last executing test programs: 3m26.629903312s ago: executing program 0 (id=2843): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@delnexthop={0x18, 0x69, 0x503, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11000000}}, 0x18}}, 0x0) 3m26.559211775s ago: executing program 0 (id=2844): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x444d6d20800230f3) ioctl$TUNSETLINK(r0, 0x400454cd, 0x320) 3m26.380193661s ago: executing program 0 (id=2845): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x3, 0x1, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x8, 0x5, 0x101, 0x1000, 0x9, 0x0, 0x8, 0x1, 0xfffffffa, 0x0, 0x6, 0x9, 0x81, 0x7, 0x8, 0x100000, 0x762, 0x3, 0x1, 0xe, 0x4, 0x80, 0x6, 0x1c00, 0x8, 0x40, 0xbed4, 0x8, 0x8000100, 0x3, 0x8, 0x11000, 0x8, 0x5, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0xa, 0x7, 0xf, 0x102, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x81, 0x2, 0xd6f, 0x4007, 0x9c, 0x5, 0x2af, 0xf7, 0x5, 0x1, 0x6, 0x9, 0x4, 0x7, 0x4009, 0x800000, 0x204, 0x1, 0x8, 0x8000, 0x0, 0x3, 0x0, 0x10001, 0x4e7b3717, 0x4, 0x6, 0x6, 0x9, 0x80000000, 0xfdffffff, 0x2, 0xfffffffe, 0x84, 0x100, 0x5, 0x5b, 0x81, 0x33b, 0x8, 0x20006, 0x5, 0x2, 0x6, 0x2, 0xd9a, 0xd, 0x2a2, 0xfffffffd, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x4, 0x3, 0x401, 0x66cd, 0x7, 0x8, 0x1, 0xfffffffe, 0xc5c, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) 3m26.299810355s ago: executing program 0 (id=2846): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xfffffff9) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, 0x0, 0x100000}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001180)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) 3m26.202810109s ago: executing program 0 (id=2847): pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYRES32=r5, @ANYBLOB="20005080050002"], 0x3c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 3m23.590525182s ago: executing program 0 (id=2855): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f000010d000)={{0x0, 0x51, 0x4, 0x81, 0x8, 0x2, 0x5, 0x9, 0x5, 0x7c7, 0x3, 0x4, 0x4, 0x9, 0x6}}) shutdown(r0, 0x0) setresuid(0x0, 0xee00, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000240)) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/26, 0x11}}, {{0x0, 0x1d, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/47}, {&(0x7f0000000100)=""/224}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/113}, {&(0x7f0000001280)=""/60}]}}, {{&(0x7f0000001380)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x0, &(0x7f0000001840)=[{&(0x7f0000001400)=""/149}, {&(0x7f0000001b00)=""/118}, {&(0x7f0000001540)=""/188}, {&(0x7f0000001600)=""/57}, {&(0x7f0000001640)=""/135}, {&(0x7f00000014c0)=""/101}, {&(0x7f0000001780)=""/171}], 0x0, &(0x7f00000018c0)=""/176}}], 0x15cbc1ab4c0933f, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x4, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1}}, 0x40) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) r4 = eventfd(0xfffffff9) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000240)=r4) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000040)={0x1, r4}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0, 0xdddd1000}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/246, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/70, 0x100000}) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x3000, 0x68, &(0x7f0000001700)=""/104}]}) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f00000002c0)={0x1, r4}) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000000)=0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000f}, 0x94) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) 2m37.990279859s ago: executing program 32 (id=2855): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f000010d000)={{0x0, 0x51, 0x4, 0x81, 0x8, 0x2, 0x5, 0x9, 0x5, 0x7c7, 0x3, 0x4, 0x4, 0x9, 0x6}}) shutdown(r0, 0x0) setresuid(0x0, 0xee00, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000240)) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/26, 0x11}}, {{0x0, 0x1d, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/47}, {&(0x7f0000000100)=""/224}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/113}, {&(0x7f0000001280)=""/60}]}}, {{&(0x7f0000001380)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x0, &(0x7f0000001840)=[{&(0x7f0000001400)=""/149}, {&(0x7f0000001b00)=""/118}, {&(0x7f0000001540)=""/188}, {&(0x7f0000001600)=""/57}, {&(0x7f0000001640)=""/135}, {&(0x7f00000014c0)=""/101}, {&(0x7f0000001780)=""/171}], 0x0, &(0x7f00000018c0)=""/176}}], 0x15cbc1ab4c0933f, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x4, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1}}, 0x40) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) r4 = eventfd(0xfffffff9) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000240)=r4) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000040)={0x1, r4}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0, 0xdddd1000}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/246, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/70, 0x100000}) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x3000, 0x68, &(0x7f0000001700)=""/104}]}) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f00000002c0)={0x1, r4}) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000000)=0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000f}, 0x94) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) 11.453666276s ago: executing program 2 (id=3004): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$key(0xf, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec85000000750000000400000007000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x69703000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x200048e1}, 0x20040040) readv(0xffffffffffffffff, &(0x7f00000001c0), 0x0) 8.131033898s ago: executing program 1 (id=3005): r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000bc0)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 7.956654445s ago: executing program 1 (id=3006): r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x0) 7.788236741s ago: executing program 1 (id=3007): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x10, 0x4}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f0000000180)}, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r1, &(0x7f0000000e40)="b3019c28", 0x4, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 7.446723935s ago: executing program 1 (id=3008): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000540)=ANY=[@ANYBLOB="12010000772904202404019957c2010203010902240001000010000904430002317d5500090502020002020000090582020002"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000c0506"], 0x0, 0x0, 0x0, 0x0}) 7.337439329s ago: executing program 1 (id=3009): r0 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[], 0xe4}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)={0x0, 0x3, 0xe0d, 0x1}) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380), 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040122, &(0x7f0000003700)={0x77359400}) 6.715836384s ago: executing program 1 (id=3010): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000003680)=@filter={'filter\x00', 0x42, 0x4, 0x458, 0xffffffff, 0x210, 0x318, 0x318, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x5, 0x0, {[{{@ip={@multicast2, @private, 0x0, 0x0, 'wg1\x00', 'nr0\x00'}, 0x74000002, 0xe8, 0x210, 0x1ba, {0x46010000, 0x2c000000000000}, [@common=@unspec=@limit={{0x48}, {0x0, 0xdf6, 0x0, 0x0, 0x0, 0x9}}, @common=@addrtype={{0x30}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:removable_device_t:s0\x00'}}}, {{@uncond, 0x287, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@cpu={{0x28}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xb0, 0xf0, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @common=@inet=@TCPOPTSTRIP={0x40}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000005c0)={0x28, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0xb}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x9}}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000010}, 0x20040020) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}}, 0x80) close_range(r5, 0xffffffffffffffff, 0x0) syz_usb_connect$uac1(0x2, 0xb7, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xa5, 0x3, 0x1, 0x0, 0x70, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x8}, [@feature_unit={0xd, 0x24, 0x6, 0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, @input_terminal={0xc, 0x24, 0x2, 0x6, 0x101, 0x6, 0x8, 0x1000, 0x4}, @input_terminal={0xc, 0x24, 0x2, 0x8, 0x0, 0x3, 0x1}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x0, 0x0, 0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x40, 0x0, 0x0, {0x7, 0x25, 0x1, 0x2, 0x0, 0x81}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x11, 0x24, 0x2, 0x2, 0x3, 0x7, 0x3, "ee8745bb938534d7"}, @as_header={0x7, 0x24, 0x1, 0x28, 0xc, 0x3}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x9, 0x0, 0x0, {0x7, 0x25, 0x1, 0x80, 0x2, 0x81}}}}}}}]}}, 0x0) syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x200) 545.146249ms ago: executing program 2 (id=3011): syz_usb_connect(0x5, 0x24, &(0x7f00000002c0)={{0x12, 0x1, 0x201, 0x54, 0x1d, 0xb8, 0x40, 0x2c7c, 0x191, 0x6e27, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x4, 0x0, 0xa0, 0x4, [{{0x9, 0x4, 0xd2, 0x4, 0x0, 0xff, 0xff, 0xff, 0xc5}}]}}]}}, &(0x7f0000000cc0)={0x0, 0x0, 0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="050f5e0006"]}) syz_clone3(&(0x7f00000001c0)={0x42323080, &(0x7f00000000c0), 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 321.048357ms ago: executing program 2 (id=3012): r0 = fsopen(&(0x7f00000001c0)='sysfs\x00', 0x0) unshare(0x2040400) pipe(0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000001c0)='.\x00', 0x4000423) r3 = open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x0) getdents(r3, &(0x7f0000001fc0)=""/184, 0xb8) 189.894143ms ago: executing program 2 (id=3013): syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "8000", 0x30, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "f20700", 0x0, 0x2f, 0x0, @private2, @remote}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) 88.058237ms ago: executing program 2 (id=3014): r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[], 0x48}}, 0x0) 0s ago: executing program 2 (id=3015): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"/4153], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) kernel console output (not intermixed with test programs): tclass=netlink_iscsi_socket permissive=1 [ 1063.327983][T10720] fuse: Bad value for 'user_id' [ 1063.329637][T10720] fuse: Bad value for 'user_id' [ 1063.344562][T10720] SELinux: Context system_u:object_r:audit_spool_t:s0 is not valid (left unmapped). [ 1063.348489][ T31] audit: type=1400 audit(1063.270:330): avc: denied { relabelto } for pid=10719 comm="syz.0.1576" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audit_spool_t:s0" [ 1063.349417][ T31] audit: type=1400 audit(1063.270:331): avc: denied { associate } for pid=10719 comm="syz.0.1576" name="fuse" dev="devtmpfs" ino=89 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:audit_spool_t:s0" [ 1066.461559][T10736] fuse: Invalid rootmode [ 1072.321044][T10760] fuse: Invalid rootmode [ 1075.691283][T10777] fuse: Bad value for 'rootmode' [ 1078.959437][T10795] FAULT_INJECTION: forcing a failure. [ 1078.959437][T10795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1078.960097][T10795] CPU: 1 UID: 0 PID: 10795 Comm: syz.0.1597 Not tainted syzkaller #0 PREEMPT [ 1078.960177][T10795] Hardware name: ARM-Versatile Express [ 1078.960203][T10795] Call trace: [ 1078.960271][T10795] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1078.960372][T10795] r7:e4691e20 r6:00000000 r5:60000013 r4:82260aec [ 1078.960394][T10795] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1078.960444][T10795] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1078.960492][T10795] r5:84140000 r4:8294f190 [ 1078.960506][T10795] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1078.960560][T10795] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1078.960621][T10795] r8:20000000 r7:e4691e20 r6:20000200 r5:00000000 r4:e4691f20 [ 1078.960638][T10795] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1078.960798][T10795] [<80972e00>] (should_fail_usercopy) from [<81546d54>] (copy_msghdr_from_user+0x50/0x130) [ 1078.960881][T10795] [<81546d04>] (copy_msghdr_from_user) from [<81546eac>] (___sys_sendmsg+0x78/0xd0) [ 1078.960933][T10795] r8:20000000 r7:00000000 r6:850d9180 r5:e4691f20 r4:e4691e64 [ 1078.960950][T10795] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 1078.961008][T10795] r10:00000128 r9:84140000 r8:84941240 r7:20000000 r6:20000200 r5:84941241 [ 1078.961026][T10795] r4:00000003 [ 1078.961059][T10795] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 1078.961115][T10795] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1078.961133][T10795] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1078.961174][T10795] Exception stack(0xe4691fa8 to 0xe4691ff0) [ 1078.961274][T10795] 1fa0: 00000000 00000000 00000003 20000200 20000000 00000000 [ 1078.961312][T10795] 1fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f900bc [ 1078.961393][T10795] 1fe0: 76f8fec0 76f8feb0 0001946c 00132280 [ 1079.050821][T10797] fuse: Bad value for 'rootmode' [ 1079.160643][ T31] audit: type=1400 audit(1079.080:332): avc: denied { map } for pid=10798 comm="syz.0.1599" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1079.161102][ T31] audit: type=1400 audit(1079.080:333): avc: denied { read write } for pid=10798 comm="syz.0.1599" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1086.386691][T10845] FAULT_INJECTION: forcing a failure. [ 1086.386691][T10845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1086.387898][T10845] CPU: 0 UID: 0 PID: 10845 Comm: syz.0.1611 Not tainted syzkaller #0 PREEMPT [ 1086.387958][T10845] Hardware name: ARM-Versatile Express [ 1086.387975][T10845] Call trace: [ 1086.387995][T10845] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1086.388276][T10845] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1086.388286][T10845] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1086.388311][T10845] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1086.388338][T10845] r5:84144800 r4:8294f190 [ 1086.388345][T10845] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1086.388373][T10845] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1086.388403][T10845] r8:76f6ef30 r7:00000000 r6:00000000 r5:e4689f68 r4:00000002 [ 1086.388411][T10845] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1086.388436][T10845] [<80972e00>] (should_fail_usercopy) from [<8058e6f4>] (simple_read_from_buffer+0x80/0x13c) [ 1086.388488][T10845] [<8058e674>] (simple_read_from_buffer) from [<80608724>] (proc_fail_nth_read+0xb8/0x108) [ 1086.388520][T10845] r10:00000001 r9:8060866c r8:00000002 r7:e4689f68 r6:0000000f r5:76f6ef30 [ 1086.388531][T10845] r4:84144800 r3:e4689e9f [ 1086.388538][T10845] [<8060866c>] (proc_fail_nth_read) from [<8055353c>] (vfs_read+0x98/0x324) [ 1086.388568][T10845] r8:76f6ef30 r7:e4689f68 r6:84144800 r5:0000000f r4:849413c0 [ 1086.388576][T10845] [<805534a4>] (vfs_read) from [<8055424c>] (ksys_read+0x74/0xe8) [ 1086.388606][T10845] r10:00000003 r9:84144800 r8:8020029c r7:00000000 r6:00000000 r5:849413c0 [ 1086.388615][T10845] r4:849413c3 [ 1086.388622][T10845] [<805541d8>] (ksys_read) from [<805542d0>] (sys_read+0x10/0x14) [ 1086.388651][T10845] r7:00000003 r6:00000006 r5:76f6ef30 r4:0000000f [ 1086.388659][T10845] [<805542c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1086.388686][T10845] Exception stack(0xe4689fa8 to 0xe4689ff0) [ 1086.388705][T10845] 9fa0: 0000000f 76f6ef30 00000006 76f6ef30 0000000f 00000000 [ 1086.388721][T10845] 9fc0: 0000000f 76f6ef30 00000006 00000003 002e0000 00000000 00006364 76f6f0bc [ 1086.388733][T10845] 9fe0: 00000158 76f6eed0 000d80b8 00130154 [ 1088.706969][ T31] audit: type=1400 audit(1088.620:334): avc: denied { write } for pid=10869 comm="syz.1.1617" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1106.044394][T10977] fuse: Bad value for 'fd' [ 1109.257593][ T31] audit: type=1400 audit(1109.180:335): avc: denied { write } for pid=10988 comm="syz.0.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1109.639115][T11000] fuse: Bad value for 'fd' [ 1115.951431][ T31] audit: type=1400 audit(1115.870:336): avc: denied { connect } for pid=11028 comm="syz.0.1661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1119.468600][T11049] FAULT_INJECTION: forcing a failure. [ 1119.468600][T11049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1119.469115][T11049] CPU: 0 UID: 0 PID: 11049 Comm: syz.0.1667 Not tainted syzkaller #0 PREEMPT [ 1119.469222][T11049] Hardware name: ARM-Versatile Express [ 1119.469246][T11049] Call trace: [ 1119.469291][T11049] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1119.469424][T11049] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1119.469445][T11049] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1119.469491][T11049] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1119.469976][T11049] r5:83cabc00 r4:8294f190 [ 1119.470031][T11049] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1119.470109][T11049] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1119.470213][T11049] r8:76f8ff30 r7:00000000 r6:00000000 r5:ea831f68 r4:00000002 [ 1119.470298][T11049] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1119.470438][T11049] [<80972e00>] (should_fail_usercopy) from [<8058e6f4>] (simple_read_from_buffer+0x80/0x13c) [ 1119.470495][T11049] [<8058e674>] (simple_read_from_buffer) from [<80608724>] (proc_fail_nth_read+0xb8/0x108) [ 1119.470572][T11049] r10:00000001 r9:8060866c r8:00000002 r7:ea831f68 r6:0000000f r5:76f8ff30 [ 1119.470609][T11049] r4:83cabc00 r3:ea831e9f [ 1119.470626][T11049] [<8060866c>] (proc_fail_nth_read) from [<8055353c>] (vfs_read+0x98/0x324) [ 1119.470682][T11049] r8:76f8ff30 r7:ea831f68 r6:83cabc00 r5:0000000f r4:ac2b13c0 [ 1119.470700][T11049] [<805534a4>] (vfs_read) from [<8055424c>] (ksys_read+0x74/0xe8) [ 1119.470757][T11049] r10:00000003 r9:83cabc00 r8:8020029c r7:00000000 r6:00000000 r5:ac2b13c0 [ 1119.470777][T11049] r4:ac2b13c3 [ 1119.470792][T11049] [<805541d8>] (ksys_read) from [<805542d0>] (sys_read+0x10/0x14) [ 1119.470908][T11049] r7:00000003 r6:00000005 r5:76f8ff30 r4:0000000f [ 1119.470924][T11049] [<805542c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1119.470969][T11049] Exception stack(0xea831fa8 to 0xea831ff0) [ 1119.471026][T11049] 1fa0: 0000000f 76f8ff30 00000005 76f8ff30 0000000f 00000000 [ 1119.471068][T11049] 1fc0: 0000000f 76f8ff30 00000005 00000003 002e0000 00000000 00006364 76f900bc [ 1119.471091][T11049] 1fe0: 00000158 76f8fed0 000d80b8 00130154 [ 1122.537607][T11092] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11092 comm=syz.0.1680 [ 1126.448073][T11113] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11113 comm=syz.1.1688 [ 1133.663832][T11153] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=262 sclass=netlink_audit_socket pid=11153 comm=syz.0.1699 [ 1133.678495][T11153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11153 comm=syz.0.1699 [ 1135.882080][T11160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11160 comm=syz.1.1701 [ 1136.032824][T11160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11160 comm=syz.1.1701 [ 1136.118015][T11164] fuse: Invalid rootmode [ 1139.780818][T11181] fuse: Invalid rootmode [ 1140.273515][T11185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11185 comm=syz.0.1706 [ 1140.507769][T11185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11185 comm=syz.0.1706 [ 1140.805448][ T31] audit: type=1400 audit(1140.720:337): avc: denied { read } for pid=11194 comm="syz.0.1710" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tun_tap_device_t:s0" [ 1140.805632][ T31] audit: type=1400 audit(1140.720:338): avc: denied { open } for pid=11194 comm="syz.0.1710" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tun_tap_device_t:s0" [ 1143.061393][T11223] fuse: Unknown parameter 'rOo²İode' [ 1143.929183][T11238] fuse: Bad value for 'fd' [ 1145.192425][T11245] FAULT_INJECTION: forcing a failure. [ 1145.192425][T11245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1145.196221][T11245] CPU: 1 UID: 0 PID: 11245 Comm: syz.0.1725 Not tainted syzkaller #0 PREEMPT [ 1145.196362][T11245] Hardware name: ARM-Versatile Express [ 1145.196392][T11245] Call trace: [ 1145.196433][T11245] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1145.196545][T11245] r7:eaa69e20 r6:00000000 r5:60000013 r4:82260aec [ 1145.196564][T11245] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1145.196612][T11245] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1145.196664][T11245] r5:84145400 r4:8294f190 [ 1145.196679][T11245] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1145.196733][T11245] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1145.196791][T11245] r8:00000004 r7:eaa69e20 r6:20000500 r5:00000000 r4:eaa69f20 [ 1145.196807][T11245] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1145.196856][T11245] [<80972e00>] (should_fail_usercopy) from [<81546d54>] (copy_msghdr_from_user+0x50/0x130) [ 1145.196918][T11245] [<81546d04>] (copy_msghdr_from_user) from [<81546eac>] (___sys_sendmsg+0x78/0xd0) [ 1145.196973][T11245] r8:00000004 r7:00000000 r6:850f2780 r5:eaa69f20 r4:eaa69e64 [ 1145.196990][T11245] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 1145.197041][T11245] r10:00000128 r9:84145400 r8:ac2b1a80 r7:00000004 r6:20000500 r5:ac2b1a81 [ 1145.197059][T11245] r4:00000005 [ 1145.197074][T11245] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 1145.197126][T11245] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1145.197141][T11245] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1145.197183][T11245] Exception stack(0xeaa69fa8 to 0xeaa69ff0) [ 1145.197219][T11245] 9fa0: 00000000 00000000 00000005 20000500 00000004 00000000 [ 1145.197250][T11245] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f900bc [ 1145.197274][T11245] 9fe0: 76f8fec0 76f8feb0 0001946c 00132280 [ 1148.756685][T11258] FAULT_INJECTION: forcing a failure. [ 1148.756685][T11258] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1148.756894][T11258] CPU: 0 UID: 0 PID: 11258 Comm: syz.1.1728 Not tainted syzkaller #0 PREEMPT [ 1148.756954][T11258] Hardware name: ARM-Versatile Express [ 1148.756968][T11258] Call trace: [ 1148.757012][T11258] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1148.757074][T11258] r7:84e994d4 r6:00000000 r5:60000013 r4:82260aec [ 1148.757086][T11258] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1148.757113][T11258] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1148.757142][T11258] r5:85691800 r4:8294f190 [ 1148.757150][T11258] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1148.757185][T11258] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1148.757246][T11258] r8:0000000c r7:84e994d4 r6:ffffffa4 r5:eaa69ed4 r4:20000000 [ 1148.757264][T11258] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1148.757303][T11258] [<80972e00>] (should_fail_usercopy) from [<8193963c>] (copy_from_sockptr_offset.constprop.0+0x48/0xd4) [ 1148.757341][T11258] [<819395f4>] (copy_from_sockptr_offset.constprop.0) from [<819397b8>] (smc_setsockopt+0xf0/0x3cc) [ 1148.757394][T11258] r6:ffffffa4 r5:84e98fc0 r4:0000048a [ 1148.757513][T11258] [<819396cc>] (smc_setsockopt) from [<815433d8>] (do_sock_setsockopt+0x70/0xc8) [ 1148.757557][T11258] r9:85691800 r8:0000000c r7:8505ca00 r6:0000048a r5:00000000 r4:819396c8 [ 1148.757631][T11258] [<81543368>] (do_sock_setsockopt) from [<81546994>] (__sys_setsockopt+0x7c/0xc4) [ 1148.757742][T11258] r8:00000000 r7:859aeb40 r6:859aeb41 r5:0000048a r4:00000000 [ 1148.757859][T11258] [<81546918>] (__sys_setsockopt) from [<815469f8>] (sys_setsockopt+0x1c/0x24) [ 1148.757897][T11258] r8:8020029c r7:00000126 r6:00130230 r5:00000000 r4:0000000c [ 1148.758029][T11258] [<815469dc>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1148.758055][T11258] Exception stack(0xeaa69fa8 to 0xeaa69ff0) [ 1148.758106][T11258] 9fa0: 0000000c 00000000 00000003 00000000 0000048a 20000000 [ 1148.758204][T11258] 9fc0: 0000000c 00000000 00130230 00000126 002e0000 00000000 00006364 76f0c0bc [ 1148.758221][T11258] 9fe0: 76f0bec0 76f0beb0 0001946c 00132280 [ 1151.441754][T11275] fuse: Bad value for 'fd' [ 1157.530041][T11295] fuse: Invalid rootmode [ 1157.649445][ T31] audit: type=1400 audit(1157.570:339): avc: denied { accept } for pid=11296 comm="syz.0.1738" lport=48490 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1158.958649][T11307] fuse: Bad value for 'fd' [ 1160.462842][T11311] fuse: Invalid rootmode [ 1160.819639][T11319] FAULT_INJECTION: forcing a failure. [ 1160.819639][T11319] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.821132][T11319] CPU: 0 UID: 0 PID: 11319 Comm: syz.1.1744 Not tainted syzkaller #0 PREEMPT [ 1160.821245][T11319] Hardware name: ARM-Versatile Express [ 1160.821272][T11319] Call trace: [ 1160.821311][T11319] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1160.821424][T11319] r7:00000d40 r6:00000000 r5:60000013 r4:82260aec [ 1160.821442][T11319] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1160.821488][T11319] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1160.821537][T11319] r5:85474800 r4:82917c00 [ 1160.821551][T11319] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1160.821604][T11319] [<80972bc0>] (should_fail_ex) from [<8051f318>] (should_failslab+0x6c/0x94) [ 1160.821665][T11319] r8:85474800 r7:00000d40 r6:ac2b1da8 r5:0000001d r4:83001240 [ 1160.821682][T11319] [<8051f2ac>] (should_failslab) from [<80503cac>] (__kmalloc_noprof+0x9c/0x458) [ 1160.821732][T11319] [<80503c10>] (__kmalloc_noprof) from [<807c3654>] (tomoyo_encode2+0x64/0xf0) [ 1160.821797][T11319] r10:00000fff r9:8309e400 r8:00000000 r7:834e2220 r6:ac2b1da8 r5:84b9affc [ 1160.821815][T11319] r4:84b9afea [ 1160.821866][T11319] [<807c35f0>] (tomoyo_encode2) from [<807c3704>] (tomoyo_encode+0x24/0x30) [ 1160.821938][T11319] r9:8309e400 r8:00000000 r7:834e2220 r6:ac2b1da8 r5:00001000 r4:84b9afeb [ 1160.821954][T11319] [<807c36e0>] (tomoyo_encode) from [<807c3790>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1160.822001][T11319] r5:00001000 r4:84b9a000 [ 1160.822015][T11319] [<807c3710>] (tomoyo_realpath_from_path) from [<807bf890>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1160.822071][T11319] r10:85474800 r9:00000000 r8:ac2b1d80 r7:c0186405 r6:00000004 r5:81cd6504 [ 1160.822091][T11319] r4:ac2b1da8 r3:826c0200 [ 1160.822105][T11319] [<807bf7c4>] (tomoyo_path_number_perm) from [<807c4170>] (tomoyo_file_ioctl+0x1c/0x20) [ 1160.822160][T11319] r9:00000003 r8:ac2b1d80 r7:20004b40 r6:20004b40 r5:c0186405 r4:ac2b1d80 [ 1160.822176][T11319] [<807c4154>] (tomoyo_file_ioctl) from [<807709c4>] (security_file_ioctl+0x64/0x1e4) [ 1160.822225][T11319] [<80770960>] (security_file_ioctl) from [<8056cdbc>] (sys_ioctl+0x4c/0xba0) [ 1160.822285][T11319] r7:20004b40 r6:ac2b1d81 r5:00000000 r4:c0186405 [ 1160.822303][T11319] [<8056cd70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1160.822345][T11319] Exception stack(0xeabf1fa8 to 0xeabf1ff0) [ 1160.822381][T11319] 1fa0: 00000000 00000000 00000003 c0186405 20004b40 00000000 [ 1160.822413][T11319] 1fc0: 00000000 00000000 00130230 00000036 002e0000 00000000 00006364 76f2d0bc [ 1160.822437][T11319] 1fe0: 76f2cec0 76f2ceb0 0001946c 00132280 [ 1160.822469][T11319] r10:00000036 r9:85474800 r8:8020029c r7:00000036 r6:00130230 r5:00000000 [ 1160.822553][T11319] r4:00000000 [ 1160.834422][T11319] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1162.054179][T11325] fuse: Invalid rootmode [ 1168.397809][ T31] audit: type=1400 audit(1168.320:340): avc: denied { map } for pid=11370 comm="syz.0.1758" path="pipe:[22022]" dev="pipefs" ino=22022 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1168.707889][ T7572] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1168.865980][ T7572] usb 1-1: Using ep0 maxpacket: 16 [ 1168.874442][ T7572] usb 1-1: config 1 interface 0 altsetting 8 bulk endpoint 0x82 has invalid maxpacket 927 [ 1168.877011][ T7572] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1168.885538][ T7572] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1168.886761][ T7572] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1168.887833][ T7572] usb 1-1: Product: syz [ 1168.888742][ T7572] usb 1-1: Manufacturer: syz [ 1168.889553][ T7572] usb 1-1: SerialNumber: syz [ 1168.899247][T11373] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1169.323588][T11373] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1169.326395][T11373] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1169.338932][ T7572] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 1169.344595][ T7572] usb 1-1: USB disconnect, device number 7 [ 1175.141222][T11431] fuse: Unknown parameter 'user_i00000000000000000000' [ 1180.942849][T11458] fuse: Unknown parameter 'user_id00000000000000000000' [ 1181.523113][T11461] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11461 comm=syz.1.1778 [ 1182.337265][T11473] fuse: Unknown parameter 'user_id00000000000000000000' [ 1182.950385][T11476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11476 comm=syz.1.1783 [ 1184.316319][T11495] fuse: Unknown parameter 'user_id00000000000000000000' [ 1185.010539][T11502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11502 comm=syz.0.1790 [ 1185.758774][ T31] audit: type=1400 audit(1185.680:341): avc: denied { create } for pid=11509 comm="syz.0.1792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1185.760534][ T31] audit: type=1400 audit(1185.680:342): avc: denied { module_request } for pid=11509 comm="syz.0.1792" kmod="net-pf-11" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1186.593227][T11520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11520 comm=syz.0.1795 [ 1187.948824][T11539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11539 comm=syz.1.1800 [ 1194.691788][ T31] audit: type=1400 audit(1194.610:343): avc: denied { unmount } for pid=8264 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1194.856295][ T31] audit: type=1400 audit(1194.770:344): avc: denied { append } for pid=11585 comm="syz.0.1813" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1200.385557][T11624] fuse: Unknown parameter '0x0000000000000003' [ 1203.501752][T11641] fuse: Unknown parameter '0x0000000000000003' [ 1207.114394][T11663] fuse: Unknown parameter '0x0000000000000003' [ 1210.556151][T11675] fuse: Unknown parameter '0x0000000000000003' [ 1213.786503][T11692] fuse: Unknown parameter 'fd0x0000000000000003' [ 1214.242139][T11697] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=381 sclass=netlink_audit_socket pid=11697 comm=syz.0.1846 [ 1214.973922][T11707] fuse: Unknown parameter 'fd0x0000000000000003' [ 1215.067863][T11709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11709 comm=syz.1.1850 [ 1221.990637][ T31] audit: type=1400 audit(1221.910:345): avc: denied { create } for pid=11748 comm="syz.0.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1262.450380][ T31] audit: type=1400 audit(1262.370:346): avc: denied { read } for pid=11990 comm="syz.0.1912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1275.428585][ T31] audit: type=1400 audit(1275.350:347): avc: denied { create } for pid=12064 comm="syz.0.1930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1292.533294][ T31] audit: type=1400 audit(1292.450:348): avc: denied { name_bind } for pid=12158 comm="syz.1.1950" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1304.923948][ T31] audit: type=1400 audit(1304.840:349): avc: denied { connect } for pid=12255 comm="syz.1.1974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1323.478433][T12379] tmpfs: Unknown parameter 'appraise_type' [ 1332.790889][ T31] audit: type=1400 audit(1332.710:350): avc: denied { getattr } for pid=12444 comm="syz.0.2020" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1334.929883][T12467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5134 sclass=netlink_audit_socket pid=12467 comm=syz.0.2025 [ 1349.081640][ T31] audit: type=1400 audit(1349.000:351): avc: denied { setattr } for pid=12539 comm="syz.0.2045" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1349.578399][T12554] fuse: Bad value for 'fd' [ 1359.242439][T13070] fuse: Invalid rootmode [ 1361.432505][ T31] audit: type=1400 audit(1361.350:352): avc: denied { mount } for pid=13080 comm="syz.0.2059" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1361.988067][ T31] audit: type=1400 audit(1361.910:353): avc: denied { mounton } for pid=13080 comm="syz.0.2059" path="/458/file0/file0" dev="bpf" ino=25169 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 1363.846201][ T31] audit: type=1400 audit(1363.760:354): avc: denied { unmount } for pid=8264 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1365.256032][T13099] fuse: Invalid rootmode [ 1368.683715][T13117] fuse: Invalid rootmode [ 1371.866875][T13127] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1373.893574][ T31] audit: type=1400 audit(1373.810:355): avc: denied { getopt } for pid=13165 comm="syz.1.2086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1374.078938][ T31] audit: type=1400 audit(1374.000:356): avc: denied { lock } for pid=13170 comm="syz.1.2088" path="socket:[25302]" dev="sockfs" ino=25302 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1375.687795][ T31] audit: type=1400 audit(1375.610:357): avc: denied { append } for pid=13189 comm="syz.0.2096" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1378.973146][T13226] input: syz0 as /devices/virtual/input/input6 [ 1381.012558][ T31] audit: type=1400 audit(1380.930:358): avc: denied { execute } for pid=13225 comm="syz.0.2112" path="/dev/dsp" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1383.631724][T13255] SELinux: syz.1.2118 (13255) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1398.751496][ T31] audit: type=1400 audit(1398.670:359): avc: denied { map } for pid=13317 comm="syz.1.2132" path="socket:[25542]" dev="sockfs" ino=25542 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1398.783703][ T31] audit: type=1400 audit(1398.700:360): avc: denied { create } for pid=13317 comm="syz.1.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 1402.484792][T13351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13351 comm=syz.1.2140 [ 1406.903535][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.926922][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.927995][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.928704][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.931845][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.932640][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.933319][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.934061][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1406.934706][T13368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13368 comm=syz.0.2145 [ 1408.007192][ T31] audit: type=1400 audit(1407.920:361): avc: denied { map } for pid=13367 comm="syz.0.2145" path="socket:[26633]" dev="sockfs" ino=26633 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1408.007580][ T31] audit: type=1400 audit(1407.920:362): avc: denied { accept } for pid=13367 comm="syz.0.2145" path="socket:[26633]" dev="sockfs" ino=26633 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1412.307629][ T31] audit: type=1400 audit(1412.230:363): avc: denied { create } for pid=13430 comm="syz.0.2155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1412.388248][T13431] fuse: Bad value for 'user_id' [ 1412.389609][T13431] fuse: Bad value for 'user_id' [ 1412.996617][ T31] audit: type=1400 audit(1412.920:364): avc: denied { ioctl } for pid=13433 comm="syz.0.2156" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tun_tap_device_t:s0" [ 1415.670497][ T31] audit: type=1400 audit(1415.590:365): avc: denied { lock } for pid=13447 comm="syz.0.2160" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=26385 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1416.150741][T13458] selinux_netlink_send: 89 callbacks suppressed [ 1416.151166][T13458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13458 comm=syz.0.2162 [ 1416.461282][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.461958][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.462335][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.462699][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.463063][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.463404][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.463940][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.464281][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1416.464597][T13468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13468 comm=syz.0.2166 [ 1419.614229][ T31] audit: type=1400 audit(1419.530:366): avc: denied { write } for pid=13485 comm="syz.1.2171" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1419.636658][ T31] audit: type=1400 audit(1419.550:367): avc: granted { setsecparam } for pid=13485 comm="syz.1.2171" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1421.217408][ T31] audit: type=1400 audit(1421.140:368): avc: denied { map } for pid=13509 comm="syz.0.2179" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1421.218841][ T31] audit: type=1400 audit(1421.140:369): avc: denied { execute } for pid=13509 comm="syz.0.2179" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1421.223361][ T31] audit: type=1400 audit(1421.140:370): avc: denied { read } for pid=13509 comm="syz.0.2179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1423.546396][ T31] audit: type=1400 audit(1423.460:371): avc: denied { read } for pid=13544 comm="syz.1.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1429.291518][ T31] audit: type=1400 audit(1429.210:372): avc: denied { accept } for pid=13568 comm="syz.0.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1429.376204][T13572] FAULT_INJECTION: forcing a failure. [ 1429.376204][T13572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1429.376543][T13572] CPU: 1 UID: 0 PID: 13572 Comm: syz.1.2192 Not tainted syzkaller #0 PREEMPT [ 1429.376631][T13572] Hardware name: ARM-Versatile Express [ 1429.376658][T13572] Call trace: [ 1429.376718][T13572] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1429.376829][T13572] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1429.376850][T13572] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1429.376906][T13572] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1429.376964][T13572] r5:84144800 r4:8294f190 [ 1429.376979][T13572] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1429.377084][T13572] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1429.377298][T13572] r8:76f2cf30 r7:00000000 r6:00000000 r5:dfa49f68 r4:00000002 [ 1429.377455][T13572] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1429.377566][T13572] [<80972e00>] (should_fail_usercopy) from [<8058e6f4>] (simple_read_from_buffer+0x80/0x13c) [ 1429.377847][T13572] [<8058e674>] (simple_read_from_buffer) from [<80608724>] (proc_fail_nth_read+0xb8/0x108) [ 1429.378020][T13572] r10:00000001 r9:8060866c r8:00000002 r7:dfa49f68 r6:0000000f r5:76f2cf30 [ 1429.378159][T13572] r4:84144800 r3:dfa49e9f [ 1429.378234][T13572] [<8060866c>] (proc_fail_nth_read) from [<8055353c>] (vfs_read+0x98/0x324) [ 1429.378374][T13572] r8:76f2cf30 r7:dfa49f68 r6:84144800 r5:0000000f r4:b13d56c0 [ 1429.378472][T13572] [<805534a4>] (vfs_read) from [<8055424c>] (ksys_read+0x74/0xe8) [ 1429.378786][T13572] r10:00000003 r9:84144800 r8:8020029c r7:00000000 r6:00000000 r5:b13d56c0 [ 1429.378918][T13572] r4:b13d56c3 [ 1429.378939][T13572] [<805541d8>] (ksys_read) from [<805542d0>] (sys_read+0x10/0x14) [ 1429.379052][T13572] r7:00000003 r6:00000005 r5:76f2cf30 r4:0000000f [ 1429.379072][T13572] [<805542c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1429.379179][T13572] Exception stack(0xdfa49fa8 to 0xdfa49ff0) [ 1429.379258][T13572] 9fa0: 0000000f 76f2cf30 00000005 76f2cf30 0000000f 00000000 [ 1429.379351][T13572] 9fc0: 0000000f 76f2cf30 00000005 00000003 002e0000 00000000 00006364 76f2d0bc [ 1429.379480][T13572] 9fe0: 00000158 76f2ced0 000d80b8 00130154 [ 1445.488575][ T7534] hid-generic 0001:0FFF:0000.0002: item fetching failed at offset 0/2 [ 1445.489333][ T7534] hid-generic 0001:0FFF:0000.0002: probe with driver hid-generic failed with error -22 [ 1454.811586][T13749] selinux_netlink_send: 57 callbacks suppressed [ 1454.815930][T13749] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13749 comm=syz.0.2237 [ 1457.002904][ T31] audit: type=1400 audit(1456.920:373): avc: denied { lock } for pid=13767 comm="syz.1.2242" path="socket:[28149]" dev="sockfs" ino=28149 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1461.259593][T13787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=13787 comm=syz.0.2246 [ 1464.550614][T13803] dlm: non-version read from control device 8224 [ 1464.600796][T13804] dlm: non-version read from control device 8224 [ 1470.126302][ T31] audit: type=1400 audit(1470.050:374): avc: denied { block_suspend } for pid=13838 comm="syz.1.2258" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1483.806011][T13936] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13936 comm=syz.0.2283 [ 1485.048016][T13956] FAULT_INJECTION: forcing a failure. [ 1485.048016][T13956] name failslab, interval 1, probability 0, space 0, times 0 [ 1485.050241][T13956] CPU: 0 UID: 0 PID: 13956 Comm: syz.0.2289 Not tainted syzkaller #0 PREEMPT [ 1485.050366][T13956] Hardware name: ARM-Versatile Express [ 1485.050400][T13956] Call trace: [ 1485.050440][T13956] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1485.050545][T13956] r7:00000d40 r6:00000000 r5:60000013 r4:82260aec [ 1485.050566][T13956] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1485.050622][T13956] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1485.050678][T13956] r5:84ba0000 r4:82917c00 [ 1485.050697][T13956] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1485.050758][T13956] [<80972bc0>] (should_fail_ex) from [<8051f318>] (should_failslab+0x6c/0x94) [ 1485.050826][T13956] r8:84ba0000 r7:00000d40 r6:dfc4df6c r5:0000001d r4:83001240 [ 1485.050845][T13956] [<8051f2ac>] (should_failslab) from [<80503cac>] (__kmalloc_noprof+0x9c/0x458) [ 1485.050893][T13956] [<80503c10>] (__kmalloc_noprof) from [<807c3654>] (tomoyo_encode2+0x64/0xf0) [ 1485.050967][T13956] r10:00000fff r9:b14d6800 r8:00000000 r7:8367f880 r6:dfc4df6c r5:84b99ffc [ 1485.050987][T13956] r4:84b99fea [ 1485.051005][T13956] [<807c35f0>] (tomoyo_encode2) from [<807c3704>] (tomoyo_encode+0x24/0x30) [ 1485.051068][T13956] r9:b14d6800 r8:00000000 r7:8367f880 r6:dfc4df6c r5:00001000 r4:84b99feb [ 1485.051085][T13956] [<807c36e0>] (tomoyo_encode) from [<807c3790>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1485.051136][T13956] r5:00001000 r4:84b99000 [ 1485.051153][T13956] [<807c3710>] (tomoyo_realpath_from_path) from [<807c1d78>] (tomoyo_mount_acl+0xac/0x32c) [ 1485.051210][T13956] r10:dfc4dd7c r9:dfc4df6c r8:85bf6440 r7:822b009c r6:85bf63c0 r5:00000000 [ 1485.051236][T13956] r4:dfc4de60 r3:dfc4ddb8 [ 1485.051256][T13956] [<807c1ccc>] (tomoyo_mount_acl) from [<807c20a8>] (tomoyo_mount_permission+0xb0/0x1f0) [ 1485.051317][T13956] r10:84ba0000 r9:807c410c r8:822b009c r7:dfc4df6c r6:85bf63c0 r5:00000001 [ 1485.051338][T13956] r4:00000000 [ 1485.051352][T13956] [<807c1ff8>] (tomoyo_mount_permission) from [<807c4128>] (tomoyo_sb_mount+0x1c/0x24) [ 1485.051410][T13956] r8:00000000 r7:02087002 r6:00000000 r5:dfc4df6c r4:85bf63c0 [ 1485.051430][T13956] [<807c410c>] (tomoyo_sb_mount) from [<807798ec>] (security_sb_mount+0x7c/0x24c) [ 1485.051485][T13956] [<80779870>] (security_sb_mount) from [<80585968>] (path_mount+0x78/0xa70) [ 1485.051548][T13956] r9:00000000 r8:02087002 r7:85bf63c0 r6:dfc4df6c r5:00000000 r4:00000000 [ 1485.051567][T13956] [<805858f0>] (path_mount) from [<805868e0>] (sys_mount+0x178/0x260) [ 1485.051627][T13956] r10:00000015 r9:84ba0000 r8:00000000 r7:85bf63c0 r6:00000000 r5:00000000 [ 1485.051651][T13956] r4:00000000 [ 1485.051671][T13956] [<80586768>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1485.051719][T13956] Exception stack(0xdfc4dfa8 to 0xdfc4dff0) [ 1485.051759][T13956] dfa0: 00000000 00000000 20000a40 20000000 00000000 02087002 [ 1485.051796][T13956] dfc0: 00000000 00000000 00130230 00000015 002e0000 00000000 00006364 76f900bc [ 1485.051823][T13956] dfe0: 76f8fec0 76f8feb0 0001946c 00132280 [ 1485.051963][T13956] r10:00000015 r9:84ba0000 r8:8020029c r7:00000015 r6:00130230 r5:00000000 [ 1485.051990][T13956] r4:00000000 [ 1485.078986][T13956] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1485.682634][T13972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13972 comm=syz.0.2296 [ 1488.832187][T13985] nbd: must specify a device to reconfigure [ 1489.031878][T13995] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13995 comm=syz.0.2302 [ 1491.578597][ T31] audit: type=1400 audit(1491.490:375): avc: denied { unmount } for pid=8827 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1493.349892][T14020] fuse: Unknown parameter '0x0000000000000006' [ 1496.622141][ T31] audit: type=1400 audit(1496.540:376): avc: denied { listen } for pid=14027 comm="syz.1.2312" path=2F3533372FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1497.262565][T14036] fuse: Unknown parameter 'fd0x0000000000000006' [ 1503.572568][T14065] fuse: Unknown parameter 'fd0x0000000000000006' [ 1504.793137][T14075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=14075 comm=syz.1.2325 [ 1508.128065][T14097] fuse: Unknown parameter 'fd0x0000000000000006' [ 1513.884144][ T31] audit: type=1400 audit(1513.800:377): avc: denied { ioctl } for pid=14114 comm="syz.1.2337" path="socket:[29703]" dev="sockfs" ino=29703 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1536.188304][T14227] fuse: Unknown parameter 'g' [ 1539.172399][ T8271] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1539.232147][ T8271] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1539.293386][ T8271] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1539.357229][ T8271] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1539.670538][ T8271] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1539.681495][ T8271] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1539.684199][ T8271] bond0 (unregistering): Released all slaves [ 1539.760693][ T8271] hsr_slave_0: left promiscuous mode [ 1539.763001][ T8271] hsr_slave_1: left promiscuous mode [ 1539.775841][ T8271] veth1_macvtap: left promiscuous mode [ 1539.776225][ T8271] veth0_macvtap: left promiscuous mode [ 1539.780521][ T8271] veth1_vlan: left promiscuous mode [ 1539.780989][ T8271] veth0_vlan: left promiscuous mode [ 1541.442044][T14246] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1541.451082][T14246] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1542.062637][T14246] hsr_slave_0: entered promiscuous mode [ 1542.068025][T14246] hsr_slave_1: entered promiscuous mode [ 1542.069244][T14246] debugfs: 'hsr0' already exists in 'hsr' [ 1542.069873][T14246] Cannot create hsr debugfs directory [ 1542.576628][T14246] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1542.588560][T14246] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1542.593735][T14246] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1542.600541][T14246] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1543.052351][T14621] random: crng reseeded on system resumption [ 1543.079930][T14621] Restarting kernel threads ... [ 1543.086655][T14621] Done restarting kernel threads. [ 1543.540619][T14246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1546.030618][T14246] veth0_vlan: entered promiscuous mode [ 1546.043095][T14246] veth1_vlan: entered promiscuous mode [ 1546.081525][T14246] veth0_macvtap: entered promiscuous mode [ 1546.089531][T14246] veth1_macvtap: entered promiscuous mode [ 1546.127707][ T8271] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1546.129358][ T8271] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1546.132726][ T8271] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1546.141234][ T8271] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1546.206045][ T31] audit: type=1400 audit(1546.120:378): avc: denied { mounton } for pid=14246 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1594.673429][ T31] audit: type=1400 audit(1594.590:379): avc: denied { setattr } for pid=14697 comm="syz.0.2379" name="UDP-Lite" dev="sockfs" ino=29174 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1600.332508][T14753] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14753 comm=syz.0.2392 [ 1604.170185][T14774] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14774 comm=syz.1.2397 [ 1614.801051][T14833] fuse: Unknown parameter '000000000000000000000060x0000000000000009roo] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1708.484489][T15765] r7:00000003 r6:00000000 r5:60000013 r4:82260aec [ 1708.484507][T15765] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1708.484560][T15765] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1708.484611][T15765] r5:833c4800 r4:8294f190 [ 1708.484626][T15765] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1708.484691][T15765] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1708.484751][T15765] r8:00000000 r7:00000003 r6:00001000 r5:00000000 r4:20007f80 [ 1708.484766][T15765] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1708.484815][T15765] [<80972e00>] (should_fail_usercopy) from [<80978ee8>] (strncpy_from_user+0x20/0x1a0) [ 1708.484944][T15765] [<80978ec8>] (strncpy_from_user) from [<8058bfec>] (setxattr_copy+0x2c/0x90) [ 1708.485020][T15765] r10:000000e4 r9:833c4800 r8:00000000 r7:00000003 r6:00001000 r5:00000000 [ 1708.485040][T15765] r4:eabe9e48 [ 1708.485055][T15765] [<8058bfc0>] (setxattr_copy) from [<8058c224>] (path_setxattrat+0x7c/0x17c) [ 1708.485103][T15765] r5:00000000 r4:20007f80 [ 1708.485118][T15765] [<8058c1a8>] (path_setxattrat) from [<8058c524>] (sys_fsetxattr+0x30/0x38) [ 1708.485203][T15765] r8:8020029c r7:000000e4 r6:00130230 r5:00000000 r4:00000000 [ 1708.485223][T15765] [<8058c4f4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1708.485266][T15765] Exception stack(0xeabe9fa8 to 0xeabe9ff0) [ 1708.485299][T15765] 9fa0: 00000000 00000000 00000003 20007f80 00000000 00000000 [ 1708.485330][T15765] 9fc0: 00000000 00000000 00130230 000000e4 002e0000 00000000 00006364 76fc70bc [ 1708.485356][T15765] 9fe0: 76fc6ec0 76fc6eb0 0001946c 00132280 [ 1708.599879][T15769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15769 comm=syz.0.2551 [ 1710.122488][ T31] audit: type=1400 audit(1710.040:384): avc: denied { setcheckreqprot } for pid=15774 comm="syz.1.2553" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1726.183106][T15869] FAULT_INJECTION: forcing a failure. [ 1726.183106][T15869] name failslab, interval 1, probability 0, space 0, times 0 [ 1726.185628][T15869] CPU: 1 UID: 0 PID: 15869 Comm: syz.1.2578 Not tainted syzkaller #0 PREEMPT [ 1726.185740][T15869] Hardware name: ARM-Versatile Express [ 1726.185763][T15869] Call trace: [ 1726.185797][T15869] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1726.185922][T15869] r7:00000c40 r6:00000000 r5:60000013 r4:82260aec [ 1726.185938][T15869] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1726.185981][T15869] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1726.186023][T15869] r5:8321c800 r4:82917c00 [ 1726.186035][T15869] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1726.186086][T15869] [<80972bc0>] (should_fail_ex) from [<8051f318>] (should_failslab+0x6c/0x94) [ 1726.186140][T15869] r8:8321c800 r7:00000c40 r6:b13d57a8 r5:00001000 r4:830016c0 [ 1726.186153][T15869] [<8051f2ac>] (should_failslab) from [<80503cac>] (__kmalloc_noprof+0x9c/0x458) [ 1726.186190][T15869] [<80503c10>] (__kmalloc_noprof) from [<807c374c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1726.186242][T15869] r10:8321c800 r9:8309e400 r8:00000000 r7:834e2220 r6:b13d57a8 r5:00001000 [ 1726.186257][T15869] r4:00000000 [ 1726.186270][T15869] [<807c3710>] (tomoyo_realpath_from_path) from [<807bf890>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1726.186318][T15869] r10:8321c800 r9:00000000 r8:b13d5780 r7:80206403 r6:00000004 r5:81cd6504 [ 1726.186335][T15869] r4:b13d57a8 r3:826c0200 [ 1726.186348][T15869] [<807bf7c4>] (tomoyo_path_number_perm) from [<807c4170>] (tomoyo_file_ioctl+0x1c/0x20) [ 1726.186396][T15869] r9:00000003 r8:b13d5780 r7:2005a0c0 r6:2005a0c0 r5:80206403 r4:b13d5780 [ 1726.186409][T15869] [<807c4154>] (tomoyo_file_ioctl) from [<807709c4>] (security_file_ioctl+0x64/0x1e4) [ 1726.186450][T15869] [<80770960>] (security_file_ioctl) from [<8056cdbc>] (sys_ioctl+0x4c/0xba0) [ 1726.186497][T15869] r7:2005a0c0 r6:b13d5781 r5:00000000 r4:80206403 [ 1726.186510][T15869] [<8056cd70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1726.186545][T15869] Exception stack(0xeac19fa8 to 0xeac19ff0) [ 1726.186574][T15869] 9fa0: 00000000 00000000 00000003 80206403 2005a0c0 00000000 [ 1726.186604][T15869] 9fc0: 00000000 00000000 00130230 00000036 002e0000 00000000 00006364 76f6b0bc [ 1726.186628][T15869] 9fe0: 76f6aec0 76f6aeb0 0001946c 00132280 [ 1726.186656][T15869] r10:00000036 r9:8321c800 r8:8020029c r7:00000036 r6:00130230 r5:00000000 [ 1726.186671][T15869] r4:00000000 [ 1726.199517][T15869] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1729.881073][T15889] capability: warning: `syz.1.2584' uses deprecated v2 capabilities in a way that may be insecure [ 1732.307325][T15897] FAULT_INJECTION: forcing a failure. [ 1732.307325][T15897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1732.309147][T15897] CPU: 1 UID: 0 PID: 15897 Comm: syz.0.2586 Not tainted syzkaller #0 PREEMPT [ 1732.309261][T15897] Hardware name: ARM-Versatile Express [ 1732.309302][T15897] Call trace: [ 1732.309345][T15897] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1732.309458][T15897] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1732.309481][T15897] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1732.309537][T15897] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1732.309596][T15897] r5:857cc800 r4:8294f190 [ 1732.309614][T15897] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1732.309679][T15897] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1732.309746][T15897] r8:76fc6f30 r7:00000000 r6:00000000 r5:ead09f68 r4:00000002 [ 1732.309765][T15897] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1732.309863][T15897] [<80972e00>] (should_fail_usercopy) from [<8058e6f4>] (simple_read_from_buffer+0x80/0x13c) [ 1732.309938][T15897] [<8058e674>] (simple_read_from_buffer) from [<80608724>] (proc_fail_nth_read+0xb8/0x108) [ 1732.310010][T15897] r10:00000001 r9:8060866c r8:00000002 r7:ead09f68 r6:0000000f r5:76fc6f30 [ 1732.310033][T15897] r4:857cc800 r3:ead09e9f [ 1732.310052][T15897] [<8060866c>] (proc_fail_nth_read) from [<8055353c>] (vfs_read+0x98/0x324) [ 1732.310119][T15897] r8:76fc6f30 r7:ead09f68 r6:857cc800 r5:0000000f r4:848c3540 [ 1732.310137][T15897] [<805534a4>] (vfs_read) from [<8055424c>] (ksys_read+0x74/0xe8) [ 1732.310204][T15897] r10:00000003 r9:857cc800 r8:8020029c r7:00000000 r6:00000000 r5:848c3540 [ 1732.310227][T15897] r4:848c3543 [ 1732.310244][T15897] [<805541d8>] (ksys_read) from [<805542d0>] (sys_read+0x10/0x14) [ 1732.310308][T15897] r7:00000003 r6:00000005 r5:76fc6f30 r4:0000000f [ 1732.310325][T15897] [<805542c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1732.310374][T15897] Exception stack(0xead09fa8 to 0xead09ff0) [ 1732.310414][T15897] 9fa0: 0000000f 76fc6f30 00000005 76fc6f30 0000000f 00000000 [ 1732.310452][T15897] 9fc0: 0000000f 76fc6f30 00000005 00000003 002e0000 00000000 00006364 76fc70bc [ 1732.310481][T15897] 9fe0: 00000158 76fc6ed0 000d80b8 00130154 [ 1735.962647][ T31] audit: type=1400 audit(1735.880:385): avc: denied { lock } for pid=15921 comm="syz.0.2596" path="socket:[32896]" dev="sockfs" ino=32896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1738.983722][T15950] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5129 sclass=netlink_audit_socket pid=15950 comm=syz.0.2606 [ 1739.929687][ C0] vkms_vblank_simulate: vblank timer overrun [ 1740.870328][T15959] FAULT_INJECTION: forcing a failure. [ 1740.870328][T15959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1740.870880][T15959] CPU: 1 UID: 0 PID: 15959 Comm: syz.1.2608 Not tainted syzkaller #0 PREEMPT [ 1740.870985][T15959] Hardware name: ARM-Versatile Express [ 1740.871008][T15959] Call trace: [ 1740.871044][T15959] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1740.871739][T15959] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1740.871980][T15959] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1740.872210][T15959] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1740.872511][T15959] r5:833c3000 r4:8294f190 [ 1740.872551][T15959] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1740.872704][T15959] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1740.872789][T15959] r8:00000000 r7:00000000 r6:82466858 r5:20000140 r4:20000140 [ 1740.872808][T15959] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1740.872956][T15959] [<80972e00>] (should_fail_usercopy) from [<80978ee8>] (strncpy_from_user+0x20/0x1a0) [ 1740.873115][T15959] [<80978ec8>] (strncpy_from_user) from [<80562c78>] (getname_flags.part.0+0x44/0x18c) [ 1740.873403][T15959] r10:000000e3 r9:833c3000 r8:00000000 r7:00000000 r6:82466858 r5:20000140 [ 1740.873544][T15959] r4:84c03000 [ 1740.873670][T15959] [<80562c34>] (getname_flags.part.0) from [<80567bf8>] (getname_flags+0x3c/0x50) [ 1740.873747][T15959] r9:833c3000 r8:00000000 r7:ffffff9c r6:00000100 r5:00000000 r4:20000140 [ 1740.873766][T15959] [<80567bbc>] (getname_flags) from [<8058c2f4>] (path_setxattrat+0x14c/0x17c) [ 1740.873853][T15959] r5:20000140 r4:00000000 [ 1740.873874][T15959] [<8058c1a8>] (path_setxattrat) from [<8058c4ec>] (sys_lsetxattr+0x34/0x3c) [ 1740.873945][T15959] r8:8020029c r7:000000e3 r6:00130230 r5:00000000 r4:20000200 [ 1740.873964][T15959] [<8058c4b8>] (sys_lsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1740.874012][T15959] Exception stack(0xead81fa8 to 0xead81ff0) [ 1740.874052][T15959] 1fa0: 00000001 00000000 20000140 20000200 00000000 00000000 [ 1740.874085][T15959] 1fc0: 00000001 00000000 00130230 000000e3 002e0000 00000000 00006364 76f6b0bc [ 1740.874318][T15959] 1fe0: 76f6aec0 76f6aeb0 0001946c 00132280 [ 1740.874394][T15959] r4:00000001 [ 1745.423624][T15986] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15986 comm=syz.0.2616 [ 1745.503431][T15990] FAULT_INJECTION: forcing a failure. [ 1745.503431][T15990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1745.507156][T15990] CPU: 0 UID: 0 PID: 15990 Comm: syz.0.2618 Not tainted syzkaller #0 PREEMPT [ 1745.507282][T15990] Hardware name: ARM-Versatile Express [ 1745.507318][T15990] Call trace: [ 1745.507363][T15990] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1745.507478][T15990] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1745.507505][T15990] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1745.507565][T15990] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1745.507627][T15990] r5:841b9800 r4:8294f190 [ 1745.507648][T15990] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1745.507726][T15990] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1745.507801][T15990] r8:76fc6f30 r7:00000000 r6:00000000 r5:eadb9f68 r4:00000002 [ 1745.507827][T15990] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1745.507888][T15990] [<80972e00>] (should_fail_usercopy) from [<8058e6f4>] (simple_read_from_buffer+0x80/0x13c) [ 1745.507957][T15990] [<8058e674>] (simple_read_from_buffer) from [<80608724>] (proc_fail_nth_read+0xb8/0x108) [ 1745.508040][T15990] r10:00000001 r9:8060866c r8:00000002 r7:eadb9f68 r6:0000000f r5:76fc6f30 [ 1745.508069][T15990] r4:841b9800 r3:eadb9e9f [ 1745.508091][T15990] [<8060866c>] (proc_fail_nth_read) from [<8055353c>] (vfs_read+0x98/0x324) [ 1745.508159][T15990] r8:76fc6f30 r7:eadb9f68 r6:841b9800 r5:0000000f r4:84941c00 [ 1745.508180][T15990] [<805534a4>] (vfs_read) from [<8055424c>] (ksys_read+0x74/0xe8) [ 1745.508251][T15990] r10:00000003 r9:841b9800 r8:8020029c r7:00000000 r6:00000000 r5:84941c00 [ 1745.508274][T15990] r4:84941c03 [ 1745.508331][T15990] [<805541d8>] (ksys_read) from [<805542d0>] (sys_read+0x10/0x14) [ 1745.508410][T15990] r7:00000003 r6:00000004 r5:76fc6f30 r4:0000000f [ 1745.508433][T15990] [<805542c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1745.508518][T15990] Exception stack(0xeadb9fa8 to 0xeadb9ff0) [ 1745.508568][T15990] 9fa0: 0000000f 76fc6f30 00000004 76fc6f30 0000000f 00000000 [ 1745.508614][T15990] 9fc0: 0000000f 76fc6f30 00000004 00000003 002e0000 00000000 00006364 76fc70bc [ 1745.508650][T15990] 9fe0: 00000158 76fc6ed0 000d80b8 00130154 [ 1748.450745][T16018] FAULT_INJECTION: forcing a failure. [ 1748.450745][T16018] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1748.452780][T16018] CPU: 0 UID: 0 PID: 16018 Comm: syz.1.2627 Not tainted syzkaller #0 PREEMPT [ 1748.452910][T16018] Hardware name: ARM-Versatile Express [ 1748.452961][T16018] Call trace: [ 1748.453008][T16018] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1748.453390][T16018] r7:00000000 r6:00000000 r5:60000013 r4:82260aec [ 1748.453411][T16018] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1748.453466][T16018] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1748.453522][T16018] r5:832ee000 r4:82917c54 [ 1748.453540][T16018] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1748.453600][T16018] [<80972bc0>] (should_fail_ex) from [<8051f3a8>] (should_fail_alloc_page+0x68/0x74) [ 1748.453676][T16018] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:eadc5d10 [ 1748.453697][T16018] [<8051f340>] (should_fail_alloc_page) from [<804ed650>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 1748.453752][T16018] [<804ed5bc>] (prepare_alloc_pages.constprop.0) from [<804f5b78>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 1748.453816][T16018] r10:eadc5ef8 r9:00000000 r8:832ee000 r7:00000000 r6:00140cca r5:832ee000 [ 1748.453884][T16018] r4:00000000 r3:eadc5d10 [ 1748.453904][T16018] [<804f5acc>] (__alloc_frozen_pages_noprof) from [<804f6c10>] (__folio_alloc_noprof+0x14/0x6c) [ 1748.453967][T16018] r10:eadc5ef8 r9:848a8a00 r8:00000000 r7:00000000 r6:20001000 r5:832ee000 [ 1748.453989][T16018] r4:00000215 [ 1748.454006][T16018] [<804f6bfc>] (__folio_alloc_noprof) from [<804c774c>] (handle_mm_fault+0xcf8/0x14dc) [ 1748.454067][T16018] r5:832ee000 r4:00000215 [ 1748.454085][T16018] [<804c6a54>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 1748.454150][T16018] r10:00000002 r9:b15d9380 r8:00000215 r7:20001000 r6:00000a06 r5:20001040 [ 1748.454171][T16018] r4:eadc5ef8 [ 1748.454186][T16018] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 1748.454242][T16018] r10:00000137 r9:832ee000 r8:80234648 r7:eadc5ef8 r6:20001040 r5:00000a06 [ 1748.454261][T16018] r4:8281cee0 [ 1748.454278][T16018] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 1748.454343][T16018] r9:832ee000 r8:80234648 r7:eadc5ef8 r6:20001040 r5:00000a06 r4:8281cee0 [ 1748.454361][T16018] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 1748.454407][T16018] Exception stack(0xeadc5ef8 to 0xeadc5f40) [ 1748.454438][T16018] 5ee0: 20001040 81cd12e6 [ 1748.454470][T16018] 5f00: 00000000 00000000 000000ff 00000002 b5003500 20001040 b5403587 832ee000 [ 1748.454501][T16018] 5f20: 00000137 eadc5f84 00000007 eadc5f4c 80765418 81a09680 60000013 ffffffff [ 1748.454531][T16018] r8:b5403587 r7:eadc5f2c r6:ffffffff r5:60000013 r4:81a09680 [ 1748.454548][T16018] [<807653a4>] (keyctl_capabilities) from [<80765758>] (sys_keyctl+0x2b8/0x318) [ 1748.454616][T16018] r9:832ee000 r8:8020029c r7:00000137 r6:00130230 r5:00000000 r4:00000000 [ 1748.454634][T16018] [<807654a0>] (sys_keyctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1748.454687][T16018] Exception stack(0xeadc5fa8 to 0xeadc5ff0) [ 1748.454718][T16018] 5fa0: 00000000 00000000 0000001f 20001040 5c2e7059 00000000 [ 1748.454751][T16018] 5fc0: 00000000 00000000 00130230 00000137 002e0000 00000000 00006364 76f6b0bc [ 1748.454776][T16018] 5fe0: 76f6aec0 76f6aeb0 0001946c 00132280 [ 1748.454798][T16018] r5:00000000 r4:00000000 [ 1748.571218][T16022] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=152 sclass=netlink_audit_socket pid=16022 comm=syz.1.2629 [ 1753.173784][ T31] audit: type=1400 audit(1753.090:386): avc: denied { write } for pid=16046 comm="syz.0.2637" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tun_tap_device_t:s0" [ 1753.242515][ C0] vkms_vblank_simulate: vblank timer overrun [ 1753.419258][ T31] audit: type=1400 audit(1753.340:387): avc: denied { create } for pid=16050 comm="syz.0.2639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1753.480562][ T31] audit: type=1400 audit(1753.400:388): avc: denied { read write } for pid=14936 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1753.480871][ T31] audit: type=1400 audit(1753.400:389): avc: denied { open } for pid=14936 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1753.484362][ T31] audit: type=1400 audit(1753.400:390): avc: denied { ioctl } for pid=14936 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1753.514796][ T31] audit: type=1400 audit(1753.430:391): avc: denied { read } for pid=16058 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1753.544372][ T31] audit: type=1400 audit(1753.460:392): avc: denied { read } for pid=16058 comm="syz.1.2641" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1753.544787][ T31] audit: type=1400 audit(1753.460:393): avc: denied { open } for pid=16058 comm="syz.1.2641" path="ipc:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1753.629910][ T31] audit: type=1400 audit(1753.550:394): avc: denied { create } for pid=16060 comm="syz.1.2642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1753.649257][ T31] audit: type=1400 audit(1753.570:395): avc: denied { setopt } for pid=16060 comm="syz.1.2642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1754.892454][T16079] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16079 comm=syz.1.2649 [ 1756.112024][T16107] fuse: Bad value for 'user_id' [ 1756.113699][T16107] fuse: Bad value for 'user_id' [ 1763.781319][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 1763.785562][ T31] audit: type=1400 audit(1763.700:420): avc: denied { read } for pid=16148 comm="syz.1.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1763.785967][ T31] audit: type=1400 audit(1763.700:421): avc: denied { accept } for pid=16148 comm="syz.1.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1763.862092][ T31] audit: type=1400 audit(1763.780:422): avc: denied { setopt } for pid=16150 comm="syz.1.2667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1764.962606][ T31] audit: type=1400 audit(1764.880:423): avc: denied { bind } for pid=16150 comm="syz.1.2667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1765.154319][ T31] audit: type=1400 audit(1765.070:424): avc: denied { create } for pid=16143 comm="syz.0.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1765.170328][ T31] audit: type=1400 audit(1765.090:425): avc: denied { write } for pid=16143 comm="syz.0.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1767.134715][ T31] audit: type=1400 audit(1767.050:426): avc: denied { allowed } for pid=16157 comm="syz.1.2669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1767.333889][T16163] FAULT_INJECTION: forcing a failure. [ 1767.333889][T16163] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1767.337168][T16163] CPU: 1 UID: 0 PID: 16163 Comm: syz.1.2671 Not tainted syzkaller #0 PREEMPT [ 1767.337304][T16163] Hardware name: ARM-Versatile Express [ 1767.337338][T16163] Call trace: [ 1767.337382][T16163] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1767.337486][T16163] r7:200002c0 r6:00000000 r5:60000013 r4:82260aec [ 1767.337506][T16163] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1767.337562][T16163] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1767.337616][T16163] r5:85470c00 r4:8294f190 [ 1767.337634][T16163] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1767.337700][T16163] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1767.337766][T16163] r8:200002c0 r7:200002c0 r6:00000000 r5:b1400e40 r4:00000014 [ 1767.337790][T16163] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1767.337874][T16163] [<80972e00>] (should_fail_usercopy) from [<8049c598>] (vmemdup_user+0x40/0x16c) [ 1767.337932][T16163] [<8049c558>] (vmemdup_user) from [<8058c018>] (setxattr_copy+0x58/0x90) [ 1767.338008][T16163] r9:85470c00 r8:200002c0 r7:ffffff9c r6:00000000 r5:20000200 r4:eaf65e40 [ 1767.338030][T16163] [<8058bfc0>] (setxattr_copy) from [<8058c224>] (path_setxattrat+0x7c/0x17c) [ 1767.338086][T16163] r5:20000200 r4:20000280 [ 1767.338106][T16163] [<8058c1a8>] (path_setxattrat) from [<8058c4b0>] (sys_setxattr+0x34/0x3c) [ 1767.338169][T16163] r8:8020029c r7:000000e2 r6:00130230 r5:00000000 r4:20000280 [ 1767.338189][T16163] [<8058c47c>] (sys_setxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1767.338238][T16163] Exception stack(0xeaf65fa8 to 0xeaf65ff0) [ 1767.338276][T16163] 5fa0: 00000003 00000000 20000200 20000280 200002c0 00000014 [ 1767.338312][T16163] 5fc0: 00000003 00000000 00130230 000000e2 002e0000 00000000 00006364 76f6b0bc [ 1767.338343][T16163] 5fe0: 76f6aec0 76f6aeb0 0001946c 00132280 [ 1767.338366][T16163] r4:00000003 [ 1769.986417][ T31] audit: type=1400 audit(1769.910:427): avc: denied { create } for pid=16171 comm="syz.1.2674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1771.519529][ T31] audit: type=1400 audit(1771.440:428): avc: denied { create } for pid=16171 comm="syz.1.2674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1771.530156][ T31] audit: type=1400 audit(1771.450:429): avc: denied { create } for pid=16171 comm="syz.1.2674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1771.533151][ T31] audit: type=1400 audit(1771.450:430): avc: denied { ioctl } for pid=16171 comm="syz.1.2674" path="socket:[34224]" dev="sockfs" ino=34224 ioctlcmd=0x920a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1771.547749][ T31] audit: type=1400 audit(1771.470:431): avc: denied { map } for pid=16171 comm="syz.1.2674" path="socket:[34210]" dev="sockfs" ino=34210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1782.444706][ T31] audit: type=1400 audit(1782.360:432): avc: denied { execute } for pid=16234 comm="syz.0.2689" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=1069 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1782.757286][ T31] audit: type=1400 audit(1782.680:433): avc: denied { setopt } for pid=16234 comm="syz.0.2689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1790.369207][ T31] audit: type=1400 audit(1790.290:434): avc: denied { audit_write } for pid=16272 comm="syz.0.2697" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1801.728170][ T31] audit: type=1400 audit(1801.650:435): avc: denied { create } for pid=16322 comm="syz.0.2709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1802.263242][ T31] audit: type=1400 audit(1802.180:436): avc: denied { map_create } for pid=16322 comm="syz.0.2709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1810.116794][ T31] audit: type=1400 audit(1810.040:437): avc: denied { ioctl } for pid=16356 comm="syz.1.2720" path="socket:[34516]" dev="sockfs" ino=34516 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1810.329630][ T31] audit: type=1400 audit(1810.250:438): avc: denied { setattr } for pid=16362 comm="syz.0.2722" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1810.340465][ T31] audit: type=1400 audit(1810.260:439): avc: denied { ioctl } for pid=16362 comm="syz.0.2722" path="socket:[34525]" dev="sockfs" ino=34525 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1810.353874][ T31] audit: type=1400 audit(1810.270:440): avc: denied { create } for pid=16362 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1810.540202][ T31] audit: type=1400 audit(1810.460:441): avc: denied { write } for pid=16362 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1812.501965][T16377] FAULT_INJECTION: forcing a failure. [ 1812.501965][T16377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1812.504148][T16377] CPU: 1 UID: 0 PID: 16377 Comm: syz.1.2726 Not tainted syzkaller #0 PREEMPT [ 1812.504271][T16377] Hardware name: ARM-Versatile Express [ 1812.504310][T16377] Call trace: [ 1812.504358][T16377] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1812.504464][T16377] r7:dfaa9e20 r6:00000000 r5:60000013 r4:82260aec [ 1812.504488][T16377] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1812.504547][T16377] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1812.504750][T16377] r5:857ce000 r4:8294f190 [ 1812.504788][T16377] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1812.504892][T16377] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1812.504967][T16377] r8:04000000 r7:dfaa9e20 r6:20000200 r5:00000000 r4:dfaa9f20 [ 1812.504985][T16377] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1812.505035][T16377] [<80972e00>] (should_fail_usercopy) from [<81546d54>] (copy_msghdr_from_user+0x50/0x130) [ 1812.505089][T16377] [<81546d04>] (copy_msghdr_from_user) from [<81546eac>] (___sys_sendmsg+0x78/0xd0) [ 1812.505144][T16377] r8:04000000 r7:00000000 r6:850ea000 r5:dfaa9f20 r4:dfaa9e64 [ 1812.505164][T16377] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 1812.505253][T16377] r10:00000128 r9:857ce000 r8:ac438300 r7:04000000 r6:20000200 r5:ac438301 [ 1812.505297][T16377] r4:00000005 [ 1812.505314][T16377] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 1812.505370][T16377] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1812.505388][T16377] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1812.505434][T16377] Exception stack(0xdfaa9fa8 to 0xdfaa9ff0) [ 1812.505471][T16377] 9fa0: 00000000 00000000 00000005 20000200 04000000 00000000 [ 1812.505548][T16377] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f4a0bc [ 1812.505578][T16377] 9fe0: 76f49ec0 76f49eb0 0001946c 00132280 [ 1812.549594][ T31] audit: type=1400 audit(1812.470:442): avc: denied { write } for pid=16374 comm="syz.1.2726" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1814.498122][ T31] audit: type=1400 audit(1814.420:443): avc: denied { create } for pid=16391 comm="syz.0.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1814.502542][ T31] audit: type=1400 audit(1814.420:444): avc: denied { setopt } for pid=16391 comm="syz.0.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1817.679578][T16405] fuse: Bad value for 'user_id' [ 1817.679849][T16405] fuse: Bad value for 'user_id' [ 1817.682738][T16406] fuse: Bad value for 'user_id' [ 1817.683025][T16406] fuse: Bad value for 'user_id' [ 1817.689646][ T31] audit: type=1400 audit(1817.610:445): avc: denied { create } for pid=16404 comm="syz.1.2735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1817.691395][ T31] audit: type=1400 audit(1817.610:446): avc: denied { setopt } for pid=16404 comm="syz.1.2735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1820.151072][T16422] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=152 sclass=netlink_audit_socket pid=16422 comm=syz.0.2738 [ 1820.332410][ T31] audit: type=1400 audit(1820.250:447): avc: denied { getopt } for pid=16421 comm="syz.0.2738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1820.351153][ T31] audit: type=1400 audit(1820.270:448): avc: denied { create } for pid=16428 comm="syz.1.2740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1820.384667][ T31] audit: type=1400 audit(1820.300:449): avc: denied { ioctl } for pid=16428 comm="syz.1.2740" path="socket:[33654]" dev="sockfs" ino=33654 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1824.040819][ T31] audit: type=1400 audit(1823.960:450): avc: denied { bind } for pid=16447 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1826.735921][ T31] audit: type=1400 audit(1826.650:451): avc: denied { create } for pid=16461 comm="syz.0.2747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1826.828339][ T31] audit: type=1400 audit(1826.750:452): avc: denied { write } for pid=16461 comm="syz.0.2747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1832.408646][ T31] audit: type=1400 audit(1832.330:453): avc: denied { name_bind } for pid=16488 comm="syz.0.2754" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1832.409124][ T31] audit: type=1400 audit(1832.330:454): avc: denied { node_bind } for pid=16488 comm="syz.0.2754" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1835.461555][ T31] audit: type=1400 audit(1835.380:455): avc: denied { create } for pid=16512 comm="syz.0.2759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1835.995666][ T31] audit: type=1400 audit(1835.910:456): avc: denied { read } for pid=16527 comm="syz.1.2764" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1835.996044][ T31] audit: type=1400 audit(1835.910:457): avc: denied { open } for pid=16527 comm="syz.1.2764" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1836.017035][ T31] audit: type=1400 audit(1835.940:458): avc: denied { map } for pid=16527 comm="syz.1.2764" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1836.019296][ T31] audit: type=1400 audit(1835.940:459): avc: denied { execmem } for pid=16527 comm="syz.1.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1836.022049][ T31] audit: type=1400 audit(1835.940:460): avc: denied { execute } for pid=16527 comm="syz.1.2764" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1836.180153][ T31] audit: type=1400 audit(1836.100:461): avc: denied { read } for pid=16531 comm="syz.1.2765" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tun_tap_device_t:s0" [ 1836.181942][ T31] audit: type=1400 audit(1836.100:462): avc: denied { open } for pid=16531 comm="syz.1.2765" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tun_tap_device_t:s0" [ 1837.711456][T16543] FAULT_INJECTION: forcing a failure. [ 1837.711456][T16543] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1837.715654][T16543] CPU: 0 UID: 0 PID: 16543 Comm: syz.1.2768 Not tainted syzkaller #0 PREEMPT [ 1837.715765][T16543] Hardware name: ARM-Versatile Express [ 1837.715788][T16543] Call trace: [ 1837.715809][T16543] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1837.715868][T16543] r7:dfb5de20 r6:00000000 r5:60000013 r4:82260aec [ 1837.715878][T16543] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1837.715906][T16543] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1837.715938][T16543] r5:84f66000 r4:8294f190 [ 1837.715946][T16543] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1837.715979][T16543] [<80972bc0>] (should_fail_ex) from [<80972dfc>] (should_fail+0x14/0x18) [ 1837.716014][T16543] r8:00000000 r7:dfb5de20 r6:20000580 r5:00000000 r4:dfb5df20 [ 1837.716023][T16543] [<80972de8>] (should_fail) from [<80972e1c>] (should_fail_usercopy+0x1c/0x20) [ 1837.716058][T16543] [<80972e00>] (should_fail_usercopy) from [<81546d54>] (copy_msghdr_from_user+0x50/0x130) [ 1837.716089][T16543] [<81546d04>] (copy_msghdr_from_user) from [<81546eac>] (___sys_sendmsg+0x78/0xd0) [ 1837.716119][T16543] r8:00000000 r7:00000000 r6:850eaa00 r5:dfb5df20 r4:dfb5de64 [ 1837.716127][T16543] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 1837.716163][T16543] r10:00000128 r9:84f66000 r8:848ff240 r7:00000000 r6:20000580 r5:848ff241 [ 1837.716185][T16543] r4:00000006 [ 1837.716202][T16543] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 1837.716255][T16543] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1837.716275][T16543] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1837.716301][T16543] Exception stack(0xdfb5dfa8 to 0xdfb5dff0) [ 1837.716321][T16543] dfa0: 00000000 00000000 00000006 20000580 00000000 00000000 [ 1837.716341][T16543] dfc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f4a0bc [ 1837.716356][T16543] dfe0: 76f49ec0 76f49eb0 0001946c 00132280 [ 1839.648349][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1839.648730][ T31] audit: type=1400 audit(1839.570:466): avc: denied { create } for pid=16549 comm="syz.0.2770" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1839.914648][ T31] audit: type=1400 audit(1839.830:467): avc: denied { write } for pid=16557 comm="syz.1.2772" path="socket:[34860]" dev="sockfs" ino=34860 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1843.239200][T16585] misc userio: No port type given on /dev/userio [ 1843.327195][ T31] audit: type=1400 audit(1843.250:468): avc: denied { write } for pid=16586 comm="syz.1.2781" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1843.418678][ T31] audit: type=1400 audit(1843.340:469): avc: denied { ioctl } for pid=16586 comm="syz.1.2781" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 ioctlcmd=0x64ac scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1843.429896][ T31] audit: type=1400 audit(1843.350:470): avc: denied { ioctl } for pid=16586 comm="syz.1.2781" path="socket:[35927]" dev="sockfs" ino=35927 ioctlcmd=0x941e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1849.790704][ T31] audit: type=1400 audit(1849.710:471): avc: denied { ioctl } for pid=16630 comm="syz.0.2791" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1851.328731][T16655] fuse: Bad value for 'fd' [ 1856.826610][ T31] audit: type=1400 audit(1856.750:472): avc: denied { setopt } for pid=16670 comm="syz.1.2801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1859.766603][T16693] FAULT_INJECTION: forcing a failure. [ 1859.766603][T16693] name failslab, interval 1, probability 0, space 0, times 0 [ 1859.766957][T16693] CPU: 0 UID: 0 PID: 16693 Comm: syz.0.2807 Not tainted syzkaller #0 PREEMPT [ 1859.767048][T16693] Hardware name: ARM-Versatile Express [ 1859.767073][T16693] Call trace: [ 1859.767113][T16693] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1859.767213][T16693] r7:84f64800 r6:00000000 r5:60000013 r4:82260aec [ 1859.767234][T16693] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 1859.767284][T16693] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 1859.767337][T16693] r5:84f64800 r4:82917c00 [ 1859.767354][T16693] [<8021fc0c>] (dump_stack) from [<80972d84>] (should_fail_ex+0x1c4/0x228) [ 1859.767416][T16693] [<80972bc0>] (should_fail_ex) from [<8051f318>] (should_failslab+0x6c/0x94) [ 1859.767557][T16693] r8:00000000 r7:84f64800 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 1859.767751][T16693] [<8051f2ac>] (should_failslab) from [<805032bc>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1859.767904][T16693] [<8050326c>] (kmem_cache_alloc_node_noprof) from [<81551dd4>] (__alloc_skb+0x138/0x160) [ 1859.767997][T16693] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 1859.768071][T16693] r4:828060c0 [ 1859.768148][T16693] [<81551c9c>] (__alloc_skb) from [<816716f8>] (netlink_alloc_large_skb+0x88/0xa0) [ 1859.768343][T16693] r8:00000000 r7:84e7b400 r6:000000d0 r5:850a8500 r4:00000200 [ 1859.768380][T16693] [<81671670>] (netlink_alloc_large_skb) from [<81671e40>] (netlink_sendmsg+0x134/0x444) [ 1859.768471][T16693] r5:850a8500 r4:dfd25f20 [ 1859.768523][T16693] [<81671d0c>] (netlink_sendmsg) from [<81543bb0>] (__sock_sendmsg+0x44/0x78) [ 1859.768629][T16693] r10:00000000 r9:dfd25dc4 r8:dfd25dc4 r7:00000000 r6:850a8500 r5:dfd25f20 [ 1859.768655][T16693] r4:00000000 [ 1859.768745][T16693] [<81543b6c>] (__sock_sendmsg) from [<81544f08>] (____sys_sendmsg+0x298/0x2cc) [ 1859.768918][T16693] r7:00000000 r6:850a8500 r5:00040000 r4:dfd25f20 [ 1859.768990][T16693] [<81544c70>] (____sys_sendmsg) from [<81546ed0>] (___sys_sendmsg+0x9c/0xd0) [ 1859.769076][T16693] r10:dfd25e24 r9:20000280 r8:00040000 r7:00000000 r6:850a8500 r5:dfd25f20 [ 1859.769177][T16693] r4:00000000 [ 1859.769206][T16693] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 1859.769333][T16693] r10:00000128 r9:84f64800 r8:84dbad80 r7:00040000 r6:20000280 r5:84dbad81 [ 1859.769387][T16693] r4:00000003 [ 1859.769404][T16693] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 1859.769525][T16693] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1859.769547][T16693] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1859.769629][T16693] Exception stack(0xdfd25fa8 to 0xdfd25ff0) [ 1859.769674][T16693] 5fa0: 00000000 00000000 00000003 20000280 00040000 00000000 [ 1859.769801][T16693] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fc70bc [ 1859.769891][T16693] 5fe0: 76fc6ec0 76fc6eb0 0001946c 00132280 [ 1861.467066][ T31] audit: type=1400 audit(1861.390:473): avc: denied { mount } for pid=16708 comm="syz.1.2812" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1864.837302][ T31] audit: type=1400 audit(1864.760:474): avc: denied { append } for pid=16724 comm="syz.0.2816" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1867.268561][ T31] audit: type=1400 audit(1867.190:475): avc: denied { prog_load } for pid=16753 comm="syz.0.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1867.268960][ T31] audit: type=1400 audit(1867.190:476): avc: denied { bpf } for pid=16753 comm="syz.0.2822" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1867.269294][ T31] audit: type=1400 audit(1867.190:477): avc: denied { perfmon } for pid=16753 comm="syz.0.2822" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1867.273612][ T31] audit: type=1400 audit(1867.190:478): avc: denied { prog_run } for pid=16753 comm="syz.0.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1867.812838][ T31] audit: type=1400 audit(1867.730:479): avc: denied { read } for pid=16753 comm="syz.0.2822" name="file0" dev="fuse" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1867.818027][ T31] audit: type=1400 audit(1867.740:480): avc: denied { open } for pid=16753 comm="syz.0.2822" path="/228/file0/file0" dev="fuse" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1868.346423][ T31] audit: type=1400 audit(1868.260:481): avc: denied { connect } for pid=16760 comm="syz.1.2824" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1868.346787][ T31] audit: type=1400 audit(1868.260:482): avc: denied { setopt } for pid=16760 comm="syz.1.2824" laddr=fe80::489e:3ff:fe89:9a5a lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1868.781853][T13900] usb 2-1: new full-speed USB device number 11 using dummy_hcd [ 1869.012902][T13900] usb 2-1: config 1 has an invalid interface number: 105 but max is 0 [ 1869.014406][T13900] usb 2-1: config 1 has no interface number 0 [ 1869.023871][T13900] usb 2-1: config 1 interface 105 has no altsetting 0 [ 1869.156429][T13900] usb 2-1: New USB device found, idVendor=20f4, idProduct=e05a, bcdDevice=6c.6d [ 1869.157292][T13900] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1869.157452][T13900] usb 2-1: Product: syz [ 1869.157537][T13900] usb 2-1: Manufacturer: syz [ 1869.157614][T13900] usb 2-1: SerialNumber: syz [ 1869.936172][T13900] aqc111 2-1:1.105 (unnamed net_device) (uninitialized): Failed to read(0x20) reg index 0x0000: 0 [ 1869.936963][T13900] aqc111 2-1:1.105: probe with driver aqc111 failed with error -61 [ 1870.152751][T12544] usb 2-1: USB disconnect, device number 11 [ 1870.177392][ T31] audit: type=1400 audit(1870.070:483): avc: denied { accept } for pid=16762 comm="syz.1.2825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1870.510250][ T31] audit: type=1400 audit(1870.430:484): avc: denied { ioctl } for pid=16778 comm="syz.1.2827" path="socket:[35248]" dev="sockfs" ino=35248 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1870.597729][ T31] audit: type=1400 audit(1870.520:485): avc: denied { bind } for pid=16778 comm="syz.1.2827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1872.006446][ T31] audit: type=1400 audit(1871.900:486): avc: denied { write } for pid=16787 comm="syz.1.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1872.465546][ T31] audit: type=1400 audit(1872.380:487): avc: denied { name_bind } for pid=16790 comm="syz.1.2832" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1872.832455][T16794] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2833'. [ 1874.235725][ T7655] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 1874.498043][ T7655] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1874.499134][ T7655] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 21 [ 1874.500364][ T7655] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1874.501155][ T7655] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1874.515313][ T7655] usb 2-1: config 0 descriptor?? [ 1874.527748][ T7655] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 1875.368714][T16788] usb 2-1: USB disconnect, device number 12 [ 1875.925732][ T7602] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 1876.119279][ T7602] usb 2-1: Using ep0 maxpacket: 32 [ 1876.147918][ T7602] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1876.152338][ T7602] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1876.166433][ T7602] usb 2-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= a.f5 [ 1876.170083][ T7602] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1876.171363][ T7602] usb 2-1: Product: syz [ 1876.172012][ T7602] usb 2-1: Manufacturer: syz [ 1876.172631][ T7602] usb 2-1: SerialNumber: syz [ 1876.192574][ T7602] usb 2-1: config 0 descriptor?? [ 1876.213245][ T7602] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 1876.249042][ T7602] snd-usb-audio 2-1:0.0: probe with driver snd-usb-audio failed with error -2 [ 1876.439063][T16788] usb 2-1: USB disconnect, device number 13 [ 1887.187498][ T31] audit: type=1400 audit(1887.110:488): avc: denied { write } for pid=16851 comm="syz.0.2842" name="ipv6_route" dev="proc" ino=4026532761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1887.373414][T16856] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 1887.376473][T16856] pim6reg0: linktype set to 800 [ 1888.627658][ T7534] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 1888.775627][ T7534] usb 2-1: Using ep0 maxpacket: 8 [ 1888.781217][ T7534] usb 2-1: config 0 has no interfaces? [ 1888.790598][ T7534] usb 2-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ee [ 1888.790846][ T7534] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1888.791007][ T7534] usb 2-1: Product: syz [ 1888.791047][ T7534] usb 2-1: Manufacturer: syz [ 1888.791071][ T7534] usb 2-1: SerialNumber: syz [ 1888.796558][ T7534] usb 2-1: config 0 descriptor?? [ 1889.011205][T16807] usb 2-1: USB disconnect, device number 14 [ 1889.094457][ T31] audit: type=1400 audit(1889.010:489): avc: denied { bind } for pid=16886 comm="syz.1.2850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1889.248297][ T31] audit: type=1400 audit(1889.170:490): avc: denied { accept } for pid=16886 comm="syz.1.2850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1904.521707][ T31] audit: type=1400 audit(1904.440:491): avc: denied { mount } for pid=16912 comm="syz.1.2860" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1904.575647][ T31] audit: type=1400 audit(1904.490:492): avc: denied { unmount } for pid=14936 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1916.212933][ T31] audit: type=1400 audit(1916.130:493): avc: denied { write } for pid=16932 comm="syz.1.2867" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1916.284076][ T31] audit: type=1400 audit(1916.200:494): avc: denied { ioctl } for pid=16934 comm="syz.1.2868" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=35375 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1919.076163][ T7534] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 1919.225698][ T7534] usb 2-1: Using ep0 maxpacket: 16 [ 1919.238140][ T7534] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1919.238483][ T7534] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1919.238779][ T7534] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 1919.238898][ T7534] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 1919.238943][ T7534] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1919.246397][ T7534] usb 2-1: config 0 descriptor?? [ 1919.710806][ T7534] microsoft 0003:045E:07DA.0003: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 [ 1919.711038][ T7534] microsoft 0003:045E:07DA.0003: no inputs found [ 1919.711214][ T7534] microsoft 0003:045E:07DA.0003: could not initialize ff, continuing anyway [ 1919.896465][ T7534] usb 2-1: USB disconnect, device number 15 [ 1919.988405][T16969] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2870'. [ 1920.615540][T16807] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 1920.886337][T16807] usb 2-1: Using ep0 maxpacket: 16 [ 1920.919960][T16807] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1920.921116][T16807] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 1920.927112][T16807] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 1920.928187][T16807] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1920.940541][T16807] usb 2-1: config 0 descriptor?? [ 1921.433370][T16807] HID 045e:07da: Invalid code 65791 type 1 [ 1921.446809][T16807] input: HID 045e:07da as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:045E:07DA.0004/input/input8 [ 1921.455715][T16807] microsoft 0003:045E:07DA.0004: input,hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 [ 1931.816916][ T7598] usb 2-1: USB disconnect, device number 16 [ 1935.955430][ T31] audit: type=1400 audit(1935.870:495): avc: denied { execute } for pid=17005 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1935.955701][ T31] audit: type=1400 audit(1935.870:496): avc: denied { execute_no_trans } for pid=17005 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1936.032116][ T31] audit: type=1400 audit(1935.950:497): avc: denied { mounton } for pid=17006 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1938.070411][T17006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1938.073073][T17006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1939.148236][T17006] hsr_slave_0: entered promiscuous mode [ 1939.151815][T17006] hsr_slave_1: entered promiscuous mode [ 1939.153913][T17006] debugfs: 'hsr0' already exists in 'hsr' [ 1939.154799][T17006] Cannot create hsr debugfs directory [ 1939.609944][T17006] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1939.622865][T17006] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1939.628763][T17006] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1939.637381][T17006] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1939.832925][ T31] audit: type=1400 audit(1939.750:498): avc: denied { setopt } for pid=17260 comm="syz.1.2877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1940.382194][T17006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1940.528485][ T31] audit: type=1400 audit(1940.450:499): avc: denied { create } for pid=17343 comm="syz.1.2878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1941.650062][T17355] netlink: 'syz.1.2878': attribute type 3 has an invalid length. [ 1944.319311][T17006] veth0_vlan: entered promiscuous mode [ 1944.359628][T17006] veth1_vlan: entered promiscuous mode [ 1944.472980][T17006] veth0_macvtap: entered promiscuous mode [ 1944.498878][T17006] veth1_macvtap: entered promiscuous mode [ 1944.585646][T17341] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.586348][T17341] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.586746][T17341] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.586830][T17341] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.693528][ T31] audit: type=1400 audit(1944.610:500): avc: denied { mounton } for pid=17006 comm="syz-executor" path="/syzkaller.GDfrDb/syz-tmp" dev="vda" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1944.710493][ T31] audit: type=1400 audit(1944.630:501): avc: denied { mount } for pid=17006 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1944.730096][ T31] audit: type=1400 audit(1944.650:502): avc: denied { mounton } for pid=17006 comm="syz-executor" path="/syzkaller.GDfrDb/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1944.744526][ T31] audit: type=1400 audit(1944.660:503): avc: denied { mounton } for pid=17006 comm="syz-executor" path="/syzkaller.GDfrDb/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=35665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1944.765797][ T31] audit: type=1400 audit(1944.680:504): avc: denied { unmount } for pid=17006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1944.780934][ T31] audit: type=1400 audit(1944.700:505): avc: denied { mounton } for pid=17006 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1944.785444][ T31] audit: type=1400 audit(1944.700:506): avc: denied { mount } for pid=17006 comm="syz-executor" name="/" dev="gadgetfs" ino=2003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1944.801096][ T31] audit: type=1400 audit(1944.720:507): avc: denied { mount } for pid=17006 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1944.801459][ T31] audit: type=1400 audit(1944.720:508): avc: denied { mounton } for pid=17006 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1946.118444][ T31] audit: type=1400 audit(1946.040:509): avc: denied { read } for pid=17386 comm="syz.2.2883" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1948.922594][T17408] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1948.995728][T17408] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1950.587977][T17424] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17424 comm=syz.2.2897 [ 1958.523710][T17432] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2900'. [ 1959.206559][T17437] netlink: 'syz.1.2901': attribute type 13 has an invalid length. [ 1965.666623][ T8271] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1965.720358][ T8271] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1965.796332][ T8271] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1965.838966][ T8271] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1966.113178][ T8271] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1966.140982][ T8271] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1966.151382][ T8271] bond0 (unregistering): Released all slaves [ 1966.241383][ T8271] hsr_slave_0: left promiscuous mode [ 1966.243365][ T8271] hsr_slave_1: left promiscuous mode [ 1966.258204][ T8271] veth1_macvtap: left promiscuous mode [ 1966.258563][ T8271] veth0_macvtap: left promiscuous mode [ 1966.259027][ T8271] veth1_vlan: left promiscuous mode [ 1966.259189][ T8271] veth0_vlan: left promiscuous mode [ 1967.044722][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1967.045551][ T31] audit: type=1400 audit(1966.960:511): avc: denied { write } for pid=17459 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1967.045815][ T31] audit: type=1400 audit(1966.960:512): avc: denied { open } for pid=17459 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1967.243321][ T31] audit: type=1400 audit(1967.160:513): avc: denied { search } for pid=17460 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.243659][ T31] audit: type=1400 audit(1967.160:514): avc: denied { search } for pid=17460 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.244015][ T31] audit: type=1400 audit(1967.160:515): avc: denied { search } for pid=17460 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.244151][ T31] audit: type=1400 audit(1967.160:516): avc: denied { search } for pid=17460 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.304422][ T31] audit: type=1400 audit(1967.220:517): avc: denied { read open } for pid=17461 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.318931][ T31] audit: type=1400 audit(1967.240:518): avc: denied { getattr } for pid=17461 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.418010][ T31] audit: type=1400 audit(1967.340:519): avc: denied { add_name } for pid=17460 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1967.418566][ T31] audit: type=1400 audit(1967.340:520): avc: denied { create } for pid=17460 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1975.639698][ T7598] usb 2-1: new high-speed USB device number 17 using dummy_hcd [ 1975.823929][ T7598] usb 2-1: Using ep0 maxpacket: 32 [ 1975.871957][ T7598] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1975.891578][ T7598] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1975.892120][ T7598] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1975.892184][ T7598] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1975.931320][ T7598] usb 2-1: config 0 descriptor?? [ 1975.983005][ T7598] hub 2-1:0.0: USB hub found [ 1976.221895][ T7598] hub 2-1:0.0: 1 port detected [ 1976.911456][T11187] hub 2-1:0.0: activate --> -90 [ 1977.359337][T14786] usb 2-1: USB disconnect, device number 17 [ 1977.586088][ T7534] usb 2-1-port1: config error [ 1981.866334][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 1981.866644][ T31] audit: type=1400 audit(1981.790:529): avc: denied { setopt } for pid=17545 comm="syz.1.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1981.871626][ T31] audit: type=1400 audit(1981.790:530): avc: denied { bind } for pid=17545 comm="syz.1.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1981.887073][ T31] audit: type=1400 audit(1981.810:531): avc: denied { listen } for pid=17545 comm="syz.1.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1981.890464][ T31] audit: type=1400 audit(1981.810:532): avc: denied { connect } for pid=17545 comm="syz.1.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1982.418405][T17551] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1982.420905][T17551] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1982.564550][ T31] audit: type=1400 audit(1982.480:533): avc: denied { mounton } for pid=17554 comm="syz.2.2914" path="/proc/60/task" dev="proc" ino=36968 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1982.570743][ T31] audit: type=1400 audit(1982.490:534): avc: denied { mount } for pid=17554 comm="syz.2.2914" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1982.573495][ T31] audit: type=1400 audit(1982.490:535): avc: denied { search } for pid=17554 comm="syz.2.2914" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 1982.603096][ T31] audit: type=1400 audit(1982.520:536): avc: denied { search } for pid=17554 comm="syz.2.2914" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 1984.306347][T17568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1984.309310][T17568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1999.755887][T16788] usb 2-1: new full-speed USB device number 18 using dummy_hcd [ 1999.930376][T16788] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1999.931506][T16788] usb 2-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 1999.941249][T16788] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40 [ 1999.942259][T16788] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1999.944582][T16788] usb 2-1: SerialNumber: syz [ 1999.960847][T16788] usb 2-1: bad CDC descriptors [ 1999.963078][T16788] usb-storage 2-1:1.0: USB Mass Storage device detected [ 1999.975978][T16788] usb-storage 2-1:1.0: USB Mass Storage not supported on this host controller [ 2000.020543][T16788] usb-storage 2-1:1.0: probe with driver usb-storage failed with error -22 [ 2000.158493][T16788] usb 2-1: USB disconnect, device number 18 [ 2000.555811][T16788] usb 2-1: new full-speed USB device number 19 using dummy_hcd [ 2000.741366][T16788] usb 2-1: config 0 has an invalid interface number: 133 but max is 0 [ 2000.742052][T16788] usb 2-1: config 0 has no interface number 0 [ 2000.761543][T16788] usb 2-1: New USB device found, idVendor=06cd, idProduct=0121, bcdDevice=dd.3d [ 2000.762375][T16788] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2000.763015][T16788] usb 2-1: Product: syz [ 2000.763533][T16788] usb 2-1: Manufacturer: syz [ 2000.764043][T16788] usb 2-1: SerialNumber: syz [ 2000.767755][T16788] usb 2-1: config 0 descriptor?? [ 2000.997136][T16788] keyspan 2-1:0.133: Keyspan 1 port adapter converter detected [ 2001.018090][T16788] keyspan 2-1:0.133: found no endpoint descriptor for endpoint 81 [ 2001.020551][T16788] keyspan 2-1:0.133: found no endpoint descriptor for endpoint 1 [ 2001.026053][T16788] keyspan 2-1:0.133: found no endpoint descriptor for endpoint 2 [ 2001.047242][T16788] usb 2-1: Keyspan 1 port adapter converter now attached to ttyUSB0 [ 2001.515915][T16788] usb 2-1: USB disconnect, device number 19 [ 2001.544196][T16788] keyspan_1 ttyUSB0: Keyspan 1 port adapter converter now disconnected from ttyUSB0 [ 2001.550833][T16788] keyspan 2-1:0.133: device disconnected [ 2002.419379][ T31] audit: type=1400 audit(2002.340:537): avc: denied { create } for pid=17648 comm="syz.1.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2002.440897][ T31] audit: type=1400 audit(2002.360:538): avc: denied { write } for pid=17648 comm="syz.1.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2002.442491][ T31] audit: type=1400 audit(2002.360:539): avc: denied { nlmsg_write } for pid=17648 comm="syz.1.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2002.928183][ T31] audit: type=1400 audit(2002.850:540): avc: denied { create } for pid=17652 comm="syz.1.2929" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2002.932924][ T31] audit: type=1400 audit(2002.850:541): avc: denied { write } for pid=17652 comm="syz.1.2929" name="file0" dev="tmpfs" ino=1377 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2002.936488][ T31] audit: type=1400 audit(2002.850:542): avc: denied { open } for pid=17652 comm="syz.1.2929" path="/259/file0" dev="tmpfs" ino=1377 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2003.049586][ T31] audit: type=1400 audit(2002.970:543): avc: denied { unlink } for pid=14936 comm="syz-executor" name="file0" dev="tmpfs" ino=1377 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2006.549522][T17659] syzkaller0: entered promiscuous mode [ 2006.549888][T17659] syzkaller0: entered allmulticast mode [ 2007.083840][ T31] audit: type=1400 audit(2007.000:544): avc: denied { write } for pid=17654 comm="syz.1.2930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2007.089043][ T31] audit: type=1400 audit(2007.010:545): avc: denied { read } for pid=17654 comm="syz.1.2930" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2016.275779][T14786] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 2016.427162][T14786] usb 2-1: Using ep0 maxpacket: 16 [ 2016.452009][T14786] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2016.476806][T14786] usb 2-1: New USB device found, idVendor=06cd, idProduct=0131, bcdDevice=16.60 [ 2016.477089][T14786] usb 2-1: New USB device strings: Mfr=175, Product=2, SerialNumber=3 [ 2016.477354][T14786] usb 2-1: Product: syz [ 2016.477401][T14786] usb 2-1: Manufacturer: syz [ 2016.477461][T14786] usb 2-1: SerialNumber: syz [ 2016.491302][T14786] usb 2-1: config 0 descriptor?? [ 2016.499473][T14786] keyspan 2-1:0.0: Keyspan 4 port adapter converter detected [ 2016.499922][T14786] keyspan 2-1:0.0: found no endpoint descriptor for endpoint 81 [ 2016.500001][T14786] keyspan 2-1:0.0: found no endpoint descriptor for endpoint 88 [ 2016.500850][T14786] keyspan 2-1:0.0: found no endpoint descriptor for endpoint 1 [ 2016.506831][T14786] usb 2-1: Keyspan 4 port adapter converter now attached to ttyUSB0 [ 2016.508296][T14786] keyspan 2-1:0.0: found no endpoint descriptor for endpoint 2 [ 2016.513332][T14786] usb 2-1: Keyspan 4 port adapter converter now attached to ttyUSB1 [ 2016.519210][T14786] keyspan 2-1:0.0: found no endpoint descriptor for endpoint 4 [ 2016.526146][T14786] usb 2-1: Keyspan 4 port adapter converter now attached to ttyUSB2 [ 2016.527603][T14786] keyspan 2-1:0.0: found no endpoint descriptor for endpoint 6 [ 2016.532747][T14786] usb 2-1: Keyspan 4 port adapter converter now attached to ttyUSB3 [ 2016.700734][ T7534] usb 2-1: USB disconnect, device number 20 [ 2016.707995][ T7534] keyspan_4 ttyUSB0: Keyspan 4 port adapter converter now disconnected from ttyUSB0 [ 2016.720427][ T7534] keyspan_4 ttyUSB1: Keyspan 4 port adapter converter now disconnected from ttyUSB1 [ 2016.733106][ T7534] keyspan_4 ttyUSB2: Keyspan 4 port adapter converter now disconnected from ttyUSB2 [ 2016.741947][ T7534] keyspan_4 ttyUSB3: Keyspan 4 port adapter converter now disconnected from ttyUSB3 [ 2016.746347][ T7534] keyspan 2-1:0.0: device disconnected [ 2017.639585][ T31] audit: type=1400 audit(2017.560:546): avc: denied { write } for pid=17748 comm="syz.1.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2018.466425][ T31] audit: type=1400 audit(2018.370:547): avc: denied { watch watch_reads } for pid=17780 comm="syz.2.2947" path="/syzcgroup/net/syz2/syz0" dev="cgroup" ino=268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 2018.598148][T17784] bridge_slave_0: default FDB implementation only supports local addresses [ 2018.968196][T17791] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2018.977262][T17791] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2019.299710][T17800] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2019.302434][T17800] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2019.576118][T17806] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2019.582308][T17806] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2020.618344][ T31] audit: type=1400 audit(2020.520:548): avc: denied { watch watch_reads } for pid=17854 comm="syz.1.2956" path="/267" dev="tmpfs" ino=1413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2022.635564][T12544] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 2022.821734][T12544] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2022.822157][T12544] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2022.847541][T12544] usb 2-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 2022.847718][T12544] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 2022.847831][T12544] usb 2-1: SerialNumber: syz [ 2023.064514][T12544] usb 2-1: 0:2 : does not exist [ 2023.127672][T12544] usb 2-1: USB disconnect, device number 21 [ 2023.332870][T17912] pim6reg0: tun_chr_ioctl cmd 1074812118 [ 2036.195585][ T31] audit: type=1400 audit(2036.110:549): avc: denied { append } for pid=17929 comm="syz.2.2968" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2036.379552][ T31] audit: type=1400 audit(2036.300:550): avc: denied { mounton } for pid=17936 comm="syz.2.2971" path="/58/file0" dev="tmpfs" ino=310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 2037.534246][T17958] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2037.558668][T17958] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2038.194855][T17964] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2038.205910][T17964] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2038.852174][T17970] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2038.863364][T17970] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2050.240822][T17985] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2050.246715][T17985] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2050.373614][T17989] netlink: 208 bytes leftover after parsing attributes in process `syz.2.2988'. [ 2050.375470][ T31] audit: type=1400 audit(2050.290:551): avc: denied { nlmsg_read } for pid=17988 comm="syz.2.2988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2054.891971][T17995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2054.893914][T17995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2065.740900][T17999] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 2066.966253][T18005] process 'syz.1.2993' launched './file0' with NULL argv: empty string added [ 2067.299585][ T31] audit: type=1400 audit(2067.220:552): avc: denied { bind } for pid=18013 comm="syz.1.2997" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2067.302795][ T31] audit: type=1400 audit(2067.220:553): avc: denied { name_bind } for pid=18013 comm="syz.1.2997" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2067.304236][ T31] audit: type=1400 audit(2067.220:554): avc: denied { node_bind } for pid=18013 comm="syz.1.2997" saddr=ff01::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2085.838415][ T31] audit: type=1400 audit(2085.760:555): avc: granted { setsecparam } for pid=18036 comm="syz.1.3005" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 2086.046849][ T31] audit: type=1400 audit(2085.960:556): avc: denied { ioctl } for pid=18039 comm="syz.1.3006" path="socket:[37367]" dev="sockfs" ino=37367 ioctlcmd=0x9360 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2093.374350][T18053] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2093.376939][T18053] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2093.615687][ T31] audit: type=1400 audit(2093.530:557): avc: denied { mount } for pid=18076 comm="syz.2.3012" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 2093.625515][ T31] audit: type=1400 audit(2093.540:558): avc: denied { watch watch_reads } for pid=18076 comm="syz.2.3012" path="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 2096.520541][T18085] ------------[ cut here ]------------ [ 2096.520994][T18085] WARNING: CPU: 0 PID: 18085 at ker ** replaying previous printk message ** [ 2096.520994][T18085] WARNING: CPU: 0 PID: 18085 at kernel/bpf/verifier.c:2722 reg_bounds_sanity_check+0x390/0x45c [ 2096.524900][T18085] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0x1f, 0x1f] s64=[0x1f, 0x1f] u32=[0x1f, 0x17] s32=[0x1f, 0x1f] var_off=(0x1f, 0x0)(1) [ 2096.527548][T18085] Modules linked in: [ 2096.528388][T18085] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2096.528938][T18085] CPU: 0 UID: 0 PID: 18085 Comm: syz.2.3015 Not tainted syzkaller #0 PREEMPT [ 2096.529407][T18085] Hardware name: ARM-Versatile Express [ 2096.529655][T18085] Call trace: [ 2096.529876][T18085] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2096.530283][T18085] r7:00000000 r6:8281f77c r5:00000000 r4:82260aec [ 2096.530562][T18085] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 2096.530987][T18085] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 2096.531330][T18085] r5:00000000 r4:82a77d18 [ 2096.531528][T18085] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 2096.531911][T18085] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 2096.532301][T18085] r7:803d4444 [ 2096.532445][T18085] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 2096.532817][T18085] r3:8280c684 r2:00000001 r1:82247508 r0:8224ef84 [ 2096.533107][T18085] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 2096.533442][T18085] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 2096.533866][T18085] r8:00000009 r7:822673ec r6:dfa71984 r5:84fb3000 r4:00000000 [ 2096.534238][T18085] [<80254bd0>] (warn_slowpath_fmt) from [<803d4444>] (reg_bounds_sanity_check+0x390/0x45c) [ 2096.534611][T18085] r10:b14f8000 r9:0000001f r8:00000000 r7:0000001f r6:0000001f r5:82267d48 [ 2096.535042][T18085] r4:85808168 [ 2096.535217][T18085] [<803d40b4>] (reg_bounds_sanity_check) from [<803e2910>] (reg_set_min_max+0x1b0/0x26c) [ 2096.535709][T18085] r10:00000000 r9:854ae9e0 r8:00000010 r7:b14f8000 r6:858081e0 r5:85808168 [ 2096.536021][T18085] r4:854ae968 [ 2096.536174][T18085] [<803e2760>] (reg_set_min_max) from [<803ecd18>] (check_cond_jmp_op+0x848/0x1718) [ 2096.536541][T18085] r10:854ae9e0 r9:85808000 r8:00000000 r7:83e59000 r6:85bf0d80 r5:b14f8000 [ 2096.536854][T18085] r4:df8e5078 r3:854ae968 [ 2096.537033][T18085] [<803ec4d0>] (check_cond_jmp_op) from [<803f6ea8>] (do_check_common+0x2008/0x311c) [ 2096.537389][T18085] r10:0000000f r9:b14fd000 r8:df8e5048 r7:00000009 r6:df8e5000 r5:85bf0100 [ 2096.537697][T18085] r4:b14f8000 [ 2096.538037][T18085] [<803f4ea0>] (do_check_common) from [<803fb778>] (bpf_check+0x28c8/0x3038) [ 2096.538599][T18085] r10:00000000 r9:b14f87b8 r8:b14f8000 r7:00000001 r6:b14fd000 r5:0000000e [ 2096.539055][T18085] r4:00000a7b [ 2096.539249][T18085] [<803f8eb0>] (bpf_check) from [<803cdc24>] (bpf_prog_load+0x68c/0xc20) [ 2096.539675][T18085] r10:84fb3000 r9:84ed1b30 r8:00000048 r7:dfa71d90 r6:00000000 r5:00000000 [ 2096.540045][T18085] r4:dfa71ec0 [ 2096.540213][T18085] [<803cd598>] (bpf_prog_load) from [<803cf260>] (__sys_bpf+0x42c/0x20f0) [ 2096.540661][T18085] r10:b5403587 r9:200017c0 r8:00000000 r7:00000000 r6:00000005 r5:dfa71e90 [ 2096.541122][T18085] r4:00000048 [ 2096.541292][T18085] [<803cee34>] (__sys_bpf) from [<803d14c4>] (sys_bpf+0x2c/0x48) [ 2096.541986][T18085] r10:00000182 r9:84fb3000 r8:8020029c r7:00000182 r6:002f6448 r5:00000000 [ 2096.542378][T18085] r4:00000000 [ 2096.542578][T18085] [<803d1498>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2096.542919][T18085] Exception stack(0xdfa71fa8 to 0xdfa71ff0) [ 2096.543194][T18085] 1fa0: 00000000 00000000 00000005 200017c0 00000048 00000000 [ 2096.543584][T18085] 1fc0: 00000000 00000000 002f6448 00000182 002e0000 00000000 00006364 76ef70bc [ 2096.544010][T18085] 1fe0: 76ef6ec0 76ef6eb0 0001946c 00132280 [ 2096.546146][T18085] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:10:15 Registers: info registers vcpu 0 CPU#0 R00=84158c40 R01=00000054 R02=eba1f000 R03=eba1f018 R04=83cc800f R05=84158c40 R06=80a79c5c R07=83cc80bc R08=82826ef8 R09=00000000 R10=00000bca R11=dfa71764 R12=00000002 R13=dfa71758 R14=829590c4 R15=80a79c6c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=5b721000 R01=00333735 R02=826b72c4 R03=81a3b050 R04=00000006 R05=828f7888 R06=00000000 R07=828f7880 R08=84142400 R09=00000028 R10=828f7888 R11=df9f5ad4 R12=df9f5ad8 R13=df9f5ac8 R14=8033d97c R15=81a3b060 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000