last executing test programs: 10.398357986s ago: executing program 0 (id=113): socket$can_bcm(0x1d, 0x2, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000002b40)={0xe, {"a2e3ad099b0d09f91b5f2f0987f70e06d038e7ff7fc6e5539b0d3d0e8b089b3f323063090810e0879b0f0a75e70a9b334d959b669a240d5b0af3988f7ef31952010afde8d178708c523c921b1b5b07070d075b0936cd3b78130daa61d8e81a0000005802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae19397273ce1766769f0c91c00305d3f46635eb016d5b1dda98e2d739be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b7638354a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801119242ca026bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc3609aa24b7d520c829d095083bba2987a67399eac430d145d546a40b9f6ff14ac488ec130bb3850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce7cd9f465e41e610c20d80421d653a5520000008213b704c7fb082ff27590678ef9f190bae97909507041d860420c5664b27921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710ac0000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000008271a1f5f8528f227e79c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b2860d1b3cff57d8b6d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d4ac01b75d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4350aeae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a4f0492d48604675fde2b34cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f3927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827955e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb9754fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c46eb65ca8104e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad94e7475cb74642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd7369dde50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd72ea4998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5ff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c58b75c0f73cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40427db6fe29068c0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b50517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864af090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d885b36ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afa2d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1a85ae7e69fd1a47a284f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cef8473b53d94d02daee67918e5d6787463183b4b87c1050000002f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b344340002000000000000f288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cccf8a97406bb5a68a1f0c4549820a73c8859dde0712ae00398e8bd1f4108b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcb7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c2e14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb784ed7148b6ce431b63ec00000000000000b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a52830052fcc460db043afe525629b40d7cee458e4cb5e930ed624806c43a006e39336d07c2b8081c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e0691953264d2700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec685f068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b01faffd0a5dbed2881a9700af561ac8c6b00000000000e00f96f06817fb903729a7fb6ff957697c9ede7885d94ffb0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000", 0x942}}, 0x1006) 10.210585404s ago: executing program 0 (id=114): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000008001000004"], 0x50) 10.021037141s ago: executing program 0 (id=116): bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x2, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1}}, 0x40) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xfffffff9) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x9}}}, 0x24}}, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/246, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/70, 0x100000}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001180)={0x1, 0x0, [{0x0, 0x73, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000f}, 0x94) 9.689963474s ago: executing program 0 (id=118): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x8000f28, 0x0) splice(r2, 0x0, r1, 0x0, 0x7f, 0xe) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) lseek(r4, 0x2004, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 2.553965468s ago: executing program 1 (id=128): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000019c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x4040850) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001700)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a40000000030a0fdb00000000000000000a0000050900030073797a30000000000900010073797a310000000014000480080002403cb140bb080001400000000314000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) close_range(r0, 0xffffffffffffffff, 0x0) 1.992386481s ago: executing program 1 (id=129): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1f, 0x10, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x7e}, [@snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb3}}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebfb}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0xc) 1.531710849s ago: executing program 1 (id=130): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=@newsa={0x140, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x71c, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@dev={0xac, 0x14, 0x14, 0x25}, {0x0, 0x192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffa, 0x3fc}, 0x80, 0x3500, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @XFRMA_SET_MARK={0x8, 0x1d, 0xfffffeff}]}, 0x140}}, 0x844) 1.121662596s ago: executing program 1 (id=131): socket$inet_udplite(0x2, 0x2, 0x88) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0xf4, 0x0, 0x7fff0026}]}) close_range(r0, 0xffffffffffffffff, 0x0) 932.400983ms ago: executing program 0 (id=132): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r0, r1, 0x25, 0x0, @val=@iter={0x0}}, 0x20) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x10, 0x0, 0x7fff7ffc}]}) close_range(r2, 0xffffffffffffffff, 0x0) 621.412036ms ago: executing program 1 (id=133): r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20088004, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @remote, 0x7}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4000880, 0x0, 0x0) 141.112645ms ago: executing program 0 (id=134): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000200)={'comedi_parport\x00', [0x8001, 0x8, 0x1, 0x7, 0x3, 0xccb, 0x8, 0xab, 0xd, 0x100, 0xffffffff, 0xbefa, 0x5, 0x1, 0x6, 0xffffffff, 0x1, 0x1a449, 0x3, 0x40000003, 0x89, 0x2, 0x9, 0x20001e58, 0x5, 0x8, 0x3c, 0xa, 0xc, 0x4, 0xd]}) 0s ago: executing program 1 (id=135): r0 = landlock_create_ruleset(&(0x7f0000000140)={0xc000, 0x0, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) eventfd(0x7f) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) kernel console output (not intermixed with test programs): [ 52.174415][ T31] audit: type=1400 audit(52.080:56): avc: denied { read write } for pid=3114 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.175715][ T31] audit: type=1400 audit(52.080:57): avc: denied { open } for pid=3114 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:22644' (ED25519) to the list of known hosts. [ 62.867962][ T31] audit: type=1400 audit(62.780:58): avc: denied { name_bind } for pid=3117 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.723515][ T31] audit: type=1400 audit(64.630:59): avc: denied { execute } for pid=3118 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.746078][ T31] audit: type=1400 audit(64.650:60): avc: denied { execute_no_trans } for pid=3118 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.906692][ T31] audit: type=1400 audit(67.810:61): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.911738][ T31] audit: type=1400 audit(67.820:62): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.929960][ T3118] cgroup: Unknown subsys name 'net' [ 67.938174][ T31] audit: type=1400 audit(67.840:63): avc: denied { unmount } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.170400][ T3118] cgroup: Unknown subsys name 'cpuset' [ 68.176537][ T3118] cgroup: Unknown subsys name 'hugetlb' [ 68.180730][ T3118] cgroup: Unknown subsys name 'rlimit' [ 68.438456][ T31] audit: type=1400 audit(68.350:64): avc: denied { setattr } for pid=3118 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.440022][ T31] audit: type=1400 audit(68.350:65): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.442055][ T31] audit: type=1400 audit(68.350:66): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.638443][ T3120] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.642610][ T31] audit: type=1400 audit(68.550:67): avc: denied { relabelto } for pid=3120 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.651270][ T31] audit: type=1400 audit(68.560:68): avc: denied { write } for pid=3120 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.691740][ T31] audit: type=1400 audit(68.600:69): avc: denied { read } for pid=3118 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.693656][ T31] audit: type=1400 audit(68.600:70): avc: denied { open } for pid=3118 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.858618][ T3118] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.822010][ T31] audit: type=1400 audit(78.730:71): avc: denied { execmem } for pid=3121 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.883020][ T31] audit: type=1400 audit(78.790:72): avc: denied { read } for pid=3123 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.888030][ T31] audit: type=1400 audit(78.790:73): avc: denied { open } for pid=3123 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.900372][ T31] audit: type=1400 audit(78.810:74): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.931541][ T31] audit: type=1400 audit(78.840:75): avc: denied { module_request } for pid=3123 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.015767][ T31] audit: type=1400 audit(78.920:76): avc: denied { sys_module } for pid=3124 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.563693][ T31] audit: type=1400 audit(79.470:77): avc: denied { ioctl } for pid=3124 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.653275][ T3124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.662445][ T3124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.895522][ T3123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.904613][ T3123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.571223][ T3124] hsr_slave_0: entered promiscuous mode [ 81.573162][ T3124] hsr_slave_1: entered promiscuous mode [ 81.739369][ T3123] hsr_slave_0: entered promiscuous mode [ 81.740826][ T3123] hsr_slave_1: entered promiscuous mode [ 81.743998][ T3123] debugfs: 'hsr0' already exists in 'hsr' [ 81.745664][ T3123] Cannot create hsr debugfs directory [ 82.023201][ T31] audit: type=1400 audit(81.930:78): avc: denied { create } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.023427][ T31] audit: type=1400 audit(81.930:79): avc: denied { write } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.023602][ T31] audit: type=1400 audit(81.930:80): avc: denied { read } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.054293][ T3124] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.080211][ T3124] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.090379][ T3124] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.111128][ T3124] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.249173][ T3123] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.260757][ T3123] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.271297][ T3123] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.283291][ T3123] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.962379][ T3124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.044049][ T3123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.732820][ T3124] veth0_vlan: entered promiscuous mode [ 85.765133][ T3124] veth1_vlan: entered promiscuous mode [ 85.819045][ T3123] veth0_vlan: entered promiscuous mode [ 85.849112][ T3123] veth1_vlan: entered promiscuous mode [ 85.875396][ T3124] veth0_macvtap: entered promiscuous mode [ 85.888833][ T3124] veth1_macvtap: entered promiscuous mode [ 85.962511][ T3123] veth0_macvtap: entered promiscuous mode [ 86.000249][ T3123] veth1_macvtap: entered promiscuous mode [ 86.002400][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.003113][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.003227][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.003295][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.129952][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.130254][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.130507][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.130586][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.184376][ T31] audit: type=1400 audit(86.090:81): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.191514][ T31] audit: type=1400 audit(86.100:82): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.CRnHTu/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.196717][ T31] audit: type=1400 audit(86.100:83): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.211775][ T31] audit: type=1400 audit(86.120:84): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.CRnHTu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.215377][ T31] audit: type=1400 audit(86.120:85): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.CRnHTu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2562 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.236164][ T31] audit: type=1400 audit(86.140:86): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.244311][ T31] audit: type=1400 audit(86.150:87): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.246769][ T31] audit: type=1400 audit(86.150:88): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="gadgetfs" ino=2563 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.253202][ T31] audit: type=1400 audit(86.160:89): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.255330][ T31] audit: type=1400 audit(86.160:90): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.330597][ T3124] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.699684][ T3819] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3819 comm=syz.1.2 [ 91.353673][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 91.353959][ T31] audit: type=1400 audit(91.260:120): avc: denied { create } for pid=3871 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 91.371611][ T31] audit: type=1400 audit(91.280:121): avc: denied { bind } for pid=3871 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 91.376897][ T31] audit: type=1400 audit(91.280:122): avc: denied { create } for pid=3871 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.380860][ T3872] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 91.386330][ T31] audit: type=1400 audit(91.290:123): avc: denied { ioctl } for pid=3871 comm="syz.1.18" path="socket:[2023]" dev="sockfs" ino=2023 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.650182][ T31] audit: type=1400 audit(91.560:124): avc: denied { prog_load } for pid=3876 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.650465][ T31] audit: type=1400 audit(91.560:125): avc: denied { bpf } for pid=3876 comm="syz.0.20" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 92.022977][ T3890] Zero length message leads to an empty skb [ 92.044335][ T3890] SELinux: Context system_u:object_r:dhcpd_unit_file_t:s0 is not valid (left unmapped). [ 92.051203][ T31] audit: type=1400 audit(91.960:126): avc: denied { relabelto } for pid=3889 comm="syz.0.24" name="memfd:)[" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:dhcpd_unit_file_t:s0" [ 92.051557][ T31] audit: type=1400 audit(91.960:127): avc: denied { associate } for pid=3889 comm="syz.0.24" name="memfd:)[" dev="tmpfs" ino=5 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:dhcpd_unit_file_t:s0" [ 92.229417][ T31] audit: type=1400 audit(92.140:128): avc: denied { ioctl } for pid=3893 comm="syz.0.26" path="socket:[2756]" dev="sockfs" ino=2756 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 92.244099][ T31] audit: type=1400 audit(92.150:129): avc: denied { write } for pid=3893 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 96.889807][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 96.900023][ T31] audit: type=1400 audit(96.800:138): avc: denied { setopt } for pid=3936 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.911338][ T31] audit: type=1400 audit(96.820:139): avc: denied { read } for pid=3936 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.075088][ T31] audit: type=1400 audit(96.980:140): avc: denied { append } for pid=3938 comm="syz.1.37" name="pfkey" dev="proc" ino=4026532703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 97.195866][ T31] audit: type=1400 audit(97.100:141): avc: denied { getopt } for pid=3940 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.220440][ T31] audit: type=1400 audit(97.130:142): avc: denied { read } for pid=3940 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.580308][ T31] audit: type=1400 audit(98.490:143): avc: denied { getopt } for pid=3945 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.882248][ T31] audit: type=1400 audit(98.790:144): avc: denied { lock } for pid=3953 comm="syz.0.41" path="socket:[2879]" dev="sockfs" ino=2879 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 98.978556][ T31] audit: type=1400 audit(98.880:145): avc: denied { read } for pid=3955 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.413708][ T3963] FAULT_INJECTION: forcing a failure. [ 99.413708][ T3963] name failslab, interval 1, probability 0, space 0, times 1 [ 99.415080][ T3963] CPU: 0 UID: 0 PID: 3963 Comm: syz.1.43 Not tainted syzkaller #0 PREEMPT [ 99.415456][ T3963] Hardware name: ARM-Versatile Express [ 99.415744][ T3963] Call trace: [ 99.417276][ T3963] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 99.419115][ T3963] r7:00000c40 r6:00000000 r5:60000013 r4:82260e34 [ 99.419324][ T3963] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 99.419404][ T3963] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 99.419466][ T3963] r5:84145400 r4:82917c00 [ 99.419511][ T3963] [<8021fc6c>] (dump_stack) from [<80973004>] (should_fail_ex+0x1c4/0x228) [ 99.419580][ T3963] [<80972e40>] (should_fail_ex) from [<8051f468>] (should_failslab+0x6c/0x94) [ 99.419654][ T3963] r8:84145400 r7:00000c40 r6:85ba6da8 r5:00001000 r4:830016c0 [ 99.419673][ T3963] [<8051f3fc>] (should_failslab) from [<80503df8>] (__kmalloc_noprof+0x9c/0x458) [ 99.419725][ T3963] [<80503d5c>] (__kmalloc_noprof) from [<807c3a44>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 99.419838][ T3963] r10:84145400 r9:8309e400 r8:00000000 r7:834cdaa0 r6:85ba6da8 r5:00001000 [ 99.420075][ T3963] r4:00000000 [ 99.420176][ T3963] [<807c3a08>] (tomoyo_realpath_from_path) from [<807bfb88>] (tomoyo_path_number_perm+0xcc/0x22c) [ 99.420365][ T3963] r10:84145400 r9:00000000 r8:85ba6d80 r7:8008f511 r6:00000004 r5:81cd6504 [ 99.420754][ T3963] r4:85ba6da8 r3:826c0200 [ 99.421005][ T3963] [<807bfabc>] (tomoyo_path_number_perm) from [<807c4468>] (tomoyo_file_ioctl+0x1c/0x20) [ 99.421119][ T3963] r9:00000003 r8:85ba6d80 r7:00000000 r6:00000000 r5:8008f511 r4:85ba6d80 [ 99.421165][ T3963] [<807c444c>] (tomoyo_file_ioctl) from [<80770cbc>] (security_file_ioctl+0x64/0x1e4) [ 99.421431][ T3963] [<80770c58>] (security_file_ioctl) from [<8056cfe8>] (sys_ioctl+0x4c/0xba0) [ 99.421717][ T3963] r7:00000000 r6:85ba6d81 r5:00000000 r4:8008f511 [ 99.421834][ T3963] [<8056cf9c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 99.422125][ T3963] Exception stack(0xdfeedfa8 to 0xdfeedff0) [ 99.422894][ T3963] dfa0: 00000000 00000000 00000003 8008f511 00000000 00000000 [ 99.422962][ T3963] dfc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f320bc [ 99.423038][ T3963] dfe0: 76f31ec0 76f31eb0 0001948c 001322a0 [ 99.423255][ T3963] r10:00000036 r9:84145400 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 99.423380][ T3963] r4:00000000 [ 99.490419][ T3963] ERROR: Out of memory at tomoyo_realpath_from_path. [ 101.681843][ T31] audit: type=1400 audit(101.590:146): avc: denied { setattr } for pid=3996 comm="syz.0.47" name="NETLINK" dev="sockfs" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 101.800972][ T31] audit: type=1400 audit(101.710:147): avc: denied { create } for pid=4001 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 102.901550][ T4013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4013 comm=syz.1.52 [ 102.901883][ T4013] FAULT_INJECTION: forcing a failure. [ 102.901883][ T4013] name failslab, interval 1, probability 0, space 0, times 0 [ 102.904751][ T4013] CPU: 0 UID: 0 PID: 4013 Comm: syz.1.52 Not tainted syzkaller #0 PREEMPT [ 102.905023][ T4013] Hardware name: ARM-Versatile Express [ 102.905312][ T4013] Call trace: [ 102.905587][ T4013] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 102.906542][ T4013] r7:84155400 r6:00000000 r5:60000013 r4:82260e34 [ 102.906623][ T4013] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 102.906677][ T4013] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 102.906730][ T4013] r5:84155400 r4:82917c00 [ 102.906743][ T4013] [<8021fc6c>] (dump_stack) from [<80973004>] (should_fail_ex+0x1c4/0x228) [ 102.906798][ T4013] [<80972e40>] (should_fail_ex) from [<8051f468>] (should_failslab+0x6c/0x94) [ 102.906863][ T4013] r8:00000000 r7:84155400 r6:00000820 r5:84b55840 r4:830a7c00 [ 102.906879][ T4013] [<8051f3fc>] (should_failslab) from [<80503a74>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 102.906925][ T4013] [<80503a28>] (kmem_cache_alloc_noprof) from [<815587d4>] (skb_clone+0x60/0x1c8) [ 102.907027][ T4013] r10:000001a2 r9:848cd8c0 r8:84d85c00 r7:84b55840 r6:84e016c0 r5:84b55840 [ 102.907057][ T4013] r4:00000820 [ 102.907072][ T4013] [<81558774>] (skb_clone) from [<8166f004>] (__netlink_deliver_tap+0x1f4/0x28c) [ 102.907155][ T4013] r5:00000014 r4:84e01000 [ 102.907169][ T4013] [<8166ee10>] (__netlink_deliver_tap) from [<81672368>] (netlink_unicast+0x2f0/0x30c) [ 102.907230][ T4013] r10:00000000 r9:00000000 r8:85958000 r7:84b55840 r6:848cd8c0 r5:00000014 [ 102.907247][ T4013] r4:84d85c00 [ 102.907260][ T4013] [<81672078>] (netlink_unicast) from [<81672550>] (netlink_sendmsg+0x1cc/0x444) [ 102.907323][ T4013] r9:00000000 r8:00000000 r7:85aa2000 r6:00000014 r5:84b55840 r4:e0265f20 [ 102.907338][ T4013] [<81672384>] (netlink_sendmsg) from [<815440d8>] (__sock_sendmsg+0x44/0x78) [ 102.907404][ T4013] r10:00000000 r9:e0265dc4 r8:e0265dc4 r7:00000000 r6:854ba780 r5:e0265f20 [ 102.907421][ T4013] r4:00000000 [ 102.907434][ T4013] [<81544094>] (__sock_sendmsg) from [<81545430>] (____sys_sendmsg+0x298/0x2cc) [ 102.907495][ T4013] r7:00000000 r6:854ba780 r5:00008040 r4:e0265f20 [ 102.907509][ T4013] [<81545198>] (____sys_sendmsg) from [<815473f8>] (___sys_sendmsg+0x9c/0xd0) [ 102.907571][ T4013] r10:e0265e24 r9:20003580 r8:00008040 r7:00000000 r6:854ba780 r5:e0265f20 [ 102.907587][ T4013] r4:00000000 [ 102.907600][ T4013] [<8154735c>] (___sys_sendmsg) from [<81547890>] (__sys_sendmsg+0x8c/0xe0) [ 102.907656][ T4013] r10:00000128 r9:84155400 r8:84a0fd80 r7:00008040 r6:20003580 r5:84a0fd81 [ 102.907672][ T4013] r4:00000003 [ 102.907685][ T4013] [<81547804>] (__sys_sendmsg) from [<815478f8>] (sys_sendmsg+0x14/0x18) [ 102.907760][ T4013] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 102.907774][ T4013] [<815478e4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 102.907885][ T4013] Exception stack(0xe0265fa8 to 0xe0265ff0) [ 102.908045][ T4013] 5fa0: 00000000 00000000 00000003 20003580 00008040 00000000 [ 102.908090][ T4013] 5fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f320bc [ 102.908120][ T4013] 5fe0: 76f31ec0 76f31eb0 0001948c 001322a0 [ 103.498551][ T4026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4026 comm=syz.1.58 [ 103.500648][ T4026] FAULT_INJECTION: forcing a failure. [ 103.500648][ T4026] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 103.504852][ T4026] CPU: 1 UID: 0 PID: 4026 Comm: syz.1.58 Not tainted syzkaller #0 PREEMPT [ 103.504991][ T4026] Hardware name: ARM-Versatile Express [ 103.505016][ T4026] Call trace: [ 103.505058][ T4026] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 103.505162][ T4026] r7:00000000 r6:00000000 r5:60000013 r4:82260e34 [ 103.505194][ T4026] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 103.505248][ T4026] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 103.505305][ T4026] r5:85000c00 r4:8294f150 [ 103.505323][ T4026] [<8021fc6c>] (dump_stack) from [<80973004>] (should_fail_ex+0x1c4/0x228) [ 103.505426][ T4026] [<80972e40>] (should_fail_ex) from [<8097307c>] (should_fail+0x14/0x18) [ 103.505493][ T4026] r8:76f31f30 r7:00000000 r6:00000000 r5:e024df68 r4:00000002 [ 103.505509][ T4026] [<80973068>] (should_fail) from [<8097309c>] (should_fail_usercopy+0x1c/0x20) [ 103.505555][ T4026] [<80973080>] (should_fail_usercopy) from [<8058e920>] (simple_read_from_buffer+0x80/0x13c) [ 103.505620][ T4026] [<8058e8a0>] (simple_read_from_buffer) from [<8060894c>] (proc_fail_nth_read+0xb8/0x108) [ 103.505689][ T4026] r10:00000001 r9:80608894 r8:00000002 r7:e024df68 r6:0000000f r5:76f31f30 [ 103.505712][ T4026] r4:85000c00 r3:e024de9f [ 103.505727][ T4026] [<80608894>] (proc_fail_nth_read) from [<80553768>] (vfs_read+0x98/0x324) [ 103.505792][ T4026] r8:76f31f30 r7:e024df68 r6:85000c00 r5:0000000f r4:84a0f300 [ 103.505810][ T4026] [<805536d0>] (vfs_read) from [<80554478>] (ksys_read+0x74/0xe8) [ 103.505871][ T4026] r10:00000003 r9:85000c00 r8:8020029c r7:00000000 r6:00000000 r5:84a0f300 [ 103.505891][ T4026] r4:84a0f303 [ 103.505905][ T4026] [<80554404>] (ksys_read) from [<805544fc>] (sys_read+0x10/0x14) [ 103.505963][ T4026] r7:00000003 r6:00000005 r5:76f31f30 r4:0000000f [ 103.505977][ T4026] [<805544ec>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 103.506024][ T4026] Exception stack(0xe024dfa8 to 0xe024dff0) [ 103.506062][ T4026] dfa0: 0000000f 76f31f30 00000005 76f31f30 0000000f 00000000 [ 103.506099][ T4026] dfc0: 0000000f 76f31f30 00000005 00000003 002f0000 00000000 00006364 76f320bc [ 103.506129][ T4026] dfe0: 00000158 76f31ed0 000d80d8 00130174 [ 103.643352][ T31] audit: type=1400 audit(103.550:148): avc: denied { write } for pid=4027 comm="syz.1.59" path="socket:[2962]" dev="sockfs" ino=2962 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 103.930959][ T4032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4032 comm=syz.1.61 [ 104.142311][ T31] audit: type=1400 audit(104.050:149): avc: denied { create } for pid=4038 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 104.158494][ T4039] netlink: 4 bytes leftover after parsing attributes in process `syz.1.64'. [ 104.163564][ T31] audit: type=1400 audit(104.070:150): avc: denied { create } for pid=4038 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 104.170495][ T31] audit: type=1400 audit(104.080:151): avc: denied { ioctl } for pid=4038 comm="syz.1.64" path="socket:[3286]" dev="sockfs" ino=3286 ioctlcmd=0x6402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.488012][ T31] audit: type=1400 audit(107.390:152): avc: denied { create } for pid=4076 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 108.303313][ T4087] SELinux: Context system_u:object_r:removable_device_t:s0 is not valid (left unmapped). [ 108.305531][ T31] audit: type=1400 audit(108.210:153): avc: denied { relabelto } for pid=4086 comm="syz.1.80" name="userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:removable_device_t:s0" [ 108.305836][ T31] audit: type=1400 audit(108.210:154): avc: denied { associate } for pid=4086 comm="syz.1.80" name="userfaultfd" dev="devtmpfs" ino=84 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:removable_device_t:s0" [ 108.841934][ T31] audit: type=1400 audit(108.750:155): avc: denied { create } for pid=4093 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 108.845116][ T31] audit: type=1400 audit(108.750:156): avc: denied { write } for pid=4093 comm="syz.0.82" path="socket:[4104]" dev="sockfs" ino=4104 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 109.048151][ T31] audit: type=1400 audit(108.950:157): avc: denied { connect } for pid=4095 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 109.061986][ T31] audit: type=1400 audit(108.970:158): avc: denied { ioctl } for pid=4095 comm="syz.0.83" path="socket:[4110]" dev="sockfs" ino=4110 ioctlcmd=0x6418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 109.752944][ T4106] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 109.791477][ T4106] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 110.913628][ T31] audit: type=1400 audit(110.820:159): avc: denied { ioctl } for pid=4105 comm="syz.0.85" path="socket:[4120]" dev="sockfs" ino=4120 ioctlcmd=0x9439 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 113.574969][ T4130] bond0: (slave bond_slave_0): Releasing backup interface [ 113.613301][ T4130] bond0: (slave bond_slave_1): Releasing backup interface [ 114.630627][ T31] audit: type=1400 audit(114.540:160): avc: denied { wake_alarm } for pid=4140 comm="syz.1.93" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 115.524063][ T31] audit: type=1400 audit(115.430:161): avc: denied { execute } for pid=4150 comm="syz.0.96" path="/48/cpu.stat" dev="tmpfs" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 117.042761][ T4288] process 'syz.0.100' launched './file2' with NULL argv: empty string added [ 117.051796][ T31] audit: type=1400 audit(116.950:162): avc: denied { execute_no_trans } for pid=4287 comm="syz.0.100" path="/51/file2" dev="tmpfs" ino=285 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 118.632145][ T31] audit: type=1400 audit(118.540:163): avc: denied { ioctl } for pid=4319 comm="syz.0.109" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3526 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 118.728808][ T9] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 118.898425][ T9] usb 2-1: Using ep0 maxpacket: 32 [ 118.909774][ T9] usb 2-1: New USB device found, idVendor=0b89, idProduct=0007, bcdDevice=ef.64 [ 118.910050][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 118.925408][ T9] usb 2-1: config 0 descriptor?? [ 119.078113][ T2909] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 119.153284][ T728] usb 2-1: USB disconnect, device number 2 [ 119.238453][ T2909] usb 1-1: Using ep0 maxpacket: 8 [ 119.267839][ T2909] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 119.268213][ T2909] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 119.268712][ T2909] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 119.268957][ T2909] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 119.269231][ T2909] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 119.269417][ T2909] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 119.377323][ T4338] syz.1.111 uses obsolete (PF_INET,SOCK_PACKET) [ 119.386644][ T31] audit: type=1400 audit(119.290:164): avc: denied { ioctl } for pid=4335 comm="syz.1.111" path="socket:[3536]" dev="sockfs" ino=3536 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.580867][ T2909] usb 1-1: GET_CAPABILITIES returned 0 [ 119.581216][ T2909] usbtmc 1-1:16.0: can't read capabilities [ 119.815020][ T3815] usb 1-1: USB disconnect, device number 2 [ 120.191287][ T31] audit: type=1400 audit(120.100:165): avc: denied { map_read map_write } for pid=4361 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 120.690725][ T31] audit: type=1400 audit(120.600:166): avc: denied { name_bind } for pid=4369 comm="syz.1.117" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 120.699269][ T31] audit: type=1400 audit(120.610:167): avc: denied { node_bind } for pid=4369 comm="syz.1.117" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 122.388164][ T9] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 122.538125][ T9] usb 2-1: Using ep0 maxpacket: 8 [ 122.560567][ T9] usb 2-1: config 0 has an invalid interface number: 1 but max is 0 [ 122.560874][ T9] usb 2-1: config 0 has no interface number 0 [ 122.561248][ T9] usb 2-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 122.561428][ T9] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 122.561494][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 122.568562][ T9] usb 2-1: config 0 descriptor?? [ 122.630886][ T9] iowarrior 2-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 122.823852][ T9] usb 2-1: USB disconnect, device number 3 [ 123.109338][ T4406] comedi comedi0: Minor 3 could not be opened [ 127.137505][ C1] hrtimer: interrupt took 6710064 ns [ 128.497984][ T31] audit: type=1400 audit(128.400:168): avc: denied { perfmon } for pid=4416 comm="syz.1.129" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 128.695639][ T31] audit: type=1400 audit(128.600:169): avc: denied { prog_run } for pid=4416 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 129.074703][ T31] audit: type=1400 audit(128.980:170): avc: denied { nlmsg_write } for pid=4419 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 130.131993][ T4426] Dead loop on virtual device ip6_vti0, fix it urgently! [ 130.393264][ T31] audit: type=1400 audit(130.300:171): avc: denied { read } for pid=4428 comm="syz.1.135" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.396387][ T31] audit: type=1400 audit(130.300:172): avc: denied { open } for pid=4428 comm="syz.1.135" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.443996][ T4430] 8<--- cut here --- [ 130.444171][ T4430] Unable to handle kernel paging request at virtual address fee08001 when write [ 130.444281][ T4430] [fee08001] *pgd=80000080007003, *pmd=00000000 [ 130.445439][ T4430] Internal error: Oops: a06 [#1] SMP ARM [ 130.450291][ T4430] Modules linked in: [ 130.450790][ T4430] CPU: 0 UID: 0 PID: 4430 Comm: syz.0.134 Not tainted syzkaller #0 PREEMPT [ 130.452344][ T4430] Hardware name: ARM-Versatile Express [ 130.452928][ T4430] PC is at parport_attach+0x174/0x1d0 [ 130.453262][ T4430] LR is at parport_attach+0x164/0x1d0 [ 130.453569][ T4430] pc : [<813ac988>] lr : [<813ac978>] psr: 60000013 [ 130.453904][ T4430] sp : e0515d30 ip : e0515d30 fp : e0515d54 [ 130.454188][ T4430] r10: 82b16f40 r9 : 00000003 r8 : 84196480 [ 130.454497][ T4430] r7 : e0515d90 r6 : 84196480 r5 : 00000000 r4 : 00000000 [ 130.454833][ T4430] r3 : fee08001 r2 : 81e15644 r1 : 00000001 r0 : 813ac5f8 [ 130.455247][ T4430] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 130.456903][ T4430] Control: 30c5387d Table: 849e25c0 DAC: fffffffd [ 130.457548][ T4430] Register r0 information: non-slab/vmalloc memory [ 130.458475][ T4430] Register r1 information: non-paged memory [ 130.458827][ T4430] Register r2 information: non-slab/vmalloc memory [ 130.459179][ T4430] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 130.459769][ T4430] Register r4 information: NULL pointer [ 130.460045][ T4430] Register r5 information: NULL pointer [ 130.460605][ T4430] Register r6 information: slab kmalloc-192 start 84196480 pointer offset 0 size 192 [ 130.461711][ T4430] Register r7 information: 2-page vmalloc region starting at 0xe0514000 allocated at kernel_clone+0xac/0x3ec [ 130.462209][ T4430] Register r8 information: slab kmalloc-192 start 84196480 pointer offset 0 size 192 [ 130.464178][ T4430] Register r9 information: non-paged memory [ 130.464484][ T4430] Register r10 information: non-slab/vmalloc memory [ 130.464797][ T4430] Register r11 information: 2-page vmalloc region starting at 0xe0514000 allocated at kernel_clone+0xac/0x3ec [ 130.465313][ T4430] Register r12 information: 2-page vmalloc region starting at 0xe0514000 allocated at kernel_clone+0xac/0x3ec [ 130.465859][ T4430] Process syz.0.134 (pid: 4430, stack limit = 0xe0514000) [ 130.466395][ T4430] Stack: (0xe0515d30 to 0xe0516000) [ 130.466658][ T4430] 5d20: 823ff12c 84196480 829cf9ac 829cf9ac [ 130.467073][ T4430] 5d40: 81e15b04 841964c4 e0515d8c e0515d58 813a8a20 813ac820 20000200 00000000 [ 130.469185][ T4430] 5d60: e0515d7c 20000200 84196480 b5403587 20000200 85000000 40946400 00000003 [ 130.469688][ T4430] 5d80: e0515e4c e0515d90 813a456c 813a8924 656d6f63 705f6964 6f707261 00007472 [ 130.470061][ T4430] 5da0: 00000000 00008001 00000008 00000001 00000007 00000003 00000ccb 00000008 [ 130.470442][ T4430] 5dc0: 000000ab 0000000d 00000100 ffffffff 0000befa 00000005 00000001 00000006 [ 130.470806][ T4430] 5de0: ffffffff 00000001 0001a449 00000003 40000003 00000089 00000002 00000009 [ 130.471429][ T4430] 5e00: 20001e58 00000005 00000008 0000003c 0000000a 0000000c 00000004 0000000d [ 130.471904][ T4430] 5e20: 00000000 75d47e42 00000000 85b96f00 84196480 20000200 20000200 85000000 [ 130.472286][ T4430] 5e40: e0515f14 e0515e50 813a5538 813a4478 00000000 00000000 00000000 75d47e42 [ 130.472631][ T4430] 5e60: 00000000 00000000 8247154c 0000005f 83bb9e58 841964b0 8409387c 85000000 [ 130.473001][ T4430] 5e80: e0515ee4 e0515e90 80797ecc 8078e230 00000064 00000001 00000000 e0515eac [ 130.473391][ T4430] 5ea0: 849df850 8343a550 00006400 0000000b e0515ea0 00000000 00000000 75d47e42 [ 130.473742][ T4430] 5ec0: 85b96f00 40946400 20000200 20000200 85b96f00 00000003 e0515ef4 e0515ee8 [ 130.474140][ T4430] 5ee0: 80797fec 75d47e42 e0515f14 40946400 00000000 85b96f01 20000200 85b96f00 [ 130.474526][ T4430] 5f00: 00000003 85000000 e0515fa4 e0515f18 8056d0cc 813a4f68 ecac8b10 85000000 [ 130.474898][ T4430] 5f20: e0515f3c e0515f30 81a3b378 81a3b248 e0515f54 e0515f40 8025e490 8028ef6c [ 130.475206][ T4430] 5f40: e0515fb0 40000000 e0515f84 e0515f58 802229ec 8025e44c 00000000 8281cddc [ 130.475557][ T4430] 5f60: e0515fb0 0014c800 ecac8b10 80222940 00000000 75d47e42 e0515fac 00000000 [ 130.475980][ T4430] 5f80: 00000000 00306308 00000036 8020029c 85000000 00000036 00000000 e0515fa8 [ 130.476312][ T4430] 5fa0: 80200060 8056cfa8 00000000 00000000 00000003 40946400 20000200 00000000 [ 130.476652][ T4430] 5fc0: 00000000 00000000 00306308 00000036 002f0000 00000000 00006364 76fa90bc [ 130.477073][ T4430] 5fe0: 76fa8ec0 76fa8eb0 0001948c 001322a0 60000010 00000003 00000000 00000000 [ 130.477801][ T4430] Call trace: [ 130.478041][ T4430] [<813ac814>] (parport_attach) from [<813a8a20>] (comedi_device_attach+0x108/0x250) [ 130.478515][ T4430] r6:841964c4 r5:81e15b04 r4:829cf9ac [ 130.478754][ T4430] [<813a8918>] (comedi_device_attach) from [<813a456c>] (do_devconfig_ioctl+0x100/0x220) [ 130.479158][ T4430] r10:00000003 r9:40946400 r8:85000000 r7:20000200 r6:b5403587 r5:84196480 [ 130.479505][ T4430] r4:20000200 [ 130.479684][ T4430] [<813a446c>] (do_devconfig_ioctl) from [<813a5538>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 130.480114][ T4430] r8:85000000 r7:20000200 r6:20000200 r5:84196480 r4:85b96f00 [ 130.480430][ T4430] [<813a4f5c>] (comedi_unlocked_ioctl) from [<8056d0cc>] (sys_ioctl+0x130/0xba0) [ 130.480857][ T4430] r10:85000000 r9:00000003 r8:85b96f00 r7:20000200 r6:85b96f01 r5:00000000 [ 130.481199][ T4430] r4:40946400 [ 130.481409][ T4430] [<8056cf9c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 130.481760][ T4430] Exception stack(0xe0515fa8 to 0xe0515ff0) [ 130.482181][ T4430] 5fa0: 00000000 00000000 00000003 40946400 20000200 00000000 [ 130.482755][ T4430] 5fc0: 00000000 00000000 00306308 00000036 002f0000 00000000 00006364 76fa90bc [ 130.483361][ T4430] 5fe0: 76fa8ec0 76fa8eb0 0001948c 001322a0 [ 130.483626][ T4430] r10:00000036 r9:85000000 r8:8020029c r7:00000036 r6:00306308 r5:00000000 [ 130.483948][ T4430] r4:00000000 [ 130.484471][ T4430] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 130.485163][ T4430] ---[ end trace 0000000000000000 ]--- [ 130.485989][ T4430] Kernel panic - not syncing: Fatal exception [ 130.488569][ T4430] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:52:11 Registers: info registers vcpu 0 CPU#0 R00=840ec840 R01=00000030 R02=eaf29000 R03=eaf29018 R04=8412d00c R05=840ec840 R06=80a79f04 R07=8412d060 R08=82826ef8 R09=00000000 R10=00000437 R11=e0515924 R12=00000002 R13=e0515918 R14=82959084 R15=80a79f14 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=2df81cd4 R06=00000000 R07=00000000 R08=002f0000 R09=00000000 R10=00006364 R11=76fa90bc R12=20000a20 R13=20000a20 R14=0001969c R15=0001969c PSR=20000010 --C- A S usr32 s00=7463656a s01=753a725f d00=753a725f7463656a s02=646e6962 s03=22307265 d01=22307265646e6962 s04=76656420 s05=6962223d d02=6962223d76656420 s06=7265646e s07=6e692022 d03=6e6920227265646e s08=20343d6f s09=6e6f6373 d04=6e6f637320343d6f s10=74786574 s11=6f6f723d d05=6f6f723d74786574 s12=79733a74 s13=6d646173 d06=6d64617379733a74 s14=733a725f s15=64617379 d07=64617379733a725f s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000