last executing test programs: 2m55.63194869s ago: executing program 0 (id=1254): r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x21, @time={0x1, 0xfffefffd}, 0x0, {0x0, 0x2}, 0xfc, 0x2, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)={0x36, 0x7, 0x4, 0x7, 0x430, 0x80}) tkill(r0, 0x7) 2m51.450641606s ago: executing program 0 (id=1255): r0 = syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0xfec9}, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0) r3 = eventfd2(0x100, 0x80000) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000200)=r3, 0x1) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x8, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x1}) io_uring_enter(r0, 0xdb4, 0x0, 0x0, 0x0, 0x0) 2m49.783371273s ago: executing program 0 (id=1256): socket$inet6(0xa, 0x5, 0x23) syz_open_pts(0xffffffffffffffff, 0x40480) socket$netlink(0x10, 0x3, 0x1e) 2m47.840152103s ago: executing program 0 (id=1257): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x0, 0x0}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) 2m46.718985201s ago: executing program 0 (id=1262): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000240)='%', 0x1, 0x1, 0x0, 0x0) 2m46.033478856s ago: executing program 0 (id=1263): openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0xad82, 0x0) userfaultfd(0x80001) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x0, 0x40, 0xbbba, 0x2, 0x0, 0x2, {}, {0x80004, 0x2}, {0x4004000}, {0x0, 0x8}, 0x0, 0x3f0, 0x0, 0xd613, 0x0, 0x0, 0x0, 0x800f, 0x2, 0x20000000, 0x80, 0x0, 0x11}) 2m0.764058757s ago: executing program 32 (id=1263): openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0xad82, 0x0) userfaultfd(0x80001) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x0, 0x40, 0xbbba, 0x2, 0x0, 0x2, {}, {0x80004, 0x2}, {0x4004000}, {0x0, 0x8}, 0x0, 0x3f0, 0x0, 0xd613, 0x0, 0x0, 0x0, 0x800f, 0x2, 0x20000000, 0x80, 0x0, 0x11}) 1m42.53212325s ago: executing program 2 (id=1280): socket$nl_route(0x10, 0x3, 0x0) r0 = syz_io_uring_setup(0x5ce, &(0x7f0000000240)={0x0, 0x7730, 0x80, 0x0, 0x34d}, &(0x7f0000000480)=0x0, &(0x7f00000001c0)=0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2e, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0xb2752a96f73d6e15, 0x0, 0x0, 0x0, 0x31712}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) 1m42.31869325s ago: executing program 2 (id=1283): socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000, 0x2, 0x1}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x0, r7}, 0x10) 56.798262334s ago: executing program 33 (id=1283): socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000, 0x2, 0x1}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x0, r7}, 0x10) 1.36971895s ago: executing program 3 (id=1346): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001c80)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x48814) write$nci(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="414005a1b727039d078873a2ab30ac06db7f"], 0x12) 1.180670259s ago: executing program 1 (id=1347): r0 = syz_open_dev$I2C(0x0, 0x1, 0x2003) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000a40)={&(0x7f0000000380)=[{0x3, 0x6000, 0x1, &(0x7f00000003c0)='t'}], 0x1}) 1.111641032s ago: executing program 1 (id=1348): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0}], 0x1, 0x40800) 802.222988ms ago: executing program 1 (id=1349): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000340)=ANY=[@ANYBLOB="f0000000100013070000000000000000fc020000000000000000000000000000fe8000000000000000000000000000100004000000000000000000202c000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe"], 0xf0}, 0x1, 0xe}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x2, @void}, 0x10) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xffffffff) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/247, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) 701.078064ms ago: executing program 3 (id=1350): syz_clone(0x80011, 0x0, 0x3f, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x7e00, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000800)=0x80008000) syz_genetlink_get_family_id$tipc2(&(0x7f0000002bc0), r0) 700.754654ms ago: executing program 1 (id=1351): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000480)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r2, 0x0, {0x1, 0x1, 0x4}, 0x1}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="00c7662fcf1f6e36b7", 0x9}], 0x1}, 0x48005) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1) 540.877662ms ago: executing program 3 (id=1352): r0 = syz_open_dev$I2C(0x0, 0x1, 0x2003) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000a40)={&(0x7f0000000380)=[{0x3, 0x6000, 0x1, &(0x7f00000003c0)='t'}], 0x1}) 390.73788ms ago: executing program 1 (id=1353): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x60081, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x15) 390.38619ms ago: executing program 3 (id=1354): socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="034886dd010000000000140000006000000003088800fe88a43de1a400000000000000007d01ff020000000000000000000000000001"], 0xfdef) 212.61247ms ago: executing program 1 (id=1355): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xdf57}]}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$tun(r1, &(0x7f00000002c0)={@val={0x0, 0x86dd}, @val={0x0, 0x1, 0x11, 0x4, 0x0, 0xca6}, @mpls={[], @ipv6=@gre_packet={0xe, 0x6, "ec00be", 0x44, 0x2f, 0xff, @local, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x88be, 0x6000, 0x3}, {0x0, 0x0, 0x1, 0x1}, {0x1, 0x0, 0x1}, {0xa888, 0x88be, 0x2, {{0x6, 0x1, 0x9, 0x2, 0x1, 0x0, 0x3, 0x5}, 0x1, {0x8100}}}, {0x8, 0x22eb, 0x20000, {{0x0, 0x2, 0xc, 0x0, 0x0, 0x2, 0x7, 0x8}, 0x2, {0x2, 0x4, 0x0, 0x5, 0x1, 0x1, 0x1}}}, {0x8, 0x6558, 0x2}}}}}}, 0xfdef) 108.234964ms ago: executing program 3 (id=1356): r0 = epoll_create1(0x0) r1 = syz_open_dev$dri(&(0x7f0000000340), 0x2, 0x800) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000300)={&(0x7f0000000000)=[r2], 0x0, 0x1}) close_range(r0, 0xffffffffffffffff, 0x0) 0s ago: executing program 3 (id=1357): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x450e7abe, 0xa, 0x6, 0x5, 0x5, 0x20000000, 0x1000007, 0x54c6cff3, 0xfd, 0x2, 0x8401, 0x6, 0x5da31c5d, 0x6, 0x100, 0x21, 0x891, 0x8000, 0x40000001, 0x5, 0xcaa0, 0xfffffffb, 0x20001e5b, 0xfffffffd, 0xe66, 0x80, 0x8, 0x27e, 0x0, 0xfffffff8]}) kernel console output (not intermixed with test programs): [ 51.604710][ T31] audit: type=1400 audit(51.520:56): avc: denied { read write } for pid=3115 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.606672][ T31] audit: type=1400 audit(51.520:57): avc: denied { open } for pid=3115 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:7769' (ED25519) to the list of known hosts. [ 63.740614][ T31] audit: type=1400 audit(63.650:58): avc: denied { name_bind } for pid=3118 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.836129][ T31] audit: type=1400 audit(65.750:59): avc: denied { execute } for pid=3119 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.842371][ T31] audit: type=1400 audit(65.760:60): avc: denied { execute_no_trans } for pid=3119 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.197924][ T31] audit: type=1400 audit(68.110:61): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.202402][ T31] audit: type=1400 audit(68.120:62): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.214115][ T3119] cgroup: Unknown subsys name 'net' [ 68.220327][ T31] audit: type=1400 audit(68.130:63): avc: denied { unmount } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.411958][ T3119] cgroup: Unknown subsys name 'cpuset' [ 68.416996][ T3119] cgroup: Unknown subsys name 'hugetlb' [ 68.417999][ T3119] cgroup: Unknown subsys name 'rlimit' [ 68.711899][ T31] audit: type=1400 audit(68.630:64): avc: denied { setattr } for pid=3119 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.714350][ T31] audit: type=1400 audit(68.630:65): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.718021][ T31] audit: type=1400 audit(68.630:66): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.936947][ T3121] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.944403][ T31] audit: type=1400 audit(68.860:67): avc: denied { relabelto } for pid=3121 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.952415][ T31] audit: type=1400 audit(68.870:68): avc: denied { write } for pid=3121 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.984759][ T31] audit: type=1400 audit(68.900:69): avc: denied { read } for pid=3119 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.986800][ T31] audit: type=1400 audit(68.900:70): avc: denied { open } for pid=3119 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.013564][ T3119] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.958560][ T31] audit: type=1400 audit(76.870:71): avc: denied { execmem } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.017070][ T31] audit: type=1400 audit(76.930:72): avc: denied { read } for pid=3124 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.029251][ T31] audit: type=1400 audit(76.940:73): avc: denied { open } for pid=3124 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.033806][ T31] audit: type=1400 audit(76.950:74): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.059691][ T31] audit: type=1400 audit(76.980:76): avc: denied { module_request } for pid=3125 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.062557][ T31] audit: type=1400 audit(76.980:75): avc: denied { module_request } for pid=3124 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.142151][ T31] audit: type=1400 audit(77.060:77): avc: denied { sys_module } for pid=3124 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.856784][ T31] audit: type=1400 audit(77.770:78): avc: denied { ioctl } for pid=3124 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.128259][ T3125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.168201][ T3125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.176481][ T3124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.184587][ T3124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.076302][ T3125] hsr_slave_0: entered promiscuous mode [ 80.080182][ T3125] hsr_slave_1: entered promiscuous mode [ 80.192455][ T3124] hsr_slave_0: entered promiscuous mode [ 80.195035][ T3124] hsr_slave_1: entered promiscuous mode [ 80.200881][ T3124] debugfs: 'hsr0' already exists in 'hsr' [ 80.205124][ T3124] Cannot create hsr debugfs directory [ 80.573717][ T31] audit: type=1400 audit(80.490:79): avc: denied { create } for pid=3125 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.575594][ T31] audit: type=1400 audit(80.490:80): avc: denied { write } for pid=3125 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.584127][ T3125] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.596656][ T3125] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.614948][ T3125] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.631551][ T3125] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.727818][ T3124] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.741750][ T3124] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.750407][ T3124] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.758124][ T3124] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.255345][ T3125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.395292][ T3124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.823077][ T3124] veth0_vlan: entered promiscuous mode [ 83.834689][ T3124] veth1_vlan: entered promiscuous mode [ 83.877119][ T3124] veth0_macvtap: entered promiscuous mode [ 83.885865][ T3124] veth1_macvtap: entered promiscuous mode [ 83.971293][ T1054] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.972109][ T1054] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.972510][ T1054] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.972708][ T1054] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.021668][ T3125] veth0_vlan: entered promiscuous mode [ 84.114059][ T3125] veth1_vlan: entered promiscuous mode [ 84.129284][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 84.137158][ T31] audit: type=1400 audit(84.040:82): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.156263][ T31] audit: type=1400 audit(84.070:83): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.s4qQNd/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.172045][ T31] audit: type=1400 audit(84.090:84): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.182478][ T31] audit: type=1400 audit(84.090:85): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.s4qQNd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.189239][ T31] audit: type=1400 audit(84.100:86): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.s4qQNd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.217064][ T31] audit: type=1400 audit(84.130:87): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.227994][ T31] audit: type=1400 audit(84.140:88): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.238131][ T31] audit: type=1400 audit(84.150:89): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="gadgetfs" ino=1935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.244877][ T3125] veth0_macvtap: entered promiscuous mode [ 84.256262][ T31] audit: type=1400 audit(84.170:90): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.258305][ T31] audit: type=1400 audit(84.170:91): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.266067][ T3125] veth1_macvtap: entered promiscuous mode [ 84.372719][ T3124] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.382469][ T3186] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.382996][ T3186] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.383318][ T3186] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.383600][ T3186] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.589869][ T3818] Zero length message leads to an empty skb [ 85.725544][ T3821] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3821 comm=syz.1.2 [ 86.238135][ T3825] fuse: Bad value for 'fd' [ 86.894024][ T3832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=525 sclass=netlink_route_socket pid=3832 comm=syz.0.6 [ 90.545973][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 90.546354][ T31] audit: type=1400 audit(90.460:126): avc: denied { create } for pid=3856 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 90.558041][ T31] audit: type=1400 audit(90.470:127): avc: denied { setopt } for pid=3856 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 90.578181][ T3857] syz.0.13 uses obsolete (PF_INET,SOCK_PACKET) [ 92.847941][ T31] audit: type=1400 audit(92.760:128): avc: denied { shutdown } for pid=3865 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.095023][ T31] audit: type=1400 audit(93.010:129): avc: denied { create } for pid=3868 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 93.101399][ T31] audit: type=1400 audit(93.020:130): avc: denied { setopt } for pid=3868 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 93.407385][ T31] audit: type=1400 audit(93.320:131): avc: denied { create } for pid=3865 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 98.760899][ T3888] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3888 comm=syz.1.25 [ 98.831209][ T3888] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=3888 comm=syz.1.25 [ 99.106943][ T3894] cgroup2: Unknown parameter 'dont_hash' [ 99.107403][ T31] audit: type=1400 audit(99.020:132): avc: denied { mounton } for pid=3893 comm="syz.1.28" path=2F31352FE91F7189591E9233614B dev="tmpfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 99.703263][ T31] audit: type=1400 audit(99.620:133): avc: denied { write } for pid=3895 comm="syz.1.29" name="fib_triestat" dev="proc" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 99.900992][ T3897] capability: warning: `syz.1.29' uses 32-bit capabilities (legacy support in use) [ 100.805634][ T3903] FAULT_INJECTION: forcing a failure. [ 100.805634][ T3903] name failslab, interval 1, probability 0, space 0, times 1 [ 100.808447][ T3903] CPU: 1 UID: 0 PID: 3903 Comm: syz.0.31 Not tainted syzkaller #0 PREEMPT [ 100.808800][ T3903] Hardware name: ARM-Versatile Express [ 100.809056][ T3903] Call trace: [ 100.809333][ T3903] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 100.810733][ T3903] r7:8537bc00 r6:00000000 r5:60000013 r4:8226064c [ 100.810812][ T3903] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 100.810864][ T3903] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 100.810937][ T3903] r5:8537bc00 r4:82917c00 [ 100.810951][ T3903] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 100.811004][ T3903] [<80972640>] (should_fail_ex) from [<8051f260>] (should_failslab+0x6c/0x94) [ 100.811064][ T3903] r8:00000000 r7:8537bc00 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 100.811078][ T3903] [<8051f1f4>] (should_failslab) from [<80503204>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 100.811138][ T3903] [<805031b4>] (kmem_cache_alloc_node_noprof) from [<8155180c>] (__alloc_skb+0x138/0x160) [ 100.811224][ T3903] r10:dfdfde2c r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 100.811248][ T3903] r4:828060c0 [ 100.811262][ T3903] [<815516d4>] (__alloc_skb) from [<8155994c>] (alloc_skb_with_frags+0x44/0x1ec) [ 100.811319][ T3903] r8:802c2024 r7:dfdfddb4 r6:00000000 r5:00001000 r4:00000000 [ 100.811333][ T3903] [<81559908>] (alloc_skb_with_frags) from [<8154a3ec>] (sock_alloc_send_pskb+0x1f4/0x228) [ 100.811391][ T3903] r10:dfdfde2c r9:00000000 r8:802c2024 r7:dfdfddb4 r6:8537bc00 r5:7fffffff [ 100.811407][ T3903] r4:857f8000 [ 100.811419][ T3903] [<8154a1f8>] (sock_alloc_send_pskb) from [<819007c8>] (isotp_sendmsg+0x2ac/0x820) [ 100.811484][ T3903] r10:dfdfde98 r9:00000024 r8:dfdfdea8 r7:00000024 r6:857f8000 r5:857fa000 [ 100.811500][ T3903] r4:00000000 [ 100.811513][ T3903] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 100.811579][ T3903] r10:00000122 r9:85b77900 r8:85b77901 r7:76faae1c r6:84b77680 r5:dfdfde98 [ 100.811595][ T3903] r4:00000000 [ 100.811607][ T3903] [<8154353c>] (__sock_sendmsg) from [<81546090>] (__sys_sendto+0x110/0x160) [ 100.811663][ T3903] r7:76faae1c r6:84b77680 r5:00000000 r4:00000000 [ 100.811676][ T3903] [<81545f80>] (__sys_sendto) from [<815460fc>] (sys_sendto+0x1c/0x24) [ 100.811758][ T3903] r9:8537bc00 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76faae1c [ 100.811773][ T3903] [<815460e0>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 100.812016][ T3903] Exception stack(0xdfdfdfa8 to 0xdfdfdff0) [ 100.812189][ T3903] dfa0: 76faae1c 0000000c 00000003 76faaeb0 00000024 00000000 [ 100.812249][ T3903] dfc0: 76faae1c 0000000c 00000000 00000122 00000003 00000000 76faaeb0 76fac0bc [ 100.812274][ T3903] dfe0: 00000000 76faadf0 000d80b8 00134718 [ 101.153534][ T31] audit: type=1400 audit(101.070:134): avc: denied { setopt } for pid=3912 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 101.159253][ T31] audit: type=1400 audit(101.070:135): avc: denied { connect } for pid=3912 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 101.661300][ T31] audit: type=1400 audit(101.580:136): avc: denied { ioctl } for pid=3912 comm="syz.0.36" path="socket:[2588]" dev="sockfs" ino=2588 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 102.210184][ T3916] can: request_module (can-proto-3) failed. [ 102.325743][ T3920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3920 comm=syz.1.38 [ 102.706482][ T31] audit: type=1400 audit(102.620:137): avc: denied { write } for pid=3912 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 104.783351][ T31] audit: type=1400 audit(104.700:138): avc: denied { create } for pid=3934 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 105.881475][ T31] audit: type=1400 audit(105.800:139): avc: denied { connect } for pid=3940 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 107.852912][ T31] audit: type=1400 audit(107.770:140): avc: denied { create } for pid=3952 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.856771][ T31] audit: type=1400 audit(107.770:141): avc: denied { accept } for pid=3952 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 108.834458][ T31] audit: type=1400 audit(108.750:142): avc: denied { create } for pid=3963 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 108.936026][ T31] audit: type=1400 audit(108.850:143): avc: denied { getopt } for pid=3963 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 113.570048][ T31] audit: type=1400 audit(113.480:144): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 113.741121][ T31] audit: type=1400 audit(113.660:145): avc: denied { bind } for pid=4020 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 115.235471][ T4035] fuse: Bad value for 'rootmode' [ 115.277432][ T31] audit: type=1400 audit(115.190:146): avc: denied { write } for pid=4034 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.298220][ T31] audit: type=1400 audit(115.210:147): avc: denied { write } for pid=4034 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 115.302086][ T31] audit: type=1400 audit(115.220:148): avc: denied { ioctl } for pid=4034 comm="syz.1.71" path="socket:[3378]" dev="sockfs" ino=3378 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 117.045853][ T4054] FAULT_INJECTION: forcing a failure. [ 117.045853][ T4054] name failslab, interval 1, probability 0, space 0, times 0 [ 117.048379][ T4054] CPU: 1 UID: 0 PID: 4054 Comm: syz.1.80 Not tainted syzkaller #0 PREEMPT [ 117.048516][ T4054] Hardware name: ARM-Versatile Express [ 117.048628][ T4054] Call trace: [ 117.048698][ T4054] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 117.048817][ T4054] r7:85860c00 r6:00000000 r5:60000013 r4:8226064c [ 117.048836][ T4054] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 117.048892][ T4054] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 117.048948][ T4054] r5:85860c00 r4:82917c00 [ 117.048963][ T4054] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 117.049018][ T4054] [<80972640>] (should_fail_ex) from [<8051f260>] (should_failslab+0x6c/0x94) [ 117.049095][ T4054] r8:00000000 r7:85860c00 r6:00000820 r5:85076240 r4:830a7c00 [ 117.049114][ T4054] [<8051f1f4>] (should_failslab) from [<80503870>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 117.049166][ T4054] [<80503824>] (kmem_cache_alloc_noprof) from [<81557cd8>] (skb_clone+0x60/0x1c8) [ 117.049242][ T4054] r10:85076240 r9:00000000 r8:00000000 r7:00000001 r6:85088700 r5:85076240 [ 117.049261][ T4054] r4:00000820 [ 117.049316][ T4054] [<81557c78>] (skb_clone) from [<818edce0>] (can_send+0xe8/0x388) [ 117.049383][ T4054] r5:00000010 r4:85076240 [ 117.049398][ T4054] [<818edbf8>] (can_send) from [<81900910>] (isotp_sendmsg+0x3f4/0x820) [ 117.049464][ T4054] r9:00000000 r8:00000000 r7:00000000 r6:84d90000 r5:84d92000 r4:84d90280 [ 117.049481][ T4054] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 117.049665][ T4054] r10:00000122 r9:85b77b40 r8:85b77b41 r7:76f86e1c r6:84b76780 r5:e022de98 [ 117.049685][ T4054] r4:00000000 [ 117.049704][ T4054] [<8154353c>] (__sock_sendmsg) from [<81546090>] (__sys_sendto+0x110/0x160) [ 117.049771][ T4054] r7:76f86e1c r6:84b76780 r5:00000000 r4:00000000 [ 117.049788][ T4054] [<81545f80>] (__sys_sendto) from [<815460fc>] (sys_sendto+0x1c/0x24) [ 117.049858][ T4054] r9:85860c00 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f86e1c [ 117.049878][ T4054] [<815460e0>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 117.049950][ T4054] Exception stack(0xe022dfa8 to 0xe022dff0) [ 117.049998][ T4054] dfa0: 76f86e1c 0000000c 00000003 76f86eb0 00000024 00000000 [ 117.050036][ T4054] dfc0: 76f86e1c 0000000c 00000000 00000122 00000003 00000000 76f86eb0 76f880bc [ 117.050066][ T4054] dfe0: 00000000 76f86df0 000d80b8 00134718 [ 117.073030][ T4054] can-isotp: isotp_sendmsg: can_send_ret -ENOMEM [ 124.445195][ T31] audit: type=1400 audit(124.360:149): avc: denied { wake_alarm } for pid=4103 comm="syz.1.99" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 126.711549][ T4124] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4124 comm=syz.0.107 [ 127.319353][ T31] audit: type=1400 audit(127.230:150): avc: denied { ioctl } for pid=4123 comm="syz.0.107" path="socket:[2918]" dev="sockfs" ino=2918 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.529672][ T31] audit: type=1400 audit(128.440:151): avc: denied { create } for pid=4151 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 131.501576][ T4197] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 132.909123][ T31] audit: type=1400 audit(132.820:152): avc: denied { write } for pid=4200 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.532104][ T4252] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 135.574775][ T31] audit: type=1400 audit(135.490:153): avc: denied { create } for pid=4251 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 135.738050][ T31] audit: type=1400 audit(135.650:154): avc: denied { create } for pid=4251 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 135.753521][ T31] audit: type=1400 audit(135.670:155): avc: denied { setopt } for pid=4251 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 137.204648][ T31] audit: type=1400 audit(137.120:156): avc: denied { create } for pid=4265 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.210436][ T31] audit: type=1400 audit(137.120:157): avc: denied { setopt } for pid=4265 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.227541][ T31] audit: type=1400 audit(137.140:158): avc: denied { ioctl } for pid=4265 comm="syz.1.151" path="socket:[3777]" dev="sockfs" ino=3777 ioctlcmd=0x9429 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.254288][ T31] audit: type=1400 audit(137.170:159): avc: denied { setopt } for pid=4265 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 138.352617][ T4278] FAULT_INJECTION: forcing a failure. [ 138.352617][ T4278] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 138.353884][ T4278] CPU: 1 UID: 0 PID: 4278 Comm: syz.0.156 Not tainted syzkaller #0 PREEMPT [ 138.354000][ T4278] Hardware name: ARM-Versatile Express [ 138.354045][ T4278] Call trace: [ 138.354175][ T4278] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 138.354311][ T4278] r7:20000480 r6:00000000 r5:60000013 r4:8226064c [ 138.354330][ T4278] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 138.354395][ T4278] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 138.354456][ T4278] r5:85866c00 r4:8294f190 [ 138.354503][ T4278] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 138.354574][ T4278] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 138.354645][ T4278] r8:00000000 r7:20000480 r6:84d723a3 r5:00000000 r4:00000000 [ 138.354664][ T4278] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 138.354722][ T4278] [<80972880>] (should_fail_usercopy) from [<808b61c8>] (_copy_from_iter+0x6c/0x7d8) [ 138.354780][ T4278] [<808b615c>] (_copy_from_iter) from [<81900770>] (isotp_sendmsg+0x254/0x820) [ 138.354856][ T4278] r10:e04cdf20 r9:84d723a3 r8:e04cdf30 r7:0000005c r6:84d70000 r5:84d72000 [ 138.354883][ T4278] r4:00000000 [ 138.354900][ T4278] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 138.354979][ T4278] r10:00000000 r9:e04cddc4 r8:e04cddc4 r7:00000000 r6:84b77400 r5:e04cdf20 [ 138.355039][ T4278] r4:00000000 [ 138.355061][ T4278] [<8154353c>] (__sock_sendmsg) from [<815448d4>] (____sys_sendmsg+0x298/0x2cc) [ 138.355132][ T4278] r7:00000000 r6:84b77400 r5:00000802 r4:e04cdf20 [ 138.355159][ T4278] [<8154463c>] (____sys_sendmsg) from [<8154689c>] (___sys_sendmsg+0x9c/0xd0) [ 138.355256][ T4278] r10:e04cde24 r9:200001c0 r8:00000802 r7:00000000 r6:84b77400 r5:e04cdf20 [ 138.355279][ T4278] r4:00000000 [ 138.355294][ T4278] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 138.355354][ T4278] r10:00000128 r9:85866c00 r8:85b77b40 r7:00000802 r6:200001c0 r5:85b77b41 [ 138.355383][ T4278] r4:00000003 [ 138.355397][ T4278] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 138.355455][ T4278] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 138.355472][ T4278] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 138.355523][ T4278] Exception stack(0xe04cdfa8 to 0xe04cdff0) [ 138.355633][ T4278] dfa0: 00000000 00000000 00000003 200001c0 00000802 00000000 [ 138.355784][ T4278] dfc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 138.355874][ T4278] dfe0: 76fabec0 76fabeb0 0001946c 00132280 [ 143.243742][ T4320] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4320 comm=syz.0.176 [ 143.314992][ T4320] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4320 comm=syz.0.176 [ 144.223898][ T4331] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4331 comm=syz.1.181 [ 144.302556][ T4331] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4331 comm=syz.1.181 [ 144.719527][ T31] audit: type=1400 audit(144.630:160): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 145.097699][ T4342] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4342 comm=syz.0.186 [ 145.155495][ T4342] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4342 comm=syz.0.186 [ 147.951298][ T4362] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4362 comm=syz.0.193 [ 148.045211][ T4362] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4362 comm=syz.0.193 [ 148.438129][ T31] audit: type=1400 audit(148.350:161): avc: denied { create } for pid=4372 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.025237][ T4378] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4378 comm=syz.1.199 [ 149.124094][ T4378] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4378 comm=syz.1.199 [ 150.181181][ T4389] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4389 comm=syz.1.204 [ 150.301984][ T4389] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4389 comm=syz.1.204 [ 150.489581][ T31] audit: type=1400 audit(150.400:162): avc: denied { getopt } for pid=4401 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.625816][ T31] audit: type=1400 audit(150.540:163): avc: denied { create } for pid=4401 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 151.597483][ T4417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4417 comm=syz.0.214 [ 151.741345][ T4417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4417 comm=syz.0.214 [ 153.284399][ T31] audit: type=1400 audit(153.200:164): avc: denied { bind } for pid=4430 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 153.286706][ T31] audit: type=1400 audit(153.200:165): avc: denied { connect } for pid=4430 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 159.019099][ T4468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4468 comm=syz.1.232 [ 159.140688][ T4468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4468 comm=syz.1.232 [ 163.165618][ T31] audit: type=1400 audit(163.080:166): avc: denied { ioctl } for pid=4488 comm="syz.0.242" path="socket:[4564]" dev="sockfs" ino=4564 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 163.193022][ T31] audit: type=1400 audit(163.110:167): avc: denied { lock } for pid=4488 comm="syz.0.242" path="/dev/dma_heap/system" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 166.181078][ T31] audit: type=1400 audit(166.090:168): avc: denied { prog_run } for pid=4548 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 176.051539][ T31] audit: type=1400 audit(175.970:169): avc: denied { read } for pid=4605 comm="syz.0.290" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 176.054576][ T31] audit: type=1400 audit(175.970:170): avc: denied { open } for pid=4605 comm="syz.0.290" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 176.780788][ T31] audit: type=1400 audit(176.700:171): avc: denied { getopt } for pid=4623 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 176.839398][ T31] audit: type=1400 audit(176.750:172): avc: denied { getopt } for pid=4623 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 179.854758][ T31] audit: type=1400 audit(179.770:173): avc: denied { accept } for pid=4667 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 180.805939][ T31] audit: type=1400 audit(180.720:174): avc: denied { associate } for pid=4689 comm="syz.0.318" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 181.187092][ T31] audit: type=1400 audit(181.100:175): avc: denied { setattr } for pid=4698 comm="syz.1.323" name="CAN_ISOTP" dev="sockfs" ino=4894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 183.505953][ T31] audit: type=1400 audit(183.420:176): avc: denied { getopt } for pid=4709 comm="syz.1.328" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.520522][ T31] audit: type=1400 audit(183.430:177): avc: denied { connect } for pid=4709 comm="syz.1.328" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.669133][ T31] audit: type=1400 audit(183.580:178): avc: denied { create } for pid=4717 comm="syz.0.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 183.791751][ T31] audit: type=1400 audit(183.710:179): avc: denied { create } for pid=4717 comm="syz.0.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 185.025826][ T31] audit: type=1400 audit(184.940:180): avc: denied { map } for pid=4731 comm="syz.1.336" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4935 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 185.026213][ T31] audit: type=1400 audit(184.940:181): avc: denied { read write } for pid=4731 comm="syz.1.336" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4935 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 185.095432][ T31] audit: type=1400 audit(185.010:182): avc: denied { block_suspend } for pid=4731 comm="syz.1.336" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 187.495027][ T31] audit: type=1400 audit(187.410:183): avc: denied { create } for pid=4752 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 187.499554][ T31] audit: type=1400 audit(187.410:184): avc: denied { write } for pid=4752 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 187.812960][ T4764] FAULT_INJECTION: forcing a failure. [ 187.812960][ T4764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.815141][ T4764] CPU: 0 UID: 0 PID: 4764 Comm: syz.1.348 Not tainted syzkaller #0 PREEMPT [ 187.815265][ T4764] Hardware name: ARM-Versatile Express [ 187.815299][ T4764] Call trace: [ 187.815351][ T4764] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 187.815482][ T4764] r7:dfa51e20 r6:00000000 r5:60000013 r4:8226064c [ 187.815514][ T4764] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 187.815575][ T4764] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 187.815639][ T4764] r5:85378c00 r4:8294f190 [ 187.815657][ T4764] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 187.815722][ T4764] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 187.815794][ T4764] r8:20000000 r7:dfa51e20 r6:20000240 r5:00000000 r4:dfa51f20 [ 187.815813][ T4764] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 187.815908][ T4764] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 187.815982][ T4764] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 187.816055][ T4764] r8:20000000 r7:00000000 r6:8379b180 r5:dfa51f20 r4:dfa51e64 [ 187.816076][ T4764] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 187.816148][ T4764] r10:00000128 r9:85378c00 r8:85b86300 r7:20000000 r6:20000240 r5:85b86301 [ 187.816170][ T4764] r4:00000003 [ 187.816187][ T4764] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 187.816254][ T4764] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 187.816273][ T4764] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 187.816320][ T4764] Exception stack(0xdfa51fa8 to 0xdfa51ff0) [ 187.816362][ T4764] 1fa0: 00000000 00000000 00000003 20000240 20000000 00000000 [ 187.816399][ T4764] 1fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f880bc [ 187.816427][ T4764] 1fe0: 76f87ec0 76f87eb0 0001946c 00132280 [ 187.972271][ T31] audit: type=1400 audit(187.890:185): avc: granted { setsecparam } for pid=4767 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 188.345612][ T31] audit: type=1400 audit(188.260:186): avc: denied { write } for pid=4777 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 188.413761][ T31] audit: type=1400 audit(188.330:187): avc: denied { setattr } for pid=4777 comm="syz.1.355" name="NETLINK" dev="sockfs" ino=5834 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.276277][ T4803] FAULT_INJECTION: forcing a failure. [ 192.276277][ T4803] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 192.279444][ T4803] CPU: 0 UID: 0 PID: 4803 Comm: syz.1.366 Not tainted syzkaller #0 PREEMPT [ 192.279575][ T4803] Hardware name: ARM-Versatile Express [ 192.279604][ T4803] Call trace: [ 192.279650][ T4803] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 192.279779][ T4803] r7:200001c0 r6:00000000 r5:60000013 r4:8226064c [ 192.279800][ T4803] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 192.279896][ T4803] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 192.279959][ T4803] r5:85860000 r4:8294f190 [ 192.279977][ T4803] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 192.280038][ T4803] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 192.280109][ T4803] r8:00000000 r7:200001c0 r6:84de23a3 r5:00000000 r4:00000000 [ 192.280127][ T4803] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 192.280183][ T4803] [<80972880>] (should_fail_usercopy) from [<808b61c8>] (_copy_from_iter+0x6c/0x7d8) [ 192.280251][ T4803] [<808b615c>] (_copy_from_iter) from [<81900770>] (isotp_sendmsg+0x254/0x820) [ 192.280330][ T4803] r10:dfa59e68 r9:84de23a3 r8:dfa59e78 r7:00000018 r6:84de0000 r5:84de2000 [ 192.280355][ T4803] r4:00000000 [ 192.280372][ T4803] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 192.280450][ T4803] r10:81e54ec0 r9:200001c0 r8:00000000 r7:8379a000 r6:8379a000 r5:dfa59e68 [ 192.280472][ T4803] r4:00000000 [ 192.280489][ T4803] [<8154353c>] (__sock_sendmsg) from [<81543654>] (sock_write_iter+0xa0/0xfc) [ 192.280556][ T4803] r7:8379a000 r6:85b86f00 r5:dfa59f08 r4:dfa59ef0 [ 192.280572][ T4803] [<815435b4>] (sock_write_iter) from [<80554060>] (vfs_write+0x3a4/0x44c) [ 192.280646][ T4803] r7:85860000 r6:00000018 r5:85b86f00 r4:00004004 [ 192.280665][ T4803] [<80553cbc>] (vfs_write) from [<805542cc>] (ksys_write+0xc8/0xe8) [ 192.280819][ T4803] r10:00000004 r9:85860000 r8:8020029c r7:00000018 r6:200001c0 r5:85b86f00 [ 192.280868][ T4803] r4:85b86f01 [ 192.280886][ T4803] [<80554204>] (ksys_write) from [<805542fc>] (sys_write+0x10/0x14) [ 192.280972][ T4803] r7:00000004 r6:00130230 r5:00000000 r4:00000000 [ 192.280989][ T4803] [<805542ec>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 192.281043][ T4803] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 192.281086][ T4803] 9fa0: 00000000 00000000 00000003 200001c0 00000018 00000000 [ 192.281207][ T4803] 9fc0: 00000000 00000000 00130230 00000004 002e0000 00000000 00006364 76f880bc [ 192.281275][ T4803] 9fe0: 76f87ec0 76f87eb0 0001946c 00132280 [ 192.666254][ T4813] FAULT_INJECTION: forcing a failure. [ 192.666254][ T4813] name failslab, interval 1, probability 0, space 0, times 0 [ 192.667278][ T4813] CPU: 1 UID: 0 PID: 4813 Comm: syz.0.370 Not tainted syzkaller #0 PREEMPT [ 192.667626][ T4813] Hardware name: ARM-Versatile Express [ 192.667908][ T4813] Call trace: [ 192.668971][ T4813] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 192.670537][ T4813] r7:8537c800 r6:00000000 r5:60000013 r4:8226064c [ 192.670629][ T4813] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 192.670696][ T4813] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 192.670756][ T4813] r5:8537c800 r4:82917c00 [ 192.670773][ T4813] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 192.670836][ T4813] [<80972640>] (should_fail_ex) from [<8051f260>] (should_failslab+0x6c/0x94) [ 192.670909][ T4813] r8:00000000 r7:8537c800 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 192.670929][ T4813] [<8051f1f4>] (should_failslab) from [<80503204>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 192.670980][ T4813] [<805031b4>] (kmem_cache_alloc_node_noprof) from [<8155180c>] (__alloc_skb+0x138/0x160) [ 192.671081][ T4813] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 192.671114][ T4813] r4:828060c0 [ 192.671131][ T4813] [<815516d4>] (__alloc_skb) from [<8167112c>] (netlink_alloc_large_skb+0x88/0xa0) [ 192.671216][ T4813] r8:00000000 r7:85b66400 r6:0000001c r5:84b76c80 r4:00000140 [ 192.671242][ T4813] [<816710a4>] (netlink_alloc_large_skb) from [<81671874>] (netlink_sendmsg+0x134/0x444) [ 192.671305][ T4813] r5:84b76c80 r4:dfb09f20 [ 192.671324][ T4813] [<81671740>] (netlink_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 192.671403][ T4813] r10:00000000 r9:dfb09dc4 r8:dfb09dc4 r7:00000000 r6:84b76c80 r5:dfb09f20 [ 192.671426][ T4813] r4:00000000 [ 192.671444][ T4813] [<8154353c>] (__sock_sendmsg) from [<815448d4>] (____sys_sendmsg+0x298/0x2cc) [ 192.671525][ T4813] r7:00000000 r6:84b76c80 r5:20000000 r4:dfb09f20 [ 192.671543][ T4813] [<8154463c>] (____sys_sendmsg) from [<8154689c>] (___sys_sendmsg+0x9c/0xd0) [ 192.671608][ T4813] r10:dfb09e24 r9:20000240 r8:20000000 r7:00000000 r6:84b76c80 r5:dfb09f20 [ 192.671630][ T4813] r4:00000000 [ 192.671647][ T4813] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 192.671712][ T4813] r10:00000128 r9:8537c800 r8:84c48a80 r7:20000000 r6:20000240 r5:84c48a81 [ 192.671735][ T4813] r4:00000003 [ 192.671753][ T4813] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 192.671891][ T4813] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 192.671909][ T4813] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 192.672034][ T4813] Exception stack(0xdfb09fa8 to 0xdfb09ff0) [ 192.672289][ T4813] 9fa0: 00000000 00000000 00000003 20000240 20000000 00000000 [ 192.672354][ T4813] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 192.672390][ T4813] 9fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 192.785041][ T31] audit: type=1400 audit(192.700:188): avc: denied { getopt } for pid=4814 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 194.246006][ T4822] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4822 comm=syz.0.374 [ 196.750179][ T2911] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 198.615318][ T4839] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4839 comm=syz.1.379 [ 198.616230][ T2911] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 198.616615][ T2911] usb 1-1: can't read configurations, error -71 [ 198.754023][ T4839] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4839 comm=syz.1.379 [ 198.981940][ T31] audit: type=1400 audit(198.900:189): avc: denied { accept } for pid=4849 comm="syz.1.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 199.024868][ T31] audit: type=1400 audit(198.940:190): avc: denied { bind } for pid=4849 comm="syz.1.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 200.893969][ T4870] FAULT_INJECTION: forcing a failure. [ 200.893969][ T4870] name failslab, interval 1, probability 0, space 0, times 0 [ 200.894412][ T4870] CPU: 1 UID: 0 PID: 4870 Comm: syz.0.386 Not tainted syzkaller #0 PREEMPT [ 200.894520][ T4870] Hardware name: ARM-Versatile Express [ 200.894550][ T4870] Call trace: [ 200.894602][ T4870] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 200.894726][ T4870] r7:8537bc00 r6:00000000 r5:60000013 r4:8226064c [ 200.894836][ T4870] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 200.894965][ T4870] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 200.895036][ T4870] r5:8537bc00 r4:82917c00 [ 200.895124][ T4870] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 200.895253][ T4870] [<80972640>] (should_fail_ex) from [<8051f260>] (should_failslab+0x6c/0x94) [ 200.895343][ T4870] r8:00000000 r7:8537bc00 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 200.895522][ T4870] [<8051f1f4>] (should_failslab) from [<80503204>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 200.895710][ T4870] [<805031b4>] (kmem_cache_alloc_node_noprof) from [<8155180c>] (__alloc_skb+0x138/0x160) [ 200.895874][ T4870] r10:dfb59dfc r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 200.895908][ T4870] r4:828060c0 [ 200.895928][ T4870] [<815516d4>] (__alloc_skb) from [<8155994c>] (alloc_skb_with_frags+0x44/0x1ec) [ 200.896005][ T4870] r8:802c2024 r7:dfb59d84 r6:00000000 r5:00001000 r4:00000000 [ 200.896197][ T4870] [<81559908>] (alloc_skb_with_frags) from [<8154a3ec>] (sock_alloc_send_pskb+0x1f4/0x228) [ 200.896375][ T4870] r10:dfb59dfc r9:00000000 r8:802c2024 r7:dfb59d84 r6:8537bc00 r5:7fffffff [ 200.896436][ T4870] r4:84e28000 [ 200.896569][ T4870] [<8154a1f8>] (sock_alloc_send_pskb) from [<819007c8>] (isotp_sendmsg+0x2ac/0x820) [ 200.896790][ T4870] r10:dfb59e68 r9:00000018 r8:dfb59e78 r7:00000018 r6:84e28000 r5:84e2a000 [ 200.896924][ T4870] r4:00000000 [ 200.897068][ T4870] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 200.897154][ T4870] r10:81e54ec0 r9:200001c0 r8:00000000 r7:8379b180 r6:8379b180 r5:dfb59e68 [ 200.897179][ T4870] r4:00000000 [ 200.897231][ T4870] [<8154353c>] (__sock_sendmsg) from [<81543654>] (sock_write_iter+0xa0/0xfc) [ 200.897321][ T4870] r7:8379b180 r6:85b86cc0 r5:dfb59f08 r4:dfb59ef0 [ 200.897339][ T4870] [<815435b4>] (sock_write_iter) from [<80554060>] (vfs_write+0x3a4/0x44c) [ 200.897415][ T4870] r7:8537bc00 r6:00000018 r5:85b86cc0 r4:00004004 [ 200.897434][ T4870] [<80553cbc>] (vfs_write) from [<805542cc>] (ksys_write+0xc8/0xe8) [ 200.897537][ T4870] r10:00000004 r9:8537bc00 r8:8020029c r7:00000018 r6:200001c0 r5:85b86cc0 [ 200.897561][ T4870] r4:85b86cc1 [ 200.897579][ T4870] [<80554204>] (ksys_write) from [<805542fc>] (sys_write+0x10/0x14) [ 200.897678][ T4870] r7:00000004 r6:00130230 r5:00000000 r4:00000000 [ 200.897757][ T4870] [<805542ec>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 200.897876][ T4870] Exception stack(0xdfb59fa8 to 0xdfb59ff0) [ 200.897930][ T4870] 9fa0: 00000000 00000000 00000003 200001c0 00000018 00000000 [ 200.898014][ T4870] 9fc0: 00000000 00000000 00130230 00000004 002e0000 00000000 00006364 76fac0bc [ 200.898077][ T4870] 9fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 201.973990][ T4879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pid=4879 comm=syz.1.390 [ 203.552199][ T4899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4899 comm=syz.1.398 [ 206.172081][ T31] audit: type=1400 audit(206.090:191): avc: denied { unmount } for pid=3125 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 211.427360][ T31] audit: type=1400 audit(211.340:192): avc: denied { write } for pid=4948 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 211.427857][ T31] audit: type=1400 audit(211.340:193): avc: denied { nlmsg_write } for pid=4948 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 211.720364][ T732] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 211.917452][ T732] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 211.917818][ T732] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 211.918143][ T732] usb 1-1: Product: syz [ 211.918197][ T732] usb 1-1: Manufacturer: syz [ 211.918282][ T732] usb 1-1: SerialNumber: syz [ 216.973838][ T31] audit: type=1400 audit(216.890:194): avc: denied { mounton } for pid=4969 comm="syz.1.425" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 216.975120][ T4970] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 221.504199][ T11] usb 1-1: USB disconnect, device number 4 [ 221.732221][ T4996] fuse: Bad value for 'fd' [ 221.745160][ T31] audit: type=1400 audit(221.660:195): avc: denied { execute } for pid=4995 comm="syz.0.430" name="file0" dev="tmpfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 221.747951][ T4996] process 'syz.0.430' launched './file0' with NULL argv: empty string added [ 221.751326][ T31] audit: type=1400 audit(221.670:196): avc: denied { execute_no_trans } for pid=4995 comm="syz.0.430" path="/208/file0" dev="tmpfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 222.001378][ T31] audit: type=1400 audit(221.920:197): avc: denied { ioctl } for pid=5001 comm="syz.1.433" path="socket:[6357]" dev="sockfs" ino=6357 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 222.004197][ T31] audit: type=1400 audit(221.920:198): avc: denied { setopt } for pid=5001 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 222.457548][ T5007] FAULT_INJECTION: forcing a failure. [ 222.457548][ T5007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.458013][ T5007] CPU: 1 UID: 0 PID: 5007 Comm: syz.1.434 Not tainted syzkaller #0 PREEMPT [ 222.458110][ T5007] Hardware name: ARM-Versatile Express [ 222.458161][ T5007] Call trace: [ 222.458214][ T5007] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 222.458375][ T5007] r7:dfcb5e20 r6:00000000 r5:60000013 r4:8226064c [ 222.458437][ T5007] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 222.458498][ T5007] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 222.458559][ T5007] r5:8537b000 r4:8294f190 [ 222.458578][ T5007] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 222.458821][ T5007] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 222.458952][ T5007] r8:00000010 r7:dfcb5e20 r6:20000180 r5:00000000 r4:dfcb5f20 [ 222.459007][ T5007] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 222.459137][ T5007] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 222.459277][ T5007] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 222.459425][ T5007] r8:00000010 r7:00000000 r6:84b76c80 r5:dfcb5f20 r4:dfcb5e64 [ 222.459554][ T5007] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 222.459748][ T5007] r10:00000128 r9:8537b000 r8:84c48180 r7:00000010 r6:20000180 r5:84c48181 [ 222.459816][ T5007] r4:00000004 [ 222.459885][ T5007] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 222.459957][ T5007] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 222.459976][ T5007] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 222.460023][ T5007] Exception stack(0xdfcb5fa8 to 0xdfcb5ff0) [ 222.460066][ T5007] 5fa0: 00000000 00000000 00000004 20000180 00000010 00000000 [ 222.460105][ T5007] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f880bc [ 222.460134][ T5007] 5fe0: 76f87ec0 76f87eb0 0001946c 00132280 [ 226.088653][ T31] audit: type=1400 audit(226.000:199): avc: denied { ioctl } for pid=5039 comm="syz.0.447" path="socket:[7365]" dev="sockfs" ino=7365 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 228.321848][ T31] audit: type=1400 audit(228.230:200): avc: denied { read } for pid=5057 comm="syz.1.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 229.053545][ T31] audit: type=1400 audit(228.970:201): avc: denied { bind } for pid=5068 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 229.060917][ T31] audit: type=1400 audit(228.980:202): avc: denied { write } for pid=5068 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 232.114995][ T31] audit: type=1400 audit(232.030:203): avc: denied { shutdown } for pid=5080 comm="syz.1.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.123684][ T31] audit: type=1400 audit(235.040:204): avc: denied { ioctl } for pid=5115 comm="syz.0.473" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6553 ioctlcmd=0xaa06 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 235.426542][ T31] audit: type=1400 audit(235.340:205): avc: denied { write } for pid=5134 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 237.996912][ T5141] FAULT_INJECTION: forcing a failure. [ 237.996912][ T5141] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 237.997304][ T5141] CPU: 1 UID: 0 PID: 5141 Comm: syz.0.479 Not tainted syzkaller #0 PREEMPT [ 237.997403][ T5141] Hardware name: ARM-Versatile Express [ 237.997433][ T5141] Call trace: [ 237.997487][ T5141] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 237.997652][ T5141] r7:dfce1e20 r6:00000000 r5:60000013 r4:8226064c [ 237.997676][ T5141] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 237.997839][ T5141] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 237.998009][ T5141] r5:8537a400 r4:8294f190 [ 237.998047][ T5141] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 237.998129][ T5141] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 237.998205][ T5141] r8:00000010 r7:dfce1e20 r6:20000180 r5:00000000 r4:dfce1f20 [ 237.998268][ T5141] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 237.998368][ T5141] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 237.998509][ T5141] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 237.998688][ T5141] r8:00000010 r7:00000000 r6:84b77680 r5:dfce1f20 r4:dfce1e64 [ 237.998711][ T5141] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 237.998780][ T5141] r10:00000128 r9:8537a400 r8:85b77840 r7:00000010 r6:20000180 r5:85b77841 [ 237.998800][ T5141] r4:00000003 [ 237.998818][ T5141] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 237.998884][ T5141] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 237.998903][ T5141] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 237.998951][ T5141] Exception stack(0xdfce1fa8 to 0xdfce1ff0) [ 237.998994][ T5141] 1fa0: 00000000 00000000 00000003 20000180 00000010 00000000 [ 237.999033][ T5141] 1fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 237.999064][ T5141] 1fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 238.114629][ T31] audit: type=1400 audit(238.030:206): avc: denied { write } for pid=5142 comm="syz.0.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 242.295752][ T5162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5162 comm=syz.1.487 [ 242.353974][ T5162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5162 comm=syz.1.487 [ 244.327587][ T31] audit: type=1400 audit(244.240:207): avc: denied { create } for pid=5173 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 244.340110][ T31] audit: type=1400 audit(244.260:208): avc: denied { getopt } for pid=5173 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 244.354087][ T31] audit: type=1400 audit(244.270:209): avc: denied { accept } for pid=5173 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 244.365709][ T31] audit: type=1400 audit(244.280:210): avc: denied { ioctl } for pid=5173 comm="syz.0.491" path="socket:[7594]" dev="sockfs" ino=7594 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 246.841636][ T5208] FAULT_INJECTION: forcing a failure. [ 246.841636][ T5208] name failslab, interval 1, probability 0, space 0, times 0 [ 246.845940][ T5208] CPU: 0 UID: 0 PID: 5208 Comm: syz.1.501 Not tainted syzkaller #0 PREEMPT [ 246.846084][ T5208] Hardware name: ARM-Versatile Express [ 246.846157][ T5208] Call trace: [ 246.846236][ T5208] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 246.846370][ T5208] r7:85865400 r6:00000000 r5:60000013 r4:8226064c [ 246.846391][ T5208] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 246.846446][ T5208] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 246.846509][ T5208] r5:85865400 r4:82917c00 [ 246.846526][ T5208] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 246.846586][ T5208] [<80972640>] (should_fail_ex) from [<8051f260>] (should_failslab+0x6c/0x94) [ 246.846657][ T5208] r8:00000000 r7:85865400 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 246.846675][ T5208] [<8051f1f4>] (should_failslab) from [<80503204>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 246.846842][ T5208] [<805031b4>] (kmem_cache_alloc_node_noprof) from [<8155180c>] (__alloc_skb+0x138/0x160) [ 246.846977][ T5208] r10:dfe2dd3c r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 246.847003][ T5208] r4:828060c0 [ 246.847021][ T5208] [<815516d4>] (__alloc_skb) from [<8155994c>] (alloc_skb_with_frags+0x44/0x1ec) [ 246.847089][ T5208] r8:802c2024 r7:dfe2dcc4 r6:00000000 r5:00001000 r4:00000000 [ 246.847105][ T5208] [<81559908>] (alloc_skb_with_frags) from [<8154a3ec>] (sock_alloc_send_pskb+0x1f4/0x228) [ 246.847173][ T5208] r10:dfe2dd3c r9:00000000 r8:802c2024 r7:dfe2dcc4 r6:85865400 r5:00000000 [ 246.847193][ T5208] r4:85240000 [ 246.847208][ T5208] [<8154a1f8>] (sock_alloc_send_pskb) from [<819007c8>] (isotp_sendmsg+0x2ac/0x820) [ 246.847287][ T5208] r10:dfe2df20 r9:00000014 r8:dfe2df30 r7:00000014 r6:85240000 r5:85242000 [ 246.847307][ T5208] r4:00000000 [ 246.847397][ T5208] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 246.847580][ T5208] r10:00000000 r9:dfe2ddc4 r8:dfe2ddc4 r7:00000000 r6:8379a500 r5:dfe2df20 [ 246.847604][ T5208] r4:00000000 [ 246.847621][ T5208] [<8154353c>] (__sock_sendmsg) from [<815448d4>] (____sys_sendmsg+0x298/0x2cc) [ 246.847687][ T5208] r7:00000000 r6:8379a500 r5:00080040 r4:dfe2df20 [ 246.847705][ T5208] [<8154463c>] (____sys_sendmsg) from [<8154689c>] (___sys_sendmsg+0x9c/0xd0) [ 246.847776][ T5208] r10:dfe2de24 r9:200003c0 r8:00080040 r7:00000000 r6:8379a500 r5:dfe2df20 [ 246.847796][ T5208] r4:00000000 [ 246.847811][ T5208] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 246.847908][ T5208] r10:00000128 r9:85865400 r8:85b86240 r7:00080040 r6:200003c0 r5:85b86241 [ 246.847928][ T5208] r4:00000003 [ 246.847946][ T5208] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 246.848006][ T5208] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 246.848155][ T5208] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 246.848243][ T5208] Exception stack(0xdfe2dfa8 to 0xdfe2dff0) [ 246.848328][ T5208] dfa0: 00000000 00000000 00000003 200003c0 00080040 00000000 [ 246.848381][ T5208] dfc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f880bc [ 246.848410][ T5208] dfe0: 76f87ec0 76f87eb0 0001946c 00132280 [ 247.154096][ T31] audit: type=1400 audit(247.070:211): avc: denied { write } for pid=5199 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 248.240926][ T31] audit: type=1400 audit(248.160:212): avc: denied { create } for pid=5213 comm="syz.1.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 249.599647][ T31] audit: type=1400 audit(249.510:213): avc: denied { connect } for pid=5229 comm="syz.0.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 249.605150][ T31] audit: type=1400 audit(249.520:214): avc: denied { bind } for pid=5229 comm="syz.0.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 249.621701][ T31] audit: type=1400 audit(249.540:215): avc: denied { write } for pid=5229 comm="syz.0.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 252.647016][ T31] audit: type=1400 audit(252.560:216): avc: denied { nlmsg_write } for pid=5245 comm="syz.1.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 255.569403][ T5256] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5256 comm=syz.0.522 [ 255.610002][ T5256] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5256 comm=syz.0.522 [ 256.395872][ T31] audit: type=1400 audit(256.310:217): avc: denied { create } for pid=5258 comm="syz.1.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 256.627691][ T31] audit: type=1400 audit(256.540:218): avc: denied { bind } for pid=5261 comm="syz.1.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 256.632149][ T31] audit: type=1400 audit(256.550:220): avc: denied { node_bind } for pid=5261 comm="syz.1.524" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 256.636764][ T31] audit: type=1400 audit(256.540:219): avc: denied { name_bind } for pid=5261 comm="syz.1.524" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 257.636404][ T5274] FAULT_INJECTION: forcing a failure. [ 257.636404][ T5274] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.637049][ T5274] CPU: 1 UID: 0 PID: 5274 Comm: syz.0.529 Not tainted syzkaller #0 PREEMPT [ 257.637156][ T5274] Hardware name: ARM-Versatile Express [ 257.637188][ T5274] Call trace: [ 257.637250][ T5274] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 257.637374][ T5274] r7:20000040 r6:00000000 r5:60000013 r4:8226064c [ 257.637399][ T5274] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 257.637455][ T5274] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 257.637516][ T5274] r5:8537a400 r4:8294f190 [ 257.637534][ T5274] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 257.637597][ T5274] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 257.637665][ T5274] r8:b5403587 r7:20000040 r6:dfe55e64 r5:0000000c r4:0000000c [ 257.637764][ T5274] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 257.637907][ T5274] [<80972880>] (should_fail_usercopy) from [<8154493c>] (move_addr_to_kernel+0x34/0xf8) [ 257.638100][ T5274] [<81544908>] (move_addr_to_kernel) from [<815466a4>] (__copy_msghdr+0xe4/0x110) [ 257.638178][ T5274] r7:dfe55e20 r6:20000140 r5:dfe55dd0 r4:dfe55f20 [ 257.638284][ T5274] [<815465c0>] (__copy_msghdr) from [<8154677c>] (copy_msghdr_from_user+0xac/0x130) [ 257.638462][ T5274] r5:00000000 r4:dfe55f20 [ 257.638808][ T5274] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 257.639032][ T5274] r8:00000000 r7:00000000 r6:8379a780 r5:dfe55f20 r4:dfe55e64 [ 257.639079][ T5274] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 257.639157][ T5274] r10:00000128 r9:8537a400 r8:85b86000 r7:00000000 r6:20000140 r5:85b86001 [ 257.639179][ T5274] r4:00000003 [ 257.639196][ T5274] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 257.639270][ T5274] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 257.639286][ T5274] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 257.639335][ T5274] Exception stack(0xdfe55fa8 to 0xdfe55ff0) [ 257.639377][ T5274] 5fa0: 00000000 00000000 00000003 20000140 00000000 00000000 [ 257.639416][ T5274] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 257.639533][ T5274] 5fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 259.049448][ T31] audit: type=1400 audit(258.960:221): avc: denied { create } for pid=5286 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 259.503944][ T31] audit: type=1400 audit(259.420:222): avc: denied { accept } for pid=5293 comm="syz.0.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 260.949500][ T31] audit: type=1400 audit(260.860:223): avc: denied { create } for pid=5319 comm="syz.0.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 265.062337][ T31] audit: type=1400 audit(264.980:224): avc: denied { connect } for pid=5372 comm="syz.0.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 267.270683][ T43] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 267.458012][ T43] usb 2-1: not running at top speed; connect to a high speed hub [ 267.477770][ T43] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 267.480347][ T43] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 267.494722][ T43] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 267.495079][ T43] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 267.495266][ T43] usb 2-1: Product: syz [ 267.495441][ T43] usb 2-1: Manufacturer: 㕳ɪ듚娌嬡⭲솜岏Ổᧇ雨儩宲⣳㇉ລ잚ಝ䧩✟碣劯艑鳻铒座臟㓖蘆콴贈 [ 267.495603][ T43] usb 2-1: SerialNumber: syz [ 267.824796][ T43] usb 2-1: 0:2 : does not exist [ 267.862549][ T43] usb 2-1: USB disconnect, device number 2 [ 269.429678][ T2911] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 269.580228][ T2911] usb 2-1: device descriptor read/64, error -71 [ 269.820288][ T2911] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 270.009442][ T2911] usb 2-1: device descriptor read/64, error -71 [ 270.120384][ T2911] usb usb2-port1: attempt power cycle [ 270.469579][ T2911] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 270.501239][ T2911] usb 2-1: device descriptor read/8, error -71 [ 270.739762][ T2911] usb 2-1: new low-speed USB device number 6 using dummy_hcd [ 270.769758][ T2911] usb 2-1: device descriptor read/8, error -71 [ 270.881626][ T2911] usb usb2-port1: unable to enumerate USB device [ 274.901161][ T5477] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5477 comm=syz.0.599 [ 276.619576][ T31] audit: type=1400 audit(276.530:225): avc: denied { map } for pid=5481 comm="syz.0.601" path="socket:[8155]" dev="sockfs" ino=8155 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 278.930580][ T5499] capability: warning: `syz.0.609' uses deprecated v2 capabilities in a way that may be insecure [ 281.733684][ T5515] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5515 comm=syz.0.615 [ 282.522158][ T31] audit: type=1400 audit(282.440:226): avc: denied { write } for pid=5520 comm="syz.0.618" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 282.907206][ T5528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5528 comm=syz.0.621 [ 284.315859][ T31] audit: type=1400 audit(284.230:227): avc: denied { sqpoll } for pid=5539 comm="syz.1.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 287.121112][ T31] audit: type=1400 audit(287.030:228): avc: denied { ioctl } for pid=5557 comm="syz.1.633" path="socket:[9311]" dev="sockfs" ino=9311 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 289.183708][ T5562] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5562 comm=syz.1.635 [ 289.871754][ T5562] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5562 comm=syz.1.635 [ 294.187510][ T5580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5580 comm=syz.1.644 [ 295.247401][ T5580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5580 comm=syz.1.644 [ 299.516530][ T5601] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5601 comm=syz.0.652 [ 301.150082][ T5601] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5601 comm=syz.0.652 [ 301.549845][ T31] audit: type=1400 audit(301.400:229): avc: denied { bind } for pid=5608 comm="syz.0.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 301.550249][ T31] audit: type=1400 audit(301.450:230): avc: denied { setopt } for pid=5608 comm="syz.0.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 302.215426][ T5617] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5617 comm=syz.1.659 [ 304.305784][ T5619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5619 comm=syz.1.660 [ 305.854009][ T5619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5619 comm=syz.1.660 [ 308.458719][ T5648] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5648 comm=syz.0.672 [ 308.977177][ T5648] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5648 comm=syz.0.672 [ 314.744415][ T5669] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5669 comm=syz.1.680 [ 315.044842][ T5669] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=5669 comm=syz.1.680 [ 321.513038][ T31] audit: type=1400 audit(321.430:231): avc: denied { accept } for pid=5740 comm="syz.0.713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 323.944574][ T5751] FAULT_INJECTION: forcing a failure. [ 323.944574][ T5751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.944934][ T5751] CPU: 1 UID: 0 PID: 5751 Comm: syz.0.718 Not tainted syzkaller #0 PREEMPT [ 323.945030][ T5751] Hardware name: ARM-Versatile Express [ 323.945061][ T5751] Call trace: [ 323.945111][ T5751] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 323.945300][ T5751] r7:e0385e20 r6:00000000 r5:60000013 r4:8226064c [ 323.945395][ T5751] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 323.945494][ T5751] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 323.945604][ T5751] r5:84003000 r4:8294f190 [ 323.945638][ T5751] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 323.945742][ T5751] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 323.945883][ T5751] r8:24000005 r7:e0385e20 r6:20000200 r5:00000000 r4:e0385f20 [ 323.945919][ T5751] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 323.946047][ T5751] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 323.946118][ T5751] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 323.946288][ T5751] r8:24000005 r7:00000000 r6:84b76a00 r5:e0385f20 r4:e0385e64 [ 323.946342][ T5751] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 323.946429][ T5751] r10:00000128 r9:84003000 r8:857229c0 r7:24000005 r6:20000200 r5:857229c1 [ 323.946516][ T5751] r4:00000003 [ 323.946602][ T5751] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 323.946741][ T5751] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 323.946762][ T5751] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 323.946861][ T5751] Exception stack(0xe0385fa8 to 0xe0385ff0) [ 323.946946][ T5751] 5fa0: 00000000 00000000 00000003 20000200 24000005 00000000 [ 323.947055][ T5751] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 323.947126][ T5751] 5fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 324.752277][ T5764] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=5764 comm=syz.0.719 [ 331.174014][ T31] audit: type=1400 audit(331.070:232): avc: denied { checkpoint_restore } for pid=5792 comm="syz.0.736" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 334.620933][ T31] audit: type=1400 audit(334.540:233): avc: denied { ioctl } for pid=5828 comm="syz.0.743" path="ipc:[4026532638]" dev="nsfs" ino=4026532638 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 342.893729][ T5874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5874 comm=syz.1.763 [ 345.765492][ T5887] FAULT_INJECTION: forcing a failure. [ 345.765492][ T5887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 345.789705][ T5887] CPU: 1 UID: 0 PID: 5887 Comm: syz.0.769 Not tainted syzkaller #0 PREEMPT [ 345.789856][ T5887] Hardware name: ARM-Versatile Express [ 345.789890][ T5887] Call trace: [ 345.789943][ T5887] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 345.790425][ T5887] r7:20000040 r6:00000000 r5:60000013 r4:8226064c [ 345.790447][ T5887] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 345.790504][ T5887] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 345.790564][ T5887] r5:8537b000 r4:8294f190 [ 345.790580][ T5887] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 345.790641][ T5887] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 345.790708][ T5887] r8:b5403587 r7:20000040 r6:e0555e64 r5:0000000c r4:0000000c [ 345.790726][ T5887] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 345.790779][ T5887] [<80972880>] (should_fail_usercopy) from [<8154493c>] (move_addr_to_kernel+0x34/0xf8) [ 345.790842][ T5887] [<81544908>] (move_addr_to_kernel) from [<815466a4>] (__copy_msghdr+0xe4/0x110) [ 345.790914][ T5887] r7:e0555e20 r6:20000200 r5:e0555dd0 r4:e0555f20 [ 345.790933][ T5887] [<815465c0>] (__copy_msghdr) from [<8154677c>] (copy_msghdr_from_user+0xac/0x130) [ 345.790999][ T5887] r5:00000000 r4:e0555f20 [ 345.791016][ T5887] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 345.791086][ T5887] r8:24000005 r7:00000000 r6:8379e780 r5:e0555f20 r4:e0555e64 [ 345.791105][ T5887] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 345.791187][ T5887] r10:00000128 r9:8537b000 r8:84c48c00 r7:24000005 r6:20000200 r5:84c48c01 [ 345.791209][ T5887] r4:00000003 [ 345.791227][ T5887] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 345.791293][ T5887] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 345.791311][ T5887] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 345.791362][ T5887] Exception stack(0xe0555fa8 to 0xe0555ff0) [ 345.791409][ T5887] 5fa0: 00000000 00000000 00000003 20000200 24000005 00000000 [ 345.791456][ T5887] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 345.791487][ T5887] 5fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 357.151899][ T5981] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5981 comm=syz.1.790 [ 358.073474][ T31] audit: type=1400 audit(357.990:234): avc: denied { setopt } for pid=5987 comm="syz.0.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 362.171805][ T31] audit: type=1400 audit(362.090:235): avc: denied { remount } for pid=6010 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 369.674081][ T6069] FAULT_INJECTION: forcing a failure. [ 369.674081][ T6069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.674532][ T6069] CPU: 1 UID: 0 PID: 6069 Comm: syz.1.821 Not tainted syzkaller #0 PREEMPT [ 369.674638][ T6069] Hardware name: ARM-Versatile Express [ 369.674670][ T6069] Call trace: [ 369.674728][ T6069] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 369.674940][ T6069] r7:e4669e20 r6:00000000 r5:60000013 r4:8226064c [ 369.674989][ T6069] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 369.675163][ T6069] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 369.675254][ T6069] r5:841be000 r4:8294f190 [ 369.675422][ T6069] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 369.675569][ T6069] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 369.675817][ T6069] r8:00000010 r7:e4669e20 r6:200000c0 r5:00000000 r4:e4669f20 [ 369.675930][ T6069] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 369.676067][ T6069] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 369.676282][ T6069] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 369.676498][ T6069] r8:00000010 r7:00000000 r6:8379f680 r5:e4669f20 r4:e4669e64 [ 369.676613][ T6069] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 369.676833][ T6069] r10:00000128 r9:841be000 r8:857229c0 r7:00000010 r6:200000c0 r5:857229c1 [ 369.676860][ T6069] r4:00000003 [ 369.676880][ T6069] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 369.677157][ T6069] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 369.677270][ T6069] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 369.677401][ T6069] Exception stack(0xe4669fa8 to 0xe4669ff0) [ 369.677512][ T6069] 9fa0: 00000000 00000000 00000003 200000c0 00000010 00000000 [ 369.677690][ T6069] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f880bc [ 369.677817][ T6069] 9fe0: 76f87ec0 76f87eb0 0001946c 00132280 [ 372.096459][ T6091] FAULT_INJECTION: forcing a failure. [ 372.096459][ T6091] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 372.096793][ T6091] CPU: 1 UID: 0 PID: 6091 Comm: syz.0.830 Not tainted syzkaller #0 PREEMPT [ 372.096880][ T6091] Hardware name: ARM-Versatile Express [ 372.096904][ T6091] Call trace: [ 372.096947][ T6091] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 372.097047][ T6091] r7:e86a9e20 r6:00000000 r5:60000013 r4:8226064c [ 372.097064][ T6091] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 372.097114][ T6091] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 372.097183][ T6091] r5:8537c800 r4:8294f190 [ 372.097200][ T6091] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 372.097260][ T6091] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 372.097384][ T6091] r8:00008000 r7:e86a9e20 r6:200002c0 r5:00000000 r4:e86a9f20 [ 372.097633][ T6091] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 372.097991][ T6091] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 372.098306][ T6091] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 372.099066][ T6091] r8:00008000 r7:00000000 r6:8379f900 r5:e86a9f20 r4:e86a9e64 [ 372.099196][ T6091] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 372.099276][ T6091] r10:00000128 r9:8537c800 r8:85722540 r7:00008000 r6:200002c0 r5:85722541 [ 372.099297][ T6091] r4:00000003 [ 372.099314][ T6091] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 372.099374][ T6091] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 372.099389][ T6091] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 372.099507][ T6091] Exception stack(0xe86a9fa8 to 0xe86a9ff0) [ 372.099556][ T6091] 9fa0: 00000000 00000000 00000003 200002c0 00008000 00000000 [ 372.099596][ T6091] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 372.099626][ T6091] 9fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 373.191070][ T31] audit: type=1400 audit(373.110:236): avc: denied { setopt } for pid=6123 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 381.190486][ T31] audit: type=1400 audit(381.110:237): avc: denied { lock } for pid=6225 comm="syz.0.850" path="socket:[10738]" dev="sockfs" ino=10738 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 382.740595][ T31] audit: type=1400 audit(382.660:238): avc: denied { ioctl } for pid=6259 comm="syz.1.855" path="socket:[11559]" dev="sockfs" ino=11559 ioctlcmd=0x64c2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 382.871984][ T31] audit: type=1400 audit(382.790:239): avc: denied { read } for pid=6259 comm="syz.1.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 383.474722][ T31] audit: type=1400 audit(383.390:240): avc: denied { setopt } for pid=6259 comm="syz.1.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 387.579739][ T6310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6310 comm=syz.0.864 [ 388.876566][ T6314] FAULT_INJECTION: forcing a failure. [ 388.876566][ T6314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 388.876897][ T6314] CPU: 1 UID: 0 PID: 6314 Comm: syz.0.865 Not tainted syzkaller #0 PREEMPT [ 388.876986][ T6314] Hardware name: ARM-Versatile Express [ 388.877014][ T6314] Call trace: [ 388.877063][ T6314] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 388.877257][ T6314] r7:20000040 r6:00000000 r5:60000013 r4:8226064c [ 388.877298][ T6314] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 388.877403][ T6314] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 388.877471][ T6314] r5:841b0c00 r4:8294f190 [ 388.878554][ T6314] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 388.879338][ T6314] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 388.879409][ T6314] r8:00000000 r7:20000040 r6:84fca3a3 r5:00000000 r4:00000000 [ 388.879426][ T6314] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 388.879580][ T6314] [<80972880>] (should_fail_usercopy) from [<808b61c8>] (_copy_from_iter+0x6c/0x7d8) [ 388.879646][ T6314] [<808b615c>] (_copy_from_iter) from [<81900770>] (isotp_sendmsg+0x254/0x820) [ 388.879723][ T6314] r10:ea8b5f20 r9:84fca3a3 r8:ea8b5f30 r7:00000014 r6:84fc8000 r5:84fca000 [ 388.879747][ T6314] r4:00000000 [ 388.879800][ T6314] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 388.879982][ T6314] r10:00000000 r9:ea8b5dc4 r8:ea8b5dc4 r7:00000000 r6:8379e780 r5:ea8b5f20 [ 388.880167][ T6314] r4:00000000 [ 388.880241][ T6314] [<8154353c>] (__sock_sendmsg) from [<815448d4>] (____sys_sendmsg+0x298/0x2cc) [ 388.880314][ T6314] r7:00000000 r6:8379e780 r5:00000010 r4:ea8b5f20 [ 388.880422][ T6314] [<8154463c>] (____sys_sendmsg) from [<8154689c>] (___sys_sendmsg+0x9c/0xd0) [ 388.880550][ T6314] r10:ea8b5e24 r9:200000c0 r8:00000010 r7:00000000 r6:8379e780 r5:ea8b5f20 [ 388.880573][ T6314] r4:00000000 [ 388.880624][ T6314] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 388.880775][ T6314] r10:00000128 r9:841b0c00 r8:86020300 r7:00000010 r6:200000c0 r5:86020301 [ 388.880819][ T6314] r4:00000003 [ 388.880858][ T6314] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 388.880961][ T6314] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 388.881049][ T6314] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 388.881180][ T6314] Exception stack(0xea8b5fa8 to 0xea8b5ff0) [ 388.881246][ T6314] 5fa0: 00000000 00000000 00000003 200000c0 00000010 00000000 [ 388.881328][ T6314] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 388.881522][ T6314] 5fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 393.606960][ T6360] SELinux: syz.0.877 (6360) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 408.236218][ T31] audit: type=1400 audit(408.150:241): avc: denied { connect } for pid=6459 comm="syz.1.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 408.283478][ T6460] SELinux: Context system_u:object_r:ifconfig_exec_t:s0 is not valid (left unmapped). [ 408.283574][ T31] audit: type=1400 audit(408.200:242): avc: denied { relabelfrom } for pid=6459 comm="syz.1.893" name="RAWv6" dev="sockfs" ino=11792 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 408.286538][ T31] audit: type=1400 audit(408.200:243): avc: denied { relabelto } for pid=6459 comm="syz.1.893" name="RAWv6" dev="sockfs" ino=11792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=rawip_socket permissive=1 trawcon="system_u:object_r:ifconfig_exec_t:s0" [ 408.293422][ T31] audit: type=1400 audit(408.210:244): avc: denied { ioctl } for pid=6459 comm="syz.1.893" path="socket:[11792]" dev="sockfs" ino=11792 ioctlcmd=0x941f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 408.462640][ T6427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6427 comm=syz.0.887 [ 410.800561][ T6427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6427 comm=syz.0.887 [ 411.254587][ T6490] FAULT_INJECTION: forcing a failure. [ 411.254587][ T6490] name failslab, interval 1, probability 0, space 0, times 0 [ 411.259589][ T6490] CPU: 0 UID: 0 PID: 6490 Comm: syz.0.898 Not tainted syzkaller #0 PREEMPT [ 411.259766][ T6490] Hardware name: ARM-Versatile Express [ 411.259828][ T6490] Call trace: [ 411.259945][ T6490] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 411.260234][ T6490] r7:84d91800 r6:00000000 r5:60000113 r4:8226064c [ 411.260259][ T6490] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 411.260319][ T6490] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 411.260379][ T6490] r5:84d91800 r4:82917c00 [ 411.260394][ T6490] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 411.260454][ T6490] [<80972640>] (should_fail_ex) from [<8051f260>] (should_failslab+0x6c/0x94) [ 411.260528][ T6490] r8:00000000 r7:84d91800 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 411.260546][ T6490] [<8051f1f4>] (should_failslab) from [<80503204>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 411.260598][ T6490] [<805031b4>] (kmem_cache_alloc_node_noprof) from [<8155180c>] (__alloc_skb+0x138/0x160) [ 411.260670][ T6490] r10:ea989d3c r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 411.260697][ T6490] r4:828060c0 [ 411.260713][ T6490] [<815516d4>] (__alloc_skb) from [<8155994c>] (alloc_skb_with_frags+0x44/0x1ec) [ 411.260775][ T6490] r8:802c2024 r7:ea989cc4 r6:00000000 r5:00001000 r4:00000000 [ 411.260792][ T6490] [<81559908>] (alloc_skb_with_frags) from [<8154a3ec>] (sock_alloc_send_pskb+0x1f4/0x228) [ 411.260856][ T6490] r10:ea989d3c r9:00000000 r8:802c2024 r7:ea989cc4 r6:84d91800 r5:7fffffff [ 411.260876][ T6490] r4:850c0000 [ 411.260890][ T6490] [<8154a1f8>] (sock_alloc_send_pskb) from [<819007c8>] (isotp_sendmsg+0x2ac/0x820) [ 411.260960][ T6490] r10:ea989f20 r9:00000020 r8:ea989f30 r7:00000020 r6:850c0000 r5:850c2000 [ 411.260980][ T6490] r4:00000000 [ 411.260997][ T6490] [<8190051c>] (isotp_sendmsg) from [<81543580>] (__sock_sendmsg+0x44/0x78) [ 411.261074][ T6490] r10:00000000 r9:ea989dc4 r8:ea989dc4 r7:00000000 r6:8379b400 r5:ea989f20 [ 411.261092][ T6490] r4:00000000 [ 411.261107][ T6490] [<8154353c>] (__sock_sendmsg) from [<815448d4>] (____sys_sendmsg+0x298/0x2cc) [ 411.261165][ T6490] r7:00000000 r6:8379b400 r5:00008000 r4:ea989f20 [ 411.261181][ T6490] [<8154463c>] (____sys_sendmsg) from [<8154689c>] (___sys_sendmsg+0x9c/0xd0) [ 411.261246][ T6490] r10:ea989e24 r9:200002c0 r8:00008000 r7:00000000 r6:8379b400 r5:ea989f20 [ 411.261265][ T6490] r4:00000000 [ 411.261281][ T6490] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 411.261344][ T6490] r10:00000128 r9:84d91800 r8:838e0840 r7:00008000 r6:200002c0 r5:838e0841 [ 411.261364][ T6490] r4:00000003 [ 411.261381][ T6490] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 411.261442][ T6490] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 411.261459][ T6490] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 411.261558][ T6490] Exception stack(0xea989fa8 to 0xea989ff0) [ 411.261610][ T6490] 9fa0: 00000000 00000000 00000003 200002c0 00008000 00000000 [ 411.261647][ T6490] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fac0bc [ 411.261679][ T6490] 9fe0: 76fabec0 76fabeb0 0001946c 00132280 [ 431.476274][ T31] audit: type=1400 audit(431.390:245): avc: denied { create } for pid=6654 comm="syz.0.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 447.145674][ T31] audit: type=1400 audit(447.050:246): avc: denied { create } for pid=6745 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 447.172589][ T31] audit: type=1400 audit(447.090:247): avc: denied { bind } for pid=6745 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 447.173980][ T31] audit: type=1400 audit(447.090:248): avc: denied { accept } for pid=6745 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 447.195517][ T31] audit: type=1400 audit(447.110:249): avc: denied { write } for pid=6745 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 447.219904][ T6746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=6746 comm=syz.1.970 [ 447.881962][ T6759] SELinux: Context system_u:object_r:ksm_device_t:s0 is not valid (left unmapped). [ 447.886668][ T31] audit: type=1400 audit(447.800:250): avc: denied { relabelto } for pid=6757 comm="syz.1.975" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 447.892651][ T31] audit: type=1400 audit(447.810:251): avc: denied { associate } for pid=6757 comm="syz.1.975" name="nullb0" dev="devtmpfs" ino=653 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ksm_device_t:s0" [ 447.904202][ T31] audit: type=1400 audit(447.820:252): avc: denied { ioctl } for pid=6757 comm="syz.1.975" path="/dev/nullb0" dev="devtmpfs" ino=653 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 456.846576][ T6800] FAULT_INJECTION: forcing a failure. [ 456.846576][ T6800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.846994][ T6800] CPU: 1 UID: 0 PID: 6800 Comm: syz.1.992 Not tainted syzkaller #0 PREEMPT [ 456.847088][ T6800] Hardware name: ARM-Versatile Express [ 456.847116][ T6800] Call trace: [ 456.847167][ T6800] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 456.847343][ T6800] r7:eaad1e20 r6:00000000 r5:60000013 r4:8226064c [ 456.847371][ T6800] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 456.847683][ T6800] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 456.847790][ T6800] r5:84d96c00 r4:8294f190 [ 456.848078][ T6800] [<8021fb9c>] (dump_stack) from [<80972804>] (should_fail_ex+0x1c4/0x228) [ 456.848155][ T6800] [<80972640>] (should_fail_ex) from [<8097287c>] (should_fail+0x14/0x18) [ 456.848348][ T6800] r8:04048010 r7:eaad1e20 r6:200000c0 r5:00000000 r4:eaad1f20 [ 456.848370][ T6800] [<80972868>] (should_fail) from [<8097289c>] (should_fail_usercopy+0x1c/0x20) [ 456.848460][ T6800] [<80972880>] (should_fail_usercopy) from [<81546720>] (copy_msghdr_from_user+0x50/0x130) [ 456.849138][ T6800] [<815466d0>] (copy_msghdr_from_user) from [<81546878>] (___sys_sendmsg+0x78/0xd0) [ 456.849984][ T6800] r8:04048010 r7:00000000 r6:8379f680 r5:eaad1f20 r4:eaad1e64 [ 456.850007][ T6800] [<81546800>] (___sys_sendmsg) from [<81546d34>] (__sys_sendmsg+0x8c/0xe0) [ 456.850119][ T6800] r10:00000128 r9:84d96c00 r8:86020000 r7:04048010 r6:200000c0 r5:86020001 [ 456.850185][ T6800] r4:00000003 [ 456.850207][ T6800] [<81546ca8>] (__sys_sendmsg) from [<81546d9c>] (sys_sendmsg+0x14/0x18) [ 456.850274][ T6800] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 456.850300][ T6800] [<81546d88>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 456.850352][ T6800] Exception stack(0xeaad1fa8 to 0xeaad1ff0) [ 456.850403][ T6800] 1fa0: 00000000 00000000 00000003 200000c0 04048010 00000000 [ 456.850560][ T6800] 1fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f880bc [ 456.850850][ T6800] 1fe0: 76f87ec0 76f87eb0 0001946c 00132280 [ 459.539944][ T31] audit: type=1400 audit(459.410:253): avc: denied { write } for pid=6805 comm="syz.0.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 462.234545][ T31] audit: type=1400 audit(462.150:254): avc: denied { shutdown } for pid=6822 comm="syz.1.1001" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 462.768262][ T6825] cgroup: fork rejected by pids controller in /syz0 [ 466.399875][ T2911] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 466.636060][ T2911] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 466.636365][ T2911] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 466.636566][ T2911] usb 2-1: Product: syz [ 466.636715][ T2911] usb 2-1: Manufacturer: syz [ 466.636860][ T2911] usb 2-1: SerialNumber: syz [ 470.199806][ T31] audit: type=1400 audit(470.110:255): avc: denied { create } for pid=6889 comm="syz.0.1011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 476.235064][ T43] usb 2-1: USB disconnect, device number 7 [ 485.241843][ T31] audit: type=1400 audit(485.150:256): avc: denied { bind } for pid=7134 comm="syz.1.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 486.680473][ T31] audit: type=1400 audit(486.600:257): avc: denied { getopt } for pid=7125 comm="syz.0.1022" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 490.109720][ T31] audit: type=1400 audit(490.020:258): avc: denied { bind } for pid=7164 comm="syz.1.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 493.741207][ T7181] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1795 sclass=netlink_audit_socket pid=7181 comm=syz.1.1042 [ 497.599541][ T31] audit: type=1400 audit(497.510:259): avc: denied { bind } for pid=7189 comm="syz.1.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 503.641646][ T31] audit: type=1400 audit(503.560:260): avc: denied { setattr } for pid=7230 comm="syz.1.1052" name="[io_uring]" dev="anon_inodefs" ino=13744 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 524.132354][ T7267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=7267 comm=syz.1.1066 [ 527.899742][ T31] audit: type=1400 audit(527.810:261): avc: denied { create } for pid=7274 comm="syz.0.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 534.550961][ T31] audit: type=1400 audit(534.470:262): avc: denied { map } for pid=7310 comm="syz.1.1082" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 543.764168][ T7338] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7338 comm=syz.1.1089 [ 543.930589][ T7338] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=7338 comm=syz.1.1089 [ 547.871256][ T7375] dlm: non-version read from control device 8224 [ 549.603100][ T7377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7377 comm=syz.1.1096 [ 555.089610][ T31] audit: type=1400 audit(555.000:263): avc: denied { setopt } for pid=7393 comm="syz.0.1103" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 558.428937][ T7391] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7391 comm=syz.1.1102 [ 561.189107][ T31] audit: type=1400 audit(561.100:264): avc: denied { read } for pid=7406 comm="syz.1.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 563.589065][ T11] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 563.794960][ T11] usb 2-1: config index 0 descriptor too short (expected 45, got 36) [ 563.795475][ T11] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 12336, setting to 64 [ 563.795809][ T11] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 563.796079][ T11] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 563.796233][ T11] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 563.803192][ T11] usb 2-1: config 0 descriptor?? [ 563.832741][ T11] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 578.186451][ T43] usb 2-1: USB disconnect, device number 8 [ 578.379548][ T31] audit: type=1400 audit(578.280:265): avc: denied { setopt } for pid=7448 comm="syz.1.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 578.379803][ T31] audit: type=1400 audit(578.280:266): avc: denied { listen } for pid=7448 comm="syz.1.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 578.380105][ T31] audit: type=1400 audit(578.280:267): avc: denied { write } for pid=7448 comm="syz.1.1117" path="socket:[14003]" dev="sockfs" ino=14003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 584.097858][ T31] audit: type=1400 audit(583.980:268): avc: denied { connect } for pid=7478 comm="syz.1.1123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 606.187703][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.247515][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.286959][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.363048][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.697891][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 606.711697][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 606.715779][ T12] bond0 (unregistering): Released all slaves [ 606.833589][ T12] hsr_slave_0: left promiscuous mode [ 606.836601][ T12] hsr_slave_1: left promiscuous mode [ 606.845778][ T12] veth1_macvtap: left promiscuous mode [ 606.846272][ T12] veth0_macvtap: left promiscuous mode [ 606.846520][ T12] veth1_vlan: left promiscuous mode [ 606.846787][ T12] veth0_vlan: left promiscuous mode [ 608.917659][ T7589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 608.930999][ T7589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 610.228368][ T7589] hsr_slave_0: entered promiscuous mode [ 610.241019][ T7589] hsr_slave_1: entered promiscuous mode [ 611.265715][ T7589] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 611.298435][ T7589] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 611.306541][ T7589] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 611.343696][ T7589] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 612.422956][ T7589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 612.569486][ T7756] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7756 comm=syz.0.1154 [ 616.285598][ T7589] veth0_vlan: entered promiscuous mode [ 616.317904][ T7589] veth1_vlan: entered promiscuous mode [ 616.477539][ T7589] veth0_macvtap: entered promiscuous mode [ 616.493342][ T7589] veth1_macvtap: entered promiscuous mode [ 616.651445][ T3815] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 616.652305][ T3815] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 616.652961][ T3815] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 616.656754][ T3815] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 617.416323][ T8033] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1158'. [ 617.804094][ T8035] netlink: 'syz.1.1159': attribute type 10 has an invalid length. [ 619.409581][ T31] audit: type=1400 audit(619.320:269): avc: denied { nlmsg_read } for pid=8052 comm="syz.1.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 624.148987][ C1] hrtimer: interrupt took 7080208 ns [ 626.403370][ T8076] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1174'. [ 635.776853][ T31] audit: type=1400 audit(635.690:270): avc: denied { name_bind } for pid=8107 comm="syz.1.1186" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 635.781287][ T31] audit: type=1400 audit(635.690:271): avc: denied { node_bind } for pid=8107 comm="syz.1.1186" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 636.111331][ T31] audit: type=1400 audit(636.030:272): avc: denied { read } for pid=8109 comm="syz.1.1187" path="socket:[15584]" dev="sockfs" ino=15584 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 639.980512][ T8116] input: syz0 as /devices/virtual/input/input3 [ 669.148713][ T31] audit: type=1400 audit(669.060:273): avc: denied { write } for pid=8135 comm="syz.1.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 677.689744][ T31] audit: type=1400 audit(677.600:274): avc: denied { bind } for pid=8150 comm="syz.1.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 677.850033][ T31] audit: type=1400 audit(677.760:275): avc: denied { getopt } for pid=8150 comm="syz.1.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 683.200311][ T31] audit: type=1400 audit(683.100:276): avc: denied { map } for pid=8164 comm="syz.1.1209" path="socket:[16546]" dev="sockfs" ino=16546 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 683.200792][ T31] audit: type=1400 audit(683.100:277): avc: denied { read accept } for pid=8164 comm="syz.1.1209" path="socket:[16546]" dev="sockfs" ino=16546 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 688.200292][ T31] audit: type=1400 audit(688.120:278): avc: denied { getopt } for pid=8195 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 691.197012][ T31] audit: type=1326 audit(691.110:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8199 comm="syz.1.1213" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x0 [ 696.742975][ T31] audit: type=1400 audit(696.660:280): avc: denied { read } for pid=8206 comm="syz.1.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 715.229393][ T31] audit: type=1400 audit(715.140:281): avc: denied { read } for pid=8222 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 719.711667][ T31] audit: type=1400 audit(719.620:282): avc: denied { getopt } for pid=8236 comm="syz.1.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 736.510861][ T31] audit: type=1400 audit(736.410:283): avc: denied { name_bind } for pid=8262 comm="syz.1.1237" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 738.263699][ T31] audit: type=1400 audit(738.180:284): avc: denied { create } for pid=8279 comm="syz.1.1244" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 738.291815][ T31] audit: type=1400 audit(738.190:285): avc: denied { write } for pid=8279 comm="syz.1.1244" name="file0" dev="tmpfs" ino=378 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 738.292241][ T31] audit: type=1400 audit(738.190:286): avc: denied { open } for pid=8279 comm="syz.1.1244" path="/70/file0" dev="tmpfs" ino=378 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 738.352589][ T31] audit: type=1400 audit(738.270:287): avc: denied { unlink } for pid=7589 comm="syz-executor" name="file0" dev="tmpfs" ino=378 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 738.747687][ T31] audit: type=1400 audit(738.660:288): avc: denied { read write } for pid=3124 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.259530][ T31] audit: type=1400 audit(739.010:289): avc: denied { open } for pid=3124 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.261683][ T31] audit: type=1400 audit(739.180:290): avc: denied { ioctl } for pid=3124 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 768.981215][ T31] audit: type=1400 audit(768.900:291): avc: denied { create } for pid=8311 comm="syz.0.1255" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 768.981581][ T31] audit: type=1400 audit(768.900:292): avc: denied { map } for pid=8311 comm="syz.0.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 768.981666][ T31] audit: type=1400 audit(768.900:293): avc: denied { read write } for pid=8311 comm="syz.0.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 772.347330][ T8327] mmap: syz.0.1257 (8327) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 824.690141][ T8387] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 824.770387][ T8387] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 827.704791][ T8387] hsr_slave_0: entered promiscuous mode [ 827.706622][ T8387] hsr_slave_1: entered promiscuous mode [ 827.724691][ T8387] debugfs: 'hsr0' already exists in 'hsr' [ 827.732087][ T8387] Cannot create hsr debugfs directory [ 829.503785][ T8387] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 829.551977][ T8387] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 829.580379][ T8387] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 829.622951][ T8387] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 831.500167][ T8387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 831.721759][ T3815] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 831.811633][ T3815] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 831.881951][ T3815] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 831.975450][ T3815] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 832.847503][ T3815] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 832.861831][ T3815] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 832.871244][ T3815] bond0 (unregistering): Released all slaves [ 833.109699][ T3815] hsr_slave_0: left promiscuous mode [ 833.153339][ T3815] hsr_slave_1: left promiscuous mode [ 833.201871][ T3815] veth1_macvtap: left promiscuous mode [ 833.203322][ T3815] veth0_macvtap: left promiscuous mode [ 833.204943][ T3815] veth1_vlan: left promiscuous mode [ 833.206303][ T3815] veth0_vlan: left promiscuous mode [ 836.332198][ T8387] veth0_vlan: entered promiscuous mode [ 836.347004][ T8387] veth1_vlan: entered promiscuous mode [ 836.407712][ T8387] veth0_macvtap: entered promiscuous mode [ 836.418104][ T8387] veth1_macvtap: entered promiscuous mode [ 836.493466][ T8716] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.495371][ T8716] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.499273][ T8716] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.500446][ T8716] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.687486][ T31] audit: type=1400 audit(841.600:294): avc: denied { bind } for pid=8777 comm="syz.2.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 851.194951][ T31] audit: type=1400 audit(851.110:295): avc: denied { mount } for pid=8826 comm="syz.1.1291" name="/" dev="ramfs" ino=16083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 868.552643][ T8858] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1295'. [ 868.701043][ T31] audit: type=1400 audit(868.620:296): avc: denied { associate } for pid=8861 comm="syz.1.1297" name="blkio.bfq.io_merged_recursive" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 870.401796][ T31] audit: type=1400 audit(870.320:297): avc: denied { mount } for pid=8871 comm="syz.1.1301" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 881.386241][ T31] audit: type=1400 audit(881.300:298): avc: denied { bind } for pid=8892 comm="syz.1.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 885.501781][ T8895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 885.514980][ T8895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 886.888354][ T8895] hsr_slave_0: entered promiscuous mode [ 886.894380][ T8895] hsr_slave_1: entered promiscuous mode [ 886.910604][ T8895] debugfs: 'hsr0' already exists in 'hsr' [ 886.910959][ T8895] Cannot create hsr debugfs directory [ 887.463977][ T8895] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 887.476672][ T8895] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 887.497964][ T8895] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 887.517771][ T8895] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 888.655551][ T8895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 893.305687][ T8895] veth0_vlan: entered promiscuous mode [ 893.332572][ T8895] veth1_vlan: entered promiscuous mode [ 893.413864][ T8895] veth0_macvtap: entered promiscuous mode [ 893.427812][ T8895] veth1_macvtap: entered promiscuous mode [ 893.537108][ T3815] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 893.537899][ T3815] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 893.538010][ T3815] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 893.538113][ T3815] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 894.123649][ T9247] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 894.129560][ T9247] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 895.150789][ T9247] i2c i2c-1: sendbytes: error -110 [ 902.580611][ T9264] netlink: 248 bytes leftover after parsing attributes in process `syz.3.1316'. [ 914.619211][ T9268] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 914.621256][ T9268] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 914.939909][ T3815] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.044266][ T3815] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.132856][ T3815] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.193828][ T3815] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.495128][ T3815] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 915.511612][ T3815] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 915.516987][ T3815] bond0 (unregistering): Released all slaves [ 915.590894][ T3815] hsr_slave_0: left promiscuous mode [ 915.602324][ T3815] hsr_slave_1: left promiscuous mode [ 915.614652][ T3815] veth1_macvtap: left promiscuous mode [ 915.614887][ T3815] veth0_macvtap: left promiscuous mode [ 915.620739][ T3815] veth1_vlan: left promiscuous mode [ 915.621083][ T3815] veth0_vlan: left promiscuous mode [ 915.644074][ T9268] i2c i2c-1: sendbytes: error -110 [ 935.014719][ T9336] netlink: 44 bytes leftover after parsing attributes in process `syz.1.1322'. [ 936.630169][ T31] audit: type=1400 audit(936.550:299): avc: denied { read } for pid=9367 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 937.767058][ T9393] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 937.771270][ T9393] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 939.311074][ T9444] 8<--- cut here --- [ 939.311240][ T9444] Unable to handle kernel paging request at virtual address fee04f27 when write [ 939.311350][ T9444] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 939.312283][ T9444] Internal error: Oops: a06 [#1] SMP ARM [ 939.314964][ T9444] Modules linked in: [ 939.316017][ T9444] CPU: 1 UID: 0 PID: 9444 Comm: syz.3.1357 Not tainted syzkaller #0 PREEMPT [ 939.316700][ T9444] Hardware name: ARM-Versatile Express [ 939.317203][ T9444] PC is at parport_attach+0x174/0x1d0 [ 939.317919][ T9444] LR is at parport_attach+0x164/0x1d0 [ 939.318194][ T9444] pc : [<813abeb8>] lr : [<813abea8>] psr: 60000013 [ 939.318651][ T9444] sp : dfac1d30 ip : dfac1d30 fp : dfac1d54 [ 939.319093][ T9444] r10: 82b16f40 r9 : 00000003 r8 : 840e36c0 [ 939.319433][ T9444] r7 : dfac1d90 r6 : 840e36c0 r5 : 00000000 r4 : 00000000 [ 939.319738][ T9444] r3 : fee04f27 r2 : 81e15544 r1 : 00000001 r0 : 813abb28 [ 939.320146][ T9444] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 939.320486][ T9444] Control: 30c5387d Table: 8562bf00 DAC: 00000000 [ 939.320795][ T9444] Register r0 information: non-slab/vmalloc memory [ 939.321556][ T9444] Register r1 information: non-paged memory [ 939.322790][ T9444] Register r2 information: non-slab/vmalloc memory [ 939.324137][ T9444] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 939.324766][ T9444] Register r4 information: NULL pointer [ 939.325829][ T9444] Register r5 information: NULL pointer [ 939.326083][ T9444] Register r6 information: slab kmalloc-192 start 840e36c0 pointer offset 0 size 192 [ 939.327020][ T9444] Register r7 information: 2-page vmalloc region starting at 0xdfac0000 allocated at kernel_clone+0xac/0x3ec [ 939.327482][ T9444] Register r8 information: slab kmalloc-192 start 840e36c0 pointer offset 0 size 192 [ 939.327951][ T9444] Register r9 information: non-paged memory [ 939.328229][ T9444] Register r10 information: non-slab/vmalloc memory [ 939.328840][ T9444] Register r11 information: 2-page vmalloc region starting at 0xdfac0000 allocated at kernel_clone+0xac/0x3ec [ 939.329400][ T9444] Register r12 information: 2-page vmalloc region starting at 0xdfac0000 allocated at kernel_clone+0xac/0x3ec [ 939.329946][ T9444] Process syz.3.1357 (pid: 9444, stack limit = 0xdfac0000) [ 939.330279][ T9444] Stack: (0xdfac1d30 to 0xdfac2000) [ 939.330513][ T9444] 1d20: 823fe884 840e36c0 829cf9ac 829cf9ac [ 939.330823][ T9444] 1d40: 81e15a04 840e3704 dfac1d8c dfac1d58 813a7f50 813abd50 200000c0 00000000 [ 939.331117][ T9444] 1d60: dfac1d7c 200000c0 840e36c0 b5403587 200000c0 83a83c00 40946400 00000003 [ 939.331424][ T9444] 1d80: dfac1e4c dfac1d90 813a3a9c 813a7e54 656d6f63 705f6964 6f707261 00007472 [ 939.331709][ T9444] 1da0: 00000000 00004f27 450e7abe 0000000a 00000006 00000005 00000005 20000000 [ 939.332056][ T9444] 1dc0: 01000007 54c6cff3 000000fd 00000002 00008401 00000006 5da31c5d 00000006 [ 939.332378][ T9444] 1de0: 00000100 00000021 00000891 00008000 40000001 00000005 0000caa0 fffffffb [ 939.332686][ T9444] 1e00: 20001e5b fffffffd 00000e66 00000080 00000008 0000027e 00000000 fffffff8 [ 939.332983][ T9444] 1e20: 00000000 0f6b85f0 00000000 85b86480 840e36c0 200000c0 200000c0 83a83c00 [ 939.333293][ T9444] 1e40: dfac1f14 dfac1e50 813a4a68 813a39a8 00000000 00000000 00000000 0f6b85f0 [ 939.333613][ T9444] 1e60: 00000000 00000000 8247154c 0000005f 84030858 840e36f0 840dce1c 83a83c00 [ 939.333944][ T9444] 1e80: dfac1ee4 dfac1e90 80797aa4 8078de08 00000064 00000001 00000000 dfac1eac [ 939.334544][ T9444] 1ea0: 850810d0 834d8bb0 00006400 0000000b dfac1ea0 00000000 00000000 0f6b85f0 [ 939.334868][ T9444] 1ec0: 85b86480 40946400 200000c0 200000c0 85b86480 00000003 dfac1ef4 dfac1ee8 [ 939.335188][ T9444] 1ee0: 80797bc4 0f6b85f0 dfac1f14 40946400 00000000 85b86481 200000c0 85b86480 [ 939.335503][ T9444] 1f00: 00000003 83a83c00 dfac1fa4 dfac1f18 8056cdc8 813a4498 ecac8b10 83a83c00 [ 939.335817][ T9444] 1f20: dfac1f3c dfac1f30 81a3a078 81a39f48 dfac1f54 dfac1f40 8025e490 8028ef6c [ 939.336195][ T9444] 1f40: dfac1fb0 40000000 dfac1f84 dfac1f58 802229ec 8025e44c 00000000 8281cddc [ 939.336509][ T9444] 1f60: dfac1fb0 0014c7e0 ecac8b10 80222940 00000000 0f6b85f0 dfac1fac 00000000 [ 939.336823][ T9444] 1f80: 00000000 002f6308 00000036 8020029c 83a83c00 00000036 00000000 dfac1fa8 [ 939.337146][ T9444] 1fa0: 80200060 8056cca4 00000000 00000000 00000003 40946400 200000c0 00000000 [ 939.337461][ T9444] 1fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f720bc [ 939.337775][ T9444] 1fe0: 76f71ec0 76f71eb0 0001946c 00132280 60000010 00000003 00000000 00000000 [ 939.338113][ T9444] Call trace: [ 939.338341][ T9444] [<813abd44>] (parport_attach) from [<813a7f50>] (comedi_device_attach+0x108/0x250) [ 939.338797][ T9444] r6:840e3704 r5:81e15a04 r4:829cf9ac [ 939.339264][ T9444] [<813a7e48>] (comedi_device_attach) from [<813a3a9c>] (do_devconfig_ioctl+0x100/0x220) [ 939.339981][ T9444] r10:00000003 r9:40946400 r8:83a83c00 r7:200000c0 r6:b5403587 r5:840e36c0 [ 939.340658][ T9444] r4:200000c0 [ 939.340832][ T9444] [<813a399c>] (do_devconfig_ioctl) from [<813a4a68>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 939.341504][ T9444] r8:83a83c00 r7:200000c0 r6:200000c0 r5:840e36c0 r4:85b86480 [ 939.341867][ T9444] [<813a448c>] (comedi_unlocked_ioctl) from [<8056cdc8>] (sys_ioctl+0x130/0xba0) [ 939.342284][ T9444] r10:83a83c00 r9:00000003 r8:85b86480 r7:200000c0 r6:85b86481 r5:00000000 [ 939.342629][ T9444] r4:40946400 [ 939.342809][ T9444] [<8056cc98>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 939.343191][ T9444] Exception stack(0xdfac1fa8 to 0xdfac1ff0) [ 939.343471][ T9444] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 939.343828][ T9444] 1fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f720bc [ 939.344234][ T9444] 1fe0: 76f71ec0 76f71eb0 0001946c 00132280 [ 939.344491][ T9444] r10:00000036 r9:83a83c00 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 939.344797][ T9444] r4:00000000 [ 939.345253][ T9444] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 939.345908][ T9444] ---[ end trace 0000000000000000 ]--- [ 939.346693][ T9444] Kernel panic - not syncing: Fatal exception [ 939.349350][ T9444] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:21:10 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=7ed829d4 R03=7ed829cc R04=00000000 R05=7ed829cc R06=00000000 R07=00000109 R08=00000000 R09=0000002b R10=00000001 R11=0000006f R12=00000000 R13=7ed829c8 R14=00000001 R15=0015fca4 PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000000 R03=60000193 R04=00000000 R05=83a83c00 R06=8281f790 R07=00000000 R08=00000000 R09=83a83c00 R10=00000000 R11=dfac1af4 R12=dfac1af8 R13=dfac1a70 R14=802e2480 R15=802e09d8 PSR=60000193 -ZC- A S svc32 s00=00090000 s01=00000000 d00=0000000000090000 s02=00000300 s03=ffea0000 d01=ffea000000000300 s04=a6b03fea s05=ff3cd70c d02=ff3cd70ca6b03fea s06=163c8f70 s07=cd318a52 d03=cd318a52163c8f70 s08=8555b800 s09=e65aaa65 d04=e65aaa658555b800 s10=0eceaa5a s11=80d3e5e4 d05=80d3e5e40eceaa5a s12=00000005 s13=00000000 d06=0000000000000005 s14=00000000 s15=f40a0000 d07=f40a000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=af02897e s33=45b6aaad d16=45b6aaadaf02897e s34=d7ceebe9 s35=b1f3a256 d17=b1f3a256d7ceebe9 s36=5bfd5510 s37=4dbed014 d18=4dbed0145bfd5510 s38=59029e71 s39=204540fe d19=204540fe59029e71 s40=35263e82 s41=3820714f d20=3820714f35263e82 s42=01191384 s43=2d405505 d21=2d40550501191384 s44=517663af s45=8c7d5997 d22=8c7d5997517663af s46=043daf6a s47=72901c87 d23=72901c87043daf6a s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00440000 s53=002c0000 d26=002c000000440000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ff9e0000 d29=ff9e000003e60000 s60=000cffff s61=00090000 d30=00090000000cffff s62=00000000 s63=00000300 d31=0000030000000000 FPSCR: 00000000