last executing test programs: 24.811111972s ago: executing program 1 (id=450): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010100000000000000002b00000008000300", @ANYRES32=r2, @ANYBLOB="04004600070034004031e300080026006c0900002c0051"], 0x5c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) 23.326017627s ago: executing program 1 (id=451): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x99d}, [@alu={0x7, 0x0, 0x6, 0xb, 0x1, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100002}, 0x94) 23.043689382s ago: executing program 1 (id=452): prlimit64(0x0, 0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) get_robust_list(0xffffffffffffffff, &(0x7f0000000300)=&(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)}, &(0x7f0000000340)=0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) 9.415068898s ago: executing program 0 (id=454): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e22, @multicast1}, {0x1}, 0x0, {0x2, 0x4e25, @private=0xa0100fd}}) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000080)=0x7, 0x4) syz_emit_ethernet(0x2e, &(0x7f00000004c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty, {[@timestamp_prespec={0x44, 0x4, 0x5, 0x3, 0x2}]}}, {0x0, 0x4e20, 0x8}}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000140), 0x40000000000006a, 0x10003, 0x0) 7.185559596s ago: executing program 1 (id=455): r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000000)=0x40b, 0x4) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000800)={0x18, r1, 0x1, 0x0, 0x0, {0x23}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x0) 7.087144088s ago: executing program 1 (id=456): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{0x0}, {0x0}], 0x2) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/partitions\x00', 0x0, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x58, 0xa) syz_usb_connect$printer(0x2, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sched_setscheduler(0x0, 0x2, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000007, 0x38011, r4, 0x0) 6.766187918s ago: executing program 0 (id=457): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r1, 0xc11, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{0x7}, {0x10, 0x1}, {0x34, 0x7}, {}], "3829b70b8285f0c2"}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) 5.149482909s ago: executing program 0 (id=458): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x6, 0x4, 0x4, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="17fa00000000090000000400000000001c110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/clear_refs\x00', 0x1, 0x0) write$sysctl(r2, &(0x7f0000000180)='4\x00', 0x2) 3.796606728s ago: executing program 0 (id=459): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi2\x00', 0xa400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000140)={'fl512\x00', [0x10, 0x2166, 0x0, 0x100000, 0x88d7, 0x2, 0x1, 0x10, 0x1002, 0xffffffff, 0x600, 0x60e7b7b4, 0x1344, 0x1, 0x7, 0x1, 0x4, 0x3, 0x9, 0xb, 0x103, 0x3, 0x7, 0xa, 0x5, 0x1, 0xb0c4, 0x4, 0x8, 0x400007, 0x1]}) 1.708730947s ago: executing program 0 (id=460): syz_open_procfs(0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000003d40), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) 451.909554ms ago: executing program 0 (id=461): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/comedi0\x00', 0x8080, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000540)={'8255\x00', [0x109, 0x80008000, 0x86b, 0xa, 0x0, 0x0, 0x1, 0x8000f, 0x1004, 0x1, 0x8, 0x5, 0x6, 0x1, 0x1138fce9, 0x6, 0xffffffa7, 0x2000001, 0xfffffffd, 0x658, 0x3ff, 0x10004, 0x800, 0xe2df, 0x9, 0x6, 0x4, 0x3, 0x7, 0x5, 0x5]}) 0s ago: executing program 1 (id=462): r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x64010102}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x40) kernel console output (not intermixed with test programs): [ 52.285730][ T31] audit: type=1400 audit(52.180:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.288053][ T31] audit: type=1400 audit(52.180:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:10993' (ED25519) to the list of known hosts. [ 65.316386][ T31] audit: type=1400 audit(65.200:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.863485][ T31] audit: type=1400 audit(66.760:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.870642][ T31] audit: type=1400 audit(66.770:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.650570][ T31] audit: type=1400 audit(69.550:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.658896][ T31] audit: type=1400 audit(69.550:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.674877][ T3093] cgroup: Unknown subsys name 'net' [ 69.685726][ T31] audit: type=1400 audit(69.580:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.915490][ T3093] cgroup: Unknown subsys name 'cpuset' [ 69.925332][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 69.926573][ T3093] cgroup: Unknown subsys name 'rlimit' [ 70.181485][ T31] audit: type=1400 audit(70.080:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.183424][ T31] audit: type=1400 audit(70.080:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.188610][ T31] audit: type=1400 audit(70.080:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.378602][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.385527][ T31] audit: type=1400 audit(70.280:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.391848][ T31] audit: type=1400 audit(70.280:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.424968][ T31] audit: type=1400 audit(70.320:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.425680][ T31] audit: type=1400 audit(70.320:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.948815][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.042938][ T31] audit: type=1400 audit(79.940:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.109134][ T31] audit: type=1400 audit(80.010:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.118129][ T31] audit: type=1400 audit(80.010:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.118510][ T31] audit: type=1400 audit(80.010:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.151816][ T31] audit: type=1400 audit(80.050:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.154251][ T31] audit: type=1400 audit(80.050:76): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.234358][ T31] audit: type=1400 audit(80.130:77): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.893771][ T31] audit: type=1400 audit(80.790:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.055069][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.062073][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.065498][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.089073][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.853279][ T3098] hsr_slave_0: entered promiscuous mode [ 82.862072][ T3098] hsr_slave_1: entered promiscuous mode [ 83.061367][ T3099] hsr_slave_0: entered promiscuous mode [ 83.062821][ T3099] hsr_slave_1: entered promiscuous mode [ 83.064188][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 83.065103][ T3099] Cannot create hsr debugfs directory [ 83.205740][ T31] audit: type=1400 audit(83.100:79): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.214238][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.214842][ T31] audit: type=1400 audit(83.110:80): avc: denied { write } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.225431][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.234559][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.253074][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.445338][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.455509][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.464612][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.473879][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.808601][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.906336][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.088919][ T3099] veth0_vlan: entered promiscuous mode [ 86.138540][ T3099] veth1_vlan: entered promiscuous mode [ 86.142818][ T3098] veth0_vlan: entered promiscuous mode [ 86.168746][ T3098] veth1_vlan: entered promiscuous mode [ 86.221256][ T3099] veth0_macvtap: entered promiscuous mode [ 86.236049][ T3099] veth1_macvtap: entered promiscuous mode [ 86.272277][ T3098] veth0_macvtap: entered promiscuous mode [ 86.296029][ T3098] veth1_macvtap: entered promiscuous mode [ 86.333552][ T3099] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.334278][ T3099] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.334397][ T3099] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.334486][ T3099] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.468993][ T3098] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.469395][ T3098] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.471117][ T3098] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.471364][ T3098] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.486763][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 86.487609][ T31] audit: type=1400 audit(86.380:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.507949][ T31] audit: type=1400 audit(86.400:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.KNl0DL/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.508334][ T31] audit: type=1400 audit(86.400:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.514972][ T31] audit: type=1400 audit(86.410:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.KNl0DL/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.521376][ T31] audit: type=1400 audit(86.420:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.KNl0DL/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.534758][ T31] audit: type=1400 audit(86.430:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.551494][ T31] audit: type=1400 audit(86.450:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.553589][ T31] audit: type=1400 audit(86.450:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.563312][ T31] audit: type=1400 audit(86.460:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.566543][ T31] audit: type=1400 audit(86.460:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.695476][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.632215][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 91.632951][ T31] audit: type=1400 audit(91.530:118): avc: denied { append } for pid=3822 comm="syz.0.12" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 91.704479][ T3823] syz.0.12 uses obsolete (PF_INET,SOCK_PACKET) [ 97.980748][ T31] audit: type=1400 audit(97.870:119): avc: denied { ioctl } for pid=3853 comm="syz.0.22" path="socket:[1911]" dev="sockfs" ino=1911 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 97.986222][ T31] audit: type=1400 audit(97.880:120): avc: denied { create } for pid=3854 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 98.021882][ T3863] syzkaller0: entered promiscuous mode [ 98.030575][ T3863] syzkaller0: entered allmulticast mode [ 99.350692][ T31] audit: type=1326 audit(99.230:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.353932][ T31] audit: type=1326 audit(99.250:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.373356][ T31] audit: type=1326 audit(99.260:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.391045][ T31] audit: type=1326 audit(99.290:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.404849][ T31] audit: type=1326 audit(99.300:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.414141][ T31] audit: type=1326 audit(99.300:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.418572][ T31] audit: type=1326 audit(99.310:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.469514][ T31] audit: type=1326 audit(99.350:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3871 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 102.205767][ T3892] SELinux: Context system_u:object_r:hald_sonypic_exec_t:s0 is not valid (left unmapped). [ 104.458565][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 104.460059][ T31] audit: type=1326 audit(104.340:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.469703][ T31] audit: type=1326 audit(104.360:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.476064][ T31] audit: type=1326 audit(104.360:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.503721][ T31] audit: type=1326 audit(104.400:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fa74 code=0x7ffc0000 [ 104.508883][ T31] audit: type=1326 audit(104.410:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.608316][ T31] audit: type=1326 audit(104.500:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.626119][ T31] audit: type=1326 audit(104.520:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.678951][ T31] audit: type=1400 audit(104.570:191): avc: denied { unlink } for pid=3098 comm="syz-executor" name="cgroup" dev="tmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 trawcon="system_u:object_r:hald_sonypic_exec_t:s0" [ 104.722284][ T31] audit: type=1326 audit(104.590:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 104.725272][ T31] audit: type=1326 audit(104.620:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.1.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 104.785245][ T3903] netlink: 'syz.1.34': attribute type 4 has an invalid length. [ 109.701605][ T3925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=3925 comm=syz.0.42 [ 109.743963][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 109.744668][ T31] audit: type=1400 audit(109.640:216): avc: denied { create } for pid=3924 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.791637][ T31] audit: type=1400 audit(109.690:217): avc: denied { connect } for pid=3924 comm="syz.0.42" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.796000][ T31] audit: type=1400 audit(109.690:218): avc: denied { ioctl } for pid=3924 comm="syz.0.42" path="socket:[2573]" dev="sockfs" ino=2573 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 109.802924][ T31] audit: type=1400 audit(109.700:219): avc: denied { bind } for pid=3924 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 109.834983][ T31] audit: type=1400 audit(109.730:220): avc: denied { write } for pid=3924 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 110.215635][ T3927] netlink: 'syz.1.34': attribute type 4 has an invalid length. [ 110.277366][ C1] hrtimer: interrupt took 7782576 ns [ 110.357944][ T31] audit: type=1400 audit(110.240:221): avc: denied { bind } for pid=3928 comm="syz.0.43" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.472180][ T31] audit: type=1400 audit(110.240:222): avc: denied { name_bind } for pid=3928 comm="syz.0.43" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 110.473869][ T31] audit: type=1400 audit(110.370:223): avc: denied { node_bind } for pid=3928 comm="syz.0.43" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 110.992758][ T31] audit: type=1400 audit(110.890:224): avc: denied { ioctl } for pid=3928 comm="syz.0.43" path="socket:[1997]" dev="sockfs" ino=1997 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 111.525035][ T31] audit: type=1400 audit(111.410:225): avc: denied { create } for pid=3928 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 129.438796][ T3862] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 129.631540][ T3862] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 129.633045][ T3862] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 129.634267][ T3862] usb 1-1: Product: syz [ 129.635065][ T3862] usb 1-1: Manufacturer: syz [ 129.635843][ T3862] usb 1-1: SerialNumber: syz [ 130.328813][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 130.330520][ T31] audit: type=1400 audit(130.230:231): avc: denied { create } for pid=3978 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 130.336782][ T31] audit: type=1400 audit(130.230:232): avc: denied { ioctl } for pid=3978 comm="syz.1.57" path="socket:[3089]" dev="sockfs" ino=3089 ioctlcmd=0x583b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 130.546334][ T31] audit: type=1400 audit(130.440:233): avc: denied { create } for pid=3982 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 130.806374][ T31] audit: type=1400 audit(130.700:234): avc: denied { create } for pid=3982 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 130.819859][ T31] audit: type=1400 audit(130.720:235): avc: denied { ioctl } for pid=3982 comm="syz.1.59" path="socket:[2639]" dev="sockfs" ino=2639 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 132.170851][ T31] audit: type=1400 audit(132.070:236): avc: denied { nlmsg_write } for pid=3998 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 132.190952][ T31] audit: type=1400 audit(132.090:237): avc: denied { ioctl } for pid=3998 comm="syz.1.64" path="socket:[3124]" dev="sockfs" ino=3124 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 133.849230][ T31] audit: type=1400 audit(133.750:238): avc: denied { setopt } for pid=4006 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.193691][ T31] audit: type=1400 audit(135.090:239): avc: denied { create } for pid=4016 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 137.184705][ T4025] FAULT_INJECTION: forcing a failure. [ 137.184705][ T4025] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 137.186282][ T4025] CPU: 1 UID: 0 PID: 4025 Comm: syz.1.72 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 137.186567][ T4025] Hardware name: ARM-Versatile Express [ 137.186892][ T4025] Call trace: [ 137.188127][ T4025] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 137.189581][ T4025] r7:dfc41e20 r6:00000000 r5:60000013 r4:8224a6e0 [ 137.189638][ T4025] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 137.189672][ T4025] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 137.189701][ T4025] r5:83b08000 r4:8294fe50 [ 137.189709][ T4025] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 137.189738][ T4025] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 137.189769][ T4025] r8:00000845 r7:dfc41e20 r6:20000200 r5:00000000 r4:dfc41f20 [ 137.189776][ T4025] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 137.189833][ T4025] [<80968d04>] (should_fail_usercopy) from [<81520ef8>] (copy_msghdr_from_user+0x50/0x130) [ 137.189906][ T4025] [<81520ea8>] (copy_msghdr_from_user) from [<81521050>] (___sys_sendmsg+0x78/0xd0) [ 137.189940][ T4025] r8:00000845 r7:00000000 r6:8518b180 r5:dfc41f20 r4:dfc41e64 [ 137.189949][ T4025] [<81520fd8>] (___sys_sendmsg) from [<8152150c>] (__sys_sendmsg+0x8c/0xe0) [ 137.190003][ T4025] r10:00000128 r9:83b08000 r8:848fd540 r7:00000845 r6:20000200 r5:848fd541 [ 137.190019][ T4025] r4:00000003 [ 137.190028][ T4025] [<81521480>] (__sys_sendmsg) from [<81521574>] (sys_sendmsg+0x14/0x18) [ 137.190082][ T4025] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 137.190090][ T4025] [<81521560>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 137.190168][ T4025] Exception stack(0xdfc41fa8 to 0xdfc41ff0) [ 137.190274][ T4025] 1fa0: 00000000 00000000 00000003 20000200 00000845 00000000 [ 137.190301][ T4025] 1fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b0e0bc [ 137.190315][ T4025] 1fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 137.666297][ T4036] FAULT_INJECTION: forcing a failure. [ 137.666297][ T4036] name failslab, interval 1, probability 0, space 0, times 1 [ 137.674607][ T4036] CPU: 1 UID: 0 PID: 4036 Comm: syz.1.77 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 137.675030][ T4036] Hardware name: ARM-Versatile Express [ 137.675384][ T4036] Call trace: [ 137.675682][ T4036] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 137.676831][ T4036] r7:8400ec00 r6:00000000 r5:60000013 r4:8224a6e0 [ 137.677010][ T4036] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 137.677080][ T4036] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 137.677137][ T4036] r5:8400ec00 r4:82918cc0 [ 137.677154][ T4036] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 137.677228][ T4036] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 137.677298][ T4036] r8:00000000 r7:8400ec00 r6:00000cc0 r5:dfd39f40 r4:830a1b40 [ 137.677319][ T4036] [<8051a470>] (should_failslab) from [<804febb8>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 137.677373][ T4036] [<804feb68>] (kmem_cache_alloc_lru_noprof) from [<80569ed0>] (__d_alloc+0x30/0x21c) [ 137.677464][ T4036] r10:00000112 r9:8244c83c r8:d269875b r7:84846800 r6:00000000 r5:dfd39f40 [ 137.677636][ T4036] r4:000001d7 [ 137.677664][ T4036] [<80569ea0>] (__d_alloc) from [<8056d1d8>] (d_alloc_parallel+0x5c/0x4ec) [ 137.677739][ T4036] r9:852e1550 r8:d269875b r7:83a8a288 r6:00000000 r5:82ac390c r4:000001d7 [ 137.677761][ T4036] [<8056d17c>] (d_alloc_parallel) from [<8055b6b0>] (__lookup_slow+0x5c/0x140) [ 137.677839][ T4036] r10:00000112 r9:852e1550 r8:dfd39f40 r7:83a8a288 r6:00000000 r5:852e1550 [ 137.677862][ T4036] r4:852e1550 [ 137.677880][ T4036] [<8055b654>] (__lookup_slow) from [<8055b7f8>] (lookup_noperm+0x64/0x9c) [ 137.677948][ T4036] r9:852e1550 r8:8478f250 r7:00000800 r6:8400ec00 r5:dfd39f40 r4:852e1550 [ 137.677966][ T4036] [<8055b794>] (lookup_noperm) from [<80753ec8>] (sys_mq_open+0x160/0x354) [ 137.678061][ T4036] r5:00000004 r4:832e3000 [ 137.678223][ T4036] [<80753d68>] (sys_mq_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 137.678357][ T4036] Exception stack(0xdfd39fa8 to 0xdfd39ff0) [ 137.678566][ T4036] 9fa0: 00000000 00000000 20000280 00000800 0000001e 00000000 [ 137.678626][ T4036] 9fc0: 00000000 00000000 0012ff70 00000112 002e0000 00000000 00006364 76b0e0bc [ 137.678658][ T4036] 9fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 137.678733][ T4036] r10:00000112 r9:8400ec00 r8:8020029c r7:00000112 r6:0012ff70 r5:00000000 [ 137.678762][ T4036] r4:00000000 [ 139.028531][ T4043] FAULT_INJECTION: forcing a failure. [ 139.028531][ T4043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.031234][ T4043] CPU: 0 UID: 0 PID: 4043 Comm: syz.1.80 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 139.031358][ T4043] Hardware name: ARM-Versatile Express [ 139.031391][ T4043] Call trace: [ 139.031445][ T4043] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 139.031570][ T4043] r7:00000000 r6:00000000 r5:60000013 r4:8224a6e0 [ 139.031591][ T4043] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 139.031645][ T4043] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 139.031700][ T4043] r5:83b0a400 r4:8294fe50 [ 139.031716][ T4043] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 139.031775][ T4043] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 139.031833][ T4043] r8:76aecf30 r7:00000000 r6:00000000 r5:dfd99f68 r4:00000002 [ 139.031851][ T4043] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 139.031899][ T4043] [<80968d04>] (should_fail_usercopy) from [<80586e78>] (simple_read_from_buffer+0x80/0x13c) [ 139.031958][ T4043] [<80586df8>] (simple_read_from_buffer) from [<80600610>] (proc_fail_nth_read+0xb8/0x108) [ 139.032041][ T4043] r10:00000001 r9:80600558 r8:00000002 r7:dfd99f68 r6:0000000f r5:76aecf30 [ 139.032064][ T4043] r4:83b0a400 r3:dfd99e9f [ 139.032084][ T4043] [<80600558>] (proc_fail_nth_read) from [<8054beb0>] (vfs_read+0x98/0x320) [ 139.032152][ T4043] r8:76aecf30 r7:dfd99f68 r6:83b0a400 r5:0000000f r4:85520f00 [ 139.032168][ T4043] [<8054be18>] (vfs_read) from [<8054cb58>] (ksys_read+0x74/0xe8) [ 139.032225][ T4043] r10:00000003 r9:83b0a400 r8:8020029c r7:00000000 r6:00000000 r5:85520f00 [ 139.032245][ T4043] r4:85520f03 [ 139.032264][ T4043] [<8054cae4>] (ksys_read) from [<8054cbdc>] (sys_read+0x10/0x14) [ 139.032324][ T4043] r7:00000003 r6:00000005 r5:76aecf30 r4:0000000f [ 139.032343][ T4043] [<8054cbcc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 139.032390][ T4043] Exception stack(0xdfd99fa8 to 0xdfd99ff0) [ 139.032428][ T4043] 9fa0: 0000000f 76aecf30 00000005 76aecf30 0000000f 00000000 [ 139.032461][ T4043] 9fc0: 0000000f 76aecf30 00000005 00000003 002e0000 00000000 00006364 76aed0bc [ 139.032487][ T4043] 9fe0: 00000158 76aeced0 000d7df0 0012fe94 [ 139.212070][ T723] usb 1-1: USB disconnect, device number 2 [ 139.986215][ T4068] FAULT_INJECTION: forcing a failure. [ 139.986215][ T4068] name failslab, interval 1, probability 0, space 0, times 0 [ 139.986803][ T4068] CPU: 0 UID: 0 PID: 4068 Comm: syz.0.87 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 139.986953][ T4068] Hardware name: ARM-Versatile Express [ 139.987018][ T4068] Call trace: [ 139.987061][ T4068] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 139.987167][ T4068] r7:8412bc00 r6:00000000 r5:60000013 r4:8224a6e0 [ 139.987186][ T4068] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 139.987236][ T4068] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 139.987356][ T4068] r5:8412bc00 r4:82918cc0 [ 139.987374][ T4068] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 139.987435][ T4068] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 139.987500][ T4068] r8:00000000 r7:8412bc00 r6:00000cc0 r5:20000340 r4:830a1a80 [ 139.987518][ T4068] [<8051a470>] (should_failslab) from [<804feeec>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 139.987564][ T4068] [<804feea0>] (kmem_cache_alloc_noprof) from [<8055b4f0>] (getname_flags.part.0+0x28/0x18c) [ 139.987627][ T4068] r10:00000112 r9:8362c7f8 r8:848e3490 r7:00000000 r6:8244c848 r5:20000340 [ 139.987648][ T4068] r4:20000340 [ 139.987662][ T4068] [<8055b4c8>] (getname_flags.part.0) from [<8056048c>] (getname_flags+0x3c/0x50) [ 139.987723][ T4068] r9:8362c7f8 r8:848e3490 r7:00000002 r6:8412bc00 r5:00000000 r4:20000340 [ 139.987740][ T4068] [<80560450>] (getname_flags) from [<80753e5c>] (sys_mq_open+0xf4/0x354) [ 139.987788][ T4068] r5:00000000 r4:20000340 [ 139.987805][ T4068] [<80753d68>] (sys_mq_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 139.987849][ T4068] Exception stack(0xdfd21fa8 to 0xdfd21ff0) [ 139.987980][ T4068] 1fa0: 00000000 00000000 20000340 00000002 00000111 00000000 [ 139.988080][ T4068] 1fc0: 00000000 00000000 0012ff70 00000112 002e0000 00000000 00006364 76bfd0bc [ 139.988126][ T4068] 1fe0: 76bfcec0 76bfceb0 000193a4 00131fc0 [ 139.988195][ T4068] r10:00000112 r9:8412bc00 r8:8020029c r7:00000112 r6:0012ff70 r5:00000000 [ 139.988239][ T4068] r4:00000000 [ 140.774479][ T31] audit: type=1400 audit(140.670:240): avc: denied { write } for pid=4078 comm="syz.1.92" name="netstat" dev="proc" ino=4026532773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 143.559828][ T31] audit: type=1400 audit(143.450:241): avc: denied { append } for pid=4097 comm="syz.0.98" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 143.739057][ T31] audit: type=1400 audit(143.640:242): avc: denied { create } for pid=4101 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 143.755019][ T31] audit: type=1400 audit(143.650:243): avc: denied { write } for pid=4101 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 144.424189][ T31] audit: type=1400 audit(144.320:244): avc: denied { setattr } for pid=4111 comm="syz.1.103" path="pipe:[3314]" dev="pipefs" ino=3314 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 144.439559][ T31] audit: type=1400 audit(144.340:245): avc: denied { map } for pid=4111 comm="syz.1.103" path="pipe:[3314]" dev="pipefs" ino=3314 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 145.424331][ T31] audit: type=1400 audit(145.320:246): avc: denied { setopt } for pid=4121 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.515998][ T4125] FAULT_INJECTION: forcing a failure. [ 145.515998][ T4125] name failslab, interval 1, probability 0, space 0, times 0 [ 145.518650][ T4125] CPU: 1 UID: 0 PID: 4125 Comm: syz.0.108 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 145.518755][ T4125] Hardware name: ARM-Versatile Express [ 145.518782][ T4125] Call trace: [ 145.518830][ T4125] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 145.519074][ T4125] r7:8412bc00 r6:00000000 r5:60000013 r4:8224a6e0 [ 145.519123][ T4125] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 145.519192][ T4125] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 145.519250][ T4125] r5:8412bc00 r4:82918cc0 [ 145.519267][ T4125] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 145.519348][ T4125] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 145.519416][ T4125] r8:00000000 r7:8412bc00 r6:00000d40 r5:8518f730 r4:830a1600 [ 145.519433][ T4125] [<8051a470>] (should_failslab) from [<804feeec>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 145.519482][ T4125] [<804feea0>] (kmem_cache_alloc_noprof) from [<80770fdc>] (security_inode_alloc+0x30/0x1e8) [ 145.519549][ T4125] r10:8518f838 r9:00000000 r8:00000000 r7:00000c40 r6:8309d800 r5:8518f730 [ 145.519566][ T4125] r4:8518f730 [ 145.519618][ T4125] [<80770fac>] (security_inode_alloc) from [<8056f094>] (inode_init_always_gfp+0x188/0x1dc) [ 145.519722][ T4125] r5:00000000 r4:8518f730 [ 145.519786][ T4125] [<8056ef0c>] (inode_init_always_gfp) from [<805726fc>] (alloc_inode+0x40/0xcc) [ 145.519854][ T4125] r10:8309d800 r9:81c20fc0 r8:00000000 r7:849fc190 r6:81c20f08 r5:8309d800 [ 145.519900][ T4125] r4:8518f730 r3:8412bc00 [ 145.519920][ T4125] [<805726bc>] (alloc_inode) from [<80588f40>] (path_from_stashed+0xc0/0x204) [ 145.519982][ T4125] r7:849fc190 r6:849fc190 r5:e0561e5c r4:830b0250 [ 145.520000][ T4125] [<80588e80>] (path_from_stashed) from [<8059b790>] (open_namespace+0x44/0xbc) [ 145.520099][ T4125] r10:8412bc00 r9:00000003 r8:85c50540 r7:84166890 r6:8412bc00 r5:00000000 [ 145.520122][ T4125] r4:848b8898 [ 145.520152][ T4125] [<8059b74c>] (open_namespace) from [<805a1080>] (pidfd_ioctl+0x3f4/0x9dc) [ 145.520257][ T4125] r6:84166000 r5:849fc190 r4:848b8898 [ 145.520280][ T4125] [<805a0c8c>] (pidfd_ioctl) from [<80565734>] (sys_ioctl+0x130/0xba0) [ 145.520338][ T4125] r10:8412bc00 r9:00000003 r8:85c50540 r7:00000000 r6:85c50541 r5:00000000 [ 145.520449][ T4125] r4:0000ff0a [ 145.520475][ T4125] [<80565604>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 145.520526][ T4125] Exception stack(0xe0561fa8 to 0xe0561ff0) [ 145.520710][ T4125] 1fa0: 00000000 00000000 00000003 0000ff0a 00000000 00000000 [ 145.520752][ T4125] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bfd0bc [ 145.520778][ T4125] 1fe0: 76bfcec0 76bfceb0 000193a4 00131fc0 [ 145.520813][ T4125] r10:00000036 r9:8412bc00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 145.520831][ T4125] r4:00000000 [ 146.203982][ T31] audit: type=1400 audit(146.100:247): avc: denied { getopt } for pid=4126 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 146.355313][ T31] audit: type=1400 audit(146.250:248): avc: denied { create } for pid=4126 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 148.501047][ T31] audit: type=1400 audit(148.400:249): avc: denied { setopt } for pid=4139 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.283309][ T4147] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 149.333660][ T31] audit: type=1400 audit(149.230:250): avc: denied { ioctl } for pid=4146 comm="syz.1.117" path="socket:[3386]" dev="sockfs" ino=3386 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 149.366505][ T31] audit: type=1400 audit(149.260:251): avc: denied { accept } for pid=4146 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.489122][ T4147] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pid=4147 comm=syz.1.117 [ 151.938334][ T31] audit: type=1400 audit(151.830:252): avc: denied { audit_write } for pid=4153 comm="syz.1.119" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 152.251218][ T31] audit: type=1400 audit(152.140:253): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 153.005390][ T31] audit: type=1400 audit(152.900:254): avc: denied { create } for pid=4162 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 153.057713][ T31] audit: type=1400 audit(152.950:255): avc: denied { getopt } for pid=4162 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 153.076433][ T31] audit: type=1400 audit(152.970:256): avc: denied { setopt } for pid=4162 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 153.103289][ T31] audit: type=1400 audit(153.000:257): avc: denied { ioctl } for pid=4162 comm="syz.1.122" path="socket:[3413]" dev="sockfs" ino=3413 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 154.558405][ T31] audit: type=1400 audit(154.460:258): avc: denied { create } for pid=4166 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 154.568047][ T31] audit: type=1400 audit(154.460:259): avc: denied { setopt } for pid=4166 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 154.583364][ T31] audit: type=1400 audit(154.480:260): avc: denied { ioctl } for pid=4166 comm="syz.0.124" path="socket:[3430]" dev="sockfs" ino=3430 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 154.615473][ T31] audit: type=1400 audit(154.510:261): avc: denied { write } for pid=4166 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 154.621362][ T4170] FAULT_INJECTION: forcing a failure. [ 154.621362][ T4170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.626073][ T4170] CPU: 1 UID: 0 PID: 4170 Comm: syz.1.125 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 154.626262][ T4170] Hardware name: ARM-Versatile Express [ 154.626297][ T4170] Call trace: [ 154.626343][ T4170] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 154.626457][ T4170] r7:20000080 r6:00000000 r5:60000013 r4:8224a6e0 [ 154.626479][ T4170] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 154.626534][ T4170] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 154.626595][ T4170] r5:83b08c00 r4:8294fe50 [ 154.626613][ T4170] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 154.626678][ T4170] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 154.626745][ T4170] r8:00000000 r7:20000080 r6:8331c480 r5:00000000 r4:e0405f20 [ 154.626763][ T4170] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 154.626818][ T4170] [<80968d04>] (should_fail_usercopy) from [<808ac428>] (_copy_from_iter+0x6c/0x7c8) [ 154.626988][ T4170] [<808ac3bc>] (_copy_from_iter) from [<8164c2b0>] (netlink_sendmsg+0x18c/0x444) [ 154.627101][ T4170] r10:00000000 r9:00000000 r8:e0405f30 r7:85cc8000 r6:00000014 r5:8480eb40 [ 154.627124][ T4170] r4:e0405f20 [ 154.627144][ T4170] [<8164c124>] (netlink_sendmsg) from [<8151dd58>] (__sock_sendmsg+0x44/0x78) [ 154.627216][ T4170] r10:00000000 r9:e0405dc4 r8:e0405dc4 r7:00000000 r6:8518b900 r5:e0405f20 [ 154.627239][ T4170] r4:00000000 [ 154.627258][ T4170] [<8151dd14>] (__sock_sendmsg) from [<8151f0ac>] (____sys_sendmsg+0x298/0x2cc) [ 154.627317][ T4170] r7:00000000 r6:8518b900 r5:00000004 r4:e0405f20 [ 154.627335][ T4170] [<8151ee14>] (____sys_sendmsg) from [<81521074>] (___sys_sendmsg+0x9c/0xd0) [ 154.627530][ T4170] r10:e0405e24 r9:20000140 r8:00000004 r7:00000000 r6:8518b900 r5:e0405f20 [ 154.627556][ T4170] r4:00000000 [ 154.627574][ T4170] [<81520fd8>] (___sys_sendmsg) from [<8152150c>] (__sys_sendmsg+0x8c/0xe0) [ 154.627643][ T4170] r10:00000128 r9:83b08c00 r8:85c50840 r7:00000004 r6:20000140 r5:85c50841 [ 154.627664][ T4170] r4:00000004 [ 154.627681][ T4170] [<81521480>] (__sys_sendmsg) from [<81521574>] (sys_sendmsg+0x14/0x18) [ 154.627745][ T4170] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 154.627763][ T4170] [<81521560>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 154.627815][ T4170] Exception stack(0xe0405fa8 to 0xe0405ff0) [ 154.627855][ T4170] 5fa0: 00000000 00000000 00000004 20000140 00000004 00000000 [ 154.627899][ T4170] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b0e0bc [ 154.627928][ T4170] 5fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 155.277607][ T4175] FAULT_INJECTION: forcing a failure. [ 155.277607][ T4175] name failslab, interval 1, probability 0, space 0, times 0 [ 155.278147][ T4175] CPU: 0 UID: 0 PID: 4175 Comm: syz.1.127 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 155.278230][ T4175] Hardware name: ARM-Versatile Express [ 155.278257][ T4175] Call trace: [ 155.278301][ T4175] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 155.278426][ T4175] r7:00000c40 r6:00000000 r5:60000013 r4:8224a6e0 [ 155.278449][ T4175] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 155.278498][ T4175] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 155.278549][ T4175] r5:83b0b000 r4:82918cc0 [ 155.278564][ T4175] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 155.278618][ T4175] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 155.278677][ T4175] r8:83b0b000 r7:00000c40 r6:85520c28 r5:00001000 r4:830016c0 [ 155.278722][ T4175] [<8051a470>] (should_failslab) from [<804ff270>] (__kmalloc_noprof+0x9c/0x458) [ 155.279341][ T4175] [<804ff1d4>] (__kmalloc_noprof) from [<807ba364>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 155.279984][ T4175] r10:83b0b000 r9:8337e800 r8:00000000 r7:834c9088 r6:85520c28 r5:00001000 [ 155.280261][ T4175] r4:00000000 [ 155.280367][ T4175] [<807ba328>] (tomoyo_realpath_from_path) from [<807b64a8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 155.280443][ T4175] r10:83b0b000 r9:00000000 r8:85520c00 r7:00005450 r6:00000004 r5:81cd64c4 [ 155.280469][ T4175] r4:85520c28 r3:826c0200 [ 155.280489][ T4175] [<807b63dc>] (tomoyo_path_number_perm) from [<807bad88>] (tomoyo_file_ioctl+0x1c/0x20) [ 155.280660][ T4175] r9:00000003 r8:85520c00 r7:00000000 r6:00000000 r5:00005450 r4:85520c00 [ 155.280854][ T4175] [<807bad6c>] (tomoyo_file_ioctl) from [<8076761c>] (security_file_ioctl+0x64/0x1e4) [ 155.281093][ T4175] [<807675b8>] (security_file_ioctl) from [<80565650>] (sys_ioctl+0x4c/0xba0) [ 155.281332][ T4175] r7:00000000 r6:85520c01 r5:00000000 r4:00005450 [ 155.281517][ T4175] [<80565604>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 155.281567][ T4175] Exception stack(0xea6d5fa8 to 0xea6d5ff0) [ 155.281625][ T4175] 5fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 155.281834][ T4175] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b0e0bc [ 155.282006][ T4175] 5fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 155.282150][ T4175] r10:00000036 r9:83b0b000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 155.282169][ T4175] r4:00000000 [ 155.283456][ T4175] ERROR: Out of memory at tomoyo_realpath_from_path. [ 158.318542][ T4182] fuse: Bad value for 'fd' [ 168.280965][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 168.286791][ T31] audit: type=1400 audit(168.180:263): avc: denied { shutdown } for pid=4227 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 168.358915][ T31] audit: type=1400 audit(168.260:264): avc: denied { create } for pid=4227 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 168.363648][ T31] audit: type=1400 audit(168.260:265): avc: denied { write } for pid=4227 comm="syz.1.144" path="socket:[3528]" dev="sockfs" ino=3528 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 168.591207][ T4233] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 168.611756][ T31] audit: type=1400 audit(168.510:266): avc: denied { getopt } for pid=4231 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 168.851956][ T31] audit: type=1400 audit(168.750:267): avc: denied { name_bind } for pid=4236 comm="syz.0.148" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 168.884007][ T31] audit: type=1400 audit(168.780:268): avc: denied { bind } for pid=4236 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 168.892080][ T31] audit: type=1400 audit(168.790:269): avc: denied { accept } for pid=4236 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 169.049676][ T31] audit: type=1400 audit(168.950:270): avc: denied { mounton } for pid=4238 comm="syz.0.149" path="/73/file0" dev="tmpfs" ino=399 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 170.123326][ T31] audit: type=1400 audit(170.020:271): avc: denied { ioctl } for pid=4238 comm="syz.0.149" path="socket:[4176]" dev="sockfs" ino=4176 ioctlcmd=0x6403 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 170.157511][ T31] audit: type=1400 audit(170.050:272): avc: denied { execute } for pid=4238 comm="syz.0.149" dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 170.160323][ T4240] process 'syz.0.149' launched '/dev/fd/3' with NULL argv: empty string added [ 171.475647][ T4257] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4257 comm=syz.1.155 [ 172.000706][ T4265] FAULT_INJECTION: forcing a failure. [ 172.000706][ T4265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.001987][ T4265] CPU: 0 UID: 0 PID: 4265 Comm: syz.1.158 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 172.002059][ T4265] Hardware name: ARM-Versatile Express [ 172.002074][ T4265] Call trace: [ 172.002097][ T4265] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 172.002180][ T4265] r7:20000080 r6:00000000 r5:60000013 r4:8224a6e0 [ 172.002190][ T4265] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 172.002219][ T4265] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 172.002248][ T4265] r5:83b09800 r4:8294fe50 [ 172.002256][ T4265] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 172.002287][ T4265] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 172.002320][ T4265] r8:20000080 r7:20000080 r6:00001000 r5:85d317c0 r4:0000000c [ 172.002329][ T4265] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 172.002354][ T4265] [<80968d04>] (should_fail_usercopy) from [<80498b34>] (vmemdup_user+0x40/0x16c) [ 172.002383][ T4265] [<80498af4>] (vmemdup_user) from [<8058479c>] (setxattr_copy+0x58/0x90) [ 172.002418][ T4265] r9:83b09800 r8:20000080 r7:00000003 r6:00001000 r5:00000000 r4:dfcc5e48 [ 172.002427][ T4265] [<80584744>] (setxattr_copy) from [<805849a8>] (path_setxattrat+0x7c/0x17c) [ 172.002454][ T4265] r5:00000000 r4:20000040 [ 172.002463][ T4265] [<8058492c>] (path_setxattrat) from [<80584ca8>] (sys_fsetxattr+0x30/0x38) [ 172.002495][ T4265] r8:8020029c r7:000000e4 r6:0012ff70 r5:00000000 r4:00000001 [ 172.002504][ T4265] [<80584c78>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 172.002527][ T4265] Exception stack(0xdfcc5fa8 to 0xdfcc5ff0) [ 172.002547][ T4265] 5fa0: 00000001 00000000 00000003 20000040 20000080 0000000c [ 172.002564][ T4265] 5fc0: 00000001 00000000 0012ff70 000000e4 002e0000 00000000 00006364 76b0e0bc [ 172.002578][ T4265] 5fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 172.381888][ T4273] FAULT_INJECTION: forcing a failure. [ 172.381888][ T4273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.384282][ T4273] CPU: 0 UID: 0 PID: 4273 Comm: syz.1.161 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 172.384409][ T4273] Hardware name: ARM-Versatile Express [ 172.384440][ T4273] Call trace: [ 172.384484][ T4273] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 172.384627][ T4273] r7:84ad0c00 r6:00000000 r5:60000013 r4:8224a6e0 [ 172.384650][ T4273] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 172.384704][ T4273] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 172.384760][ T4273] r5:83b25400 r4:8294fe50 [ 172.384779][ T4273] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 172.384867][ T4273] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 172.385007][ T4273] r8:00000000 r7:84ad0c00 r6:dfd35e28 r5:00000000 r4:00000000 [ 172.385025][ T4273] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 172.385102][ T4273] [<80968d04>] (should_fail_usercopy) from [<81522af8>] (copy_to_sockptr_offset+0x64/0x108) [ 172.385173][ T4273] [<81522a94>] (copy_to_sockptr_offset) from [<8152957c>] (sk_getsockopt+0x29c/0xe84) [ 172.385233][ T4273] r7:84ad0c00 r6:00000004 r5:dfd35e1c r4:00000000 [ 172.385293][ T4273] [<815292e4>] (sk_getsockopt) from [<8151ed30>] (do_sock_getsockopt+0x108/0x1ec) [ 172.385358][ T4273] r10:00000127 r9:83b25400 r8:20000180 r7:b5403587 r6:84c5bb80 r5:00000053 [ 172.385376][ T4273] r4:00000001 [ 172.385392][ T4273] [<8151ec28>] (do_sock_getsockopt) from [<81520c38>] (__sys_getsockopt+0x94/0xdc) [ 172.385468][ T4273] r8:846d5000 r7:dfd35f50 r6:00000053 r5:dfd35f58 r4:846d5001 [ 172.385488][ T4273] [<81520ba4>] (__sys_getsockopt) from [<81520c9c>] (sys_getsockopt+0x1c/0x24) [ 172.385543][ T4273] r8:8020029c r7:00000127 r6:0012ff70 r5:00000000 r4:20000180 [ 172.385560][ T4273] [<81520c80>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 172.385670][ T4273] Exception stack(0xdfd35fa8 to 0xdfd35ff0) [ 172.385710][ T4273] 5fa0: 20000180 00000000 00000003 00000001 00000053 00000000 [ 172.385741][ T4273] 5fc0: 20000180 00000000 0012ff70 00000127 002e0000 00000000 00006364 76b0e0bc [ 172.385764][ T4273] 5fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 172.895851][ T4283] fuse: Unknown parameter 'rotmode' [ 175.480671][ T4300] FAULT_INJECTION: forcing a failure. [ 175.480671][ T4300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.481175][ T4300] CPU: 1 UID: 0 PID: 4300 Comm: syz.1.171 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 175.481265][ T4300] Hardware name: ARM-Versatile Express [ 175.481294][ T4300] Call trace: [ 175.481343][ T4300] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 175.481526][ T4300] r7:dfdedd78 r6:00000000 r5:60000013 r4:8224a6e0 [ 175.481549][ T4300] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 175.481608][ T4300] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 175.481663][ T4300] r5:83b0a400 r4:8294fe50 [ 175.481707][ T4300] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 175.481874][ T4300] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 175.481972][ T4300] r8:00008000 r7:dfdedd78 r6:20000b40 r5:00000000 r4:dfdede90 [ 175.482039][ T4300] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 175.482270][ T4300] [<80968d04>] (should_fail_usercopy) from [<81520ef8>] (copy_msghdr_from_user+0x50/0x130) [ 175.482459][ T4300] [<81520ea8>] (copy_msghdr_from_user) from [<81521050>] (___sys_sendmsg+0x78/0xd0) [ 175.482682][ T4300] r8:00008000 r7:dfdeded8 r6:84c5a500 r5:dfdede90 r4:dfdeddbc [ 175.483009][ T4300] [<81520fd8>] (___sys_sendmsg) from [<8152166c>] (__sys_sendmmsg+0xf4/0x1cc) [ 175.483084][ T4300] r10:b5403587 r9:00008000 r8:dfdeded8 r7:00008000 r6:00000001 r5:00000000 [ 175.483198][ T4300] r4:20000b40 [ 175.483407][ T4300] [<81521578>] (__sys_sendmmsg) from [<81521760>] (sys_sendmmsg+0x1c/0x24) [ 175.483632][ T4300] r10:00000176 r9:83b0a400 r8:8020029c r7:00000176 r6:0012ff70 r5:00000000 [ 175.483892][ T4300] r4:00000000 [ 175.484205][ T4300] [<81521744>] (sys_sendmmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 175.484502][ T4300] Exception stack(0xdfdedfa8 to 0xdfdedff0) [ 175.485092][ T4300] dfa0: 00000000 00000000 00000003 20000b40 00000001 00008000 [ 175.485156][ T4300] dfc0: 00000000 00000000 0012ff70 00000176 002e0000 00000000 00006364 76b0e0bc [ 175.485306][ T4300] dfe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 177.210197][ T3915] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 177.407916][ T3915] usb 2-1: Using ep0 maxpacket: 32 [ 177.484590][ T3915] usb 2-1: config 1 interface 0 altsetting 6 endpoint 0x81 has an invalid bInterval 161, changing to 11 [ 177.498577][ T3915] usb 2-1: config 1 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 177.501106][ T3915] usb 2-1: config 1 interface 0 has no altsetting 0 [ 177.534684][ T3915] usb 2-1: New USB device found, idVendor=1e7d, idProduct=3232, bcdDevice= 0.40 [ 177.535217][ T3915] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 177.535572][ T3915] usb 2-1: Product: 아醢ꋽ鮦βꩉ樼㪁ⴐ㧤露ퟪᘙ໻蠄⪯픪챺ᔛ찂朕掀烘熏嵧蝫ᓆ橚쫛슀ꐚ杝抖稱Ϯ婹嵋⹔콳纤媣쇜弌곔菅锰孥㬥卲䰏鶻栌鲉獮瘪뭃㕹棌㲌⏱덶ﻝ狲難欶탶瑒㩁쮨띭幚댿ୱ♿⭕ﯛ鰋ꋧ붇ﲹ娈쁏Ⱨ䟛ꝗ繍嚼眿袷菐᷸ [ 177.535814][ T3915] usb 2-1: Manufacturer: 僽顋攉蕎뎯࿪쒔䵰ᇾ㰾纂꒥ͱ藪軅ꊔ鿓☜皲霄뀫峑옶씾胿ࣚꄕ㊻璩෌풜韎솖汙 [ 177.536047][ T3915] usb 2-1: SerialNumber:  [ 182.678154][ T3915] usbhid 2-1:1.0: can't add hid device: -32 [ 182.685750][ T3915] usbhid 2-1:1.0: probe with driver usbhid failed with error -32 [ 183.223659][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 183.226754][ T31] audit: type=1400 audit(183.120:279): avc: denied { connect } for pid=4342 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 183.732262][ T31] audit: type=1400 audit(183.630:280): avc: denied { ioctl } for pid=4342 comm="syz.0.180" path="socket:[4364]" dev="sockfs" ino=4364 ioctlcmd=0x8980 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 186.960015][ T4351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4351 comm=syz.0.182 [ 187.070177][ T4353] random: crng reseeded on system resumption [ 187.089849][ T4353] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4353 comm=syz.0.183 [ 187.488747][ T31] audit: type=1400 audit(187.390:281): avc: denied { setopt } for pid=4357 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 187.615780][ T4360] syz_tun: entered promiscuous mode [ 187.813697][ T3873] usb 2-1: USB disconnect, device number 2 [ 188.859896][ T31] audit: type=1400 audit(188.760:282): avc: denied { create } for pid=4373 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 188.929755][ T31] audit: type=1400 audit(188.830:283): avc: denied { setattr } for pid=4373 comm="syz.0.189" name="NETLINK" dev="sockfs" ino=3731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 189.695969][ T4380] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4380 comm=syz.1.190 [ 189.713233][ T4380] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4380 comm=syz.1.190 [ 190.399886][ T31] audit: type=1400 audit(190.300:284): avc: denied { read } for pid=4397 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 192.804492][ T31] audit: type=1400 audit(192.700:285): avc: denied { accept } for pid=4412 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 194.381267][ T31] audit: type=1400 audit(194.280:286): avc: denied { ioctl } for pid=4423 comm="syz.1.205" path="socket:[4455]" dev="sockfs" ino=4455 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 198.076779][ T4431] FAULT_INJECTION: forcing a failure. [ 198.076779][ T4431] name failslab, interval 1, probability 0, space 0, times 0 [ 198.078294][ T4431] CPU: 1 UID: 0 PID: 4431 Comm: syz.1.207 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 198.078383][ T4431] Hardware name: ARM-Versatile Express [ 198.078410][ T4431] Call trace: [ 198.078466][ T4431] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 198.078597][ T4431] r7:83b0b000 r6:00000000 r5:60000013 r4:8224a6e0 [ 198.078622][ T4431] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 198.078678][ T4431] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 198.078736][ T4431] r5:83b0b000 r4:82918cc0 [ 198.078752][ T4431] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 198.078810][ T4431] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 198.078872][ T4431] r8:00000000 r7:83b0b000 r6:00000d40 r5:8518a800 r4:830a1600 [ 198.078900][ T4431] [<8051a470>] (should_failslab) from [<804feeec>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 198.078953][ T4431] [<804feea0>] (kmem_cache_alloc_noprof) from [<80770fdc>] (security_inode_alloc+0x30/0x1e8) [ 198.079311][ T4431] r10:8518a908 r9:00000000 r8:00000000 r7:00000c40 r6:83351000 r5:8518a800 [ 198.079388][ T4431] r4:8518a800 [ 198.079572][ T4431] [<80770fac>] (security_inode_alloc) from [<8056f094>] (inode_init_always_gfp+0x188/0x1dc) [ 198.079663][ T4431] r5:00000000 r4:8518a800 [ 198.079707][ T4431] [<8056ef0c>] (inode_init_always_gfp) from [<805726fc>] (alloc_inode+0x40/0xcc) [ 198.079799][ T4431] r10:0000016e r9:85f359c0 r8:00000000 r7:00000000 r6:81e46340 r5:83351000 [ 198.079842][ T4431] r4:8518a800 r3:00000000 [ 198.079901][ T4431] [<805726bc>] (alloc_inode) from [<8151d024>] (sock_alloc+0x20/0x70) [ 198.079973][ T4431] r7:00000000 r6:dfbcdf5c r5:00080000 r4:8518aa00 [ 198.079993][ T4431] [<8151d004>] (sock_alloc) from [<8152019c>] (do_accept+0x64/0x174) [ 198.080052][ T4431] r5:00080000 r4:8518aa00 [ 198.080071][ T4431] [<81520138>] (do_accept) from [<81520334>] (__sys_accept4+0x88/0xf4) [ 198.080142][ T4431] r10:0000016e r9:85f359c0 r8:00000000 r7:00000000 r6:00000008 r5:00080000 [ 198.080220][ T4431] r4:85f359c1 [ 198.080256][ T4431] [<815202ac>] (__sys_accept4) from [<815203b0>] (sys_accept4+0x10/0x14) [ 198.080337][ T4431] r9:83b0b000 r8:8020029c r7:0000016e r6:0012ff70 r5:00000000 r4:00000000 [ 198.080356][ T4431] [<815203a0>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 198.080403][ T4431] Exception stack(0xdfbcdfa8 to 0xdfbcdff0) [ 198.080463][ T4431] dfa0: 00000000 00000000 00000005 00000000 00000000 00080000 [ 198.080600][ T4431] dfc0: 00000000 00000000 0012ff70 0000016e 002e0000 00000000 00006364 76b0e0bc [ 198.080657][ T4431] dfe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 200.642608][ T31] audit: type=1400 audit(200.540:287): avc: denied { write } for pid=4440 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 206.062274][ T31] audit: type=1400 audit(205.960:288): avc: denied { associate } for pid=4466 comm="syz.1.216" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 209.786063][ T4488] FAULT_INJECTION: forcing a failure. [ 209.786063][ T4488] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.786605][ T4488] CPU: 1 UID: 0 PID: 4488 Comm: syz.1.223 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 209.786682][ T4488] Hardware name: ARM-Versatile Express [ 209.786707][ T4488] Call trace: [ 209.786746][ T4488] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 209.786952][ T4488] r7:00000000 r6:00000000 r5:60000013 r4:8224a6e0 [ 209.786973][ T4488] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 209.787024][ T4488] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 209.787072][ T4488] r5:8400c800 r4:8294fe50 [ 209.787087][ T4488] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 209.787153][ T4488] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 209.787327][ T4488] r8:76b0df30 r7:00000000 r6:00000000 r5:dfbd5f68 r4:00000002 [ 209.787352][ T4488] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 209.787400][ T4488] [<80968d04>] (should_fail_usercopy) from [<80586e78>] (simple_read_from_buffer+0x80/0x13c) [ 209.787460][ T4488] [<80586df8>] (simple_read_from_buffer) from [<80600610>] (proc_fail_nth_read+0xb8/0x108) [ 209.787541][ T4488] r10:00000001 r9:80600558 r8:00000002 r7:dfbd5f68 r6:0000000f r5:76b0df30 [ 209.787566][ T4488] r4:8400c800 r3:dfbd5e9f [ 209.787583][ T4488] [<80600558>] (proc_fail_nth_read) from [<8054beb0>] (vfs_read+0x98/0x320) [ 209.787641][ T4488] r8:76b0df30 r7:dfbd5f68 r6:8400c800 r5:0000000f r4:85c12e40 [ 209.787656][ T4488] [<8054be18>] (vfs_read) from [<8054cb58>] (ksys_read+0x74/0xe8) [ 209.787712][ T4488] r10:00000003 r9:8400c800 r8:8020029c r7:00000000 r6:00000000 r5:85c12e40 [ 209.787732][ T4488] r4:85c12e43 [ 209.787748][ T4488] [<8054cae4>] (ksys_read) from [<8054cbdc>] (sys_read+0x10/0x14) [ 209.787801][ T4488] r7:00000003 r6:00000004 r5:76b0df30 r4:0000000f [ 209.787817][ T4488] [<8054cbcc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 209.787865][ T4488] Exception stack(0xdfbd5fa8 to 0xdfbd5ff0) [ 209.787898][ T4488] 5fa0: 0000000f 76b0df30 00000004 76b0df30 0000000f 00000000 [ 209.787928][ T4488] 5fc0: 0000000f 76b0df30 00000004 00000003 002e0000 00000000 00006364 76b0e0bc [ 209.787952][ T4488] 5fe0: 00000158 76b0ded0 000d7df0 0012fe94 [ 210.958943][ T4499] FAULT_INJECTION: forcing a failure. [ 210.958943][ T4499] name failslab, interval 1, probability 0, space 0, times 0 [ 210.966102][ T4499] CPU: 1 UID: 0 PID: 4499 Comm: syz.1.227 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 210.966163][ T4499] Hardware name: ARM-Versatile Express [ 210.966176][ T4499] Call trace: [ 210.966198][ T4499] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 210.966258][ T4499] r7:83b09800 r6:00000000 r5:60000013 r4:8224a6e0 [ 210.966267][ T4499] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 210.966294][ T4499] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 210.966323][ T4499] r5:83b09800 r4:82918cc0 [ 210.966331][ T4499] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 210.966360][ T4499] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 210.966394][ T4499] r8:00000000 r7:83b09800 r6:00000dc0 r5:85c126c0 r4:830a1540 [ 210.966403][ T4499] [<8051a470>] (should_failslab) from [<804feeec>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 210.966428][ T4499] [<804feea0>] (kmem_cache_alloc_noprof) from [<80776510>] (security_file_alloc+0x30/0x1dc) [ 210.966573][ T4499] r10:00000000 r9:852e1550 r8:82805cc0 r7:83b8d480 r6:00000800 r5:85c126c0 [ 210.966668][ T4499] r4:85c126c0 [ 210.966835][ T4499] [<807764e0>] (security_file_alloc) from [<8054df6c>] (init_file+0x48/0x110) [ 210.967184][ T4499] r5:85c126c0 r4:85c126c0 [ 210.967230][ T4499] [<8054df24>] (init_file) from [<8054e6e4>] (alloc_empty_file+0x68/0x13c) [ 210.967312][ T4499] r7:83b8d480 r6:00000800 r5:85c126c0 r4:8244c828 [ 210.967359][ T4499] [<8054e67c>] (alloc_empty_file) from [<805489dc>] (dentry_open+0x28/0x68) [ 210.967486][ T4499] r8:8478f250 r7:00000800 r6:83b09800 r5:dfc31f38 r4:832e7000 [ 210.967512][ T4499] [<805489b4>] (dentry_open) from [<80753f6c>] (sys_mq_open+0x204/0x354) [ 210.967558][ T4499] r5:00000004 r4:832e7000 [ 210.967648][ T4499] [<80753d68>] (sys_mq_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 210.967674][ T4499] Exception stack(0xdfc31fa8 to 0xdfc31ff0) [ 210.967714][ T4499] 1fa0: 00000000 00000000 20000280 00000800 0000001e 00000000 [ 210.967733][ T4499] 1fc0: 00000000 00000000 0012ff70 00000112 002e0000 00000000 00006364 76b0e0bc [ 210.967748][ T4499] 1fe0: 76b0dec0 76b0deb0 000193a4 00131fc0 [ 210.967766][ T4499] r10:00000112 r9:83b09800 r8:8020029c r7:00000112 r6:0012ff70 r5:00000000 [ 210.967776][ T4499] r4:00000000 [ 211.242928][ T4501] FAULT_INJECTION: forcing a failure. [ 211.242928][ T4501] name failslab, interval 1, probability 0, space 0, times 0 [ 211.247786][ T4501] CPU: 0 UID: 0 PID: 4501 Comm: syz.0.228 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 211.247907][ T4501] Hardware name: ARM-Versatile Express [ 211.247933][ T4501] Call trace: [ 211.247972][ T4501] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 211.248117][ T4501] r7:00000c40 r6:00000000 r5:60000113 r4:8224a6e0 [ 211.248138][ T4501] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 211.248189][ T4501] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 211.248239][ T4501] r5:8400a400 r4:82918cc0 [ 211.248253][ T4501] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 211.248305][ T4501] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 211.248361][ T4501] r8:8400a400 r7:00000c40 r6:85f44268 r5:00001000 r4:830016c0 [ 211.248378][ T4501] [<8051a470>] (should_failslab) from [<804ff270>] (__kmalloc_noprof+0x9c/0x458) [ 211.248421][ T4501] [<804ff1d4>] (__kmalloc_noprof) from [<807ba364>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 211.248482][ T4501] r10:8400a400 r9:8309e400 r8:00000000 r7:834dcd48 r6:85f44268 r5:00001000 [ 211.248501][ T4501] r4:00000000 [ 211.248515][ T4501] [<807ba328>] (tomoyo_realpath_from_path) from [<807b64a8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 211.248598][ T4501] r10:8400a400 r9:00000000 r8:85f44240 r7:8008551c r6:00000004 r5:81cd64c4 [ 211.248618][ T4501] r4:85f44268 r3:826c0200 [ 211.248635][ T4501] [<807b63dc>] (tomoyo_path_number_perm) from [<807bad88>] (tomoyo_file_ioctl+0x1c/0x20) [ 211.248698][ T4501] r9:00000003 r8:85f44240 r7:00000000 r6:00000000 r5:8008551c r4:85f44240 [ 211.248716][ T4501] [<807bad6c>] (tomoyo_file_ioctl) from [<8076761c>] (security_file_ioctl+0x64/0x1e4) [ 211.248763][ T4501] [<807675b8>] (security_file_ioctl) from [<80565650>] (sys_ioctl+0x4c/0xba0) [ 211.248823][ T4501] r7:00000000 r6:85f44241 r5:00000000 r4:8008551c [ 211.248839][ T4501] [<80565604>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 211.248883][ T4501] Exception stack(0xdfa51fa8 to 0xdfa51ff0) [ 211.248924][ T4501] 1fa0: 00000000 00000000 00000003 8008551c 00000000 00000000 [ 211.248959][ T4501] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bfd0bc [ 211.248983][ T4501] 1fe0: 76bfcec0 76bfceb0 000193a4 00131fc0 [ 211.249016][ T4501] r10:00000036 r9:8400a400 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 211.249035][ T4501] r4:00000000 [ 211.279403][ T4501] ERROR: Out of memory at tomoyo_realpath_from_path. [ 211.825662][ T4510] Zero length message leads to an empty skb [ 212.122809][ T4515] FAULT_INJECTION: forcing a failure. [ 212.122809][ T4515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 212.123286][ T4515] CPU: 1 UID: 0 PID: 4515 Comm: syz.0.234 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 212.123363][ T4515] Hardware name: ARM-Versatile Express [ 212.123388][ T4515] Call trace: [ 212.123441][ T4515] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 212.123625][ T4515] r7:00000000 r6:00000000 r5:60000013 r4:8224a6e0 [ 212.123651][ T4515] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 212.123849][ T4515] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 212.124074][ T4515] r5:83b0d400 r4:8294fe50 [ 212.124211][ T4515] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 212.124489][ T4515] [<80968ac4>] (should_fail_ex) from [<80968d00>] (should_fail+0x14/0x18) [ 212.124837][ T4515] r8:848e3490 r7:00000000 r6:8244c848 r5:20000340 r4:20000340 [ 212.124926][ T4515] [<80968cec>] (should_fail) from [<80968d20>] (should_fail_usercopy+0x1c/0x20) [ 212.125026][ T4515] [<80968d04>] (should_fail_usercopy) from [<8096ede8>] (strncpy_from_user+0x20/0x1a0) [ 212.125108][ T4515] [<8096edc8>] (strncpy_from_user) from [<8055b50c>] (getname_flags.part.0+0x44/0x18c) [ 212.125191][ T4515] r10:00000112 r9:8362c7f8 r8:848e3490 r7:00000000 r6:8244c848 r5:20000340 [ 212.125210][ T4515] r4:832e4000 [ 212.125227][ T4515] [<8055b4c8>] (getname_flags.part.0) from [<8056048c>] (getname_flags+0x3c/0x50) [ 212.125286][ T4515] r9:8362c7f8 r8:848e3490 r7:00000002 r6:83b0d400 r5:00000000 r4:20000340 [ 212.125305][ T4515] [<80560450>] (getname_flags) from [<80753e5c>] (sys_mq_open+0xf4/0x354) [ 212.125437][ T4515] r5:00000000 r4:20000340 [ 212.125459][ T4515] [<80753d68>] (sys_mq_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 212.125510][ T4515] Exception stack(0xdfc8dfa8 to 0xdfc8dff0) [ 212.125545][ T4515] dfa0: 00000000 00000000 20000340 00000002 00000111 00000000 [ 212.125576][ T4515] dfc0: 00000000 00000000 0012ff70 00000112 002e0000 00000000 00006364 76bfd0bc [ 212.125602][ T4515] dfe0: 76bfcec0 76bfceb0 000193a4 00131fc0 [ 212.125674][ T4515] r10:00000112 r9:83b0d400 r8:8020029c r7:00000112 r6:0012ff70 r5:00000000 [ 212.125742][ T4515] r4:00000000 [ 212.589281][ T31] audit: type=1400 audit(212.480:289): avc: denied { write } for pid=4516 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 215.480419][ T4527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4527 comm=syz.0.238 [ 220.696819][ T31] audit: type=1400 audit(220.590:290): avc: denied { lock } for pid=4548 comm="syz.0.247" path="socket:[4681]" dev="sockfs" ino=4681 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 222.908010][ T3915] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 223.139179][ T3915] usb 1-1: device descriptor read/64, error -71 [ 223.427837][ T3915] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 223.611472][ T3915] usb 1-1: device descriptor read/64, error -71 [ 223.758279][ T3915] usb usb1-port1: attempt power cycle [ 224.122019][ T3915] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 224.179202][ T3915] usb 1-1: device descriptor read/8, error -71 [ 224.447754][ T3915] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 224.469128][ T3915] usb 1-1: device descriptor read/8, error -71 [ 224.616084][ T3915] usb usb1-port1: unable to enumerate USB device [ 225.540480][ T31] audit: type=1400 audit(225.440:291): avc: denied { setopt } for pid=4566 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 225.992284][ T3909] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 226.218498][ T3909] usb 2-1: device descriptor read/64, error -71 [ 226.518631][ T3909] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 226.658090][ T3909] usb 2-1: device descriptor read/64, error -71 [ 226.782336][ T3909] usb usb2-port1: attempt power cycle [ 227.193939][ T3909] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 227.261353][ T3909] usb 2-1: device descriptor read/8, error -71 [ 227.534227][ T3909] usb 2-1: new low-speed USB device number 6 using dummy_hcd [ 227.601050][ T3909] usb 2-1: device descriptor read/8, error -71 [ 227.740526][ T3909] usb usb2-port1: unable to enumerate USB device [ 232.336252][ T4579] FAULT_INJECTION: forcing a failure. [ 232.336252][ T4579] name failslab, interval 1, probability 0, space 0, times 0 [ 232.338575][ T4579] CPU: 1 UID: 0 PID: 4579 Comm: syz.0.253 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 232.338757][ T4579] Hardware name: ARM-Versatile Express [ 232.338788][ T4579] Call trace: [ 232.338903][ T4579] [<80201a20>] (dump_backtrace) from [<80201b1c>] (show_stack+0x18/0x1c) [ 232.339031][ T4579] r7:8415a400 r6:00000000 r5:60000013 r4:8224a6e0 [ 232.339100][ T4579] [<80201b04>] (show_stack) from [<8021faa0>] (dump_stack_lvl+0x70/0x7c) [ 232.339196][ T4579] [<8021fa30>] (dump_stack_lvl) from [<8021fac4>] (dump_stack+0x18/0x1c) [ 232.339251][ T4579] r5:8415a400 r4:82918cc0 [ 232.339264][ T4579] [<8021faac>] (dump_stack) from [<80968c88>] (should_fail_ex+0x1c4/0x228) [ 232.339318][ T4579] [<80968ac4>] (should_fail_ex) from [<8051a4dc>] (should_failslab+0x6c/0x94) [ 232.339379][ T4579] r8:00000000 r7:8415a400 r6:00000cc0 r5:00000000 r4:830a1b40 [ 232.339394][ T4579] [<8051a470>] (should_failslab) from [<804febb8>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 232.339437][ T4579] [<804feb68>] (kmem_cache_alloc_lru_noprof) from [<80569ed0>] (__d_alloc+0x30/0x21c) [ 232.339497][ T4579] r10:8309d800 r9:8244c83c r8:8518f588 r7:8309d800 r6:849fc190 r5:00000000 [ 232.339514][ T4579] r4:830b0250 [ 232.339528][ T4579] [<80569ea0>] (__d_alloc) from [<8056a138>] (d_alloc_anon+0x14/0x18) [ 232.339585][ T4579] r9:81c20fc0 r8:8518f588 r7:00000000 r6:849fc190 r5:df9a1e5c r4:830b0250 [ 232.339600][ T4579] [<8056a124>] (d_alloc_anon) from [<80588f9c>] (path_from_stashed+0x11c/0x204) [ 232.339649][ T4579] [<80588e80>] (path_from_stashed) from [<8059b790>] (open_namespace+0x44/0xbc) [ 232.339726][ T4579] r10:8415a400 r9:00000003 r8:85c120c0 r7:8415dc90 r6:8415a400 r5:00000000 [ 232.339746][ T4579] r4:848b8898 [ 232.339762][ T4579] [<8059b74c>] (open_namespace) from [<805a1080>] (pidfd_ioctl+0x3f4/0x9dc) [ 232.339814][ T4579] r6:8415d400 r5:849fc190 r4:848b8898 [ 232.339828][ T4579] [<805a0c8c>] (pidfd_ioctl) from [<80565734>] (sys_ioctl+0x130/0xba0) [ 232.339882][ T4579] r10:8415a400 r9:00000003 r8:85c120c0 r7:00000000 r6:85c120c1 r5:00000000 [ 232.339899][ T4579] r4:0000ff0a [ 232.339914][ T4579] [<80565604>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 232.339955][ T4579] Exception stack(0xdf9a1fa8 to 0xdf9a1ff0) [ 232.339987][ T4579] 1fa0: 00000000 00000000 00000003 0000ff0a 00000000 00000000 [ 232.340046][ T4579] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bfd0bc [ 232.340126][ T4579] 1fe0: 76bfcec0 76bfceb0 000193a4 00131fc0 [ 232.340179][ T4579] r10:00000036 r9:8415a400 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 232.340201][ T4579] r4:00000000 [ 233.030976][ T4587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=4587 comm=syz.0.256 [ 234.859438][ T31] audit: type=1400 audit(234.750:292): avc: denied { getopt } for pid=4586 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 242.666478][ T31] audit: type=1400 audit(242.560:293): avc: denied { write } for pid=4614 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 254.198875][ T4651] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pid=4651 comm=syz.1.274 [ 255.008435][ T4659] ======================================================= [ 255.008435][ T4659] WARNING: The mand mount option has been deprecated and [ 255.008435][ T4659] and is ignored by this kernel. Remove the mand [ 255.008435][ T4659] option from the mount to silence this warning. [ 255.008435][ T4659] ======================================================= [ 256.530756][ T31] audit: type=1400 audit(256.430:294): avc: denied { create } for pid=4677 comm="syz.0.286" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 256.548225][ T31] audit: type=1400 audit(256.440:295): avc: denied { write } for pid=4677 comm="syz.0.286" name="file2" dev="tmpfs" ino=791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 256.548890][ T31] audit: type=1400 audit(256.440:296): avc: denied { open } for pid=4677 comm="syz.0.286" path="/148/file2" dev="tmpfs" ino=791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 256.549172][ T31] audit: type=1400 audit(256.440:297): avc: denied { ioctl } for pid=4677 comm="syz.0.286" path="/148/file2" dev="tmpfs" ino=791 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 256.571341][ T4678] loop0: detected capacity change from 0 to 8 [ 256.618005][ T31] audit: type=1400 audit(256.510:298): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file2" dev="tmpfs" ino=791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 257.241466][ T31] audit: type=1400 audit(257.140:299): avc: denied { block_suspend } for pid=4691 comm="syz.1.291" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 259.020817][ T31] audit: type=1400 audit(258.920:300): avc: denied { setattr } for pid=4719 comm="syz.0.303" name="map_files" dev="proc" ino=5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 259.214636][ T31] audit: type=1400 audit(259.110:301): avc: denied { sqpoll } for pid=4723 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 259.751682][ T4733] ALSA: mixer_oss: invalid OSS volume '' [ 261.063495][ T31] audit: type=1400 audit(260.960:302): avc: denied { watch } for pid=4771 comm="syz.0.324" path="/166" dev="tmpfs" ino=883 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 261.139777][ T31] audit: type=1400 audit(261.040:303): avc: denied { mount } for pid=4777 comm="syz.1.325" name="/" dev="configfs" ino=1120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 261.775402][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 261.775799][ T31] audit: type=1400 audit(261.670:313): avc: denied { create } for pid=4799 comm="syz.1.335" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 261.781257][ T31] audit: type=1400 audit(261.670:314): avc: denied { map } for pid=4799 comm="syz.1.335" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 261.781631][ T31] audit: type=1400 audit(261.680:315): avc: denied { read write } for pid=4799 comm="syz.1.335" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 261.936344][ T31] audit: type=1400 audit(261.830:316): avc: denied { view } for pid=4805 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 261.996819][ T4807] ALSA: mixer_oss: invalid OSS volume '' [ 262.136605][ T31] audit: type=1400 audit(262.030:317): avc: denied { read } for pid=4812 comm="syz.0.341" path="socket:[5073]" dev="sockfs" ino=5073 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 262.255490][ T31] audit: type=1400 audit(262.150:318): avc: denied { create } for pid=4815 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.274756][ T31] audit: type=1400 audit(262.170:319): avc: denied { write } for pid=4815 comm="syz.1.343" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.287815][ T31] audit: type=1400 audit(262.180:320): avc: denied { read } for pid=4815 comm="syz.1.343" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.445027][ T31] audit: type=1400 audit(262.340:321): avc: denied { module_load } for pid=4819 comm="syz.0.344" path="/sys/power/wakeup_count" dev="sysfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 265.152295][ T31] audit: type=1400 audit(265.050:322): avc: denied { bind } for pid=4842 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 267.487976][ T3862] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 267.683052][ T3862] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 267.687508][ T3862] usb 1-1: config 0 has no interfaces? [ 267.737745][ T3862] usb 1-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 267.739355][ T3862] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 267.740355][ T3862] usb 1-1: Product: syz [ 267.741320][ T3862] usb 1-1: Manufacturer: syz [ 267.742054][ T3862] usb 1-1: SerialNumber: syz [ 267.769149][ T3862] usb 1-1: config 0 descriptor?? [ 268.181574][ T3862] usb 1-1: USB disconnect, device number 7 [ 269.005346][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 269.005859][ T31] audit: type=1400 audit(268.900:324): avc: denied { nlmsg_write } for pid=4874 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.713092][ T31] audit: type=1400 audit(269.610:325): avc: denied { getopt } for pid=4878 comm="syz.0.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.735435][ T31] audit: type=1400 audit(269.630:326): avc: denied { ioctl } for pid=4878 comm="syz.0.359" path="socket:[5637]" dev="sockfs" ino=5637 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 287.067317][ T31] audit: type=1400 audit(286.960:327): avc: denied { read } for pid=4911 comm="syz.1.369" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 287.067783][ T31] audit: type=1400 audit(286.960:328): avc: denied { open } for pid=4911 comm="syz.1.369" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 287.095236][ T31] audit: type=1400 audit(286.990:329): avc: denied { ioctl } for pid=4911 comm="syz.1.369" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 287.104717][ T31] audit: type=1400 audit(287.000:330): avc: denied { set_context_mgr } for pid=4911 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 303.106215][ T31] audit: type=1400 audit(302.980:331): avc: denied { kexec_image_load } for pid=4927 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 311.388197][ T31] audit: type=1400 audit(311.280:332): avc: denied { create } for pid=4944 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 311.390512][ T31] audit: type=1400 audit(311.280:333): avc: denied { bind } for pid=4944 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 311.401962][ T31] audit: type=1400 audit(311.280:334): avc: denied { setopt } for pid=4944 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 311.405145][ T31] audit: type=1400 audit(311.300:335): avc: denied { accept } for pid=4944 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 311.411317][ T31] audit: type=1400 audit(311.300:336): avc: denied { write } for pid=4944 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 319.907632][ T3909] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 320.088221][ T3909] usb 1-1: Using ep0 maxpacket: 32 [ 320.124921][ T3909] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 320.126752][ T3909] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 320.130200][ T3909] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 320.132152][ T3909] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 320.139459][ T3909] usb 1-1: config 0 descriptor?? [ 320.588754][ T3909] savu 0003:1E7D:2D5A.0001: hiddev0,hidraw0: USB HID v0.00 Device [HID 1e7d:2d5a] on usb-dummy_hcd.0-1/input0 [ 320.851345][ T3909] usb 1-1: USB disconnect, device number 8 [ 323.572010][ T4994] netlink: 20 bytes leftover after parsing attributes in process `syz.0.387'. [ 335.975649][ T5003] netlink: 'syz.0.389': attribute type 4 has an invalid length. [ 339.211899][ T31] audit: type=1400 audit(339.110:337): avc: denied { read } for pid=5008 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 353.690357][ T5027] netlink: 144 bytes leftover after parsing attributes in process `syz.0.399'. [ 363.246513][ T31] audit: type=1400 audit(363.140:338): avc: denied { map } for pid=5028 comm="syz.1.400" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 363.277874][ T31] audit: type=1400 audit(363.160:339): avc: denied { call } for pid=5028 comm="syz.1.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 363.278941][ T31] audit: type=1400 audit(363.170:340): avc: denied { transfer } for pid=5028 comm="syz.1.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 379.937247][ T31] audit: type=1400 audit(379.830:341): avc: denied { connect } for pid=5058 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.039663][ T5064] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 382.416464][ T31] audit: type=1400 audit(382.310:342): avc: denied { read } for pid=5058 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 403.552261][ T3873] Process accounting resumed [ 405.512966][ T31] audit: type=1400 audit(405.410:343): avc: denied { connect } for pid=5101 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 405.525206][ T31] audit: type=1400 audit(405.420:344): avc: denied { write } for pid=5101 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 405.547561][ T31] audit: type=1400 audit(405.440:345): avc: denied { read } for pid=5101 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 416.841615][ T31] audit: type=1400 audit(416.740:346): avc: denied { map } for pid=5124 comm="syz.1.428" path="socket:[6487]" dev="sockfs" ino=6487 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 416.849989][ T31] audit: type=1400 audit(416.740:347): avc: denied { read } for pid=5124 comm="syz.1.428" path="socket:[6487]" dev="sockfs" ino=6487 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 416.900669][ T31] audit: type=1400 audit(416.800:348): avc: denied { connect } for pid=5124 comm="syz.1.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 421.226634][ T5139] netlink: 68 bytes leftover after parsing attributes in process `syz.0.431'. [ 433.269357][ T5163] netlink: 32 bytes leftover after parsing attributes in process `syz.0.439'. [ 433.298105][ T31] audit: type=1400 audit(433.190:349): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=33562 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 433.310017][ T31] audit: type=1400 audit(433.210:350): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 433.312608][ T31] audit: type=1400 audit(433.210:351): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 433.315193][ T31] audit: type=1400 audit(433.210:352): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 433.349684][ T31] audit: type=1400 audit(433.250:353): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33562 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 436.051712][ T5171] veth0: entered promiscuous mode [ 437.068318][ T5165] veth0: left promiscuous mode [ 442.129189][ T5193] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5193 comm=syz.1.444 [ 446.920105][ T31] audit: type=1400 audit(446.810:354): avc: denied { setopt } for pid=5202 comm="syz.0.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 460.402696][ T31] audit: type=1400 audit(460.300:355): avc: denied { name_bind } for pid=5231 comm="syz.0.454" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 462.602921][ T5234] netlink: 'syz.1.455': attribute type 2 has an invalid length. [ 463.026813][ T31] audit: type=1400 audit(462.920:356): avc: denied { module_request } for pid=5237 comm="syz.0.457" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 465.792031][ T5249] comedi: valid board names for 8255 driver are: [ 465.792345][ T5249] 8255 [ 465.792629][ T5249] comedi: valid board names for vmk80xx driver are: [ 465.792765][ T5249] vmk80xx [ 465.792863][ T5249] comedi: valid board names for usbduxsigma driver are: [ 465.792983][ T5249] usbduxsigma [ 465.793077][ T5249] comedi: valid board names for usbduxfast driver are: [ 465.793171][ T5249] usbduxfast [ 465.793263][ T5249] comedi: valid board names for usbdux driver are: [ 465.793355][ T5249] usbdux [ 465.793446][ T5249] comedi: valid board names for ni6501 driver are: [ 465.793538][ T5249] ni6501 [ 465.793630][ T5249] comedi: valid board names for dt9812 driver are: [ 465.793722][ T5249] dt9812 [ 465.793812][ T5249] comedi: valid board names for ni_labpc_cs driver are: [ 465.793911][ T5249] ni_labpc_cs [ 465.794004][ T5249] comedi: valid board names for ni_daq_700 driver are: [ 465.794554][ T5249] ni_daq_700 [ 465.794878][ T5249] comedi: valid board names for labpc_pci driver are: [ 465.794957][ T5249] labpc_pci [ 465.795083][ T5249] comedi: valid board names for adl_pci9118 driver are: [ 465.795189][ T5249] pci9118dg [ 465.795268][ T5249] pci9118hg [ 465.795315][ T5249] pci9118hr [ 465.795357][ T5249] comedi: valid board names for 8255_pci driver are: [ 465.795415][ T5249] 8255_pci [ 465.795457][ T5249] comedi: valid board names for comedi_parport driver are: [ 465.795494][ T5249] comedi_parport [ 465.795532][ T5249] comedi: valid board names for comedi_test driver are: [ 465.795574][ T5249] comedi_test [ 465.795612][ T5249] comedi: valid board names for comedi_bond driver are: [ 465.795652][ T5249] comedi_bond [ 469.133789][ T31] audit: type=1400 audit(469.030:357): avc: denied { setopt } for pid=5250 comm="syz.0.460" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 469.755827][ T5253] 8<--- cut here --- [ 469.756158][ T5253] Unable to handle kernel paging request at virtual address fee0010c when write [ 469.756301][ T5253] [fee0010c] *pgd=80000080007003, *pmd=00000000 [ 469.757883][ T5253] Internal error: Oops: a06 [#1] SMP ARM [ 469.762596][ T5253] Modules linked in: [ 469.763203][ T5253] CPU: 1 UID: 0 PID: 5253 Comm: syz.0.461 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 469.764115][ T5253] Hardware name: ARM-Versatile Express [ 469.765168][ T5253] PC is at subdev_8255_io+0x60/0x6c [ 469.766349][ T5253] LR is at subdev_8255_io+0x4c/0x6c [ 469.766713][ T5253] pc : [<813a4ab8>] lr : [<813a4aa4>] psr: 60000013 [ 469.767424][ T5253] sp : dfad5cb8 ip : dfad5cb8 fp : dfad5cd4 [ 469.767801][ T5253] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 469.768201][ T5253] r7 : 00000109 r6 : 0000009b r5 : 8408f180 r4 : 0000010c [ 469.768634][ T5253] r3 : 0000009b r2 : fee0010c r1 : 00000001 r0 : 8408f180 [ 469.769210][ T5253] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 469.769731][ T5253] Control: 30c5387d Table: 85eef200 DAC: 00000000 [ 469.770104][ T5253] Register r0 information: slab kmalloc-192 start 8408f180 pointer offset 0 size 192 [ 469.771607][ T5253] Register r1 information: non-paged memory [ 469.772220][ T5253] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 469.773007][ T5253] Register r3 information: non-paged memory [ 469.773340][ T5253] Register r4 information: non-paged memory [ 469.773697][ T5253] Register r5 information: slab kmalloc-192 start 8408f180 pointer offset 0 size 192 [ 469.774426][ T5253] Register r6 information: non-paged memory [ 469.774789][ T5253] Register r7 information: non-paged memory [ 469.775165][ T5253] Register r8 information: non-paged memory [ 469.775462][ T5253] Register r9 information: NULL pointer [ 469.775732][ T5253] Register r10 information: NULL pointer [ 469.775986][ T5253] Register r11 information: 2-page vmalloc region starting at 0xdfad4000 allocated at kernel_clone+0xac/0x3ec [ 469.777090][ T5253] Register r12 information: 2-page vmalloc region starting at 0xdfad4000 allocated at kernel_clone+0xac/0x3ec [ 469.777774][ T5253] Process syz.0.461 (pid: 5253, stack limit = 0xdfad4000) [ 469.787289][ T5253] Stack: (0xdfad5cb8 to 0xdfad6000) [ 469.787701][ T5253] 5ca0: 813a4a58 8408f180 [ 469.788013][ T5253] 5cc0: 00000109 00000109 dfad5cf4 dfad5cd8 813a4790 813a4a64 00000109 804ff1e0 [ 469.788393][ T5253] 5ce0: 85c9ec00 85c9ec00 dfad5d14 dfad5cf8 813a4b50 813a4744 85c9ec00 8408f180 [ 469.788815][ T5253] 5d00: dfad5da4 00000109 dfad5d54 dfad5d18 813a4d44 813a4ad0 82ad8e60 83b8d880 [ 469.790484][ T5253] 5d20: 82821870 00000000 00000000 829c4e70 8408f180 8408f1c4 dfad5d90 8408f180 [ 469.790899][ T5253] 5d40: 00000000 82b13fb8 dfad5d8c dfad5d58 81393c4c 813a4c94 20000540 00000000 [ 469.791294][ T5253] 5d60: dfad5d7c 20000540 8408f180 b5403587 20000540 83af8000 40946400 00000000 [ 469.791666][ T5253] 5d80: dfad5e4c dfad5d90 8138f7cc 81393b50 35353238 00000000 00000000 00000000 [ 469.792048][ T5253] 5da0: 00000000 00000109 80008000 0000086b 0000000a 00000000 00000000 00000001 [ 469.792463][ T5253] 5dc0: 0008000f 00001004 00000001 00000008 00000005 00000006 00000001 1138fce9 [ 469.792913][ T5253] 5de0: 00000006 ffffffa7 02000001 fffffffd 00000658 000003ff 00010004 00000800 [ 469.793271][ T5253] 5e00: 0000e2df 00000009 00000006 00000004 00000003 00000007 00000005 00000005 [ 469.793844][ T5253] 5e20: 00000000 5e8c7cad 00000000 85f35840 8408f180 20000540 20000540 83af8000 [ 469.794256][ T5253] 5e40: dfad5f14 dfad5e50 81390798 8138f6d8 00000000 00000000 00000000 5e8c7cad [ 469.794580][ T5253] 5e60: 00000000 00000000 8245753c 0000005f 83cd9058 8408f1b0 840c2294 83af8000 [ 469.795233][ T5253] 5e80: dfad5ee4 dfad5e90 8078e82c 80784b90 00000064 00000001 00000000 dfad5eac [ 469.795583][ T5253] 5ea0: 85be6f10 83434000 00006400 0000000b dfad5ea0 00000000 00000000 5e8c7cad [ 469.796096][ T5253] 5ec0: 85f35840 40946400 20000540 20000540 85f35840 00000003 dfad5ef4 dfad5ee8 [ 469.796434][ T5253] 5ee0: 8078e94c 5e8c7cad dfad5f14 40946400 00000000 85f35841 20000540 85f35840 [ 469.796954][ T5253] 5f00: 00000003 83af8000 dfad5fa4 dfad5f18 80565734 813901c8 ecac8b10 83af8000 [ 469.797383][ T5253] 5f20: dfad5f3c dfad5f30 81a187f0 81a186c0 dfad5f54 dfad5f40 8025e40c 8028f760 [ 469.797824][ T5253] 5f40: dfad5fb0 40000000 dfad5f84 dfad5f58 802229ec 8025e3c8 00000000 8281d09c [ 469.798193][ T5253] 5f60: dfad5fb0 0014c520 ecac8b10 80222940 00000000 5e8c7cad dfad5fac 00000000 [ 469.798569][ T5253] 5f80: 00000000 002f6300 00000036 8020029c 83af8000 00000036 00000000 dfad5fa8 [ 469.799163][ T5253] 5fa0: 80200060 80565610 00000000 00000000 00000003 40946400 20000540 00000000 [ 469.799768][ T5253] 5fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bfd0bc [ 469.800310][ T5253] 5fe0: 76bfcec0 76bfceb0 000193a4 00131fc0 60000010 00000003 00000000 00000000 [ 469.800729][ T5253] Call trace: [ 469.800976][ T5253] [<813a4a58>] (subdev_8255_io) from [<813a4790>] (subdev_8255_do_config+0x58/0x60) [ 469.801493][ T5253] r7:00000109 r6:00000109 r5:8408f180 r4:813a4a58 [ 469.801745][ T5253] [<813a4738>] (subdev_8255_do_config) from [<813a4b50>] (subdev_8255_io_init+0x8c/0x9c) [ 469.802187][ T5253] r4:85c9ec00 [ 469.802423][ T5253] [<813a4ac4>] (subdev_8255_io_init) from [<813a4d44>] (dev_8255_attach+0xbc/0x114) [ 469.802931][ T5253] r7:00000109 r6:dfad5da4 r5:8408f180 r4:85c9ec00 [ 469.803221][ T5253] [<813a4c88>] (dev_8255_attach) from [<81393c4c>] (comedi_device_attach+0x108/0x250) [ 469.803684][ T5253] r10:82b13fb8 r9:00000000 r8:8408f180 r7:dfad5d90 r6:8408f1c4 r5:8408f180 [ 469.804146][ T5253] r4:829c4e70 [ 469.804371][ T5253] [<81393b44>] (comedi_device_attach) from [<8138f7cc>] (do_devconfig_ioctl+0x100/0x220) [ 469.804991][ T5253] r10:00000000 r9:40946400 r8:83af8000 r7:20000540 r6:b5403587 r5:8408f180 [ 469.805391][ T5253] r4:20000540 [ 469.805581][ T5253] [<8138f6cc>] (do_devconfig_ioctl) from [<81390798>] (comedi_unlocked_ioctl+0x5dc/0x1c24) [ 469.806147][ T5253] r8:83af8000 r7:20000540 r6:20000540 r5:8408f180 r4:85f35840 [ 469.806673][ T5253] [<813901bc>] (comedi_unlocked_ioctl) from [<80565734>] (sys_ioctl+0x130/0xba0) [ 469.807377][ T5253] r10:83af8000 r9:00000003 r8:85f35840 r7:20000540 r6:85f35841 r5:00000000 [ 469.807699][ T5253] r4:40946400 [ 469.807901][ T5253] [<80565604>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 469.808237][ T5253] Exception stack(0xdfad5fa8 to 0xdfad5ff0) [ 469.817045][ T5253] 5fa0: 00000000 00000000 00000003 40946400 20000540 00000000 [ 469.817594][ T5253] 5fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bfd0bc [ 469.817939][ T5253] 5fe0: 76bfcec0 76bfceb0 000193a4 00131fc0 [ 469.818259][ T5253] r10:00000036 r9:83af8000 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 469.818600][ T5253] r4:00000000 [ 469.818996][ T5253] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 469.819697][ T5253] ---[ end trace 0000000000000000 ]--- [ 469.820504][ T5253] Kernel panic - not syncing: Fatal exception [ 469.822757][ T5253] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:59:58 Registers: info registers vcpu 0 CPU#0 R00=00000004 R01=00000000 R02=00008029 R03=00014148 R04=002c0088 R05=015d5eb8 R06=015cde90 R07=002c0054 R08=002c0088 R09=00000227 R10=00000076 R11=00001003 R12=00000001 R13=df999ff8 R14=001140e0 R15=001140e0 PSR=40000193 -Z-- A S svc32 s00=00000000 s01=00000300 d00=0000030000000000 s02=ff0a0000 s03=000cffff d01=000cffffff0a0000 s04=24893429 s05=8ebabece d02=8ebabece24893429 s06=b9a9a6ee s07=23ce9b3c d03=23ce9b3cb9a9a6ee s08=7e766d30 s09=964edf74 d04=964edf747e766d30 s10=8e5825af s11=961dcb0e d05=961dcb0e8e5825af s12=00000009 s13=00000000 d06=0000000000000009 s14=00000000 s15=1f040000 d07=1f04000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=4475eb6c s33=977a992c d16=977a992c4475eb6c s34=4c5e6aa5 s35=32bac017 d17=32bac0174c5e6aa5 s36=4feaab41 s37=f280739e d18=f280739e4feaab41 s38=e3c93e6c s39=a76c2b0c d19=a76c2b0ce3c93e6c s40=5856f7b5 s41=996eb37c d20=996eb37c5856f7b5 s42=7a7f71c2 s43=05ebb078 d21=05ebb0787a7f71c2 s44=3fd9f049 s45=3157abbe d22=3157abbe3fd9f049 s46=e1f95b66 s47=8cf19ea5 d23=8cf19ea5e1f95b66 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000300 d26=0000030000000000 s54=ffae0000 s55=000cffff d27=000cffffffae0000 s56=00090000 s57=00000000 d28=0000000000090000 s58=00000300 s59=ffc20000 d29=ffc2000000000300 s60=000cffff s61=000e0000 d30=000e0000000cffff s62=00000000 s63=00000300 d31=0000030000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84adc840 R01=00000073 R02=eadc5000 R03=eadc5018 R04=83b1801b R05=84adc840 R06=80a6f004 R07=83b18038 R08=82827658 R09=00000000 R10=00000675 R11=dfad591c R12=00000002 R13=dfad5910 R14=82959d64 R15=80a6f014 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000