.410:34863): avc: denied { write } for pid=31028 comm="syz.0.6459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3272.469332][ T31] audit: type=1400 audit(3272.420:34864): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3272.479574][ T31] audit: type=1400 audit(3272.430:34866): avc: denied { setopt } for pid=31030 comm="syz.1.6460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3272.480437][ T31] audit: type=1400 audit(3272.430:34865): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3272.487127][ T31] audit: type=1400 audit(3272.440:34867): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3272.489929][ T31] audit: type=1400 audit(3272.440:34868): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3272.494042][ T31] audit: type=1400 audit(3272.450:34869): avc: denied { connect } for pid=31030 comm="syz.1.6460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3272.499874][ T31] audit: type=1400 audit(3272.450:34870): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3273.031742][ T31] audit: type=1400 audit(3272.980:34871): avc: denied { setopt } for pid=31030 comm="syz.1.6460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3274.287265][T28785] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3274.348605][T28785] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3274.409177][T28785] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3274.449279][T28785] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3274.760975][T28785] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3274.783498][T28785] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3274.787129][T28785] bond0 (unregistering): Released all slaves [ 3274.924028][T28785] hsr_slave_0: left promiscuous mode [ 3274.972724][T28785] hsr_slave_1: left promiscuous mode [ 3275.007038][T28785] veth1_macvtap: left promiscuous mode [ 3275.007322][T28785] veth0_macvtap: left promiscuous mode [ 3275.007538][T28785] veth1_vlan: left promiscuous mode [ 3275.007730][T28785] veth0_vlan: left promiscuous mode [ 3277.471888][ T31] kauditd_printk_skb: 215 callbacks suppressed [ 3277.471944][ T31] audit: type=1400 audit(3277.420:35087): avc: denied { getattr } for pid=31077 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3277.478354][ T31] audit: type=1400 audit(3277.430:35088): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3277.479542][ T31] audit: type=1400 audit(3277.430:35089): avc: denied { getattr } for pid=31077 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=134 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3277.522706][ T31] audit: type=1400 audit(3277.470:35090): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3277.523669][ T31] audit: type=1400 audit(3277.470:35091): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3277.524426][ T31] audit: type=1400 audit(3277.470:35092): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3277.546749][ T31] audit: type=1400 audit(3277.500:35093): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3277.831098][ T31] audit: type=1400 audit(3277.780:35094): avc: denied { module_request } for pid=31048 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3277.897656][ T31] audit: type=1400 audit(3277.850:35095): avc: denied { search } for pid=31103 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3277.902991][ T31] audit: type=1400 audit(3277.850:35096): avc: denied { search } for pid=31103 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3281.484000][T31048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3281.490880][T31048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3282.634706][ T31] kauditd_printk_skb: 235 callbacks suppressed [ 3282.634757][ T31] audit: type=1400 audit(3282.590:35332): avc: denied { sys_module } for pid=31048 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3282.636824][ T31] audit: type=1400 audit(3282.590:35333): avc: denied { module_request } for pid=31048 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3282.683081][ T31] audit: type=1400 audit(3282.630:35334): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3282.683610][ T31] audit: type=1400 audit(3282.630:35335): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3282.689180][ T31] audit: type=1400 audit(3282.640:35336): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3282.704291][ T31] audit: type=1400 audit(3282.660:35337): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3282.715292][ T31] audit: type=1400 audit(3282.670:35338): avc: denied { write search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3282.722517][ T31] audit: type=1400 audit(3282.670:35339): avc: denied { write search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3282.723089][ T31] audit: type=1400 audit(3282.670:35340): avc: denied { remove_name search } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3282.723568][ T31] audit: type=1400 audit(3282.670:35341): avc: denied { rename } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3284.891750][T31048] hsr_slave_0: entered promiscuous mode [ 3284.898408][T31048] hsr_slave_1: entered promiscuous mode [ 3284.903980][T31048] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3284.904255][T31048] Cannot create hsr debugfs directory [ 3285.933654][T31048] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3285.950312][T31048] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3285.959586][T31048] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3286.000057][T31048] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3287.685858][ T31] kauditd_printk_skb: 279 callbacks suppressed [ 3287.685906][ T31] audit: type=1400 audit(3287.640:35621): avc: denied { module_request } for pid=31048 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3287.825545][ T31] audit: type=1400 audit(3287.780:35622): avc: denied { create } for pid=31432 comm="syz.1.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3287.834677][ T31] audit: type=1400 audit(3287.790:35623): avc: denied { write } for pid=31432 comm="syz.1.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3287.934567][ T31] audit: type=1400 audit(3287.890:35624): avc: denied { write } for pid=31430 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3287.936841][ T31] audit: type=1400 audit(3287.890:35625): avc: denied { write open } for pid=31430 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3287.944853][ T31] audit: type=1400 audit(3287.900:35626): avc: denied { getattr } for pid=31430 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3287.947198][ T31] audit: type=1400 audit(3287.900:35627): avc: denied { ioctl } for pid=31430 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3287.987786][ T31] audit: type=1400 audit(3287.940:35628): avc: denied { search } for pid=31430 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3287.989571][ T31] audit: type=1400 audit(3287.940:35629): avc: denied { search } for pid=31430 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3287.991281][ T31] audit: type=1400 audit(3287.940:35630): avc: denied { search } for pid=31430 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3288.929223][T31048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3292.865204][ T31] kauditd_printk_skb: 401 callbacks suppressed [ 3292.865250][ T31] audit: type=1400 audit(3292.820:36032): avc: denied { read } for pid=31461 comm="syz.1.6482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3292.890213][ T31] audit: type=1400 audit(3292.840:36033): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3292.897544][ T31] audit: type=1400 audit(3292.850:36034): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3292.906730][ T31] audit: type=1400 audit(3292.860:36035): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3292.908771][ T31] audit: type=1400 audit(3292.860:36036): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3292.914653][ T31] audit: type=1400 audit(3292.870:36037): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3292.938659][ T31] audit: type=1400 audit(3292.890:36038): avc: denied { read } for pid=31461 comm="syz.1.6482" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3292.955841][ T31] audit: type=1400 audit(3292.910:36039): avc: denied { read open } for pid=31461 comm="syz.1.6482" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3293.017595][ T31] audit: type=1400 audit(3292.970:36040): avc: denied { sys_module } for pid=31048 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3293.018847][ T31] audit: type=1400 audit(3292.970:36041): avc: denied { module_request } for pid=31048 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3297.891962][ T31] kauditd_printk_skb: 403 callbacks suppressed [ 3297.892029][ T31] audit: type=1400 audit(3297.840:36445): avc: denied { search } for pid=31510 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.900351][ T31] audit: type=1400 audit(3297.850:36446): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3297.903745][ T31] audit: type=1400 audit(3297.860:36447): avc: denied { search } for pid=31510 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.904884][ T31] audit: type=1400 audit(3297.860:36448): avc: denied { search } for pid=31510 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.906122][ T31] audit: type=1400 audit(3297.860:36449): avc: denied { getattr } for pid=31510 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=140 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3297.910290][ T31] audit: type=1400 audit(3297.860:36450): avc: denied { search } for pid=31510 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.911299][ T31] audit: type=1400 audit(3297.860:36451): avc: denied { search } for pid=31510 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.916220][ T31] audit: type=1400 audit(3297.870:36452): avc: denied { search } for pid=31510 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.916791][ T31] audit: type=1400 audit(3297.870:36453): avc: denied { write search } for pid=31510 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.917355][ T31] audit: type=1400 audit(3297.870:36454): avc: denied { remove_name search } for pid=31510 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=140 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3300.241088][T31048] veth0_vlan: entered promiscuous mode [ 3300.346811][T31048] veth1_vlan: entered promiscuous mode [ 3300.499532][T31048] veth0_macvtap: entered promiscuous mode [ 3300.532938][T31048] veth1_macvtap: entered promiscuous mode [ 3300.656374][T31048] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3300.656770][T31048] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3300.657065][T31048] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3300.657329][T31048] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3302.941903][ T31] kauditd_printk_skb: 397 callbacks suppressed [ 3302.941995][ T31] audit: type=1400 audit(3302.890:36852): avc: denied { read write } for pid=31549 comm="syz.0.6493" name="vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3302.945184][ T31] audit: type=1400 audit(3302.900:36853): avc: denied { read write open } for pid=31549 comm="syz.0.6493" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3302.975723][ T31] audit: type=1400 audit(3302.930:36854): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3302.984221][ T31] audit: type=1400 audit(3302.940:36855): avc: denied { ioctl } for pid=31549 comm="syz.0.6493" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3302.986527][ T31] audit: type=1400 audit(3302.940:36856): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3302.997646][ T31] audit: type=1400 audit(3302.940:36857): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3302.998340][ T31] audit: type=1400 audit(3302.950:36858): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3302.998898][ T31] audit: type=1400 audit(3302.950:36859): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3302.999635][ T31] audit: type=1400 audit(3302.950:36860): avc: denied { ioctl } for pid=31549 comm="syz.0.6493" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 ioctlcmd=0x9367 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3303.000287][ T31] audit: type=1400 audit(3302.950:36861): avc: denied { ioctl } for pid=31549 comm="syz.0.6493" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 ioctlcmd=0x4521 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3305.336571][T31578] fuse: Bad value for 'rootmode' [ 3305.740574][T31574] Invalid ELF header magic: != ELF [ 3307.922542][T14056] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 3307.942286][ T31] kauditd_printk_skb: 275 callbacks suppressed [ 3307.942335][ T31] audit: type=1400 audit(3307.890:37135): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3307.943241][ T31] audit: type=1400 audit(3307.900:37136): avc: denied { ioctl } for pid=31583 comm="syz.0.6501" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3307.954755][ T31] audit: type=1400 audit(3307.910:37137): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3308.005332][ T31] audit: type=1400 audit(3307.960:37138): avc: denied { ioctl } for pid=31583 comm="syz.0.6501" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3308.112871][T14056] usb 1-1: Using ep0 maxpacket: 8 [ 3308.120834][ T31] audit: type=1400 audit(3308.070:37139): avc: denied { ioctl } for pid=31583 comm="syz.0.6501" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3308.127436][ T31] audit: type=1400 audit(3308.080:37140): avc: denied { ioctl } for pid=31583 comm="syz.0.6501" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3308.149335][ T31] audit: type=1400 audit(3308.100:37141): avc: denied { ioctl } for pid=31583 comm="syz.0.6501" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3308.152574][ T31] audit: type=1400 audit(3308.100:37142): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3308.169285][ T31] audit: type=1400 audit(3308.120:37143): avc: denied { ioctl } for pid=31583 comm="syz.0.6501" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3308.179296][ T31] audit: type=1400 audit(3308.130:37144): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3308.250117][T14056] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3308.250419][T14056] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 3308.330586][T14056] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 3308.331109][T14056] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3308.331423][T14056] usb 1-1: Product: syz [ 3308.331622][T14056] usb 1-1: Manufacturer: syz [ 3308.331848][T14056] usb 1-1: SerialNumber: syz [ 3308.592845][T14056] cdc_ncm 1-1:1.0: bind() failure [ 3308.596755][T14056] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 3308.596989][T14056] cdc_ncm 1-1:1.1: bind() failure [ 3308.604962][T14056] usb 1-1: USB disconnect, device number 27 [ 3309.280701][T31612] serio: Serial port pts0 [ 3312.991690][ T31] kauditd_printk_skb: 94 callbacks suppressed [ 3312.991735][ T31] audit: type=1400 audit(3312.940:37237): avc: denied { read write } for pid=31639 comm="syz.0.6511" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3312.999198][ T31] audit: type=1400 audit(3312.950:37238): avc: denied { read write open } for pid=31639 comm="syz.0.6511" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3313.013522][ T31] audit: type=1400 audit(3312.970:37239): avc: denied { ioctl } for pid=31639 comm="syz.0.6511" path="/newroot/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3313.015222][ T31] audit: type=1400 audit(3312.970:37240): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3313.020319][ T31] audit: type=1400 audit(3312.970:37241): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3313.032025][ T31] audit: type=1400 audit(3312.980:37242): avc: denied { ioctl } for pid=31639 comm="syz.0.6511" path="/newroot/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x9434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3313.033268][ T31] audit: type=1400 audit(3312.980:37243): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3313.033739][ T31] audit: type=1400 audit(3312.980:37244): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3313.034360][ T31] audit: type=1400 audit(3312.980:37245): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3313.049513][ T31] audit: type=1400 audit(3313.000:37246): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3316.416177][T31659] fuse: Unknown parameter 'user_id00000000000000000000' [ 3318.318322][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 3318.318405][ T31] audit: type=1400 audit(3318.270:37332): avc: denied { read write } for pid=31671 comm="syz.1.6521" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3318.335405][ T31] audit: type=1400 audit(3318.270:37333): avc: denied { read write open } for pid=31671 comm="syz.1.6521" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3318.340258][ T31] audit: type=1400 audit(3318.290:37334): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3318.347933][ T31] audit: type=1400 audit(3318.300:37335): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3318.351746][T31672] fuse: Unknown parameter 'user_id00000000000000000000' [ 3318.352705][ T31] audit: type=1400 audit(3318.300:37336): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3318.353291][ T31] audit: type=1400 audit(3318.300:37337): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3318.353913][ T31] audit: type=1400 audit(3318.300:37338): avc: denied { mounton } for pid=31671 comm="syz.1.6521" path="/280/file0" dev="tmpfs" ino=1499 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3318.354568][ T31] audit: type=1400 audit(3318.300:37339): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3318.730351][ T31] audit: type=1400 audit(3318.680:37340): avc: denied { create } for pid=31673 comm="syz.1.6522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3318.737128][ T31] audit: type=1400 audit(3318.690:37341): avc: denied { write } for pid=31673 comm="syz.1.6522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3323.324258][ T31] kauditd_printk_skb: 163 callbacks suppressed [ 3323.324303][ T31] audit: type=1400 audit(3323.270:37505): avc: denied { ioctl } for pid=31703 comm="syz.1.6528" path="/newroot/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3323.340705][ T31] audit: type=1400 audit(3323.290:37506): avc: denied { read } for pid=31705 comm="syz.0.6529" dev="nsfs" ino=4026532652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3323.354069][ T31] audit: type=1400 audit(3323.300:37508): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3323.354877][ T31] audit: type=1400 audit(3323.310:37509): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3323.360504][ T31] audit: type=1400 audit(3323.290:37507): avc: denied { read open } for pid=31705 comm="syz.0.6529" path="net:[4026532652]" dev="nsfs" ino=4026532652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3323.361141][ T31] audit: type=1400 audit(3323.310:37510): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3323.361589][ T31] audit: type=1400 audit(3323.310:37511): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3323.362065][ T31] audit: type=1400 audit(3323.310:37512): avc: denied { create } for pid=31705 comm="syz.0.6529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3323.367914][ T31] audit: type=1400 audit(3323.320:37513): avc: denied { ioctl } for pid=31703 comm="syz.1.6528" path="/newroot/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x9434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3323.382832][ T31] audit: type=1400 audit(3323.330:37514): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3326.361577][T31732] serio: Serial port pts0 [ 3328.301193][T31740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31740 comm=syz.0.6542 [ 3328.333021][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 3328.333117][ T31] audit: type=1400 audit(3328.290:37608): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3328.571539][ T31] audit: type=1400 audit(3328.520:37609): avc: denied { read } for pid=31739 comm="syz.0.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3328.572951][ T31] audit: type=1400 audit(3328.530:37610): avc: denied { create } for pid=31739 comm="syz.0.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3328.575480][ T31] audit: type=1400 audit(3328.530:37611): avc: denied { write } for pid=31739 comm="syz.0.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3328.602507][ T31] audit: type=1400 audit(3328.550:37612): avc: denied { read } for pid=31739 comm="syz.0.6542" name="vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:zero_device_t:s0" [ 3328.603258][ T31] audit: type=1400 audit(3328.550:37613): avc: denied { read open } for pid=31739 comm="syz.0.6542" path="/dev/vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:zero_device_t:s0" [ 3329.826165][ T31] audit: type=1400 audit(3329.780:37614): avc: denied { create } for pid=31745 comm="syz.0.6543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3329.828665][ T31] audit: type=1400 audit(3329.780:37615): avc: denied { write } for pid=31745 comm="syz.0.6543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3329.830809][ T31] audit: type=1400 audit(3329.780:37616): avc: denied { module_request } for pid=31745 comm="syz.0.6543" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3329.841168][ T31] audit: type=1400 audit(3329.790:37617): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3333.466382][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 3333.466429][ T31] audit: type=1400 audit(3333.420:37703): avc: denied { sys_module } for pid=31759 comm="syz.0.6549" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3333.467087][ T31] audit: type=1400 audit(3333.420:37704): avc: denied { module_request } for pid=31759 comm="syz.0.6549" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3333.492028][ T31] audit: type=1400 audit(3333.440:37705): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3333.506012][ T31] audit: type=1400 audit(3333.460:37706): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3333.507471][ T31] audit: type=1400 audit(3333.460:37707): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3333.508787][ T31] audit: type=1400 audit(3333.460:37708): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3333.510320][ T31] audit: type=1400 audit(3333.460:37709): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3333.616898][ T31] audit: type=1400 audit(3333.570:37710): avc: denied { create } for pid=31773 comm="syz.1.6550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3333.628832][ T31] audit: type=1400 audit(3333.580:37711): avc: denied { create } for pid=31773 comm="syz.1.6550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3333.657886][ T31] audit: type=1400 audit(3333.610:37712): avc: denied { read } for pid=31773 comm="syz.1.6550" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3335.219702][T31790] FAULT_INJECTION: forcing a failure. [ 3335.219702][T31790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3335.220240][T31790] CPU: 1 UID: 0 PID: 31790 Comm: syz.0.6553 Not tainted 6.11.0-rc2-syzkaller #0 [ 3335.220469][T31790] Hardware name: ARM-Versatile Express [ 3335.220658][T31790] Call trace: [ 3335.220772][T31790] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3335.221067][T31790] r7:20000100 r6:e0451e30 r5:60000013 r4:8200bb20 [ 3335.221282][T31790] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3335.221522][T31790] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3335.221730][T31790] r5:00000000 r4:82748bd4 [ 3335.221855][T31790] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3335.222257][T31790] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 3335.222674][T31790] r6:e0451e30 r5:00000000 r4:e0451f38 [ 3335.222874][T31790] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 3335.223431][T31790] [<808b6378>] (should_fail_usercopy) from [<81449d6c>] (copy_msghdr_from_user+0x50/0x130) [ 3335.224341][T31790] [<81449d1c>] (copy_msghdr_from_user) from [<81449ec4>] (___sys_sendmsg+0x78/0xd0) [ 3335.224936][T31790] r8:0400c882 r7:00000000 r6:83072f00 r5:e0451f38 r4:e0451e74 [ 3335.225280][T31790] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 3335.225680][T31790] r10:00000128 r9:834b2400 r8:8020029c r7:0400c882 r6:20000100 r5:83072f00 [ 3335.226042][T31790] r4:00000000 [ 3335.226213][T31790] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3335.226597][T31790] Exception stack(0xe0451fa8 to 0xe0451ff0) [ 3335.226899][T31790] 1fa0: 00000000 00000000 00000005 20000100 0400c882 00000000 [ 3335.227479][T31790] 1fc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b510bc [ 3335.227920][T31790] 1fe0: 76b50ec0 76b50eb0 000188c0 00132780 [ 3335.228169][T31790] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 3338.704795][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 3338.704854][ T31] audit: type=1400 audit(3338.660:37781): avc: denied { prog_load } for pid=31811 comm="syz.1.6557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3338.708012][ T31] audit: type=1400 audit(3338.660:37782): avc: denied { bpf } for pid=31811 comm="syz.1.6557" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3338.712566][ T31] audit: type=1400 audit(3338.660:37783): avc: denied { perfmon } for pid=31811 comm="syz.1.6557" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3338.732922][ T31] audit: type=1400 audit(3338.680:37784): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3338.733481][ T31] audit: type=1400 audit(3338.680:37785): avc: denied { perfmon } for pid=31811 comm="syz.1.6557" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3338.734021][ T31] audit: type=1400 audit(3338.680:37786): avc: denied { perfmon } for pid=31811 comm="syz.1.6557" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3338.734509][ T31] audit: type=1400 audit(3338.680:37787): avc: denied { perfmon } for pid=31811 comm="syz.1.6557" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3338.734979][ T31] audit: type=1400 audit(3338.690:37788): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3338.735470][ T31] audit: type=1400 audit(3338.690:37789): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3338.736033][ T31] audit: type=1400 audit(3338.690:37790): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3343.824241][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 3343.824299][ T31] audit: type=1400 audit(3343.780:37882): avc: denied { ioctl } for pid=31842 comm="syz.1.6566" path="socket:[77056]" dev="sockfs" ino=77056 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3343.843238][ T31] audit: type=1400 audit(3343.800:37883): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3343.849099][ T31] audit: type=1400 audit(3343.800:37884): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3343.852474][ T31] audit: type=1400 audit(3343.800:37885): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3343.855961][ T31] audit: type=1400 audit(3343.810:37886): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3343.863915][ T31] audit: type=1400 audit(3343.810:37887): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3343.864540][ T31] audit: type=1400 audit(3343.810:37888): avc: denied { create } for pid=31842 comm="syz.1.6566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3343.925179][ T31] audit: type=1400 audit(3343.880:37889): avc: denied { setopt } for pid=31842 comm="syz.1.6566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3343.933415][ T31] audit: type=1400 audit(3343.880:37890): avc: denied { connect } for pid=31842 comm="syz.1.6566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3344.462998][ T31] audit: type=1400 audit(3344.390:37891): avc: denied { write } for pid=31842 comm="syz.1.6566" path="socket:[76260]" dev="sockfs" ino=76260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3348.854380][ T31] kauditd_printk_skb: 245 callbacks suppressed [ 3348.854442][ T31] audit: type=1400 audit(3348.810:38137): avc: denied { ioctl } for pid=31871 comm="syz.0.6571" path="socket:[76293]" dev="sockfs" ino=76293 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3348.868798][ T31] audit: type=1400 audit(3348.820:38138): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3348.871303][ T31] audit: type=1400 audit(3348.820:38139): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3348.884716][ T31] audit: type=1400 audit(3348.840:38140): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3348.892515][ T31] audit: type=1400 audit(3348.840:38141): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3348.893102][ T31] audit: type=1400 audit(3348.840:38142): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3348.977769][ T31] audit: type=1400 audit(3348.930:38143): avc: denied { read } for pid=31877 comm="syz.1.6573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3348.989837][ T31] audit: type=1400 audit(3348.940:38144): avc: denied { create } for pid=31877 comm="syz.1.6573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3348.993296][ T31] audit: type=1400 audit(3348.950:38145): avc: denied { create } for pid=31877 comm="syz.1.6573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3349.000106][ T31] audit: type=1400 audit(3348.950:38146): avc: denied { write } for pid=31877 comm="syz.1.6573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3351.615026][T31913] serio: Serial port pts0 [ 3354.027238][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 3354.027286][ T31] audit: type=1400 audit(3353.980:38229): avc: denied { read append } for pid=31916 comm="syz.1.6578" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3354.029683][ T31] audit: type=1400 audit(3353.980:38230): avc: denied { read open } for pid=31916 comm="syz.1.6578" path="/dev/ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3354.037935][ T31] audit: type=1400 audit(3353.990:38231): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3354.040988][ T31] audit: type=1400 audit(3353.990:38232): avc: denied { ioctl } for pid=31916 comm="syz.1.6578" path="/dev/ptmx" dev="devtmpfs" ino=605 ioctlcmd=0x540e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3354.045038][ T31] audit: type=1400 audit(3354.000:38233): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3354.046367][ T31] audit: type=1400 audit(3354.000:38234): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3354.047786][ T31] audit: type=1400 audit(3354.000:38235): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3354.050918][ T31] audit: type=1400 audit(3354.000:38236): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3354.066372][ T31] audit: type=1400 audit(3354.020:38237): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3354.073774][ T31] audit: type=1400 audit(3354.030:38238): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3355.196170][T31935] FAULT_INJECTION: forcing a failure. [ 3355.196170][T31935] name failslab, interval 1, probability 0, space 0, times 0 [ 3355.196535][T31935] CPU: 1 UID: 0 PID: 31935 Comm: syz.0.6582 Not tainted 6.11.0-rc2-syzkaller #0 [ 3355.196808][T31935] Hardware name: ARM-Versatile Express [ 3355.196953][T31935] Call trace: [ 3355.197057][T31935] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 3355.197266][T31935] r7:84268c00 r6:00000cc0 r5:60000013 r4:8200bb20 [ 3355.197428][T31935] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 3355.197631][T31935] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 3355.197906][T31935] r5:00000000 r4:8271619c [ 3355.198028][T31935] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 3355.198277][T31935] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 3355.198513][T31935] r6:00000cc0 r5:ffffffff r4:82cab780 [ 3355.198661][T31935] [<804dac94>] (should_failslab) from [<804c00a8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 3355.198944][T31935] [<804c0058>] (kmem_cache_alloc_node_noprof) from [<81454b64>] (__alloc_skb+0x138/0x160) [ 3355.199225][T31935] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab780 r5:ffffffff [ 3355.199441][T31935] r4:82606000 [ 3355.199550][T31935] [<81454a2c>] (__alloc_skb) from [<815661f0>] (netlink_alloc_large_skb+0x88/0xa0) [ 3355.199828][T31935] r8:00000000 r7:84574800 r6:00000020 r5:83072500 r4:00000140 [ 3355.200099][T31935] [<81566168>] (netlink_alloc_large_skb) from [<815667f8>] (netlink_sendmsg+0x134/0x43c) [ 3355.200597][T31935] r5:83072500 r4:ea991f38 [ 3355.200851][T31935] [<815666c4>] (netlink_sendmsg) from [<8144700c>] (__sock_sendmsg+0x44/0x78) [ 3355.201334][T31935] r10:20040004 r9:ea991dd4 r8:ea991dd4 r7:00000000 r6:83072500 r5:ea991f38 [ 3355.201751][T31935] r4:00000000 [ 3355.201861][T31935] [<81446fc8>] (__sock_sendmsg) from [<81447f7c>] (____sys_sendmsg+0x2ac/0x2cc) [ 3355.202230][T31935] r7:00000000 r6:00000000 r5:83072500 r4:ea991f38 [ 3355.202586][T31935] [<81447cd0>] (____sys_sendmsg) from [<81449ee8>] (___sys_sendmsg+0x9c/0xd0) [ 3355.202946][T31935] r10:ea991e34 r9:20000100 r8:20040004 r7:00000000 r6:83072500 r5:ea991f38 [ 3355.203152][T31935] r4:00000000 [ 3355.203244][T31935] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 3355.203476][T31935] r10:00000128 r9:84268c00 r8:8020029c r7:20040004 r6:20000100 r5:83072500 [ 3355.203678][T31935] r4:00000000 [ 3355.203789][T31935] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3355.204020][T31935] Exception stack(0xea991fa8 to 0xea991ff0) [ 3355.204179][T31935] 1fa0: 00000000 00000000 00000000 20000100 20040004 00000000 [ 3355.204414][T31935] 1fc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b510bc [ 3355.204624][T31935] 1fe0: 76b50ec0 76b50eb0 000188c0 00132780 [ 3355.204766][T31935] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 3358.958584][T31953] fuse: Unknown parameter 'fd0x0000000000000004' [ 3359.316098][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 3359.316142][ T31] audit: type=1400 audit(3359.270:38347): avc: denied { read } for pid=31954 comm="syz.1.6590" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3359.318069][ T31] audit: type=1400 audit(3359.270:38348): avc: denied { read open } for pid=31954 comm="syz.1.6590" path="net:[4026532651]" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3359.321308][ T31] audit: type=1400 audit(3359.270:38349): avc: denied { create } for pid=31954 comm="syz.1.6590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3359.333024][ T31] audit: type=1400 audit(3359.280:38350): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3359.334027][ T31] audit: type=1400 audit(3359.290:38351): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3359.342969][ T31] audit: type=1400 audit(3359.290:38352): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3359.343450][ T31] audit: type=1400 audit(3359.290:38353): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3359.343917][ T31] audit: type=1400 audit(3359.290:38354): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3359.348813][ T31] audit: type=1400 audit(3359.300:38355): avc: denied { accept } for pid=31954 comm="syz.1.6590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3359.362640][ T31] audit: type=1400 audit(3359.310:38356): avc: denied { create } for pid=31954 comm="syz.1.6590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3360.829632][T31967] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6593'. [ 3361.160869][T31977] fuse: Unknown parameter 'fd0x0000000000000004' [ 3363.099876][T32004] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5127 sclass=netlink_audit_socket pid=32004 comm=syz.0.6601 [ 3364.437094][ T31] kauditd_printk_skb: 133 callbacks suppressed [ 3364.437158][ T31] audit: type=1400 audit(3364.390:38490): avc: denied { read } for pid=32006 comm="syz.1.6602" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3364.445062][ T31] audit: type=1400 audit(3364.400:38491): avc: denied { read open } for pid=32006 comm="syz.1.6602" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3364.449767][ T31] audit: type=1400 audit(3364.400:38492): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3364.451987][ T31] audit: type=1400 audit(3364.400:38493): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3364.472758][ T31] audit: type=1400 audit(3364.420:38494): avc: denied { ioctl } for pid=32006 comm="syz.1.6602" path="/dev/dri/card1" dev="devtmpfs" ino=616 ioctlcmd=0x64b8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3364.473745][ T31] audit: type=1400 audit(3364.430:38495): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3364.475273][ T31] audit: type=1400 audit(3364.430:38496): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3364.477038][ T31] audit: type=1400 audit(3364.430:38497): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3364.512618][ T31] audit: type=1400 audit(3364.460:38498): avc: denied { ioctl } for pid=32006 comm="syz.1.6602" path="/dev/snd/seq" dev="devtmpfs" ino=727 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3364.613622][ T31] audit: type=1400 audit(3364.560:38499): avc: denied { create } for pid=32016 comm="syz.0.6604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3370.479207][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 3370.479265][ T31] audit: type=1400 audit(3370.430:38562): avc: denied { read write } for pid=32054 comm="syz.0.6613" name="ubi_ctrl" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3370.481154][ T31] audit: type=1400 audit(3370.430:38563): avc: denied { read open } for pid=32054 comm="syz.0.6613" path="/dev/ubi_ctrl" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3370.490294][ T31] audit: type=1400 audit(3370.440:38564): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3370.506154][ T31] audit: type=1400 audit(3370.460:38565): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3370.512719][ T31] audit: type=1400 audit(3370.460:38566): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3370.513892][ T31] audit: type=1400 audit(3370.460:38567): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3370.522953][ T31] audit: type=1400 audit(3370.460:38568): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3370.523698][ T31] audit: type=1400 audit(3370.470:38569): avc: denied { create } for pid=32054 comm="syz.0.6613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3370.524236][ T31] audit: type=1400 audit(3370.470:38570): avc: denied { write } for pid=32054 comm="syz.0.6613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3370.678229][ T31] audit: type=1400 audit(3370.630:38571): avc: denied { create } for pid=32056 comm="syz.0.6614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3375.489646][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 3375.489712][ T31] audit: type=1400 audit(3375.440:38672): avc: denied { write } for pid=32081 comm="syz.0.6622" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3375.492560][ T31] audit: type=1400 audit(3375.440:38673): avc: denied { write open } for pid=32081 comm="syz.0.6622" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3375.503463][ T31] audit: type=1400 audit(3375.460:38674): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3375.506723][ T31] audit: type=1400 audit(3375.460:38675): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3375.508419][ T31] audit: type=1400 audit(3375.460:38676): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3375.510189][ T31] audit: type=1400 audit(3375.460:38677): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3375.511640][ T31] audit: type=1400 audit(3375.460:38678): avc: denied { create } for pid=32081 comm="syz.0.6622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3375.513838][ T31] audit: type=1400 audit(3375.470:38679): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3375.516991][ T31] audit: type=1400 audit(3375.470:38680): avc: denied { create } for pid=32081 comm="syz.0.6622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3375.523707][ T31] audit: type=1400 audit(3375.470:38681): avc: denied { ioctl } for pid=32081 comm="syz.0.6622" path="socket:[76578]" dev="sockfs" ino=76578 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3381.353429][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3381.353488][ T31] audit: type=1400 audit(3381.310:38718): avc: denied { setattr } for pid=32077 comm="syz.1.6620" name="pfkey" dev="proc" ino=4026532736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3381.370346][ T31] audit: type=1400 audit(3381.320:38719): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3381.382497][ T31] audit: type=1400 audit(3381.330:38720): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3381.383075][ T31] audit: type=1400 audit(3381.330:38721): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3381.392725][ T31] audit: type=1400 audit(3381.340:38722): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3381.393662][ T31] audit: type=1400 audit(3381.340:38723): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3382.144425][ T31] audit: type=1400 audit(3382.100:38724): avc: denied { create } for pid=32099 comm="syz.0.6626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3382.147365][ T31] audit: type=1400 audit(3382.100:38725): avc: denied { create } for pid=32099 comm="syz.0.6626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3382.153204][ T31] audit: type=1400 audit(3382.100:38726): avc: denied { write } for pid=32099 comm="syz.0.6626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3382.172580][ T31] audit: type=1400 audit(3382.120:38727): avc: denied { write } for pid=32099 comm="syz.0.6626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3386.459917][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 3386.459979][ T31] audit: type=1400 audit(3386.410:38772): avc: denied { read } for pid=32113 comm="syz.0.6632" name="vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:zero_device_t:s0" [ 3386.461353][ T31] audit: type=1400 audit(3386.410:38773): avc: denied { read open } for pid=32113 comm="syz.0.6632" path="/dev/vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:zero_device_t:s0" [ 3386.468652][ T31] audit: type=1400 audit(3386.420:38774): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3386.482871][ T31] audit: type=1400 audit(3386.420:38775): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3386.485465][ T31] audit: type=1400 audit(3386.440:38776): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3386.492601][ T31] audit: type=1400 audit(3386.440:38777): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3386.493503][ T31] audit: type=1400 audit(3386.440:38778): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3386.554889][ T31] audit: type=1400 audit(3386.510:38779): avc: denied { sys_module } for pid=32115 comm="syz.1.6631" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3386.557022][ T31] audit: type=1400 audit(3386.510:38780): avc: denied { module_request } for pid=32115 comm="syz.1.6631" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3386.645421][ T31] audit: type=1400 audit(3386.600:38781): avc: denied { create } for pid=32115 comm="syz.1.6631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3386.793881][T32117] input: syz0 as /devices/virtual/input/input136 [ 3411.836302][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 3411.836408][ T31] audit: type=1400 audit(3411.790:38801): avc: denied { create } for pid=32129 comm="syz.0.6634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3411.840168][ T31] audit: type=1400 audit(3411.790:38802): avc: denied { ioctl } for pid=32129 comm="syz.0.6634" path="socket:[76656]" dev="sockfs" ino=76656 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3411.848668][ T31] audit: type=1400 audit(3411.800:38803): avc: denied { read } for pid=32129 comm="syz.0.6634" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3411.850517][ T31] audit: type=1400 audit(3411.800:38804): avc: denied { read open } for pid=32129 comm="syz.0.6634" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3411.862697][ T31] audit: type=1400 audit(3411.810:38805): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3411.866986][ T31] audit: type=1400 audit(3411.820:38806): avc: denied { write } for pid=32129 comm="syz.0.6634" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 3411.874628][ T31] audit: type=1400 audit(3411.830:38807): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3411.878567][ T31] audit: type=1400 audit(3411.830:38808): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3411.892600][ T31] audit: type=1400 audit(3411.840:38809): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3411.896425][ T31] audit: type=1400 audit(3411.850:38810): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3412.005895][T32132] fuse: Bad value for 'user_id' [ 3412.006180][T32132] fuse: Bad value for 'user_id' [ 3417.105658][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3417.105715][ T31] audit: type=1400 audit(3417.060:38847): avc: denied { sys_module } for pid=32142 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3417.108178][ T31] audit: type=1400 audit(3417.060:38848): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3417.140073][ T31] audit: type=1400 audit(3417.080:38849): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3417.140537][ T31] audit: type=1400 audit(3417.090:38850): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3417.140951][ T31] audit: type=1400 audit(3417.090:38851): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.141390][ T31] audit: type=1400 audit(3417.090:38852): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.141848][ T31] audit: type=1400 audit(3417.090:38853): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.419629][ T31] audit: type=1400 audit(3417.370:38854): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3417.683039][ T31] audit: type=1400 audit(3417.640:38855): avc: denied { sys_module } for pid=32142 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3417.684337][ T31] audit: type=1400 audit(3417.640:38856): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3422.907557][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3422.907602][ T31] audit: type=1400 audit(3422.860:38866): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3422.940026][ T31] audit: type=1400 audit(3422.890:38867): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3422.963186][ T31] audit: type=1400 audit(3422.920:38868): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3422.965681][ T31] audit: type=1400 audit(3422.920:38869): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3422.967028][ T31] audit: type=1400 audit(3422.920:38870): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3422.982737][ T31] audit: type=1400 audit(3422.920:38871): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3423.661539][ T31] audit: type=1400 audit(3423.610:38872): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3423.689210][ T31] audit: type=1400 audit(3423.640:38873): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3423.692823][ T31] audit: type=1400 audit(3423.640:38874): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3423.713152][ T31] audit: type=1400 audit(3423.670:38875): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3426.562998][T32142] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3426.570334][T32142] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3428.024509][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 3428.024567][ T31] audit: type=1400 audit(3427.980:38936): avc: denied { sys_module } for pid=32142 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3428.025902][ T31] audit: type=1400 audit(3427.980:38937): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3428.056525][ T31] audit: type=1400 audit(3428.010:38938): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3428.058699][ T31] audit: type=1400 audit(3428.010:38939): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3428.059836][ T31] audit: type=1400 audit(3428.010:38940): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3428.060981][ T31] audit: type=1400 audit(3428.010:38941): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3428.073004][ T31] audit: type=1400 audit(3428.030:38942): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3428.353186][ T31] audit: type=1400 audit(3428.310:38943): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3428.378392][ T31] audit: type=1400 audit(3428.330:38944): avc: denied { write } for pid=32347 comm="syz.0.6650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3428.414059][T28785] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3428.500779][T28785] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3428.569656][T28785] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3428.582888][ T31] audit: type=1400 audit(3428.540:38945): avc: denied { sys_module } for pid=32142 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3428.616330][T28785] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3428.809783][T28785] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3428.817792][T28785] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3428.827079][T28785] bond0 (unregistering): Released all slaves [ 3428.916396][T28785] hsr_slave_0: left promiscuous mode [ 3428.918422][T28785] hsr_slave_1: left promiscuous mode [ 3428.927388][T28785] veth1_macvtap: left promiscuous mode [ 3428.927750][T28785] veth0_macvtap: left promiscuous mode [ 3428.927988][T28785] veth1_vlan: left promiscuous mode [ 3428.928220][T28785] veth0_vlan: left promiscuous mode [ 3429.800469][T32142] hsr_slave_0: entered promiscuous mode [ 3429.809189][T32142] hsr_slave_1: entered promiscuous mode [ 3430.786788][T32142] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3430.803099][T32142] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3430.831071][T32142] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3430.851081][T32142] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3432.991788][T32142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3433.043393][ T31] kauditd_printk_skb: 416 callbacks suppressed [ 3433.043444][ T31] audit: type=1400 audit(3433.000:39362): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.053759][ T31] audit: type=1400 audit(3433.010:39363): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.058270][ T31] audit: type=1400 audit(3433.010:39364): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.095882][ T31] audit: type=1400 audit(3433.040:39365): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3433.096732][ T31] audit: type=1400 audit(3433.050:39366): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.102918][ T31] audit: type=1400 audit(3433.050:39367): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.105444][ T31] audit: type=1400 audit(3433.060:39368): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.111454][ T31] audit: type=1400 audit(3433.060:39369): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.136116][ T31] audit: type=1400 audit(3433.090:39370): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3433.257172][ T31] audit: type=1400 audit(3433.210:39371): avc: denied { search } for pid=32530 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3438.054992][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 3438.055065][ T31] audit: type=1400 audit(3438.010:39429): avc: denied { ioctl } for pid=32565 comm="syz.0.6658" path="socket:[78220]" dev="sockfs" ino=78220 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3438.078486][ T31] audit: type=1400 audit(3438.030:39430): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3438.084305][ T31] audit: type=1400 audit(3438.040:39431): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3438.087409][ T31] audit: type=1400 audit(3438.040:39432): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3438.092773][ T31] audit: type=1400 audit(3438.040:39433): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3438.097994][ T31] audit: type=1400 audit(3438.050:39434): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3438.221386][ T31] audit: type=1400 audit(3438.170:39435): avc: denied { sys_module } for pid=32142 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3438.225176][ T31] audit: type=1400 audit(3438.180:39436): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3438.454253][ T31] audit: type=1400 audit(3438.410:39437): avc: denied { module_request } for pid=32142 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3438.561361][ T31] audit: type=1400 audit(3438.510:39438): avc: denied { ioctl } for pid=32565 comm="syz.0.6658" path="socket:[78220]" dev="sockfs" ino=78220 ioctlcmd=0x5016 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3441.046605][T32142] veth0_vlan: entered promiscuous mode [ 3441.115522][T32142] veth1_vlan: entered promiscuous mode [ 3441.247739][T32142] veth0_macvtap: entered promiscuous mode [ 3441.275536][T32142] veth1_macvtap: entered promiscuous mode [ 3441.379099][T32142] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3441.379393][T32142] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3441.379601][T32142] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3441.380450][T32142] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3443.406392][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 3443.406498][ T31] audit: type=1400 audit(3443.360:39516): avc: denied { create } for pid=32601 comm="syz.1.6663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3443.430028][ T31] audit: type=1400 audit(3443.380:39517): avc: denied { ioctl } for pid=32601 comm="syz.1.6663" path="socket:[78250]" dev="sockfs" ino=78250 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3443.464275][ T31] audit: type=1400 audit(3443.420:39518): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3443.467339][ T31] audit: type=1400 audit(3443.420:39519): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3443.472709][ T31] audit: type=1400 audit(3443.420:39520): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3443.473463][ T31] audit: type=1400 audit(3443.420:39521): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3443.474554][ T31] audit: type=1400 audit(3443.430:39522): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3443.962631][ T31] audit: type=1400 audit(3443.910:39523): avc: denied { ioctl } for pid=32601 comm="syz.1.6663" path="socket:[78250]" dev="sockfs" ino=78250 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3444.519754][ T31] audit: type=1400 audit(3444.470:39524): avc: denied { ioctl } for pid=32601 comm="syz.1.6663" path="socket:[78250]" dev="sockfs" ino=78250 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3444.622645][ T31] audit: type=1400 audit(3444.570:39525): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3446.673026][T32619] ------------[ cut here ]------------ [ 3446.673444][T32619] kernel BUG at drivers/android/binder.c:1173! [ 3446.673747][T32619] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 3446.674560][T32619] Modules linked in: [ 3446.674980][T32619] CPU: 1 UID: 0 PID: 32619 Comm: syz.0.6669 Not tainted 6.11.0-rc2-syzkaller #0 [ 3446.676192][T32619] Hardware name: ARM-Versatile Express [ 3446.676440][T32619] PC is at binder_inc_ref_for_node+0x524/0x580 [ 3446.677223][T32619] LR is at binder_inc_ref_for_node+0x1e0/0x580 [ 3446.677918][T32619] pc : [<81322920>] lr : [<813225dc>] psr: 60000013 [ 3446.678386][T32619] sp : dffc9d20 ip : dffc9d20 fp : dffc9d64 [ 3446.678664][T32619] r10: 8503e61c r9 : 00000000 r8 : 8536c594 [ 3446.678906][T32619] r7 : 00000000 r6 : 00000001 r5 : 8536c400 r4 : 859ee880 [ 3446.679191][T32619] r3 : 8503e610 r2 : 00000000 r1 : 8536c414 r0 : 85039d9c [ 3446.679534][T32619] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 3446.679844][T32619] Control: 30c5387d Table: 8503e4c0 DAC: 00000000 [ 3446.680151][T32619] Register r0 information: slab kmalloc-64 start 85039d80 pointer offset 28 size 64 [ 3446.681293][T32619] Register r1 information: slab kmalloc-512 start 8536c400 pointer offset 20 size 512 [ 3446.681718][T32619] Register r2 information: NULL pointer [ 3446.682223][T32619] Register r3 information: slab kmalloc-64 start 8503e600 pointer offset 16 size 64 [ 3446.683003][T32619] Register r4 information: slab kmalloc-128 start 859ee880 pointer offset 0 size 128 [ 3446.683471][T32619] Register r5 information: slab kmalloc-512 start 8536c400 pointer offset 0 size 512 [ 3446.683891][T32619] Register r6 information: non-paged memory [ 3446.684151][T32619] Register r7 information: NULL pointer [ 3446.684383][T32619] Register r8 information: slab kmalloc-512 start 8536c400 pointer offset 404 size 512 [ 3446.684793][T32619] Register r9 information: NULL pointer [ 3446.685034][T32619] Register r10 information: slab kmalloc-64 start 8503e600 pointer offset 28 size 64 [ 3446.685465][T32619] Register r11 information: 2-page vmalloc region starting at 0xdffc8000 allocated at kernel_clone+0xac/0x3e4 [ 3446.686316][T32619] Register r12 information: 2-page vmalloc region starting at 0xdffc8000 allocated at kernel_clone+0xac/0x3e4 [ 3446.686786][T32619] Process syz.0.6669 (pid: 32619, stack limit = 0xdffc8000) [ 3446.687122][T32619] Stack: (0xdffc9d20 to 0xdffca000) [ 3446.687351][T32619] 9d20: 00000003 00000060 8536c414 8503e620 8536c410 85039d80 dffc9d8c 00000001 [ 3446.687655][T32619] 9d40: 00000001 00000000 20000588 dffc9eb8 8536c600 8536c400 dffc9e54 dffc9d68 [ 3446.687951][T32619] 9d60: 81327c7c 81322408 dffc9dc8 00000001 00000000 58dbc680 00000060 0000000b [ 3446.688266][T32619] 9d80: dffc9dac dffc9d90 8020c014 8020cff0 00000000 00000001 84747a30 841eec00 [ 3446.688568][T32619] 9da0: dffc9dec 84747a34 20000580 200005cc 40086303 40106309 b5003500 b5403587 [ 3446.688872][T32619] 9dc0: 841eec00 ffbfff78 00000000 00000000 00000000 00000000 00000000 841eec00 [ 3446.689188][T32619] 9de0: dffc9e14 dffc9df0 8027cfbc 802acb1c 00000000 00000000 00000000 8536c590 [ 3446.689490][T32619] 9e00: 00000000 00000000 00000000 58dbc680 dffc9e2c dffc9e20 8197e948 c0306201 [ 3446.689791][T32619] 9e20: 8290bd54 58dbc680 00000000 0000004c 00000000 c0306201 841eec00 dffc9eb0 [ 3446.690133][T32619] 9e40: 8536c400 8444e780 dffc9f14 dffc9e58 8132ba74 81327774 0000004c dffc9eb8 [ 3446.690441][T32619] 9e60: 20000580 00000000 00000000 00000000 00000000 00000000 00000062 8444e780 [ 3446.690749][T32619] 9e80: 00000003 841eec00 dffc9ee4 8536c600 20000480 8536c400 8290bd54 00000001 [ 3446.691156][T32619] 9ea0: dffc9eb4 00000000 84740910 83239cc0 0000004c 00000000 00000000 00000000 [ 3446.691511][T32619] 9ec0: 20000580 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3446.692037][T32619] 9ee0: 806f6bb8 58dbc680 dffc9f14 c0306201 00000000 8444e781 20000480 8444e780 [ 3446.692733][T32619] 9f00: 00000003 841eec00 dffc9fa4 dffc9f18 8051a1d0 8132a708 841eec00 00000001 [ 3446.693469][T32619] 9f20: ecac8b10 841eec00 dffc9f44 dffc9f38 81972e70 81972d40 dffc9f5c dffc9f48 [ 3446.693885][T32619] 9f40: 8024bb50 8027b53c 40000000 dffc9fb0 dffc9f84 dffc9f60 80202dd8 8024bb0c [ 3446.694796][T32619] 9f60: 8261c9cc dffc9fb0 0014cc30 ecac8b10 80202cc0 58dbc680 dffc9fac 00000000 [ 3446.695149][T32619] 9f80: 00000000 002662e8 00000036 8020029c 841eec00 00000036 00000000 dffc9fa8 [ 3446.695624][T32619] 9fa0: 80200060 8051a0a8 00000000 00000000 00000003 c0306201 20000480 00000000 [ 3446.696013][T32619] 9fc0: 00000000 00000000 002662e8 00000036 00000000 00006364 003d0f00 76b510bc [ 3446.696308][T32619] 9fe0: 76b50ec0 76b50eb0 000188c0 00132780 60000010 00000003 00000000 00000000 [ 3446.696622][T32619] Call trace: [ 3446.696830][T32619] [<813223fc>] (binder_inc_ref_for_node) from [<81327c7c>] (binder_thread_write+0x514/0x1560) [ 3446.697230][T32619] r10:8536c400 r9:8536c600 r8:dffc9eb8 r7:20000588 r6:00000000 r5:00000001 [ 3446.697513][T32619] r4:00000001 [ 3446.697731][T32619] [<81327768>] (binder_thread_write) from [<8132ba74>] (binder_ioctl+0x1378/0x1884) [ 3446.698203][T32619] r10:8444e780 r9:8536c400 r8:dffc9eb0 r7:841eec00 r6:c0306201 r5:00000000 [ 3446.698614][T32619] r4:0000004c [ 3446.698958][T32619] [<8132a6fc>] (binder_ioctl) from [<8051a1d0>] (sys_ioctl+0x134/0xda4) [ 3446.699457][T32619] r10:841eec00 r9:00000003 r8:8444e780 r7:20000480 r6:8444e781 r5:00000000 [ 3446.699743][T32619] r4:c0306201 [ 3446.699901][T32619] [<8051a09c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3446.700225][T32619] Exception stack(0xdffc9fa8 to 0xdffc9ff0) [ 3446.700459][T32619] 9fa0: 00000000 00000000 00000003 c0306201 20000480 00000000 [ 3446.700766][T32619] 9fc0: 00000000 00000000 002662e8 00000036 00000000 00006364 003d0f00 76b510bc [ 3446.701079][T32619] 9fe0: 76b50ec0 76b50eb0 000188c0 00132780 SYZFAIL: failed to recv rpc [ 3446.701306][T32619] r10:00000036 r9:841eec00 r8:8020029c r7:00000036 r6:002662e8 r5:00000000 [ 3446.701927][T32619] r4:00000000 [ 3446.702500][T32619] Code: eafffef1 e1a0000a ebc666bf eafffeee (e7f001f2) [ 3446.703402][T32619] ---[ end trace 0000000000000000 ]--- [ 3446.704050][T32619] Kernel panic - not syncing: Fatal exception [ 3446.705842][T32619] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:06:53 Registers: info registers vcpu 0 CPU#0 R00=00000004 R01=df95dcc0 R02=814468ac R03=8444e540 R04=00000000 R05=8306c000 R06=df95dcc0 R07=8444e540 R08=81c63720 R09=00000000 R10=00000000 R11=df95db44 R12=d29a8208 R13=df95db10 R14=8162c9b8 R15=8162c7f0 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=828fa034 R01=80000093 R02=841eec00 R03=0000ac84 R04=828fa02c R05=80000093 R06=20000093 R07=00000f01 R08=00000000 R09=00000044 R10=60000093 R11=dffc9a4c R12=dffc9a50 R13=dffc9a40 R14=80933530 R15=8197ea34 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000