last executing test programs: 16.539433168s ago: executing program 1 (id=948): socket$inet(0x2, 0x3, 0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="db", 0x1}], 0x1}], 0x1, 0x0) 16.389636425s ago: executing program 1 (id=949): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x28, r1, 0x1, 0x3, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x80) 15.93013737s ago: executing program 1 (id=950): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) 7.391581336s ago: executing program 1 (id=958): connect$inet6(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xff, 0xfffffffffffffffc}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee6, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000040)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000340)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 3.370190838s ago: executing program 0 (id=962): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) 763.255198ms ago: executing program 0 (id=963): r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) 680.257464ms ago: executing program 0 (id=964): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x21, 0x0, &(0x7f0000000180)) 602.334139ms ago: executing program 0 (id=965): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, r1, {0x7, 0x21, 0x0, 0x40000}}, 0x50) read$FUSE(r0, &(0x7f0000004380)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file0/file0\x00', 0x20000, 0x80) write$FUSE_ENTRY(r0, &(0x7f0000004200)={0x90, 0x0, r2, {0x0, 0x0, 0x0, 0x2, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc000, 0x81, 0x0, r3}}}, 0x90) 530.007852ms ago: executing program 0 (id=966): r0 = openat$binfmt_register(0xffffff9c, &(0x7f0000001240), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000002440)={0x3a, 'syz0', 0x3a, 'E', 0x3a, 0xf0, 0x3a, 'Jat\xd6\xd0\xa7\xea\xf9\xd8j\xf1\xd7cow', 0x3a, '\\-=}0UOQ\xac\xbc\x13\x8b>\n\xf1\xac\x93\xd9\x17\xc6\xf5\xc388\x04\x06\x00\x0f\x00\xb4\xc0\xe5XKpK\x11wW+n-Y\xc5X[\xad\x8ccJ\xf6\xe3_&\xa57\x8d\a(0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) 99.797721ms ago: executing program 1 (id=968): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001800)=ANY=[@ANYBLOB="240000003a000b00000000000000000003000000040000800c000180040000"], 0x24}}, 0x0) 0s ago: executing program 1 (id=969): setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@filter={'filter\x00', 0x2, 0x4, 0x348, 0xffffffff, 0xc8, 0xc8, 0x0, 0xfeffffff, 0xffffffff, 0x4f4, 0x4f4, 0x4f4, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @local, [], [], 'macsec0\x00', 'rose0\x00'}, 0x2f2, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x800, 0xd5, 0x2, 0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x7d7b, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000687000/0x4000)=nil, &(0x7f00000b9000/0x3000)=nil, 0x4000}) kernel console output (not intermixed with test programs): [ 56.334158][ T31] audit: type=1400 audit(56.240:68): avc: denied { read write } for pid=3104 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.337361][ T31] audit: type=1400 audit(56.250:69): avc: denied { open } for pid=3104 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:54783' (ED25519) to the list of known hosts. [ 68.431389][ T31] audit: type=1400 audit(68.340:70): avc: denied { name_bind } for pid=3105 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.286701][ T31] audit: type=1400 audit(70.200:71): avc: denied { execute } for pid=3107 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.330141][ T31] audit: type=1400 audit(70.240:72): avc: denied { execute_no_trans } for pid=3107 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.548597][ T31] audit: type=1400 audit(74.460:73): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.552737][ T31] audit: type=1400 audit(74.460:74): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.575427][ T3107] cgroup: Unknown subsys name 'net' [ 74.583646][ T31] audit: type=1400 audit(74.490:75): avc: denied { unmount } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.786097][ T3107] cgroup: Unknown subsys name 'cpuset' [ 74.791139][ T3107] cgroup: Unknown subsys name 'hugetlb' [ 74.792393][ T3107] cgroup: Unknown subsys name 'rlimit' [ 75.095106][ T31] audit: type=1400 audit(75.000:76): avc: denied { setattr } for pid=3107 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.096457][ T31] audit: type=1400 audit(75.010:77): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.097340][ T31] audit: type=1400 audit(75.010:78): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.292427][ T3109] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.293829][ T31] audit: type=1400 audit(75.200:79): avc: denied { relabelto } for pid=3109 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.301528][ T31] audit: type=1400 audit(75.210:80): avc: denied { write } for pid=3109 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.339620][ T31] audit: type=1400 audit(75.250:81): avc: denied { read } for pid=3107 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.340647][ T31] audit: type=1400 audit(75.250:82): avc: denied { open } for pid=3107 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 82.900500][ T3107] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.311210][ T31] audit: type=1400 audit(85.220:83): avc: denied { execmem } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 85.354074][ T31] audit: type=1400 audit(85.260:84): avc: denied { read } for pid=3112 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.357371][ T31] audit: type=1400 audit(85.270:85): avc: denied { open } for pid=3112 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.365839][ T31] audit: type=1400 audit(85.270:86): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 85.386042][ T31] audit: type=1400 audit(85.300:87): avc: denied { module_request } for pid=3112 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 85.447251][ T31] audit: type=1400 audit(85.360:88): avc: denied { sys_module } for pid=3112 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 86.090247][ T31] audit: type=1400 audit(86.000:89): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.616210][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.628205][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.770764][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.781310][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.860127][ T3113] hsr_slave_0: entered promiscuous mode [ 88.864105][ T3113] hsr_slave_1: entered promiscuous mode [ 89.078263][ T3112] hsr_slave_0: entered promiscuous mode [ 89.081469][ T3112] hsr_slave_1: entered promiscuous mode [ 89.083774][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 89.084296][ T3112] Cannot create hsr debugfs directory [ 89.427397][ T31] audit: type=1400 audit(89.330:90): avc: denied { create } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.430227][ T31] audit: type=1400 audit(89.340:91): avc: denied { write } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.432225][ T31] audit: type=1400 audit(89.340:92): avc: denied { read } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.446984][ T3113] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.461719][ T3113] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.471411][ T3113] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.487092][ T3113] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.544168][ T3112] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.550694][ T3112] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.557588][ T3112] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.570149][ T3112] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 90.435744][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.534111][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.968884][ T3112] veth0_vlan: entered promiscuous mode [ 94.000908][ T3112] veth1_vlan: entered promiscuous mode [ 94.081608][ T3112] veth0_macvtap: entered promiscuous mode [ 94.102879][ T3112] veth1_macvtap: entered promiscuous mode [ 94.214240][ T3113] veth0_vlan: entered promiscuous mode [ 94.219914][ T3112] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.220631][ T3112] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.221068][ T3112] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.221441][ T3112] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.272200][ T3113] veth1_vlan: entered promiscuous mode [ 94.421575][ T31] audit: type=1400 audit(94.320:93): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 94.427898][ T3113] veth0_macvtap: entered promiscuous mode [ 94.445260][ T31] audit: type=1400 audit(94.350:94): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzkaller.mubsKs/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 94.455434][ T31] audit: type=1400 audit(94.360:95): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 94.468012][ T3113] veth1_macvtap: entered promiscuous mode [ 94.471948][ T31] audit: type=1400 audit(94.380:96): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzkaller.mubsKs/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 94.483812][ T31] audit: type=1400 audit(94.390:97): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzkaller.mubsKs/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 94.511477][ T31] audit: type=1400 audit(94.420:98): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 94.522047][ T31] audit: type=1400 audit(94.430:99): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 94.532185][ T31] audit: type=1400 audit(94.440:100): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 94.534086][ T31] audit: type=1400 audit(94.440:101): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 94.542839][ T31] audit: type=1400 audit(94.450:102): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 94.571678][ T3113] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.572433][ T3113] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.572826][ T3113] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.573236][ T3113] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.640913][ T3112] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 96.021097][ T3803] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3803 comm=syz.0.4 [ 100.778232][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 100.778356][ T31] audit: type=1400 audit(100.690:124): avc: denied { setattr } for pid=3815 comm="syz.0.7" name="" dev="pipefs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 103.296695][ T31] audit: type=1400 audit(103.210:125): avc: denied { create } for pid=3827 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.303701][ T31] audit: type=1400 audit(103.210:126): avc: denied { ioctl } for pid=3827 comm="syz.0.11" path="socket:[2464]" dev="sockfs" ino=2464 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.315065][ T31] audit: type=1400 audit(103.220:127): avc: denied { bind } for pid=3827 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.321909][ T31] audit: type=1400 audit(103.230:128): avc: denied { write } for pid=3827 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 105.734894][ T31] audit: type=1400 audit(105.640:129): avc: denied { getopt } for pid=3831 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.737542][ T3832] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 105.740537][ T31] audit: type=1400 audit(105.650:130): avc: denied { ioctl } for pid=3831 comm="syz.1.12" path="socket:[2469]" dev="sockfs" ino=2469 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.971078][ T31] audit: type=1400 audit(105.880:131): avc: denied { setattr } for pid=3831 comm="syz.1.12" name="SCTP" dev="sockfs" ino=2468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 106.120094][ T3838] Zero length message leads to an empty skb [ 106.168721][ T31] audit: type=1400 audit(106.080:132): avc: denied { create } for pid=3839 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.173272][ T31] audit: type=1400 audit(106.080:133): avc: denied { bind } for pid=3839 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.332079][ T31] audit: type=1400 audit(106.240:134): avc: denied { accept } for pid=3839 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.340455][ T31] audit: type=1400 audit(106.250:135): avc: denied { getopt } for pid=3839 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.751021][ T3855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3855 comm=syz.1.18 [ 107.753553][ T3855] FAULT_INJECTION: forcing a failure. [ 107.753553][ T3855] name failslab, interval 1, probability 0, space 0, times 1 [ 107.757312][ T3855] CPU: 0 UID: 0 PID: 3855 Comm: syz.1.18 Not tainted 6.12.0-rc2-syzkaller #0 [ 107.757944][ T3855] Hardware name: ARM-Versatile Express [ 107.758462][ T3855] Call trace: [ 107.759008][ T3855] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 107.760382][ T3855] r7:84b55400 r6:00000820 r5:60000013 r4:8203d394 [ 107.760749][ T3855] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 107.761163][ T3855] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 107.761534][ T3855] r5:00000000 r4:82718bdc [ 107.761815][ T3855] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 107.762202][ T3855] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 107.762586][ T3855] r6:00000820 r5:84407300 r4:82cac780 [ 107.762865][ T3855] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 107.763294][ T3855] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<8149758c>] (skb_clone+0x60/0x1c8) [ 107.763853][ T3855] r10:00000000 r9:000001a2 r8:84b0dd40 r7:8412e000 r6:84407300 r5:84407300 [ 107.764276][ T3855] r4:00000820 [ 107.765075][ T3855] [<8149752c>] (skb_clone) from [<815a377c>] (__netlink_deliver_tap+0x1e8/0x24c) [ 107.765797][ T3855] r5:844c6e80 r4:844c6800 [ 107.766274][ T3855] [<815a3594>] (__netlink_deliver_tap) from [<815a6874>] (netlink_unicast+0x280/0x29c) [ 107.766708][ T3855] r10:00000000 r9:00000000 r8:844e8000 r7:84407300 r6:84b0dd40 r5:0000001c [ 107.767076][ T3855] r4:8412e000 [ 107.767322][ T3855] [<815a65f4>] (netlink_unicast) from [<815a6a6c>] (netlink_sendmsg+0x1dc/0x43c) [ 107.767755][ T3855] r9:00000000 r8:00000000 r7:847b0000 r6:0000001c r5:84407300 r4:dff29f38 [ 107.768089][ T3855] [<815a6890>] (netlink_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 107.768639][ T3855] r10:00000080 r9:dff29dd4 r8:dff29dd4 r7:00000000 r6:831a9400 r5:dff29f38 [ 107.769111][ T3855] r4:00000000 [ 107.769374][ T3855] [<81483654>] (__sock_sendmsg) from [<8148469c>] (____sys_sendmsg+0x2ac/0x2cc) [ 107.769840][ T3855] r7:00000000 r6:00000000 r5:831a9400 r4:dff29f38 [ 107.770276][ T3855] [<814843f0>] (____sys_sendmsg) from [<81486604>] (___sys_sendmsg+0x9c/0xd0) [ 107.770823][ T3855] r10:dff29e34 r9:20000180 r8:00000080 r7:00000000 r6:831a9400 r5:dff29f38 [ 107.771388][ T3855] r4:00000000 [ 107.771607][ T3855] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 107.772090][ T3855] r10:00000128 r9:84b55400 r8:8020029c r7:00000080 r6:20000180 r5:831a9400 [ 107.775404][ T3855] r4:00000000 [ 107.776805][ T3855] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 107.778584][ T3855] Exception stack(0xdff29fa8 to 0xdff29ff0) [ 107.780807][ T3855] 9fa0: 00000000 00000000 00000003 20000180 00000080 00000000 [ 107.781281][ T3855] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b720bc [ 107.781707][ T3855] 9fe0: 76b71ec0 76b71eb0 00018af8 00132ec0 [ 107.782105][ T3855] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 107.918065][ T31] audit: type=1400 audit(107.820:136): avc: denied { create } for pid=3856 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 108.282339][ T31] audit: type=1400 audit(108.190:137): avc: denied { getopt } for pid=3861 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 108.289736][ T31] audit: type=1400 audit(108.200:138): avc: denied { setopt } for pid=3861 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 108.439104][ T31] audit: type=1400 audit(108.350:139): avc: denied { bind } for pid=3856 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 108.945981][ T31] audit: type=1400 audit(108.860:140): avc: denied { getopt } for pid=3856 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 112.477591][ T3896] FAULT_INJECTION: forcing a failure. [ 112.477591][ T3896] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 112.479252][ T3896] CPU: 1 UID: 0 PID: 3896 Comm: syz.1.31 Not tainted 6.12.0-rc2-syzkaller #0 [ 112.479685][ T3896] Hardware name: ARM-Versatile Express [ 112.480103][ T3896] Call trace: [ 112.481121][ T3896] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 112.482707][ T3896] r7:20001440 r6:20001400 r5:60000013 r4:8203d394 [ 112.483074][ T3896] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 112.483445][ T3896] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 112.483783][ T3896] r5:00000000 r4:8274e1c4 [ 112.484003][ T3896] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 112.484457][ T3896] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 112.485350][ T3896] r6:20001400 r5:20001400 r4:8514d200 [ 112.485851][ T3896] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 112.486211][ T3896] [<808e5324>] (should_fail_usercopy) from [<818658c4>] (sctp_getsockopt_default_sndinfo+0x48/0x1c8) [ 112.487440][ T3896] [<8186587c>] (sctp_getsockopt_default_sndinfo) from [<8186df30>] (sctp_getsockopt+0x6b4/0x1c90) [ 112.488268][ T3896] r8:20001440 r7:00000010 r6:20001400 r5:00000022 r4:8514d200 [ 112.488608][ T3896] [<8186d87c>] (sctp_getsockopt) from [<81487474>] (sock_common_getsockopt+0x28/0x30) [ 112.489130][ T3896] r10:00000127 r9:20001440 r8:00000000 r7:833a3180 r6:00000022 r5:00000084 [ 112.489463][ T3896] r4:8186d87c [ 112.489640][ T3896] [<8148744c>] (sock_common_getsockopt) from [<81484264>] (do_sock_getsockopt+0x10c/0x298) [ 112.490035][ T3896] r4:8148744c [ 112.490194][ T3896] [<81484158>] (do_sock_getsockopt) from [<814861f0>] (sys_getsockopt+0x90/0xd4) [ 112.490589][ T3896] r9:83704800 r8:833a3180 r7:20001400 r6:00000022 r5:00000084 r4:00000000 [ 112.490892][ T3896] [<81486160>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 112.491315][ T3896] Exception stack(0xe0511fa8 to 0xe0511ff0) [ 112.491692][ T3896] 1fa0: 20001440 00000000 00000003 00000084 00000022 20001400 [ 112.492048][ T3896] 1fc0: 20001440 00000000 00130e70 00000127 00000000 00006364 003d0f00 76b720bc [ 112.492374][ T3896] 1fe0: 76b71ec0 76b71eb0 00018af8 00132ec0 [ 112.492650][ T3896] r8:8020029c r7:00000127 r6:00130e70 r5:00000000 r4:20001440 [ 112.639150][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 112.639260][ T31] audit: type=1400 audit(112.550:144): avc: denied { create } for pid=3897 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 112.646835][ T3898] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=22 sclass=netlink_tcpdiag_socket pid=3898 comm=syz.1.32 [ 112.654161][ T31] audit: type=1400 audit(112.560:145): avc: denied { write } for pid=3897 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 112.801652][ T3900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3900 comm=syz.1.33 [ 113.579837][ T3900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3900 comm=syz.1.33 [ 113.748147][ T31] audit: type=1400 audit(113.660:146): avc: denied { write } for pid=3903 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.956062][ T3908] FAULT_INJECTION: forcing a failure. [ 113.956062][ T3908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.956743][ T3908] CPU: 0 UID: 0 PID: 3908 Comm: syz.1.37 Not tainted 6.12.0-rc2-syzkaller #0 [ 113.957110][ T3908] Hardware name: ARM-Versatile Express [ 113.957792][ T3908] Call trace: [ 113.958046][ T3908] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 113.958779][ T3908] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 113.959076][ T3908] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 113.959445][ T3908] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 113.959812][ T3908] r5:00000000 r4:8274e1c4 [ 113.960028][ T3908] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 113.960409][ T3908] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 113.960797][ T3908] r6:00000000 r5:00000008 r4:00000000 [ 113.961100][ T3908] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 113.961515][ T3908] [<808e5324>] (should_fail_usercopy) from [<8148e858>] (sk_getsockopt+0x410/0x1114) [ 113.961958][ T3908] [<8148e44c>] (sk_getsockopt) from [<814843a8>] (do_sock_getsockopt+0x250/0x298) [ 113.962368][ T3908] r10:00000127 r9:20000040 r8:00000000 r7:831a8a00 r6:0000000d r5:00000001 [ 113.962714][ T3908] r4:b5403587 [ 113.962938][ T3908] [<81484158>] (do_sock_getsockopt) from [<814861f0>] (sys_getsockopt+0x90/0xd4) [ 113.963355][ T3908] r9:84b56c00 r8:831a8a00 r7:00000000 r6:0000000d r5:00000001 r4:00000000 [ 113.963690][ T3908] [<81486160>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 113.964105][ T3908] Exception stack(0xe0569fa8 to 0xe0569ff0) [ 113.964484][ T3908] 9fa0: 20000040 00000000 00000004 00000001 0000000d 00000000 [ 113.965016][ T3908] 9fc0: 20000040 00000000 00130e70 00000127 00000000 00006364 003d0f00 76b720bc [ 113.965403][ T3908] 9fe0: 76b71ec0 76b71eb0 00018af8 00132ec0 [ 113.965687][ T3908] r8:8020029c r7:00000127 r6:00130e70 r5:00000000 r4:20000040 [ 116.682249][ T3915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3915 comm=syz.1.39 [ 117.293423][ T3915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3915 comm=syz.1.39 [ 117.741715][ T31] audit: type=1400 audit(117.650:147): avc: denied { create } for pid=3918 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.756607][ T31] audit: type=1400 audit(117.670:148): avc: denied { write } for pid=3918 comm="syz.1.41" path="socket:[2660]" dev="sockfs" ino=2660 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.778905][ T3927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3927 comm=syz.1.44 [ 121.197755][ T3927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3927 comm=syz.1.44 [ 121.374244][ T31] audit: type=1400 audit(121.280:149): avc: denied { accept } for pid=3928 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 121.394005][ T31] audit: type=1400 audit(121.300:150): avc: denied { connect } for pid=3928 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 121.395887][ T31] audit: type=1400 audit(121.300:151): avc: denied { name_connect } for pid=3928 comm="syz.1.45" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 121.571133][ T31] audit: type=1400 audit(121.480:152): avc: denied { ioctl } for pid=3935 comm="syz.1.46" path="socket:[1002]" dev="sockfs" ino=1002 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 121.927344][ T3940] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3940 comm=syz.1.48 [ 122.054926][ T3942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3942 comm=syz.1.49 [ 123.199356][ T3942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3942 comm=syz.1.49 [ 123.389951][ T31] audit: type=1400 audit(123.300:153): avc: denied { write } for pid=3943 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 125.958377][ T31] audit: type=1400 audit(125.870:154): avc: denied { ioctl } for pid=3954 comm="syz.0.52" path="socket:[2717]" dev="sockfs" ino=2717 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 125.983873][ T31] audit: type=1400 audit(125.890:155): avc: denied { ioctl } for pid=3954 comm="syz.0.52" path="socket:[2718]" dev="sockfs" ino=2718 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 125.986474][ T31] audit: type=1400 audit(125.890:156): avc: denied { listen } for pid=3954 comm="syz.0.52" path=2F32312FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 125.989990][ T3955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=3955 comm=syz.0.52 [ 125.999649][ T31] audit: type=1400 audit(125.910:157): avc: denied { accept } for pid=3954 comm="syz.0.52" path=2F32312FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 126.197652][ T3960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3960 comm=syz.0.54 [ 126.495402][ T3960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3960 comm=syz.0.54 [ 126.801650][ T31] audit: type=1400 audit(126.710:158): avc: denied { setopt } for pid=3965 comm="syz.0.57" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.805248][ T31] audit: type=1400 audit(126.710:159): avc: denied { write } for pid=3965 comm="syz.0.57" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.041534][ T3970] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3970 comm=syz.0.59 [ 127.335341][ T3970] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3970 comm=syz.0.59 [ 127.457285][ T31] audit: type=1400 audit(127.370:160): avc: denied { getopt } for pid=3972 comm="syz.0.60" lport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.463245][ T31] audit: type=1400 audit(127.370:161): avc: denied { ioctl } for pid=3972 comm="syz.0.60" path="socket:[2741]" dev="sockfs" ino=2741 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 127.890302][ T3982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3982 comm=syz.1.64 [ 128.174521][ T31] audit: type=1400 audit(128.080:162): avc: denied { prog_load } for pid=3985 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 128.841228][ T3982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3982 comm=syz.1.64 [ 128.967598][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 128.967705][ T31] audit: type=1400 audit(128.880:165): avc: denied { mounton } for pid=3991 comm="syz.1.67" path="/34/file0" dev="tmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 129.557271][ T31] audit: type=1400 audit(129.470:166): avc: denied { map_create } for pid=4000 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 129.629393][ T4006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4006 comm=syz.1.71 [ 129.982554][ T4006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4006 comm=syz.1.71 [ 130.754933][ T31] audit: type=1400 audit(130.660:167): avc: denied { shutdown } for pid=4013 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.927377][ T31] audit: type=1400 audit(130.830:168): avc: denied { read } for pid=4013 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 131.114038][ T4020] FAULT_INJECTION: forcing a failure. [ 131.114038][ T4020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.117331][ T4020] CPU: 1 UID: 0 PID: 4020 Comm: syz.1.75 Not tainted 6.12.0-rc2-syzkaller #0 [ 131.117809][ T4020] Hardware name: ARM-Versatile Express [ 131.118034][ T4020] Call trace: [ 131.118251][ T4020] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 131.119950][ T4020] r7:20000100 r6:eab45e30 r5:60000013 r4:8203d394 [ 131.120222][ T4020] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 131.120628][ T4020] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 131.121022][ T4020] r5:00000000 r4:8274e1c4 [ 131.121257][ T4020] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 131.121616][ T4020] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 131.122002][ T4020] r6:eab45e30 r5:00000000 r4:eab45f38 [ 131.122268][ T4020] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 131.122680][ T4020] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 131.123143][ T4020] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 131.125412][ T4020] r8:20000001 r7:00000000 r6:83370c80 r5:eab45f38 r4:eab45e74 [ 131.125723][ T4020] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 131.126114][ T4020] r10:00000128 r9:84b50000 r8:8020029c r7:20000001 r6:20000100 r5:83370c80 [ 131.126458][ T4020] r4:00000000 [ 131.127528][ T4020] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 131.127927][ T4020] Exception stack(0xeab45fa8 to 0xeab45ff0) [ 131.129118][ T4020] 5fa0: 00000000 00000000 00000004 20000100 20000001 00000000 [ 131.129478][ T4020] 5fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b720bc [ 131.129856][ T4020] 5fe0: 76b71ec0 76b71eb0 00018af8 00132ec0 [ 131.130148][ T4020] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 131.286759][ T4024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4024 comm=syz.0.76 [ 131.830056][ T4024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4024 comm=syz.0.76 [ 132.113632][ T4034] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 132.622845][ T4045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4045 comm=syz.0.85 [ 133.181108][ T4045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4045 comm=syz.0.85 [ 133.952574][ T31] audit: type=1400 audit(133.860:169): avc: denied { create } for pid=4031 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 133.964066][ T31] audit: type=1400 audit(133.870:170): avc: denied { write } for pid=4031 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 135.286174][ T31] audit: type=1400 audit(135.190:171): avc: denied { create } for pid=4057 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.287096][ T31] audit: type=1400 audit(135.200:172): avc: denied { setopt } for pid=4057 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.409418][ T31] audit: type=1400 audit(135.320:173): avc: denied { create } for pid=4060 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 135.783911][ T4065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4065 comm=syz.1.90 [ 136.219789][ T4065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4065 comm=syz.1.90 [ 136.411433][ T4059] FAULT_INJECTION: forcing a failure. [ 136.411433][ T4059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.412054][ T4059] CPU: 1 UID: 0 PID: 4059 Comm: syz.0.86 Not tainted 6.12.0-rc2-syzkaller #0 [ 136.412454][ T4059] Hardware name: ARM-Versatile Express [ 136.412655][ T4059] Call trace: [ 136.412830][ T4059] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 136.413213][ T4059] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 136.413430][ T4059] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 136.413711][ T4059] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 136.413996][ T4059] r5:00000000 r4:8274e1c4 [ 136.414141][ T4059] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 136.414580][ T4059] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 136.415067][ T4059] r6:00000000 r5:eab69f68 r4:00000002 [ 136.415255][ T4059] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 136.415642][ T4059] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 136.415986][ T4059] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 136.416462][ T4059] r10:00000001 r9:805c30ac r8:00000002 r7:eab69f68 r6:0000000f r5:76af3f30 [ 136.416738][ T4059] r4:83553c00 r3:eab69e9f [ 136.416912][ T4059] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 136.417422][ T4059] r8:76af3f30 r7:eab69f68 r6:83553c00 r5:0000000f r4:851c5d80 [ 136.417840][ T4059] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 136.418209][ T4059] r10:00000003 r9:83553c00 r8:8020029c r7:00000000 r6:00000000 r5:851c5d80 [ 136.418492][ T4059] r4:851c5d83 [ 136.418619][ T4059] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 136.418996][ T4059] r7:00000003 r6:00000005 r5:76af3f30 r4:0000000f [ 136.419208][ T4059] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 136.419540][ T4059] Exception stack(0xeab69fa8 to 0xeab69ff0) [ 136.419773][ T4059] 9fa0: 0000000f 76af3f30 00000005 76af3f30 0000000f 00000000 [ 136.420115][ T4059] 9fc0: 0000000f 76af3f30 00000005 00000003 00000000 00006364 003d0f00 76af40bc [ 136.420443][ T4059] 9fe0: 00000158 76af3ed0 000d8408 00130d94 [ 136.586500][ T4071] FAULT_INJECTION: forcing a failure. [ 136.586500][ T4071] name failslab, interval 1, probability 0, space 0, times 0 [ 136.587927][ T4071] CPU: 0 UID: 0 PID: 4071 Comm: syz.0.93 Not tainted 6.12.0-rc2-syzkaller #0 [ 136.588307][ T4071] Hardware name: ARM-Versatile Express [ 136.588555][ T4071] Call trace: [ 136.588759][ T4071] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 136.589134][ T4071] r7:83e3bc00 r6:00000820 r5:60000013 r4:8203d394 [ 136.589260][ T4071] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 136.589482][ T4071] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 136.589787][ T4071] r5:00000000 r4:82718bdc [ 136.590028][ T4071] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 136.590401][ T4071] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 136.590780][ T4071] r6:00000820 r5:84407180 r4:82cac780 [ 136.591014][ T4071] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 136.591409][ T4071] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<8149758c>] (skb_clone+0x60/0x1c8) [ 136.591829][ T4071] r10:00000000 r9:000001a2 r8:83d86e40 r7:8492a800 r6:84407180 r5:84407180 [ 136.592114][ T4071] r4:00000820 [ 136.592287][ T4071] [<8149752c>] (skb_clone) from [<815a377c>] (__netlink_deliver_tap+0x1e8/0x24c) [ 136.592676][ T4071] r5:84653680 r4:84653000 [ 136.592881][ T4071] [<815a3594>] (__netlink_deliver_tap) from [<815a6874>] (netlink_unicast+0x280/0x29c) [ 136.593184][ T4071] r10:00000000 r9:00000000 r8:849b8000 r7:84407180 r6:83d86e40 r5:0000001c [ 136.593377][ T4071] r4:8492a800 [ 136.593472][ T4071] [<815a65f4>] (netlink_unicast) from [<815a6a6c>] (netlink_sendmsg+0x1dc/0x43c) [ 136.593686][ T4071] r9:00000000 r8:00000000 r7:8519b400 r6:0000001c r5:84407180 r4:eab69f38 [ 136.593875][ T4071] [<815a6890>] (netlink_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 136.594093][ T4071] r10:00040000 r9:eab69dd4 r8:eab69dd4 r7:00000000 r6:833e4a00 r5:eab69f38 [ 136.594554][ T4071] r4:00000000 [ 136.594792][ T4071] [<81483654>] (__sock_sendmsg) from [<8148469c>] (____sys_sendmsg+0x2ac/0x2cc) [ 136.595149][ T4071] r7:00000000 r6:00000000 r5:833e4a00 r4:eab69f38 [ 136.595330][ T4071] [<814843f0>] (____sys_sendmsg) from [<81486604>] (___sys_sendmsg+0x9c/0xd0) [ 136.595546][ T4071] r10:eab69e34 r9:20000140 r8:00040000 r7:00000000 r6:833e4a00 r5:eab69f38 [ 136.595738][ T4071] r4:00000000 [ 136.595834][ T4071] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 136.596047][ T4071] r10:00000128 r9:83e3bc00 r8:8020029c r7:00040000 r6:20000140 r5:833e4a00 [ 136.596239][ T4071] r4:00000000 [ 136.596344][ T4071] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 136.596540][ T4071] Exception stack(0xeab69fa8 to 0xeab69ff0) [ 136.596687][ T4071] 9fa0: 00000000 00000000 00000003 20000140 00040000 00000000 [ 136.596897][ T4071] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b780bc [ 136.597238][ T4071] 9fe0: 76b77ec0 76b77eb0 00018af8 00132ec0 [ 136.597471][ T4071] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 136.767564][ T4075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4075 comm=syz.0.95 [ 137.072037][ T4075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4075 comm=syz.0.95 [ 139.980846][ T31] audit: type=1400 audit(139.890:174): avc: denied { getopt } for pid=4089 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.059473][ T31] audit: type=1400 audit(139.970:175): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 140.389563][ T31] audit: type=1400 audit(140.300:176): avc: denied { setopt } for pid=4098 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 140.539251][ T31] audit: type=1400 audit(140.450:177): avc: denied { getopt } for pid=4098 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 140.549331][ T31] audit: type=1400 audit(140.460:178): avc: denied { accept } for pid=4098 comm="syz.0.102" lport=58099 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 140.892176][ T31] audit: type=1400 audit(140.800:179): avc: denied { create } for pid=4107 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 140.902921][ T4108] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1537 sclass=netlink_xfrm_socket pid=4108 comm=syz.0.105 [ 140.905326][ T31] audit: type=1400 audit(140.810:180): avc: denied { write } for pid=4107 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 142.663089][ T4126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4126 comm=syz.1.110 [ 142.666947][ T4126] FAULT_INJECTION: forcing a failure. [ 142.666947][ T4126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.667823][ T4126] CPU: 1 UID: 0 PID: 4126 Comm: syz.1.110 Not tainted 6.12.0-rc2-syzkaller #0 [ 142.668184][ T4126] Hardware name: ARM-Versatile Express [ 142.668517][ T4126] Call trace: [ 142.668729][ T4126] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 142.669349][ T4126] r7:eaff9eb8 r6:00000000 r5:60000013 r4:8203d394 [ 142.669603][ T4126] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 142.669951][ T4126] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 142.670269][ T4126] r5:00000000 r4:8274e1c4 [ 142.670502][ T4126] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 142.670884][ T4126] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 142.671252][ T4126] r6:00000000 r5:00000001 r4:00000001 [ 142.671497][ T4126] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 142.671893][ T4126] [<808e5324>] (should_fail_usercopy) from [<80842ca4>] (kstrtouint_from_user+0x60/0x128) [ 142.672304][ T4126] [<80842c44>] (kstrtouint_from_user) from [<805c4670>] (proc_fail_nth_write+0x40/0xe8) [ 142.672732][ T4126] r8:eaff9f68 r7:84b54800 r6:00000001 r5:8523f000 r4:00000001 [ 142.673088][ T4126] [<805c4630>] (proc_fail_nth_write) from [<80516674>] (vfs_write+0xac/0x44c) [ 142.673487][ T4126] r5:8523f000 r4:805c4630 [ 142.673707][ T4126] [<805165c8>] (vfs_write) from [<80516b98>] (ksys_write+0x78/0xf8) [ 142.674091][ T4126] r10:00000004 r9:84b54800 r8:8020029c r7:00000000 r6:00000002 r5:8523f000 [ 142.674699][ T4126] r4:8523f003 [ 142.674997][ T4126] [<80516b20>] (ksys_write) from [<80516c28>] (sys_write+0x10/0x14) [ 142.675378][ T4126] r7:00000004 r6:00000004 r5:76b71f30 r4:00000001 [ 142.675654][ T4126] [<80516c18>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 142.676039][ T4126] Exception stack(0xeaff9fa8 to 0xeaff9ff0) [ 142.676357][ T4126] 9fa0: 00000001 76b71f30 00000004 76b71f30 00000001 00000000 [ 142.676704][ T4126] 9fc0: 00000001 76b71f30 00000004 00000004 00000000 00006364 003d0f00 76b720bc [ 142.677121][ T4126] 9fe0: 00000158 76b71ed0 000d8408 00130e5c [ 145.086713][ T31] audit: type=1400 audit(145.000:181): avc: denied { read } for pid=4142 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 147.333659][ T31] audit: type=1400 audit(147.240:182): avc: denied { watch } for pid=4173 comm="syz.1.124" path="/66" dev="tmpfs" ino=351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 147.377899][ T4174] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4174 comm=syz.1.124 [ 147.381251][ T31] audit: type=1400 audit(147.290:183): avc: denied { connect } for pid=4173 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.237571][ T4191] FAULT_INJECTION: forcing a failure. [ 148.237571][ T4191] name failslab, interval 1, probability 0, space 0, times 0 [ 148.238429][ T4191] CPU: 1 UID: 0 PID: 4191 Comm: syz.0.131 Not tainted 6.12.0-rc2-syzkaller #0 [ 148.238942][ T4191] Hardware name: ARM-Versatile Express [ 148.239453][ T4191] Call trace: [ 148.239856][ T4191] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 148.240383][ T4191] r7:00000c40 r6:8523fb68 r5:60000013 r4:8203d394 [ 148.240643][ T4191] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 148.241045][ T4191] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 148.241395][ T4191] r5:00000000 r4:82718bdc [ 148.241592][ T4191] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 148.241963][ T4191] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 148.242319][ T4191] r6:8523fb68 r5:00001000 r4:82c016c0 [ 148.242545][ T4191] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 148.242956][ T4191] [<804cd510>] (__kmalloc_noprof) from [<80750f60>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 148.243359][ T4191] r10:836da400 r9:8412d800 r8:00000000 r7:84c177f8 r6:8523fb68 r5:00001000 [ 148.243664][ T4191] r4:00000000 [ 148.243833][ T4191] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 148.244314][ T4191] r10:836da400 r9:00000000 r8:00000003 r7:00005421 r6:00000004 r5:81ad18e8 [ 148.245081][ T4191] r4:8523fb68 r3:824ba340 [ 148.245337][ T4191] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 148.245982][ T4191] r9:8523fb40 r8:00000003 r7:200000c0 r6:200000c0 r5:00005421 r4:8523fb40 [ 148.246538][ T4191] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 148.247004][ T4191] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 148.247391][ T4191] r7:200000c0 r6:8523fb41 r5:00000000 r4:00005421 [ 148.247685][ T4191] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 148.248544][ T4191] Exception stack(0xeb1c9fa8 to 0xeb1c9ff0) [ 148.248809][ T4191] 9fa0: 00000000 00000000 00000003 00005421 200000c0 00000000 [ 148.249218][ T4191] 9fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b780bc [ 148.249700][ T4191] 9fe0: 76b77ec0 76b77eb0 00018af8 00132ec0 [ 148.250347][ T4191] r10:00000036 r9:836da400 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 148.250722][ T4191] r4:00000000 [ 148.257692][ T4191] ERROR: Out of memory at tomoyo_realpath_from_path. [ 149.414146][ T31] audit: type=1400 audit(149.320:184): avc: denied { create } for pid=4203 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 151.038776][ T31] audit: type=1400 audit(150.950:185): avc: denied { ioctl } for pid=4216 comm="syz.1.141" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 151.260930][ T31] audit: type=1400 audit(151.170:186): avc: denied { ioctl } for pid=4222 comm="syz.1.143" path="socket:[4228]" dev="sockfs" ino=4228 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 152.023328][ T4242] syz.1.148 uses obsolete (PF_INET,SOCK_PACKET) [ 152.045793][ T31] audit: type=1400 audit(151.950:187): avc: denied { write } for pid=4240 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 152.104280][ T31] audit: type=1400 audit(152.010:188): avc: denied { write } for pid=4245 comm="syz.1.149" name="net" dev="proc" ino=4276 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 152.115146][ T31] audit: type=1400 audit(152.010:189): avc: denied { add_name } for pid=4245 comm="syz.1.149" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 152.119979][ T31] audit: type=1400 audit(152.010:190): avc: denied { create } for pid=4245 comm="syz.1.149" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 152.120678][ T31] audit: type=1400 audit(152.010:191): avc: denied { associate } for pid=4245 comm="syz.1.149" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 153.147402][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 153.147498][ T31] audit: type=1400 audit(153.060:193): avc: denied { create } for pid=4272 comm="syz.0.161" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 154.122975][ T4284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=4284 comm=syz.1.164 [ 154.465950][ T4287] Restarting kernel threads ... done. [ 154.786709][ T4284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4284 comm=syz.1.164 [ 155.349592][ T31] audit: type=1400 audit(155.260:194): avc: denied { create } for pid=4296 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 155.352056][ T31] audit: type=1400 audit(155.260:195): avc: denied { write } for pid=4296 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 155.742313][ T4301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4301 comm=syz.0.170 [ 156.003580][ T4304] FAULT_INJECTION: forcing a failure. [ 156.003580][ T4304] name failslab, interval 1, probability 0, space 0, times 0 [ 156.004123][ T4304] CPU: 1 UID: 0 PID: 4304 Comm: syz.0.171 Not tainted 6.12.0-rc2-syzkaller #0 [ 156.005067][ T4304] Hardware name: ARM-Versatile Express [ 156.005290][ T4304] Call trace: [ 156.005476][ T4304] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 156.005810][ T4304] r7:84b54800 r6:00000cc0 r5:60000013 r4:8203d394 [ 156.006021][ T4304] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 156.006298][ T4304] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 156.006580][ T4304] r5:00000000 r4:82718bdc [ 156.006741][ T4304] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 156.007027][ T4304] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 156.007319][ T4304] r6:00000cc0 r5:82870cec r4:82ca83c0 [ 156.007501][ T4304] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 156.007810][ T4304] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<8023e4fc>] (vm_area_dup+0x44/0x104) [ 156.008130][ T4304] r10:84b54800 r9:00000001 r8:ec329dc4 r7:20ffa000 r6:851424e0 r5:82870cec [ 156.008381][ T4304] r4:85142cc0 [ 156.008519][ T4304] [<8023e4b8>] (vm_area_dup) from [<804b42cc>] (__split_vma+0x8c/0x450) [ 156.008808][ T4304] r7:20ffa000 r6:00004000 r5:ec329e28 r4:851424e0 [ 156.009032][ T4304] [<804b4240>] (__split_vma) from [<804b5f1c>] (vms_gather_munmap_vmas+0x74/0x4c8) [ 156.009345][ T4304] r10:84b54800 r9:20ffe000 r8:ec329d9c r7:00000000 r6:00004000 r5:ec329e28 [ 156.009620][ T4304] r4:20ffa000 [ 156.009788][ T4304] [<804b5ea8>] (vms_gather_munmap_vmas) from [<8049ed90>] (mmap_region+0x19c/0xda4) [ 156.010179][ T4304] r10:84b54800 r9:20ffe000 r8:83e83c00 r7:00000000 r6:00004000 r5:00800074 [ 156.010473][ T4304] r4:20ffa000 [ 156.010647][ T4304] [<8049ebf4>] (mmap_region) from [<8049fcf4>] (do_mmap+0x35c/0x4cc) [ 156.011016][ T4304] r10:00000000 r9:83e83c00 r8:20ffa000 r7:84b54800 r6:00800074 r5:00081032 [ 156.011315][ T4304] r4:00004000 [ 156.011462][ T4304] [<8049f998>] (do_mmap) from [<8046dee8>] (vm_mmap_pgoff+0xd8/0x18c) [ 156.011751][ T4304] r10:83e83c00 r9:00004000 r8:20ffa000 r7:00000000 r6:ec329f20 r5:00000004 [ 156.012016][ T4304] r4:00000000 [ 156.012193][ T4304] [<8046de10>] (vm_mmap_pgoff) from [<8049c8bc>] (ksys_mmap_pgoff+0x48/0xec) [ 156.012492][ T4304] r10:000000c0 r9:84b54800 r8:8020029c r7:20ffa000 r6:00004000 r5:00000004 [ 156.012741][ T4304] r4:00081032 [ 156.012880][ T4304] [<8049c874>] (ksys_mmap_pgoff) from [<8049c97c>] (sys_mmap_pgoff+0x1c/0x24) [ 156.013208][ T4304] r8:8020029c r7:000000c0 r6:00130e70 r5:00000146 r4:00000003 [ 156.014085][ T4304] [<8049c960>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 156.014812][ T4304] Exception stack(0xec329fa8 to 0xec329ff0) [ 156.015357][ T4304] 9fa0: 00000003 00000146 20ffa000 00004000 00000004 00081032 [ 156.015695][ T4304] 9fc0: 00000003 00000146 00130e70 000000c0 00000000 00006364 003d0f00 76b780bc [ 156.016020][ T4304] 9fe0: 76b77ec0 76b77eb0 00018af8 00132ec0 [ 156.213203][ T31] audit: type=1400 audit(156.120:196): avc: denied { block_suspend } for pid=4309 comm="syz.1.173" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 156.598017][ T4321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=4321 comm=syz.0.176 [ 156.977030][ T4319] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4319 comm=syz.1.175 [ 157.185917][ T31] audit: type=1400 audit(157.100:197): avc: denied { create } for pid=4324 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 157.189411][ T31] audit: type=1400 audit(157.100:198): avc: denied { write } for pid=4324 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 157.226227][ T4321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4321 comm=syz.0.176 [ 157.389151][ T4329] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4329 comm=syz.0.180 [ 157.406797][ T4329] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4329 comm=syz.0.180 [ 157.574935][ T4331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4331 comm=syz.1.181 [ 158.385363][ T4347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4347 comm=syz.1.189 [ 161.093758][ T31] audit: type=1400 audit(161.000:199): avc: denied { getopt } for pid=4363 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 162.406310][ T31] audit: type=1400 audit(162.320:200): avc: denied { nlmsg_write } for pid=4374 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 162.944913][ T31] audit: type=1400 audit(162.850:201): avc: denied { create } for pid=4393 comm="syz.0.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 162.946006][ T31] audit: type=1400 audit(162.850:202): avc: denied { write } for pid=4393 comm="syz.0.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 165.030380][ T4429] mmap: syz.1.211 (4429) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 165.590873][ T31] audit: type=1400 audit(165.500:203): avc: denied { lock } for pid=4439 comm="syz.1.216" path="socket:[3806]" dev="sockfs" ino=3806 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 167.648658][ T31] audit: type=1400 audit(167.560:204): avc: denied { read } for pid=4490 comm="syz.0.238" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 167.650031][ T31] audit: type=1400 audit(167.560:205): avc: denied { open } for pid=4490 comm="syz.0.238" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 167.651084][ T31] audit: type=1400 audit(167.560:206): avc: denied { ioctl } for pid=4490 comm="syz.0.238" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 169.328278][ T4524] fuse: Unknown parameter '0x0000000000000003' [ 169.340372][ T31] audit: type=1400 audit(169.250:207): avc: denied { read } for pid=4523 comm="syz.1.249" dev="sockfs" ino=4844 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 169.647380][ T4531] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4531 comm=syz.0.252 [ 170.927999][ T31] audit: type=1400 audit(170.840:208): avc: denied { listen } for pid=4546 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 171.560140][ T31] audit: type=1400 audit(171.470:209): avc: denied { write } for pid=4548 comm="syz.0.259" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 172.824184][ T4570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4570 comm=syz.1.267 [ 173.647276][ T4579] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4579 comm=syz.0.271 [ 174.222977][ T4590] FAULT_INJECTION: forcing a failure. [ 174.222977][ T4590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.235476][ T4590] CPU: 1 UID: 0 PID: 4590 Comm: syz.1.274 Not tainted 6.12.0-rc2-syzkaller #0 [ 174.236160][ T4590] Hardware name: ARM-Versatile Express [ 174.236544][ T4590] Call trace: [ 174.236753][ T4590] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 174.237337][ T4590] r7:ed3e5eb8 r6:00000000 r5:60000013 r4:8203d394 [ 174.237639][ T4590] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 174.238103][ T4590] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 174.238687][ T4590] r5:00000000 r4:8274e1c4 [ 174.238913][ T4590] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 174.239435][ T4590] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 174.239888][ T4590] r6:00000000 r5:00000001 r4:00000001 [ 174.240285][ T4590] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 174.240717][ T4590] [<808e5324>] (should_fail_usercopy) from [<80842ca4>] (kstrtouint_from_user+0x60/0x128) [ 174.241495][ T4590] [<80842c44>] (kstrtouint_from_user) from [<805c4670>] (proc_fail_nth_write+0x40/0xe8) [ 174.242013][ T4590] r8:ed3e5f68 r7:836d8000 r6:00000001 r5:85137300 r4:00000001 [ 174.242346][ T4590] [<805c4630>] (proc_fail_nth_write) from [<80516674>] (vfs_write+0xac/0x44c) [ 174.242888][ T4590] r5:85137300 r4:805c4630 [ 174.243225][ T4590] [<805165c8>] (vfs_write) from [<80516b98>] (ksys_write+0x78/0xf8) [ 174.243648][ T4590] r10:00000004 r9:836d8000 r8:8020029c r7:00000000 r6:00000002 r5:85137300 [ 174.244250][ T4590] r4:85137303 [ 174.244613][ T4590] [<80516b20>] (ksys_write) from [<80516c28>] (sys_write+0x10/0x14) [ 174.245267][ T4590] r7:00000004 r6:00000004 r5:76b71f30 r4:00000001 [ 174.245664][ T4590] [<80516c18>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 174.246097][ T4590] Exception stack(0xed3e5fa8 to 0xed3e5ff0) [ 174.246382][ T4590] 5fa0: 00000001 76b71f30 00000004 76b71f30 00000001 00000000 [ 174.246855][ T4590] 5fc0: 00000001 76b71f30 00000004 00000004 00000000 00006364 003d0f00 76b720bc [ 174.247214][ T4590] 5fe0: 00000158 76b71ed0 000d8408 00130e5c [ 174.315141][ T31] audit: type=1400 audit(174.220:210): avc: denied { ioctl } for pid=4591 comm="syz.0.276" path="socket:[4029]" dev="sockfs" ino=4029 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 174.335761][ T31] audit: type=1400 audit(174.240:211): avc: denied { getopt } for pid=4591 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 174.351911][ T31] audit: type=1400 audit(174.260:212): avc: denied { nlmsg_tty_audit } for pid=4591 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 174.366905][ T31] audit: type=1400 audit(174.280:213): avc: denied { write } for pid=4591 comm="syz.0.276" name="pfkey" dev="proc" ino=4026532824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 175.151572][ T4606] FAULT_INJECTION: forcing a failure. [ 175.151572][ T4606] name failslab, interval 1, probability 0, space 0, times 0 [ 175.152202][ T4606] CPU: 0 UID: 0 PID: 4606 Comm: syz.1.281 Not tainted 6.12.0-rc2-syzkaller #0 [ 175.152519][ T4606] Hardware name: ARM-Versatile Express [ 175.152735][ T4606] Call trace: [ 175.152967][ T4606] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 175.153336][ T4606] r7:836d8c00 r6:00000cc0 r5:60000013 r4:8203d394 [ 175.153571][ T4606] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 175.153882][ T4606] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 175.154201][ T4606] r5:00000000 r4:82718bdc [ 175.154689][ T4606] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 175.155097][ T4606] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 175.155453][ T4606] r6:00000cc0 r5:845cdcc0 r4:82c029c0 [ 175.155678][ T4606] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 175.156048][ T4606] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<81977628>] (mas_alloc_nodes+0x78/0x220) [ 175.156418][ T4606] r10:00000cc0 r9:00000001 r8:ed511dc4 r7:00000001 r6:00000001 r5:845cdcc0 [ 175.156738][ T4606] r4:ed511dc4 [ 175.156920][ T4606] [<819775b0>] (mas_alloc_nodes) from [<81977810>] (mas_node_count_gfp+0x40/0x5c) [ 175.157334][ T4606] r10:20000000 r9:00000001 r8:ed511dc4 r7:00000001 r6:00000cc0 r5:845cdcc0 [ 175.157646][ T4606] r4:ed511dc4 [ 175.157830][ T4606] [<819777d0>] (mas_node_count_gfp) from [<8197c6cc>] (mas_preallocate+0x1ac/0x2f0) [ 175.158277][ T4606] [<8197c520>] (mas_preallocate) from [<804b4388>] (__split_vma+0x148/0x450) [ 175.158667][ T4606] r7:20ffa000 r6:82934184 r5:845cdcc0 r4:84176060 [ 175.158926][ T4606] [<804b4240>] (__split_vma) from [<804b5f1c>] (vms_gather_munmap_vmas+0x74/0x4c8) [ 175.159333][ T4606] r10:836d8c00 r9:20ffe000 r8:ed511d9c r7:00000000 r6:00004000 r5:ed511e28 [ 175.159657][ T4606] r4:20ffa000 [ 175.159838][ T4606] [<804b5ea8>] (vms_gather_munmap_vmas) from [<8049ed90>] (mmap_region+0x19c/0xda4) [ 175.160249][ T4606] r10:836d8c00 r9:20ffe000 r8:84118c00 r7:00000000 r6:00004000 r5:00800074 [ 175.160584][ T4606] r4:20ffa000 [ 175.160757][ T4606] [<8049ebf4>] (mmap_region) from [<8049fcf4>] (do_mmap+0x35c/0x4cc) [ 175.161186][ T4606] r10:00000000 r9:84118c00 r8:20ffa000 r7:836d8c00 r6:00800074 r5:00081032 [ 175.161528][ T4606] r4:00004000 [ 175.161700][ T4606] [<8049f998>] (do_mmap) from [<8046dee8>] (vm_mmap_pgoff+0xd8/0x18c) [ 175.162147][ T4606] r10:84118c00 r9:00004000 r8:20ffa000 r7:00000000 r6:ed511f20 r5:00000004 [ 175.162562][ T4606] r4:00000000 [ 175.162741][ T4606] [<8046de10>] (vm_mmap_pgoff) from [<8049c8bc>] (ksys_mmap_pgoff+0x48/0xec) [ 175.163260][ T4606] r10:000000c0 r9:836d8c00 r8:8020029c r7:20ffa000 r6:00004000 r5:00000004 [ 175.163580][ T4606] r4:00081032 [ 175.163756][ T4606] [<8049c874>] (ksys_mmap_pgoff) from [<8049c97c>] (sys_mmap_pgoff+0x1c/0x24) [ 175.164135][ T4606] r8:8020029c r7:000000c0 r6:00130e70 r5:00000146 r4:00000003 [ 175.164753][ T4606] [<8049c960>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 175.165408][ T4606] Exception stack(0xed511fa8 to 0xed511ff0) [ 175.165679][ T4606] 1fa0: 00000003 00000146 20ffa000 00004000 00000004 00081032 [ 175.166020][ T4606] 1fc0: 00000003 00000146 00130e70 000000c0 00000000 00006364 003d0f00 76b720bc [ 175.166360][ T4606] 1fe0: 76b71ec0 76b71eb0 00018af8 00132ec0 [ 175.378137][ T4610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=4610 comm=syz.1.283 [ 175.709259][ T4610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4610 comm=syz.1.283 [ 176.066735][ T4613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4613 comm=syz.0.284 [ 176.071103][ T4613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4613 comm=syz.0.284 [ 178.349008][ T31] audit: type=1400 audit(178.260:214): avc: denied { shutdown } for pid=4656 comm="syz.0.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 178.422201][ T31] audit: type=1400 audit(178.330:215): avc: denied { bind } for pid=4658 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 184.137411][ T31] audit: type=1400 audit(184.050:216): avc: denied { map_read map_write } for pid=4784 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 184.178418][ T31] audit: type=1400 audit(184.090:217): avc: denied { prog_run } for pid=4784 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 185.075409][ T31] audit: type=1400 audit(184.970:218): avc: denied { setopt } for pid=4786 comm="syz.0.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 187.828302][ T31] audit: type=1400 audit(187.740:219): avc: denied { relabelfrom } for pid=4807 comm="syz.0.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 187.829703][ T31] audit: type=1400 audit(187.740:220): avc: denied { relabelto } for pid=4807 comm="syz.0.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 189.045162][ T31] audit: type=1400 audit(188.950:221): avc: denied { name_bind } for pid=4823 comm="syz.1.361" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 192.528154][ T31] audit: type=1400 audit(192.440:222): avc: denied { connect } for pid=4832 comm="syz.1.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 192.983727][ T31] audit: type=1400 audit(192.880:223): avc: denied { recv } for pid=3107 comm="syz-executor" saddr=127.0.0.1 src=49734 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 193.035165][ T31] audit: type=1400 audit(192.880:224): avc: denied { recv } for pid=3107 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=49734 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 196.045689][ T4851] input: syz0 as /devices/virtual/input/input3 [ 198.484789][ C0] hrtimer: interrupt took 10006928 ns [ 218.078250][ T31] audit: type=1400 audit(217.990:225): avc: denied { name_connect } for pid=4867 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 226.742715][ T31] audit: type=1400 audit(226.650:226): avc: denied { bind } for pid=4900 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 226.758254][ T31] audit: type=1400 audit(226.670:227): avc: denied { remove_name } for pid=2925 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 226.763293][ T31] audit: type=1400 audit(226.670:228): avc: denied { rename } for pid=2925 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 236.056823][ T31] audit: type=1400 audit(235.970:229): avc: denied { mounton } for pid=4936 comm="syz.1.387" path="/proc/534/task" dev="proc" ino=6362 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 236.263012][ T4941] process 'syz.1.389' launched './file2' with NULL argv: empty string added [ 236.264003][ T31] audit: type=1400 audit(236.170:230): avc: denied { execute } for pid=4940 comm="syz.1.389" name="file2" dev="tmpfs" ino=1155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 236.271869][ T31] audit: type=1400 audit(236.180:231): avc: denied { execute_no_trans } for pid=4940 comm="syz.1.389" path="/220/file2" dev="tmpfs" ino=1155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 236.491791][ T4944] netlink: 8 bytes leftover after parsing attributes in process `syz.1.390'. [ 256.791789][ T31] audit: type=1400 audit(256.700:232): avc: denied { ioctl } for pid=4976 comm="syz.1.399" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5598 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 258.672119][ T31] audit: type=1400 audit(258.580:233): avc: denied { listen } for pid=4988 comm="syz.0.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 258.937831][ T31] audit: type=1400 audit(258.850:234): avc: denied { nlmsg_read } for pid=4988 comm="syz.0.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 259.710074][ T31] audit: type=1400 audit(259.620:235): avc: denied { create } for pid=5007 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 263.089765][ T31] audit: type=1400 audit(263.000:236): avc: denied { nlmsg_read } for pid=5016 comm="syz.0.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 285.598578][ T31] audit: type=1400 audit(285.500:237): avc: denied { bind } for pid=5051 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 287.557692][ T31] audit: type=1400 audit(287.470:238): avc: denied { create } for pid=5064 comm="syz.1.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 288.308039][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 288.745162][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 290.205900][ T31] audit: type=1400 audit(290.120:239): avc: denied { create } for pid=5079 comm="syz.1.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 294.908891][ T31] audit: type=1400 audit(294.820:240): avc: denied { recv } for pid=3801 comm="syz.0.3" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 298.564824][ T31] audit: type=1400 audit(298.460:241): avc: denied { connect } for pid=5094 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 298.675623][ T31] audit: type=1400 audit(298.580:242): avc: denied { bind } for pid=5094 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 298.734907][ T31] audit: type=1400 audit(298.640:243): avc: denied { write } for pid=5094 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 312.667078][ T31] audit: type=1400 audit(312.580:244): avc: denied { mount } for pid=5146 comm="syz.1.443" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 321.798561][ T5187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.451'. [ 324.012690][ T5190] netlink: 8 bytes leftover after parsing attributes in process `syz.1.458'. [ 331.626060][ T3792] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 331.815386][ T3792] usb 2-1: Using ep0 maxpacket: 16 [ 331.825656][ T3792] usb 2-1: unable to get BOS descriptor or descriptor too short [ 331.837154][ T3792] usb 2-1: config 1 interface 0 altsetting 13 bulk endpoint 0x82 has invalid maxpacket 64 [ 331.838227][ T3792] usb 2-1: config 1 interface 0 altsetting 13 bulk endpoint 0x3 has invalid maxpacket 16 [ 331.842648][ T3792] usb 2-1: config 1 interface 0 altsetting 13 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 331.846310][ T3792] usb 2-1: config 1 interface 0 has no altsetting 0 [ 331.855457][ T3792] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 331.856682][ T3792] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 331.857099][ T3792] usb 2-1: Product: syz [ 331.857304][ T3792] usb 2-1: Manufacturer: syz [ 331.857509][ T3792] usb 2-1: SerialNumber: syz [ 331.881191][ T5203] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 331.882812][ T5203] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 332.131538][ T3792] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -71 [ 332.165672][ T3792] usb 2-1: USB disconnect, device number 2 [ 344.080327][ T31] audit: type=1400 audit(343.990:245): avc: denied { node_bind } for pid=5246 comm="syz.1.472" saddr=172.20.20.170 src=52768 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 344.208835][ T31] audit: type=1400 audit(344.120:246): avc: denied { create } for pid=5248 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 344.210917][ T31] audit: type=1400 audit(344.120:247): avc: denied { bind } for pid=5248 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 344.318043][ T31] audit: type=1400 audit(344.230:248): avc: denied { listen } for pid=5248 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 344.322963][ T31] audit: type=1400 audit(344.230:249): avc: denied { connect } for pid=5248 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 344.332915][ T31] audit: type=1400 audit(344.240:250): avc: denied { accept } for pid=5248 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 344.866685][ T31] audit: type=1400 audit(344.780:251): avc: denied { map } for pid=5276 comm="syz.1.476" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5992 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 344.879606][ T31] audit: type=1400 audit(344.790:252): avc: denied { read write } for pid=5276 comm="syz.1.476" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5992 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 344.993206][ T31] audit: type=1400 audit(344.900:253): avc: denied { read } for pid=5278 comm="syz.1.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 359.565534][ T8] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 359.720164][ T8] usb 2-1: config index 0 descriptor too short (expected 45, got 36) [ 359.720755][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 255, changing to 11 [ 359.721588][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 59391, setting to 1024 [ 359.722031][ T8] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 359.722490][ T8] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 359.722884][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.729552][ T8] usb 2-1: config 0 descriptor?? [ 359.732227][ T5294] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 360.235544][ T8] plantronics 0003:047F:FFFF.0001: unknown main item tag 0xd [ 360.243050][ T8] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 360.252447][ T8] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 360.445707][ T8] usb 2-1: USB disconnect, device number 3 [ 361.558914][ T5329] capability: warning: `syz.1.488' uses deprecated v2 capabilities in a way that may be insecure [ 364.720303][ T31] audit: type=1326 audit(364.630:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.740280][ T31] audit: type=1326 audit(364.650:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.742010][ T31] audit: type=1326 audit(364.650:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.747524][ T31] audit: type=1326 audit(364.660:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.806166][ T31] audit: type=1326 audit(364.710:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.833935][ T31] audit: type=1326 audit(364.740:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.836416][ T31] audit: type=1326 audit(364.740:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5339 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160204 code=0x7ffc0000 [ 364.843068][ T31] audit: type=1326 audit(364.750:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.856629][ T31] audit: type=1326 audit(364.770:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5336 comm="syz.1.491" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 365.809132][ T5344] Illegal XDP return value 4286103936 on prog (id 9) dev N/A, expect packet loss! [ 366.348334][ T31] audit: type=1326 audit(366.250:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5339 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 375.696765][ T31] audit: type=1400 audit(375.610:264): avc: denied { write } for pid=5353 comm="syz.0.497" path="socket:[6107]" dev="sockfs" ino=6107 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 382.057953][ T5361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5361 comm=syz.1.498 [ 382.062207][ T5361] netlink: 'syz.1.498': attribute type 1 has an invalid length. [ 382.147955][ T5361] 8021q: adding VLAN 0 to HW filter on device bond1 [ 382.199822][ T5361] bond1: (slave ip6gretap1): making interface the new active one [ 382.203169][ T5361] bond1: (slave ip6gretap1): Enslaving as an active interface with an up link [ 382.384316][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 390.386972][ T31] audit: type=1400 audit(390.300:265): avc: denied { connect } for pid=5424 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 390.425969][ T31] audit: type=1400 audit(390.340:266): avc: denied { accept } for pid=5424 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 390.437766][ T5425] netlink: 4 bytes leftover after parsing attributes in process `syz.0.508'. [ 412.012430][ T5504] snd_dummy snd_dummy.0: control 0:0:0:syz0:7 is already present [ 432.819333][ T31] audit: type=1400 audit(432.730:267): avc: denied { bind } for pid=5525 comm="syz.0.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 456.812921][ T31] audit: type=1400 audit(456.720:268): avc: denied { remount } for pid=5568 comm="syz.0.539" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 456.825123][ T5569] ======================================================= [ 456.825123][ T5569] WARNING: The mand mount option has been deprecated and [ 456.825123][ T5569] and is ignored by this kernel. Remove the mand [ 456.825123][ T5569] option from the mount to silence this warning. [ 456.825123][ T5569] ======================================================= [ 456.853181][ T31] audit: type=1400 audit(456.760:269): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 457.102058][ T5272] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.163346][ T5272] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.208447][ T5272] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.300218][ T5272] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.679576][ T5272] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 457.691269][ T5272] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 457.698611][ T5272] bond0 (unregistering): Released all slaves [ 457.788183][ T5272] hsr_slave_0: left promiscuous mode [ 457.796975][ T5272] hsr_slave_1: left promiscuous mode [ 457.816410][ T5272] veth1_macvtap: left promiscuous mode [ 457.817079][ T5272] veth0_macvtap: left promiscuous mode [ 457.817508][ T5272] veth1_vlan: left promiscuous mode [ 457.817783][ T5272] veth0_vlan: left promiscuous mode [ 459.967254][ T5573] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 459.971415][ T5573] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 461.589006][ T5573] hsr_slave_0: entered promiscuous mode [ 461.597010][ T5573] hsr_slave_1: entered promiscuous mode [ 461.601454][ T5573] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 461.601983][ T5573] Cannot create hsr debugfs directory [ 462.368813][ T5573] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 462.389789][ T5573] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 462.416832][ T5573] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 462.448420][ T5573] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 464.774097][ T5573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 472.159964][ T5573] veth0_vlan: entered promiscuous mode [ 472.212365][ T5573] veth1_vlan: entered promiscuous mode [ 472.288977][ T5573] veth0_macvtap: entered promiscuous mode [ 472.301528][ T5573] veth1_macvtap: entered promiscuous mode [ 472.370982][ T5573] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.371787][ T5573] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.372216][ T5573] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.372643][ T5573] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.558145][ T31] audit: type=1400 audit(472.470:270): avc: denied { mounton } for pid=5573 comm="syz-executor" path="/syzkaller.wUaVRA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8319 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 475.821982][ T6006] netlink: 108 bytes leftover after parsing attributes in process `syz.0.545'. [ 476.086084][ T1804] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 476.245727][ T1804] usb 2-1: Using ep0 maxpacket: 16 [ 476.257948][ T1804] usb 2-1: config 0 has an invalid interface number: 196 but max is 1 [ 476.258381][ T1804] usb 2-1: config 0 has an invalid interface number: 196 but max is 1 [ 476.258732][ T1804] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 476.259051][ T1804] usb 2-1: config 0 has no interface number 0 [ 476.259296][ T1804] usb 2-1: config 0 interface 196 altsetting 119 endpoint 0xB has an invalid bInterval 248, changing to 11 [ 476.259753][ T1804] usb 2-1: config 0 interface 196 has no altsetting 0 [ 476.260005][ T1804] usb 2-1: config 0 interface 196 has no altsetting 1 [ 476.282884][ T1804] usb 2-1: New USB device found, idVendor=0a46, idProduct=1269, bcdDevice=1a.0a [ 476.283380][ T1804] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 476.283684][ T1804] usb 2-1: Product: syz [ 476.283894][ T1804] usb 2-1: Manufacturer: syz [ 476.284100][ T1804] usb 2-1: SerialNumber: syz [ 476.293082][ T1804] usb 2-1: config 0 descriptor?? [ 476.535895][ T1804] dm9601 2-1:0.196: probe with driver dm9601 failed with error -22 [ 476.551673][ T1804] usb 2-1: USB disconnect, device number 4 [ 490.235629][ T3792] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 490.407293][ T3792] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 490.407992][ T3792] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 490.409560][ T3792] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 490.411467][ T3792] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 490.412720][ T3792] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 490.420606][ T3792] usb 2-1: config 0 descriptor?? [ 490.843182][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0xd [ 490.843814][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x7 [ 490.844927][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 490.845770][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 490.846246][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 490.846710][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 490.847099][ T3792] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 490.848326][ T3792] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 490.853325][ T3792] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 491.705979][ T3792] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 491.881072][ T3792] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 491.907453][ T3792] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 491.908300][ T3792] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 491.908863][ T3792] usb 1-1: Product: syz [ 491.909329][ T3792] usb 1-1: Manufacturer: syz [ 491.910745][ T3792] usb 1-1: SerialNumber: syz [ 492.866352][ T8] usb 2-1: USB disconnect, device number 5 [ 494.782589][ T3792] cdc_ncm 1-1:1.0: bind() failure [ 494.795702][ T3792] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 494.799161][ T3792] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 494.803356][ T3792] usbtest 1-1:1.1: probe with driver usbtest failed with error -71 [ 494.825705][ T3792] usb 1-1: USB disconnect, device number 2 [ 496.507632][ T31] audit: type=1400 audit(496.420:271): avc: denied { create } for pid=6160 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 511.972616][ T31] audit: type=1400 audit(511.880:272): avc: denied { bind } for pid=6267 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 511.973445][ T31] audit: type=1400 audit(511.880:273): avc: denied { node_bind } for pid=6267 comm="syz.0.594" saddr=fe88::101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 515.610223][ T6281] tmpfs: Unsupported parameter 'mpol' [ 519.148321][ T6293] netlink: 28 bytes leftover after parsing attributes in process `syz.0.602'. [ 519.149037][ T6293] netlink: 4 bytes leftover after parsing attributes in process `syz.0.602'. [ 519.194944][ T6293] veth1_macvtap: left promiscuous mode [ 519.205994][ T6293] netlink: 4 bytes leftover after parsing attributes in process `syz.0.602'. [ 519.209061][ T6293] netlink: 72 bytes leftover after parsing attributes in process `syz.0.602'. [ 519.209533][ T6293] A link change request failed with some changes committed already. Interface veth1_macvtap may have been left with an inconsistent configuration, please check. [ 526.739764][ T6319] trusted_key: encrypted_key: master key parameter 'u' is invalid [ 529.521781][ T31] audit: type=1400 audit(529.430:274): avc: denied { view } for pid=6320 comm="syz.1.613" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 531.408381][ T6334] random: crng reseeded on system resumption [ 531.442017][ T6334] capability: warning: `syz.1.619' uses 32-bit capabilities (legacy support in use) [ 534.426799][ T31] audit: type=1400 audit(534.340:275): avc: denied { setopt } for pid=6342 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 535.636660][ T6367] netlink: 4 bytes leftover after parsing attributes in process `syz.1.632'. [ 535.989509][ T31] audit: type=1400 audit(535.900:276): avc: denied { write } for pid=6369 comm="syz.1.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 537.155138][ T89] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 537.305355][ T89] usb 2-1: Using ep0 maxpacket: 8 [ 537.319680][ T89] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 537.320432][ T89] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 537.322895][ T89] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 537.323588][ T89] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 537.324095][ T89] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 537.335092][ T89] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 537.579568][ T89] usb 2-1: usb_control_msg returned -32 [ 537.580233][ T89] usbtmc 2-1:16.0: can't read capabilities [ 541.485892][ T6395] netlink: 8 bytes leftover after parsing attributes in process `syz.0.641'. [ 542.196312][ T6395] netlink: 8 bytes leftover after parsing attributes in process `syz.0.641'. [ 543.453193][ T6395] netlink: 8 bytes leftover after parsing attributes in process `syz.0.641'. [ 551.193306][ T8] usb 2-1: USB disconnect, device number 6 [ 551.358389][ T31] audit: type=1400 audit(551.270:277): avc: denied { mounton } for pid=6496 comm="syz.1.678" path="/352/file0" dev="tmpfs" ino=1827 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 551.765576][ T31] audit: type=1400 audit(551.670:278): avc: denied { unmount } for pid=5573 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 551.850952][ T31] audit: type=1400 audit(551.760:279): avc: denied { watch watch_reads } for pid=6509 comm="syz.0.684" path="/proc/206" dev="proc" ino=8855 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 551.920584][ T31] audit: type=1804 audit(551.830:280): pid=6497 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.1.678" name="/newroot/352/file0" dev="fuse" ino=1 res=1 errno=0 [ 553.113464][ T31] audit: type=1400 audit(553.020:281): avc: denied { setopt } for pid=6551 comm="syz.0.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 553.342245][ T31] audit: type=1400 audit(553.250:282): avc: denied { read } for pid=6557 comm="syz.0.704" path="socket:[8925]" dev="sockfs" ino=8925 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 562.571762][ T6601] netlink: 'syz.0.719': attribute type 10 has an invalid length. [ 573.087086][ T6632] netlink: 'syz.0.731': attribute type 63 has an invalid length. [ 573.677349][ T6643] bond0: (slave bond_slave_0): Releasing backup interface [ 573.703239][ T6643] bond0: (slave bond_slave_1): Releasing backup interface [ 573.775733][ T6643] bond0: entered promiscuous mode [ 573.778496][ T6643] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 573.784108][ T6643] bond0: left promiscuous mode [ 576.788054][ T6681] bridge_slave_0: default FDB implementation only supports local addresses [ 578.308583][ T6690] netlink: 68 bytes leftover after parsing attributes in process `syz.1.755'. [ 578.309615][ T6690] netlink: 12 bytes leftover after parsing attributes in process `syz.1.755'. [ 578.309988][ T6690] netlink: 16 bytes leftover after parsing attributes in process `syz.1.755'. [ 599.405469][ T6707] netlink: 56 bytes leftover after parsing attributes in process `syz.1.761'. [ 599.407177][ T6707] netlink: 24 bytes leftover after parsing attributes in process `syz.1.761'. [ 601.613601][ T6720] trusted_key: syz.0.766 sent an empty control message without MSG_MORE. [ 613.038256][ T6788] netlink: 173 bytes leftover after parsing attributes in process `syz.1.789'. [ 613.076967][ T6788] veth0_vlan: entered allmulticast mode [ 615.020714][ T6801] netlink: 12 bytes leftover after parsing attributes in process `syz.0.792'. [ 671.351038][ T6959] EXT4-fs warning (device vda): verify_group_input:136: Cannot add at group 262395 (only 8 groups) [ 692.910299][ T7008] fuse: Bad value for 'fd' [ 695.952436][ T7024] fuse: Bad value for 'fd' [ 720.051717][ T7080] fuse: Bad value for 'fd' [ 722.979958][ T7097] fuse: Bad value for 'fd' [ 728.337394][ T7114] fuse: Bad value for 'fd' [ 728.420642][ T7118] netlink: 4 bytes leftover after parsing attributes in process `syz.0.879'. [ 728.426369][ T7118] netlink: 12 bytes leftover after parsing attributes in process `syz.0.879'. [ 731.052162][ T7131] netlink: 'syz.1.882': attribute type 2 has an invalid length. [ 734.427237][ T7149] lo: entered allmulticast mode [ 734.431061][ T7148] lo: left allmulticast mode [ 751.086747][ T7224] fuse: Bad value for 'fd' [ 773.082003][ T31] audit: type=1400 audit(772.990:283): avc: denied { setopt } for pid=7258 comm="syz.1.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 777.528868][ T7264] netlink: 16 bytes leftover after parsing attributes in process `syz.1.922'. [ 788.726895][ T31] audit: type=1400 audit(788.610:284): avc: denied { create } for pid=7289 comm="syz.0.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 789.303576][ T7296] ip6gretap0: entered promiscuous mode [ 789.304228][ T7296] macsec1: entered promiscuous mode [ 789.315535][ T7296] macsec1: entered allmulticast mode [ 789.316095][ T7296] ip6gretap0: entered allmulticast mode [ 789.341737][ T7296] ip6gretap0: left allmulticast mode [ 789.347128][ T7296] ip6gretap0: left promiscuous mode [ 803.914797][ T7329] netlink: 'syz.0.939': attribute type 39 has an invalid length. [ 807.003885][ T7351] netlink: 16 bytes leftover after parsing attributes in process `syz.0.944'. [ 807.046323][ T7351] netlink: 12 bytes leftover after parsing attributes in process `syz.0.944'. [ 815.659813][ T7369] netlink: 'syz.1.949': attribute type 10 has an invalid length. [ 832.071905][ T7426] ------------[ cut here ]------------ [ 832.072635][ T7426] WARNING: CPU: 1 PID: 7426 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 832.073150][ T7426] Modules linked in: [ 832.073858][ T7426] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 832.074843][ T7426] CPU: 1 UID: 0 PID: 7426 Comm: syz.1.969 Not tainted 6.12.0-rc2-syzkaller #0 [ 832.075621][ T7426] Hardware name: ARM-Versatile Express [ 832.076666][ T7426] Call trace: [ 832.077285][ T7426] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 832.077681][ T7426] r7:00000000 r6:826228c4 r5:00000000 r4:8203d394 [ 832.077971][ T7426] [<81998edc>] (show_stack) from [<819b7384>] (dump_stack_lvl+0x54/0x7c) [ 832.078369][ T7426] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 832.078758][ T7426] r5:00000000 r4:82870d18 [ 832.078978][ T7426] [<819b73ac>] (dump_stack) from [<81999a20>] (panic+0x120/0x374) [ 832.079360][ T7426] [<81999900>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 832.079692][ T7426] r3:8260c5c4 r2:00000001 r1:82025774 r0:8202d1dc [ 832.079950][ T7426] r7:8048c614 [ 832.080140][ T7426] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 832.080803][ T7426] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 832.081338][ T7426] r8:00000009 r7:82054dd8 r6:dfccdd24 r5:82eb6000 r4:00000000 [ 832.081674][ T7426] [<80242350>] (warn_slowpath_fmt) from [<8048c614>] (kunmap_local_indexed+0x20c/0x224) [ 832.082384][ T7426] r10:ffedc438 r9:8411b300 r8:200b9000 r7:00000000 r6:00000003 r5:82eb6000 [ 832.083012][ T7426] r4:ffedc000 [ 832.083320][ T7426] [<8048c408>] (kunmap_local_indexed) from [<80505a48>] (move_pages+0x7e8/0x149c) [ 832.083773][ T7426] r7:00000000 r6:8466b120 r5:defcbba4 r4:ffeda5c8 [ 832.084217][ T7426] [<80505260>] (move_pages) from [<80581c70>] (userfaultfd_ioctl+0x114c/0x2080) [ 832.085236][ T7426] r10:8411b300 r9:dfccde98 r8:00000001 r7:2068b000 r6:00000000 r5:20000080 [ 832.086234][ T7426] r4:852d1100 [ 832.086907][ T7426] [<80580b24>] (userfaultfd_ioctl) from [<8052f654>] (sys_ioctl+0x134/0xda8) [ 832.087650][ T7426] r10:82eb6000 r9:851c5cc0 r8:00000003 r7:20000080 r6:851c5cc1 r5:00000000 [ 832.088153][ T7426] r4:c028aa05 [ 832.088339][ T7426] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 832.088707][ T7426] Exception stack(0xdfccdfa8 to 0xdfccdff0) [ 832.089051][ T7426] dfa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 832.089429][ T7426] dfc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b720bc [ 832.089819][ T7426] dfe0: 76b71ec0 76b71eb0 00018af8 00132ec0 [ 832.090117][ T7426] r10:00000036 r9:82eb6000 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 832.090474][ T7426] r4:00000000 [ 832.092624][ T7426] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:45:52 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000000 R03=84181740 R04=00000001 R05=826016cc R06=826016c0 R07=00000000 R08=00000000 R09=00000002 R10=00000007 R11=8260173c R12=82601658 R13=82601620 R14=8071d608 R15=80724350 PSR=60000113 -ZC- A S svc32 s00=0c000000 s01=00000000 d00=000000000c000000 s02=f0000000 s03=fff01ae5 d01=fff01ae5f0000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ff764cd2 s09=ffa8ba6b d04=ffa8ba6bff764cd2 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=0020f200 s13=00928129 d06=009281290020f200 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=fec80ca0 d08=fec80ca000000000 s18=4e000000 s19=0001397e d09=0001397e4e000000 s20=ff4518b7 s21=00928129 d10=00928129ff4518b7 s22=ffffffff s23=00000000 d11=00000000ffffffff s24=0d764cd2 s25=00000000 d12=000000000d764cd2 s26=f0000000 s27=fff01ae5 d13=fff01ae5f0000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=00651754 s33=ffee5cfd d16=ffee5cfd00651754 s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=00f519fd s37=fff0ed73 d18=fff0ed7300f519fd s38=00000000 s39=ffffffff d19=ffffffff00000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=01d63d75 s43=00000000 d21=0000000001d63d75 s44=00000003 s45=00000000 d22=0000000000000003 s46=009cbf27 s47=00000000 d23=00000000009cbf27 s48=013b1511 s49=fec80ca0 d24=fec80ca0013b1511 s50=0ba22fe5 s51=00000000 d25=000000000ba22fe5 s52=0054e13e s53=ff230b68 d26=ff230b680054e13e s54=fe88d8d2 s55=00ede6be d27=00ede6befe88d8d2 s56=0093e28d s57=01379b78 d28=01379b780093e28d s58=009bcdbc s59=fe88d8d2 d29=fe88d8d2009bcdbc s60=f7ee0f3c s61=fff01ae5 d30=fff01ae5f7ee0f3c s62=c3d41ced s63=ffcfb895 d31=ffcfb895c3d41ced FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000000 R03=60000093 R04=00000000 R05=00000000 R06=dddd93d5 R07=00000000 R08=00000000 R09=00000000 R10=82629b28 R11=dfccdb94 R12=00000001 R13=dfccdb10 R14=000233c0 R15=802bec88 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000