last executing test programs: 4.457253673s ago: executing program 1 (id=2731): socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)="c5cbff3b2e626ab0f365245510bf38c7fcf9f78fdad9e044", 0x18, 0x3b00, 0x0, 0x0) 4.264887331s ago: executing program 1 (id=2732): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x34, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x400}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008010) 4.129565697s ago: executing program 1 (id=2733): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x3c, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x20, 0x2b, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4090}, 0xc000) 3.418373078s ago: executing program 1 (id=2735): unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) 2.275706882s ago: executing program 0 (id=2742): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x44}}, 0x0) 2.0291941s ago: executing program 0 (id=2743): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x9866e04d8b605b6d}, 0x4) 1.845665747s ago: executing program 0 (id=2744): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'macvlan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="00001700000000001c0037800b0001206970768a616e08000c0002"], 0x44}, 0x1, 0x0, 0x0, 0x2000c080}, 0x0) 1.591918707s ago: executing program 0 (id=2745): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x18) 1.335013297s ago: executing program 0 (id=2746): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x2, 0x6) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0xa3) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e00000002008100", 0x36, 0x0, 0x0, 0x0) 949.375713ms ago: executing program 0 (id=2747): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x10681}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x20044002) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_FLAGS={0x8, 0x8, 0x100}]}, 0x34}}, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r10 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r10, &(0x7f0000000080)={0x1d, r9, 0x0, {0x0, 0x0, 0x4}, 0xfe}, 0x18) sendmsg$can_j1939(r10, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) close(r10) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)=@newtfilter={0x24, 0x11, 0x1, 0x70bd25, 0x100000, {0x0, 0x0, 0x74, r9, {0x6, 0x8}, {0x5, 0xfff3}, {0xfff1, 0xffe0}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4010}, 0xc4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_FLAGS={0x8, 0x8, 0x781}]}, 0x34}}, 0x0) 196.847651ms ago: executing program 1 (id=2748): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x9866e04d8b605b6d}, 0x4) 0s ago: executing program 1 (id=2749): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000500)="c1de6d7233a30dc5a0ac84df9225d4325a15a7295cf7e6df47390d5db02c64d88b844ff1427d351f48a4ee972e301f7d400bf2477dff5ebaac66161928c38e510398d46a398f38d1c8b8a3c60b42f680764d90379445541ca10a19abe4d5248c9825e0ecc59bbd10723a2addf3dd6766e76d57027ab42d4c2c7b0132782314c5c321bc6cae3b9cd1", 0x88) kernel console output (not intermixed with test programs): ass=chr_file permissive=1 [ 362.634665][ T30] audit: type=1400 audit(362.330:230): avc: denied { open } for pid=5338 comm="syz.0.636" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 362.795521][ T30] audit: type=1400 audit(362.490:231): avc: denied { ioctl } for pid=5338 comm="syz.0.636" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 362.810396][ T5340] Restarting kernel threads ... done. [ 364.227305][ T30] audit: type=1400 audit(363.920:232): avc: denied { read } for pid=5361 comm="syz.1.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 364.629690][ T5369] FAULT_INJECTION: forcing a failure. [ 364.629690][ T5369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.631975][ T5369] CPU: 0 UID: 0 PID: 5369 Comm: syz.0.650 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 364.632077][ T5369] Hardware name: linux,dummy-virt (DT) [ 364.632111][ T5369] Call trace: [ 364.632139][ T5369] show_stack+0x18/0x24 (C) [ 364.632211][ T5369] dump_stack_lvl+0xdc/0xf4 [ 364.632260][ T5369] dump_stack+0x1c/0x28 [ 364.632300][ T5369] should_fail_ex+0x5a0/0x6ac [ 364.632348][ T5369] should_fail+0x14/0x20 [ 364.632391][ T5369] should_fail_usercopy+0x1c/0x28 [ 364.632435][ T5369] _inline_copy_from_user+0x38/0x130 [ 364.632481][ T5369] copy_msghdr_from_user+0xa0/0x130 [ 364.632524][ T5369] ___sys_sendmsg+0xfc/0x19c [ 364.632565][ T5369] __sys_sendmsg+0x114/0x198 [ 364.632607][ T5369] __arm64_sys_sendmsg+0x70/0xa0 [ 364.632649][ T5369] invoke_syscall+0x6c/0x258 [ 364.632690][ T5369] el0_svc_common.constprop.0+0xac/0x230 [ 364.632732][ T5369] do_el0_svc+0x40/0x58 [ 364.632771][ T5369] el0_svc+0x50/0x180 [ 364.632816][ T5369] el0t_64_sync_handler+0x10c/0x138 [ 364.632859][ T5369] el0t_64_sync+0x198/0x19c [ 364.937167][ T30] audit: type=1400 audit(364.630:233): avc: denied { getopt } for pid=5373 comm="syz.1.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 365.721623][ T30] audit: type=1400 audit(365.420:234): avc: denied { mounton } for pid=5385 comm="syz.0.658" path="/306/file0" dev="tmpfs" ino=1564 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 366.337008][ T5386] FAULT_INJECTION: forcing a failure. [ 366.337008][ T5386] name failslab, interval 1, probability 0, space 0, times 0 [ 366.343231][ T5386] CPU: 1 UID: 0 PID: 5386 Comm: syz.0.658 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 366.343482][ T5386] Hardware name: linux,dummy-virt (DT) [ 366.343555][ T5386] Call trace: [ 366.343619][ T5386] show_stack+0x18/0x24 (C) [ 366.343767][ T5386] dump_stack_lvl+0xdc/0xf4 [ 366.343879][ T5386] dump_stack+0x1c/0x28 [ 366.344055][ T5386] should_fail_ex+0x5a0/0x6ac [ 366.344174][ T5386] should_failslab+0xbc/0x11c [ 366.344366][ T5386] kmem_cache_alloc_noprof+0x74/0x3b8 [ 366.344478][ T5386] fuse_request_alloc+0x28/0x1d4 [ 366.344578][ T5386] fuse_get_req+0x1c8/0x74c [ 366.344674][ T5386] __fuse_simple_request+0x90/0x978 [ 366.344772][ T5386] fuse_readdir_uncached+0x2c8/0x12c4 [ 366.344906][ T5386] fuse_readdir+0x5f8/0x12f4 [ 366.345006][ T5386] iterate_dir+0x1ec/0x7cc [ 366.345117][ T5386] __arm64_sys_getdents64+0x108/0x290 [ 366.345222][ T5386] invoke_syscall+0x6c/0x258 [ 366.345333][ T5386] el0_svc_common.constprop.0+0xac/0x230 [ 366.345434][ T5386] do_el0_svc+0x40/0x58 [ 366.345532][ T5386] el0_svc+0x50/0x180 [ 366.345638][ T5386] el0t_64_sync_handler+0x10c/0x138 [ 366.345744][ T5386] el0t_64_sync+0x198/0x19c [ 366.673086][ T5391] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5391 comm=syz.1.660 [ 368.277467][ T30] audit: type=1400 audit(367.970:235): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 368.567432][ T5405] Restarting kernel threads ... done. [ 369.450816][ T5412] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5412 comm=syz.0.665 [ 369.801755][ T5419] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 369.855182][ T5419] FAULT_INJECTION: forcing a failure. [ 369.855182][ T5419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.855718][ T5419] CPU: 0 UID: 0 PID: 5419 Comm: syz.0.667 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 369.855774][ T5419] Hardware name: linux,dummy-virt (DT) [ 369.855881][ T5419] Call trace: [ 369.855919][ T5419] show_stack+0x18/0x24 (C) [ 369.856003][ T5419] dump_stack_lvl+0xdc/0xf4 [ 369.856065][ T5419] dump_stack+0x1c/0x28 [ 369.856106][ T5419] should_fail_ex+0x5a0/0x6ac [ 369.856170][ T5419] should_fail+0x14/0x20 [ 369.856218][ T5419] should_fail_usercopy+0x1c/0x28 [ 369.856261][ T5419] simple_read_from_buffer+0x94/0x1f0 [ 369.856310][ T5419] proc_fail_nth_read+0x160/0x248 [ 369.856353][ T5419] vfs_read+0x18c/0x97c [ 369.856400][ T5419] ksys_read+0xec/0x1d8 [ 369.856442][ T5419] __arm64_sys_read+0x6c/0x9c [ 369.856485][ T5419] invoke_syscall+0x6c/0x258 [ 369.856526][ T5419] el0_svc_common.constprop.0+0xac/0x230 [ 369.856590][ T5419] do_el0_svc+0x40/0x58 [ 369.856634][ T5419] el0_svc+0x50/0x180 [ 369.856684][ T5419] el0t_64_sync_handler+0x10c/0x138 [ 369.856733][ T5419] el0t_64_sync+0x198/0x19c [ 370.498713][ T30] audit: type=1400 audit(370.190:236): avc: denied { setopt } for pid=5423 comm="syz.0.669" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 378.489823][ T5484] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 392.675129][ T5650] FAULT_INJECTION: forcing a failure. [ 392.675129][ T5650] name failslab, interval 1, probability 0, space 0, times 0 [ 392.676672][ T5650] CPU: 1 UID: 0 PID: 5650 Comm: syz.0.741 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 392.676738][ T5650] Hardware name: linux,dummy-virt (DT) [ 392.676771][ T5650] Call trace: [ 392.676799][ T5650] show_stack+0x18/0x24 (C) [ 392.676878][ T5650] dump_stack_lvl+0xdc/0xf4 [ 392.676930][ T5650] dump_stack+0x1c/0x28 [ 392.676971][ T5650] should_fail_ex+0x5a0/0x6ac [ 392.677022][ T5650] should_failslab+0xbc/0x11c [ 392.677070][ T5650] __kmalloc_noprof+0xd0/0x4d0 [ 392.677116][ T5650] tomoyo_encode2+0xa8/0x2c0 [ 392.677165][ T5650] tomoyo_encode+0x28/0x40 [ 392.677211][ T5650] tomoyo_realpath_from_path+0x114/0x534 [ 392.677258][ T5650] tomoyo_path_number_perm+0x200/0x438 [ 392.677314][ T5650] tomoyo_file_ioctl+0x1c/0x28 [ 392.677362][ T5650] security_file_ioctl+0x8c/0x19c [ 392.677411][ T5650] __arm64_sys_ioctl+0x90/0x188 [ 392.677457][ T5650] invoke_syscall+0x6c/0x258 [ 392.677499][ T5650] el0_svc_common.constprop.0+0xac/0x230 [ 392.677540][ T5650] do_el0_svc+0x40/0x58 [ 392.677580][ T5650] el0_svc+0x50/0x180 [ 392.677625][ T5650] el0t_64_sync_handler+0x10c/0x138 [ 392.677669][ T5650] el0t_64_sync+0x198/0x19c [ 392.687777][ T5650] ERROR: Out of memory at tomoyo_realpath_from_path. [ 398.145977][ T30] audit: type=1400 audit(397.840:237): avc: denied { ioctl } for pid=5717 comm="syz.0.772" path="socket:[10509]" dev="sockfs" ino=10509 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 399.354899][ T5737] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 399.394004][ T5737] FAULT_INJECTION: forcing a failure. [ 399.394004][ T5737] name failslab, interval 1, probability 0, space 0, times 0 [ 399.394612][ T5737] CPU: 0 UID: 0 PID: 5737 Comm: syz.0.780 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 399.394672][ T5737] Hardware name: linux,dummy-virt (DT) [ 399.394703][ T5737] Call trace: [ 399.394730][ T5737] show_stack+0x18/0x24 (C) [ 399.394836][ T5737] dump_stack_lvl+0xdc/0xf4 [ 399.394891][ T5737] dump_stack+0x1c/0x28 [ 399.394931][ T5737] should_fail_ex+0x5a0/0x6ac [ 399.394984][ T5737] should_failslab+0xbc/0x11c [ 399.395040][ T5737] __kmalloc_noprof+0xd0/0x4d0 [ 399.395130][ T5737] tomoyo_encode2+0xa8/0x2c0 [ 399.395184][ T5737] tomoyo_encode+0x28/0x40 [ 399.395228][ T5737] tomoyo_realpath_from_path+0x114/0x534 [ 399.395273][ T5737] tomoyo_path_number_perm+0x200/0x438 [ 399.395317][ T5737] tomoyo_file_ioctl+0x1c/0x28 [ 399.395361][ T5737] security_file_ioctl+0x8c/0x19c [ 399.395409][ T5737] __arm64_sys_ioctl+0x90/0x188 [ 399.395454][ T5737] invoke_syscall+0x6c/0x258 [ 399.395608][ T5737] el0_svc_common.constprop.0+0xac/0x230 [ 399.395656][ T5737] do_el0_svc+0x40/0x58 [ 399.395752][ T5737] el0_svc+0x50/0x180 [ 399.395999][ T5737] el0t_64_sync_handler+0x10c/0x138 [ 399.396249][ T5737] el0t_64_sync+0x198/0x19c [ 399.396468][ T5737] ERROR: Out of memory at tomoyo_realpath_from_path. [ 399.634099][ T5740] SELinux: Context system_u:object_r:restorecond_var_run_t:s0 is not valid (left unmapped). [ 399.637889][ T30] audit: type=1400 audit(399.330:238): avc: denied { relabelto } for pid=5738 comm="syz.1.781" name="file0" dev="tmpfs" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 399.645972][ T30] audit: type=1400 audit(399.340:239): avc: denied { associate } for pid=5738 comm="syz.1.781" name="file0" dev="tmpfs" ino=2190 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:restorecond_var_run_t:s0" [ 399.666875][ T30] audit: type=1400 audit(399.360:240): avc: denied { write } for pid=5738 comm="syz.1.781" path="/430/file0" dev="tmpfs" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 399.687213][ T30] audit: type=1400 audit(399.380:241): avc: denied { read } for pid=5738 comm="syz.1.781" path="/430/file0" dev="tmpfs" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 399.796107][ T30] audit: type=1400 audit(399.490:242): avc: denied { unlink } for pid=3304 comm="syz-executor" name="file0" dev="tmpfs" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 400.131840][ T30] audit: type=1400 audit(399.820:243): avc: denied { map } for pid=5744 comm="syz.1.784" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9518 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 400.135391][ T30] audit: type=1400 audit(399.830:244): avc: denied { read write } for pid=5744 comm="syz.1.784" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9518 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 401.814921][ T5759] FAULT_INJECTION: forcing a failure. [ 401.814921][ T5759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 401.819403][ T5759] CPU: 1 UID: 0 PID: 5759 Comm: syz.1.791 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 401.819493][ T5759] Hardware name: linux,dummy-virt (DT) [ 401.819531][ T5759] Call trace: [ 401.819563][ T5759] show_stack+0x18/0x24 (C) [ 401.819651][ T5759] dump_stack_lvl+0xdc/0xf4 [ 401.819703][ T5759] dump_stack+0x1c/0x28 [ 401.819744][ T5759] should_fail_ex+0x5a0/0x6ac [ 401.819798][ T5759] should_fail+0x14/0x20 [ 401.819842][ T5759] should_fail_usercopy+0x1c/0x28 [ 401.819902][ T5759] simple_read_from_buffer+0x94/0x1f0 [ 401.819965][ T5759] proc_fail_nth_read+0x160/0x248 [ 401.820012][ T5759] vfs_read+0x18c/0x97c [ 401.820063][ T5759] ksys_read+0xec/0x1d8 [ 401.820108][ T5759] __arm64_sys_read+0x6c/0x9c [ 401.820154][ T5759] invoke_syscall+0x6c/0x258 [ 401.820227][ T5759] el0_svc_common.constprop.0+0xac/0x230 [ 401.820272][ T5759] do_el0_svc+0x40/0x58 [ 401.820314][ T5759] el0_svc+0x50/0x180 [ 401.820361][ T5759] el0t_64_sync_handler+0x10c/0x138 [ 401.820406][ T5759] el0t_64_sync+0x198/0x19c [ 402.259820][ T30] audit: type=1400 audit(401.950:245): avc: denied { read } for pid=5763 comm="syz.1.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 402.993026][ T5772] FAULT_INJECTION: forcing a failure. [ 402.993026][ T5772] name failslab, interval 1, probability 0, space 0, times 0 [ 402.993672][ T5772] CPU: 0 UID: 0 PID: 5772 Comm: syz.0.797 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 402.993807][ T5772] Hardware name: linux,dummy-virt (DT) [ 402.993848][ T5772] Call trace: [ 402.993881][ T5772] show_stack+0x18/0x24 (C) [ 402.993961][ T5772] dump_stack_lvl+0xdc/0xf4 [ 402.994015][ T5772] dump_stack+0x1c/0x28 [ 402.994073][ T5772] should_fail_ex+0x5a0/0x6ac [ 402.994125][ T5772] should_failslab+0xbc/0x11c [ 402.994173][ T5772] __kmalloc_noprof+0xd0/0x4d0 [ 402.994219][ T5772] tomoyo_encode2+0xa8/0x2c0 [ 402.994271][ T5772] tomoyo_encode+0x28/0x40 [ 402.994319][ T5772] tomoyo_realpath_from_path+0x114/0x534 [ 402.994432][ T5772] tomoyo_path_number_perm+0x200/0x438 [ 402.994486][ T5772] tomoyo_file_ioctl+0x1c/0x28 [ 402.994783][ T5772] security_file_ioctl+0x8c/0x19c [ 402.994896][ T5772] __arm64_sys_ioctl+0x90/0x188 [ 402.994978][ T5772] invoke_syscall+0x6c/0x258 [ 402.995263][ T5772] el0_svc_common.constprop.0+0xac/0x230 [ 402.995377][ T5772] do_el0_svc+0x40/0x58 [ 402.995422][ T5772] el0_svc+0x50/0x180 [ 402.995468][ T5772] el0t_64_sync_handler+0x10c/0x138 [ 402.995516][ T5772] el0t_64_sync+0x198/0x19c [ 403.019366][ T5772] ERROR: Out of memory at tomoyo_realpath_from_path. [ 403.885895][ T5783] FAULT_INJECTION: forcing a failure. [ 403.885895][ T5783] name failslab, interval 1, probability 0, space 0, times 0 [ 403.887435][ T5783] CPU: 1 UID: 0 PID: 5783 Comm: syz.0.802 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 403.887508][ T5783] Hardware name: linux,dummy-virt (DT) [ 403.887542][ T5783] Call trace: [ 403.887570][ T5783] show_stack+0x18/0x24 (C) [ 403.887642][ T5783] dump_stack_lvl+0xdc/0xf4 [ 403.887690][ T5783] dump_stack+0x1c/0x28 [ 403.887731][ T5783] should_fail_ex+0x5a0/0x6ac [ 403.887780][ T5783] should_failslab+0xbc/0x11c [ 403.887826][ T5783] __kmalloc_noprof+0xd0/0x4d0 [ 403.887872][ T5783] tomoyo_encode2+0xa8/0x2c0 [ 403.887921][ T5783] tomoyo_encode+0x28/0x40 [ 403.887966][ T5783] tomoyo_realpath_from_path+0x114/0x534 [ 403.888071][ T5783] tomoyo_path_number_perm+0x200/0x438 [ 403.888121][ T5783] tomoyo_file_ioctl+0x1c/0x28 [ 403.888168][ T5783] security_file_ioctl+0x8c/0x19c [ 403.888217][ T5783] __arm64_sys_ioctl+0x90/0x188 [ 403.888262][ T5783] invoke_syscall+0x6c/0x258 [ 403.888303][ T5783] el0_svc_common.constprop.0+0xac/0x230 [ 403.888345][ T5783] do_el0_svc+0x40/0x58 [ 403.888385][ T5783] el0_svc+0x50/0x180 [ 403.888430][ T5783] el0t_64_sync_handler+0x10c/0x138 [ 403.888474][ T5783] el0t_64_sync+0x198/0x19c [ 403.900513][ T5783] ERROR: Out of memory at tomoyo_realpath_from_path. [ 403.902580][ T30] audit: type=1400 audit(403.600:246): avc: denied { ioctl } for pid=5782 comm="syz.0.802" path="net:[4026532642]" dev="nsfs" ino=4026532642 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 405.886283][ T5815] FAULT_INJECTION: forcing a failure. [ 405.886283][ T5815] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.886838][ T5815] CPU: 0 UID: 0 PID: 5815 Comm: syz.0.814 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 405.886897][ T5815] Hardware name: linux,dummy-virt (DT) [ 405.886929][ T5815] Call trace: [ 405.886956][ T5815] show_stack+0x18/0x24 (C) [ 405.887028][ T5815] dump_stack_lvl+0xdc/0xf4 [ 405.887110][ T5815] dump_stack+0x1c/0x28 [ 405.887150][ T5815] should_fail_ex+0x5a0/0x6ac [ 405.887198][ T5815] should_fail+0x14/0x20 [ 405.887240][ T5815] should_fail_usercopy+0x1c/0x28 [ 405.887282][ T5815] _inline_copy_from_user+0x38/0x130 [ 405.887328][ T5815] copy_msghdr_from_user+0xa0/0x130 [ 405.887371][ T5815] ___sys_sendmsg+0xfc/0x19c [ 405.887414][ T5815] __sys_sendmsg+0x114/0x198 [ 405.887455][ T5815] __arm64_sys_sendmsg+0x70/0xa0 [ 405.887496][ T5815] invoke_syscall+0x6c/0x258 [ 405.887549][ T5815] el0_svc_common.constprop.0+0xac/0x230 [ 405.887595][ T5815] do_el0_svc+0x40/0x58 [ 405.887664][ T5815] el0_svc+0x50/0x180 [ 405.887713][ T5815] el0t_64_sync_handler+0x10c/0x138 [ 405.887756][ T5815] el0t_64_sync+0x198/0x19c [ 407.131011][ T5838] FAULT_INJECTION: forcing a failure. [ 407.131011][ T5838] name failslab, interval 1, probability 0, space 0, times 0 [ 407.134099][ T5838] CPU: 1 UID: 0 PID: 5838 Comm: syz.1.823 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 407.134182][ T5838] Hardware name: linux,dummy-virt (DT) [ 407.134216][ T5838] Call trace: [ 407.134278][ T5838] show_stack+0x18/0x24 (C) [ 407.134440][ T5838] dump_stack_lvl+0xdc/0xf4 [ 407.134496][ T5838] dump_stack+0x1c/0x28 [ 407.134536][ T5838] should_fail_ex+0x5a0/0x6ac [ 407.134621][ T5838] should_failslab+0xbc/0x11c [ 407.134670][ T5838] __kmalloc_noprof+0xd0/0x4d0 [ 407.134716][ T5838] tomoyo_realpath_from_path+0x90/0x534 [ 407.134791][ T5838] tomoyo_path_number_perm+0x200/0x438 [ 407.134858][ T5838] tomoyo_file_ioctl+0x1c/0x28 [ 407.134904][ T5838] security_file_ioctl+0x8c/0x19c [ 407.134956][ T5838] __arm64_sys_ioctl+0x90/0x188 [ 407.135001][ T5838] invoke_syscall+0x6c/0x258 [ 407.135080][ T5838] el0_svc_common.constprop.0+0xac/0x230 [ 407.135128][ T5838] do_el0_svc+0x40/0x58 [ 407.135168][ T5838] el0_svc+0x50/0x180 [ 407.135213][ T5838] el0t_64_sync_handler+0x10c/0x138 [ 407.135257][ T5838] el0t_64_sync+0x198/0x19c [ 407.146049][ T5838] ERROR: Out of memory at tomoyo_realpath_from_path. [ 409.234165][ T5870] FAULT_INJECTION: forcing a failure. [ 409.234165][ T5870] name failslab, interval 1, probability 0, space 0, times 0 [ 409.234741][ T5870] CPU: 0 UID: 0 PID: 5870 Comm: syz.1.839 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 409.234846][ T5870] Hardware name: linux,dummy-virt (DT) [ 409.234884][ T5870] Call trace: [ 409.234913][ T5870] show_stack+0x18/0x24 (C) [ 409.234984][ T5870] dump_stack_lvl+0xdc/0xf4 [ 409.235041][ T5870] dump_stack+0x1c/0x28 [ 409.235166][ T5870] should_fail_ex+0x5a0/0x6ac [ 409.235325][ T5870] should_failslab+0xbc/0x11c [ 409.235441][ T5870] __kmalloc_noprof+0xd0/0x4d0 [ 409.235546][ T5870] tomoyo_encode2+0xa8/0x2c0 [ 409.235645][ T5870] tomoyo_encode+0x28/0x40 [ 409.235734][ T5870] tomoyo_realpath_from_path+0x114/0x534 [ 409.235823][ T5870] tomoyo_path_number_perm+0x200/0x438 [ 409.235916][ T5870] tomoyo_file_ioctl+0x1c/0x28 [ 409.236039][ T5870] security_file_ioctl+0x8c/0x19c [ 409.236141][ T5870] __arm64_sys_ioctl+0x90/0x188 [ 409.236271][ T5870] invoke_syscall+0x6c/0x258 [ 409.236367][ T5870] el0_svc_common.constprop.0+0xac/0x230 [ 409.236464][ T5870] do_el0_svc+0x40/0x58 [ 409.236549][ T5870] el0_svc+0x50/0x180 [ 409.236643][ T5870] el0t_64_sync_handler+0x10c/0x138 [ 409.236757][ T5870] el0t_64_sync+0x198/0x19c [ 409.236981][ T5870] ERROR: Out of memory at tomoyo_realpath_from_path. [ 412.194098][ T5910] FAULT_INJECTION: forcing a failure. [ 412.194098][ T5910] name failslab, interval 1, probability 0, space 0, times 0 [ 412.196365][ T5910] CPU: 1 UID: 0 PID: 5910 Comm: syz.0.858 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 412.196446][ T5910] Hardware name: linux,dummy-virt (DT) [ 412.196479][ T5910] Call trace: [ 412.196508][ T5910] show_stack+0x18/0x24 (C) [ 412.196581][ T5910] dump_stack_lvl+0xdc/0xf4 [ 412.196652][ T5910] dump_stack+0x1c/0x28 [ 412.196693][ T5910] should_fail_ex+0x5a0/0x6ac [ 412.196742][ T5910] should_failslab+0xbc/0x11c [ 412.196790][ T5910] __kmalloc_noprof+0xd0/0x4d0 [ 412.196836][ T5910] tomoyo_encode2+0xa8/0x2c0 [ 412.196885][ T5910] tomoyo_encode+0x28/0x40 [ 412.196930][ T5910] tomoyo_realpath_from_path+0x114/0x534 [ 412.196989][ T5910] tomoyo_path_number_perm+0x200/0x438 [ 412.197037][ T5910] tomoyo_file_ioctl+0x1c/0x28 [ 412.197083][ T5910] security_file_ioctl+0x8c/0x19c [ 412.197133][ T5910] __arm64_sys_ioctl+0x90/0x188 [ 412.197178][ T5910] invoke_syscall+0x6c/0x258 [ 412.197220][ T5910] el0_svc_common.constprop.0+0xac/0x230 [ 412.197262][ T5910] do_el0_svc+0x40/0x58 [ 412.197309][ T5910] el0_svc+0x50/0x180 [ 412.197355][ T5910] el0t_64_sync_handler+0x10c/0x138 [ 412.197399][ T5910] el0t_64_sync+0x198/0x19c [ 412.219632][ T5910] ERROR: Out of memory at tomoyo_realpath_from_path. [ 412.992508][ T5920] FAULT_INJECTION: forcing a failure. [ 412.992508][ T5920] name failslab, interval 1, probability 0, space 0, times 0 [ 412.996530][ T5920] CPU: 1 UID: 0 PID: 5920 Comm: syz.1.863 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 412.996630][ T5920] Hardware name: linux,dummy-virt (DT) [ 412.996664][ T5920] Call trace: [ 412.996700][ T5920] show_stack+0x18/0x24 (C) [ 412.996807][ T5920] dump_stack_lvl+0xdc/0xf4 [ 412.996860][ T5920] dump_stack+0x1c/0x28 [ 412.996902][ T5920] should_fail_ex+0x5a0/0x6ac [ 412.996952][ T5920] should_failslab+0xbc/0x11c [ 412.996999][ T5920] __kmalloc_noprof+0xd0/0x4d0 [ 412.997056][ T5920] tomoyo_encode2+0xa8/0x2c0 [ 412.997106][ T5920] tomoyo_encode+0x28/0x40 [ 412.997151][ T5920] tomoyo_realpath_from_path+0x114/0x534 [ 412.997197][ T5920] tomoyo_path_number_perm+0x200/0x438 [ 412.997243][ T5920] tomoyo_file_ioctl+0x1c/0x28 [ 412.997296][ T5920] security_file_ioctl+0x8c/0x19c [ 412.997347][ T5920] __arm64_sys_ioctl+0x90/0x188 [ 412.997393][ T5920] invoke_syscall+0x6c/0x258 [ 412.997435][ T5920] el0_svc_common.constprop.0+0xac/0x230 [ 412.997478][ T5920] do_el0_svc+0x40/0x58 [ 412.997518][ T5920] el0_svc+0x50/0x180 [ 412.997564][ T5920] el0t_64_sync_handler+0x10c/0x138 [ 412.997609][ T5920] el0t_64_sync+0x198/0x19c [ 413.013567][ T5920] ERROR: Out of memory at tomoyo_realpath_from_path. [ 416.019024][ T5935] FAULT_INJECTION: forcing a failure. [ 416.019024][ T5935] name failslab, interval 1, probability 0, space 0, times 0 [ 416.022710][ T5935] CPU: 1 UID: 0 PID: 5935 Comm: syz.0.868 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 416.022817][ T5935] Hardware name: linux,dummy-virt (DT) [ 416.022856][ T5935] Call trace: [ 416.022887][ T5935] show_stack+0x18/0x24 (C) [ 416.022979][ T5935] dump_stack_lvl+0xdc/0xf4 [ 416.023032][ T5935] dump_stack+0x1c/0x28 [ 416.023096][ T5935] should_fail_ex+0x5a0/0x6ac [ 416.023149][ T5935] should_failslab+0xbc/0x11c [ 416.023199][ T5935] __kmalloc_noprof+0xd0/0x4d0 [ 416.023247][ T5935] tomoyo_encode2+0xa8/0x2c0 [ 416.023304][ T5935] tomoyo_encode+0x28/0x40 [ 416.023348][ T5935] tomoyo_realpath_from_path+0x114/0x534 [ 416.023394][ T5935] tomoyo_path_number_perm+0x200/0x438 [ 416.023439][ T5935] tomoyo_file_ioctl+0x1c/0x28 [ 416.023484][ T5935] security_file_ioctl+0x8c/0x19c [ 416.023535][ T5935] __arm64_sys_ioctl+0x90/0x188 [ 416.023581][ T5935] invoke_syscall+0x6c/0x258 [ 416.023624][ T5935] el0_svc_common.constprop.0+0xac/0x230 [ 416.023666][ T5935] do_el0_svc+0x40/0x58 [ 416.023706][ T5935] el0_svc+0x50/0x180 [ 416.023750][ T5935] el0t_64_sync_handler+0x10c/0x138 [ 416.023794][ T5935] el0t_64_sync+0x198/0x19c [ 416.034142][ T5935] ERROR: Out of memory at tomoyo_realpath_from_path. [ 416.793936][ T5941] FAULT_INJECTION: forcing a failure. [ 416.793936][ T5941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 416.802521][ T5941] CPU: 1 UID: 0 PID: 5941 Comm: syz.0.871 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 416.802666][ T5941] Hardware name: linux,dummy-virt (DT) [ 416.802704][ T5941] Call trace: [ 416.802739][ T5941] show_stack+0x18/0x24 (C) [ 416.802842][ T5941] dump_stack_lvl+0xdc/0xf4 [ 416.802908][ T5941] dump_stack+0x1c/0x28 [ 416.802952][ T5941] should_fail_ex+0x5a0/0x6ac [ 416.803006][ T5941] should_fail+0x14/0x20 [ 416.803077][ T5941] should_fail_usercopy+0x1c/0x28 [ 416.803127][ T5941] simple_read_from_buffer+0x94/0x1f0 [ 416.803181][ T5941] proc_fail_nth_read+0x160/0x248 [ 416.803229][ T5941] vfs_read+0x18c/0x97c [ 416.803280][ T5941] ksys_read+0xec/0x1d8 [ 416.803328][ T5941] __arm64_sys_read+0x6c/0x9c [ 416.803376][ T5941] invoke_syscall+0x6c/0x258 [ 416.803421][ T5941] el0_svc_common.constprop.0+0xac/0x230 [ 416.803467][ T5941] do_el0_svc+0x40/0x58 [ 416.803509][ T5941] el0_svc+0x50/0x180 [ 416.803557][ T5941] el0t_64_sync_handler+0x10c/0x138 [ 416.803605][ T5941] el0t_64_sync+0x198/0x19c [ 417.745095][ T30] audit: type=1400 audit(417.440:247): avc: denied { setopt } for pid=5952 comm="syz.0.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 419.534665][ T30] audit: type=1400 audit(419.230:248): avc: denied { execute } for pid=5976 comm="syz.1.889" path="/489/cpuacct.usage_sys" dev="tmpfs" ino=2488 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 422.395642][ T6014] FAULT_INJECTION: forcing a failure. [ 422.395642][ T6014] name failslab, interval 1, probability 0, space 0, times 0 [ 422.401163][ T6014] CPU: 0 UID: 0 PID: 6014 Comm: syz.1.905 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 422.401277][ T6014] Hardware name: linux,dummy-virt (DT) [ 422.401312][ T6014] Call trace: [ 422.401341][ T6014] show_stack+0x18/0x24 (C) [ 422.401419][ T6014] dump_stack_lvl+0xdc/0xf4 [ 422.401469][ T6014] dump_stack+0x1c/0x28 [ 422.401510][ T6014] should_fail_ex+0x5a0/0x6ac [ 422.401559][ T6014] should_failslab+0xbc/0x11c [ 422.401606][ T6014] __kmalloc_noprof+0xd0/0x4d0 [ 422.401653][ T6014] tomoyo_encode2+0xa8/0x2c0 [ 422.401704][ T6014] tomoyo_encode+0x28/0x40 [ 422.401749][ T6014] tomoyo_realpath_from_path+0x114/0x534 [ 422.401795][ T6014] tomoyo_path_number_perm+0x200/0x438 [ 422.401840][ T6014] tomoyo_file_ioctl+0x1c/0x28 [ 422.401886][ T6014] security_file_ioctl+0x8c/0x19c [ 422.401935][ T6014] __arm64_sys_ioctl+0x90/0x188 [ 422.401980][ T6014] invoke_syscall+0x6c/0x258 [ 422.402030][ T6014] el0_svc_common.constprop.0+0xac/0x230 [ 422.402074][ T6014] do_el0_svc+0x40/0x58 [ 422.402114][ T6014] el0_svc+0x50/0x180 [ 422.402159][ T6014] el0t_64_sync_handler+0x10c/0x138 [ 422.402203][ T6014] el0t_64_sync+0x198/0x19c [ 422.422245][ T6014] ERROR: Out of memory at tomoyo_realpath_from_path. [ 425.966485][ T30] audit: type=1400 audit(425.660:249): avc: denied { append } for pid=6040 comm="syz.1.916" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 426.644832][ T6051] FAULT_INJECTION: forcing a failure. [ 426.644832][ T6051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.645374][ T6051] CPU: 0 UID: 0 PID: 6051 Comm: syz.1.920 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 426.645473][ T6051] Hardware name: linux,dummy-virt (DT) [ 426.645510][ T6051] Call trace: [ 426.645537][ T6051] show_stack+0x18/0x24 (C) [ 426.645614][ T6051] dump_stack_lvl+0xdc/0xf4 [ 426.645679][ T6051] dump_stack+0x1c/0x28 [ 426.645724][ T6051] should_fail_ex+0x5a0/0x6ac [ 426.645774][ T6051] should_fail+0x14/0x20 [ 426.645817][ T6051] should_fail_usercopy+0x1c/0x28 [ 426.645862][ T6051] simple_read_from_buffer+0x94/0x1f0 [ 426.645911][ T6051] proc_fail_nth_read+0x160/0x248 [ 426.645955][ T6051] vfs_read+0x18c/0x97c [ 426.646026][ T6051] ksys_read+0xec/0x1d8 [ 426.646109][ T6051] __arm64_sys_read+0x6c/0x9c [ 426.646158][ T6051] invoke_syscall+0x6c/0x258 [ 426.646200][ T6051] el0_svc_common.constprop.0+0xac/0x230 [ 426.646241][ T6051] do_el0_svc+0x40/0x58 [ 426.646310][ T6051] el0_svc+0x50/0x180 [ 426.646360][ T6051] el0t_64_sync_handler+0x10c/0x138 [ 426.646404][ T6051] el0t_64_sync+0x198/0x19c [ 429.007814][ T6075] FAULT_INJECTION: forcing a failure. [ 429.007814][ T6075] name failslab, interval 1, probability 0, space 0, times 0 [ 429.015149][ T6075] CPU: 0 UID: 0 PID: 6075 Comm: syz.0.933 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 429.015273][ T6075] Hardware name: linux,dummy-virt (DT) [ 429.015309][ T6075] Call trace: [ 429.015339][ T6075] show_stack+0x18/0x24 (C) [ 429.015414][ T6075] dump_stack_lvl+0xdc/0xf4 [ 429.015463][ T6075] dump_stack+0x1c/0x28 [ 429.015504][ T6075] should_fail_ex+0x5a0/0x6ac [ 429.015553][ T6075] should_failslab+0xbc/0x11c [ 429.015600][ T6075] __kmalloc_noprof+0xd0/0x4d0 [ 429.015713][ T6075] tomoyo_encode2+0xa8/0x2c0 [ 429.015790][ T6075] tomoyo_encode+0x28/0x40 [ 429.015841][ T6075] tomoyo_realpath_from_path+0x114/0x534 [ 429.015887][ T6075] tomoyo_path_number_perm+0x200/0x438 [ 429.015933][ T6075] tomoyo_file_ioctl+0x1c/0x28 [ 429.015980][ T6075] security_file_ioctl+0x8c/0x19c [ 429.016035][ T6075] __arm64_sys_ioctl+0x90/0x188 [ 429.016084][ T6075] invoke_syscall+0x6c/0x258 [ 429.016126][ T6075] el0_svc_common.constprop.0+0xac/0x230 [ 429.016168][ T6075] do_el0_svc+0x40/0x58 [ 429.016209][ T6075] el0_svc+0x50/0x180 [ 429.016253][ T6075] el0t_64_sync_handler+0x10c/0x138 [ 429.016299][ T6075] el0t_64_sync+0x198/0x19c [ 429.028988][ T6075] ERROR: Out of memory at tomoyo_realpath_from_path. [ 431.733258][ T6089] FAULT_INJECTION: forcing a failure. [ 431.733258][ T6089] name failslab, interval 1, probability 0, space 0, times 0 [ 431.735238][ T6089] CPU: 1 UID: 0 PID: 6089 Comm: syz.1.936 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 431.735340][ T6089] Hardware name: linux,dummy-virt (DT) [ 431.735398][ T6089] Call trace: [ 431.735431][ T6089] show_stack+0x18/0x24 (C) [ 431.735525][ T6089] dump_stack_lvl+0xdc/0xf4 [ 431.735604][ T6089] dump_stack+0x1c/0x28 [ 431.735662][ T6089] should_fail_ex+0x5a0/0x6ac [ 431.735714][ T6089] should_failslab+0xbc/0x11c [ 431.735763][ T6089] __kmalloc_noprof+0xd0/0x4d0 [ 431.735810][ T6089] tomoyo_encode2+0xa8/0x2c0 [ 431.735861][ T6089] tomoyo_encode+0x28/0x40 [ 431.735914][ T6089] tomoyo_realpath_from_path+0x114/0x534 [ 431.735962][ T6089] tomoyo_path_number_perm+0x200/0x438 [ 431.736009][ T6089] tomoyo_file_ioctl+0x1c/0x28 [ 431.736055][ T6089] security_file_ioctl+0x8c/0x19c [ 431.736105][ T6089] __arm64_sys_ioctl+0x90/0x188 [ 431.736152][ T6089] invoke_syscall+0x6c/0x258 [ 431.736194][ T6089] el0_svc_common.constprop.0+0xac/0x230 [ 431.736236][ T6089] do_el0_svc+0x40/0x58 [ 431.736276][ T6089] el0_svc+0x50/0x180 [ 431.736320][ T6089] el0t_64_sync_handler+0x10c/0x138 [ 431.736364][ T6089] el0t_64_sync+0x198/0x19c [ 431.745366][ T6089] ERROR: Out of memory at tomoyo_realpath_from_path. [ 434.002076][ T6115] FAULT_INJECTION: forcing a failure. [ 434.002076][ T6115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 434.002941][ T6115] CPU: 0 UID: 0 PID: 6115 Comm: syz.1.947 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 434.002999][ T6115] Hardware name: linux,dummy-virt (DT) [ 434.003077][ T6115] Call trace: [ 434.003112][ T6115] show_stack+0x18/0x24 (C) [ 434.003185][ T6115] dump_stack_lvl+0xdc/0xf4 [ 434.003233][ T6115] dump_stack+0x1c/0x28 [ 434.003272][ T6115] should_fail_ex+0x5a0/0x6ac [ 434.003320][ T6115] should_fail_alloc_page+0x70/0xb8 [ 434.003367][ T6115] prepare_alloc_pages+0x1a8/0x560 [ 434.003410][ T6115] __alloc_frozen_pages_noprof+0x144/0x1f5c [ 434.003455][ T6115] alloc_pages_mpol+0xfc/0x400 [ 434.003496][ T6115] alloc_frozen_pages_noprof+0x178/0x1ec [ 434.003536][ T6115] alloc_pages_noprof+0x14/0x114 [ 434.003576][ T6115] __pte_alloc+0x84/0x4b8 [ 434.003618][ T6115] __handle_mm_fault+0x2a18/0x35c4 [ 434.003680][ T6115] handle_mm_fault+0x330/0x7a8 [ 434.003727][ T6115] do_page_fault+0x1f4/0xca0 [ 434.003774][ T6115] do_translation_fault+0x184/0x1e8 [ 434.003819][ T6115] do_mem_abort+0x68/0x1a4 [ 434.003862][ T6115] el0_da+0x5c/0x174 [ 434.003919][ T6115] el0t_64_sync_handler+0xc4/0x138 [ 434.003966][ T6115] el0t_64_sync+0x198/0x19c [ 434.005061][ T6115] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 437.436061][ T6159] FAULT_INJECTION: forcing a failure. [ 437.436061][ T6159] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 437.437167][ T6159] CPU: 0 UID: 0 PID: 6159 Comm: syz.1.963 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 437.437298][ T6159] Hardware name: linux,dummy-virt (DT) [ 437.437368][ T6159] Call trace: [ 437.437430][ T6159] show_stack+0x18/0x24 (C) [ 437.437670][ T6159] dump_stack_lvl+0xdc/0xf4 [ 437.437805][ T6159] dump_stack+0x1c/0x28 [ 437.437926][ T6159] should_fail_ex+0x5a0/0x6ac [ 437.438179][ T6159] should_fail+0x14/0x20 [ 437.438306][ T6159] should_fail_usercopy+0x1c/0x28 [ 437.438417][ T6159] simple_read_from_buffer+0x94/0x1f0 [ 437.438525][ T6159] proc_fail_nth_read+0x160/0x248 [ 437.438661][ T6159] vfs_read+0x18c/0x97c [ 437.438773][ T6159] ksys_read+0xec/0x1d8 [ 437.438870][ T6159] __arm64_sys_read+0x6c/0x9c [ 437.438965][ T6159] invoke_syscall+0x6c/0x258 [ 437.439095][ T6159] el0_svc_common.constprop.0+0xac/0x230 [ 437.439195][ T6159] do_el0_svc+0x40/0x58 [ 437.439337][ T6159] el0_svc+0x50/0x180 [ 437.439517][ T6159] el0t_64_sync_handler+0x10c/0x138 [ 437.439657][ T6159] el0t_64_sync+0x198/0x19c [ 438.652312][ T6171] FAULT_INJECTION: forcing a failure. [ 438.652312][ T6171] name failslab, interval 1, probability 0, space 0, times 0 [ 438.654209][ T6171] CPU: 1 UID: 0 PID: 6171 Comm: syz.1.968 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 438.654280][ T6171] Hardware name: linux,dummy-virt (DT) [ 438.654317][ T6171] Call trace: [ 438.654348][ T6171] show_stack+0x18/0x24 (C) [ 438.654434][ T6171] dump_stack_lvl+0xdc/0xf4 [ 438.654487][ T6171] dump_stack+0x1c/0x28 [ 438.654528][ T6171] should_fail_ex+0x5a0/0x6ac [ 438.654582][ T6171] should_failslab+0xbc/0x11c [ 438.654632][ T6171] __kmalloc_noprof+0xd0/0x4d0 [ 438.654680][ T6171] tomoyo_encode2+0xa8/0x2c0 [ 438.654737][ T6171] tomoyo_encode+0x28/0x40 [ 438.654782][ T6171] tomoyo_realpath_from_path+0x114/0x534 [ 438.654828][ T6171] tomoyo_path_number_perm+0x200/0x438 [ 438.654874][ T6171] tomoyo_file_ioctl+0x1c/0x28 [ 438.654925][ T6171] security_file_ioctl+0x8c/0x19c [ 438.654987][ T6171] __arm64_sys_ioctl+0x90/0x188 [ 438.655121][ T6171] invoke_syscall+0x6c/0x258 [ 438.655181][ T6171] el0_svc_common.constprop.0+0xac/0x230 [ 438.655228][ T6171] do_el0_svc+0x40/0x58 [ 438.655270][ T6171] el0_svc+0x50/0x180 [ 438.655317][ T6171] el0t_64_sync_handler+0x10c/0x138 [ 438.655366][ T6171] el0t_64_sync+0x198/0x19c [ 438.675872][ T6171] ERROR: Out of memory at tomoyo_realpath_from_path. [ 439.470619][ T6182] FAULT_INJECTION: forcing a failure. [ 439.470619][ T6182] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 439.472563][ T6182] CPU: 1 UID: 0 PID: 6182 Comm: syz.1.973 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 439.472629][ T6182] Hardware name: linux,dummy-virt (DT) [ 439.472663][ T6182] Call trace: [ 439.472694][ T6182] show_stack+0x18/0x24 (C) [ 439.472769][ T6182] dump_stack_lvl+0xdc/0xf4 [ 439.472823][ T6182] dump_stack+0x1c/0x28 [ 439.472865][ T6182] should_fail_ex+0x5a0/0x6ac [ 439.472914][ T6182] should_fail+0x14/0x20 [ 439.472957][ T6182] should_fail_usercopy+0x1c/0x28 [ 439.473002][ T6182] simple_read_from_buffer+0x94/0x1f0 [ 439.473059][ T6182] proc_fail_nth_read+0x160/0x248 [ 439.473103][ T6182] vfs_read+0x18c/0x97c [ 439.473150][ T6182] ksys_read+0xec/0x1d8 [ 439.473195][ T6182] __arm64_sys_read+0x6c/0x9c [ 439.473239][ T6182] invoke_syscall+0x6c/0x258 [ 439.473281][ T6182] el0_svc_common.constprop.0+0xac/0x230 [ 439.473323][ T6182] do_el0_svc+0x40/0x58 [ 439.473364][ T6182] el0_svc+0x50/0x180 [ 439.473408][ T6182] el0t_64_sync_handler+0x10c/0x138 [ 439.473452][ T6182] el0t_64_sync+0x198/0x19c [ 443.962649][ T30] audit: type=1400 audit(443.650:250): avc: denied { setattr } for pid=6220 comm="syz.1.984" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 447.423033][ T6262] FAULT_INJECTION: forcing a failure. [ 447.423033][ T6262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.423705][ T6262] CPU: 0 UID: 0 PID: 6262 Comm: syz.0.1000 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 447.423769][ T6262] Hardware name: linux,dummy-virt (DT) [ 447.423803][ T6262] Call trace: [ 447.423831][ T6262] show_stack+0x18/0x24 (C) [ 447.423918][ T6262] dump_stack_lvl+0xdc/0xf4 [ 447.423986][ T6262] dump_stack+0x1c/0x28 [ 447.424058][ T6262] should_fail_ex+0x5a0/0x6ac [ 447.424116][ T6262] should_fail+0x14/0x20 [ 447.424164][ T6262] should_fail_usercopy+0x1c/0x28 [ 447.424215][ T6262] copy_to_sockptr_offset+0x13c/0x24c [ 447.424275][ T6262] sk_getsockopt+0x2d8/0x1a98 [ 447.424329][ T6262] do_sock_getsockopt+0x424/0x4e0 [ 447.424376][ T6262] __sys_getsockopt+0xc8/0x15c [ 447.424423][ T6262] __arm64_sys_getsockopt+0xa4/0x100 [ 447.424470][ T6262] invoke_syscall+0x6c/0x258 [ 447.424519][ T6262] el0_svc_common.constprop.0+0xac/0x230 [ 447.424564][ T6262] do_el0_svc+0x40/0x58 [ 447.424615][ T6262] el0_svc+0x50/0x180 [ 447.424666][ T6262] el0t_64_sync_handler+0x10c/0x138 [ 447.424721][ T6262] el0t_64_sync+0x198/0x19c [ 448.103202][ T30] audit: type=1400 audit(447.800:251): avc: denied { write } for pid=6270 comm="syz.1.1004" path="socket:[11486]" dev="sockfs" ino=11486 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 448.150397][ T30] audit: type=1400 audit(447.840:252): avc: denied { getopt } for pid=6270 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 448.167425][ T30] audit: type=1400 audit(447.860:253): avc: denied { setopt } for pid=6270 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 449.660892][ T6289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=6289 comm=syz.1.1011 [ 450.159031][ T6298] FAULT_INJECTION: forcing a failure. [ 450.159031][ T6298] name failslab, interval 1, probability 0, space 0, times 0 [ 450.160472][ T6298] CPU: 1 UID: 0 PID: 6298 Comm: syz.0.1016 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 450.160545][ T6298] Hardware name: linux,dummy-virt (DT) [ 450.160581][ T6298] Call trace: [ 450.160613][ T6298] show_stack+0x18/0x24 (C) [ 450.160691][ T6298] dump_stack_lvl+0xdc/0xf4 [ 450.160743][ T6298] dump_stack+0x1c/0x28 [ 450.160785][ T6298] should_fail_ex+0x5a0/0x6ac [ 450.160835][ T6298] should_failslab+0xbc/0x11c [ 450.160882][ T6298] __kmalloc_noprof+0xd0/0x4d0 [ 450.160928][ T6298] tomoyo_encode2+0xa8/0x2c0 [ 450.160977][ T6298] tomoyo_encode+0x28/0x40 [ 450.161037][ T6298] tomoyo_realpath_from_path+0x114/0x534 [ 450.161090][ T6298] tomoyo_path_number_perm+0x200/0x438 [ 450.161138][ T6298] tomoyo_file_ioctl+0x1c/0x28 [ 450.161184][ T6298] security_file_ioctl+0x8c/0x19c [ 450.161234][ T6298] __arm64_sys_ioctl+0x90/0x188 [ 450.161280][ T6298] invoke_syscall+0x6c/0x258 [ 450.161322][ T6298] el0_svc_common.constprop.0+0xac/0x230 [ 450.161364][ T6298] do_el0_svc+0x40/0x58 [ 450.161405][ T6298] el0_svc+0x50/0x180 [ 450.161449][ T6298] el0t_64_sync_handler+0x10c/0x138 [ 450.161494][ T6298] el0t_64_sync+0x198/0x19c [ 450.172589][ T6298] ERROR: Out of memory at tomoyo_realpath_from_path. [ 450.372109][ T6301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=6301 comm=syz.0.1017 [ 452.082144][ T30] audit: type=1400 audit(451.780:254): avc: denied { ioctl } for pid=6312 comm="syz.1.1023" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x9425 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 452.134310][ T6322] FAULT_INJECTION: forcing a failure. [ 452.134310][ T6322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 452.134891][ T6322] CPU: 0 UID: 0 PID: 6322 Comm: syz.0.1025 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 452.134947][ T6322] Hardware name: linux,dummy-virt (DT) [ 452.135034][ T6322] Call trace: [ 452.135090][ T6322] show_stack+0x18/0x24 (C) [ 452.135198][ T6322] dump_stack_lvl+0xdc/0xf4 [ 452.135255][ T6322] dump_stack+0x1c/0x28 [ 452.135299][ T6322] should_fail_ex+0x5a0/0x6ac [ 452.135351][ T6322] should_fail+0x14/0x20 [ 452.135396][ T6322] should_fail_usercopy+0x1c/0x28 [ 452.135499][ T6322] simple_read_from_buffer+0x94/0x1f0 [ 452.135555][ T6322] proc_fail_nth_read+0x160/0x248 [ 452.135601][ T6322] vfs_read+0x18c/0x97c [ 452.135651][ T6322] ksys_read+0xec/0x1d8 [ 452.135697][ T6322] __arm64_sys_read+0x6c/0x9c [ 452.135744][ T6322] invoke_syscall+0x6c/0x258 [ 452.135787][ T6322] el0_svc_common.constprop.0+0xac/0x230 [ 452.135844][ T6322] do_el0_svc+0x40/0x58 [ 452.135892][ T6322] el0_svc+0x50/0x180 [ 452.135939][ T6322] el0t_64_sync_handler+0x10c/0x138 [ 452.135986][ T6322] el0t_64_sync+0x198/0x19c [ 452.913207][ T30] audit: type=1400 audit(452.610:255): avc: denied { write } for pid=6333 comm="syz.1.1031" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 453.771219][ T6346] FAULT_INJECTION: forcing a failure. [ 453.771219][ T6346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 453.779559][ T6346] CPU: 1 UID: 0 PID: 6346 Comm: syz.1.1037 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 453.779665][ T6346] Hardware name: linux,dummy-virt (DT) [ 453.779700][ T6346] Call trace: [ 453.779735][ T6346] show_stack+0x18/0x24 (C) [ 453.779813][ T6346] dump_stack_lvl+0xdc/0xf4 [ 453.779865][ T6346] dump_stack+0x1c/0x28 [ 453.779906][ T6346] should_fail_ex+0x5a0/0x6ac [ 453.779955][ T6346] should_fail+0x14/0x20 [ 453.779999][ T6346] should_fail_usercopy+0x1c/0x28 [ 453.780054][ T6346] simple_read_from_buffer+0x94/0x1f0 [ 453.780104][ T6346] proc_fail_nth_read+0x160/0x248 [ 453.780149][ T6346] vfs_read+0x18c/0x97c [ 453.780197][ T6346] ksys_read+0xec/0x1d8 [ 453.780240][ T6346] __arm64_sys_read+0x6c/0x9c [ 453.780284][ T6346] invoke_syscall+0x6c/0x258 [ 453.780325][ T6346] el0_svc_common.constprop.0+0xac/0x230 [ 453.780367][ T6346] do_el0_svc+0x40/0x58 [ 453.780407][ T6346] el0_svc+0x50/0x180 [ 453.780452][ T6346] el0t_64_sync_handler+0x10c/0x138 [ 453.780496][ T6346] el0t_64_sync+0x198/0x19c [ 454.182365][ T6350] sctp: [Deprecated]: syz.1.1039 (pid 6350) Use of int in max_burst socket option. [ 454.182365][ T6350] Use struct sctp_assoc_value instead [ 454.280732][ T30] audit: type=1400 audit(453.980:256): avc: denied { map_read map_write } for pid=6351 comm="syz.0.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 455.047604][ T30] audit: type=1400 audit(454.740:257): avc: denied { read append } for pid=6358 comm="syz.1.1043" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 455.057076][ T30] audit: type=1400 audit(454.750:258): avc: denied { open } for pid=6358 comm="syz.1.1043" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 455.487847][ T30] audit: type=1400 audit(455.180:259): avc: granted { setsecparam } for pid=6363 comm="syz.1.1044" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 455.895629][ T6368] FAULT_INJECTION: forcing a failure. [ 455.895629][ T6368] name failslab, interval 1, probability 0, space 0, times 0 [ 455.906551][ T6368] CPU: 0 UID: 0 PID: 6368 Comm: syz.1.1045 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 455.906649][ T6368] Hardware name: linux,dummy-virt (DT) [ 455.906684][ T6368] Call trace: [ 455.906712][ T6368] show_stack+0x18/0x24 (C) [ 455.906786][ T6368] dump_stack_lvl+0xdc/0xf4 [ 455.906835][ T6368] dump_stack+0x1c/0x28 [ 455.906876][ T6368] should_fail_ex+0x5a0/0x6ac [ 455.906924][ T6368] should_failslab+0xbc/0x11c [ 455.906972][ T6368] __kmalloc_noprof+0xd0/0x4d0 [ 455.907027][ T6368] tomoyo_realpath_from_path+0x90/0x534 [ 455.907105][ T6368] tomoyo_path_number_perm+0x200/0x438 [ 455.907151][ T6368] tomoyo_file_ioctl+0x1c/0x28 [ 455.907197][ T6368] security_file_ioctl+0x8c/0x19c [ 455.907247][ T6368] __arm64_sys_ioctl+0x90/0x188 [ 455.907293][ T6368] invoke_syscall+0x6c/0x258 [ 455.907336][ T6368] el0_svc_common.constprop.0+0xac/0x230 [ 455.907378][ T6368] do_el0_svc+0x40/0x58 [ 455.907418][ T6368] el0_svc+0x50/0x180 [ 455.907463][ T6368] el0t_64_sync_handler+0x10c/0x138 [ 455.907507][ T6368] el0t_64_sync+0x198/0x19c [ 455.914858][ T6368] ERROR: Out of memory at tomoyo_realpath_from_path. [ 456.861659][ T30] audit: type=1400 audit(456.560:260): avc: granted { setsecparam } for pid=6380 comm="syz.0.1050" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 457.194152][ T30] audit: type=1400 audit(456.890:261): avc: granted { setsecparam } for pid=6383 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 457.526931][ T6387] FAULT_INJECTION: forcing a failure. [ 457.526931][ T6387] name failslab, interval 1, probability 0, space 0, times 0 [ 457.527605][ T6387] CPU: 1 UID: 0 PID: 6387 Comm: syz.0.1052 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 457.527673][ T6387] Hardware name: linux,dummy-virt (DT) [ 457.527707][ T6387] Call trace: [ 457.527735][ T6387] show_stack+0x18/0x24 (C) [ 457.527811][ T6387] dump_stack_lvl+0xdc/0xf4 [ 457.527884][ T6387] dump_stack+0x1c/0x28 [ 457.527928][ T6387] should_fail_ex+0x5a0/0x6ac [ 457.528022][ T6387] should_failslab+0xbc/0x11c [ 457.528075][ T6387] __kmalloc_noprof+0xd0/0x4d0 [ 457.528122][ T6387] tomoyo_realpath_from_path+0x90/0x534 [ 457.528195][ T6387] tomoyo_path_number_perm+0x200/0x438 [ 457.528244][ T6387] tomoyo_file_ioctl+0x1c/0x28 [ 457.528290][ T6387] security_file_ioctl+0x8c/0x19c [ 457.528340][ T6387] __arm64_sys_ioctl+0x90/0x188 [ 457.528385][ T6387] invoke_syscall+0x6c/0x258 [ 457.528469][ T6387] el0_svc_common.constprop.0+0xac/0x230 [ 457.528515][ T6387] do_el0_svc+0x40/0x58 [ 457.528555][ T6387] el0_svc+0x50/0x180 [ 457.528601][ T6387] el0t_64_sync_handler+0x10c/0x138 [ 457.528645][ T6387] el0t_64_sync+0x198/0x19c [ 457.536992][ T6387] ERROR: Out of memory at tomoyo_realpath_from_path. [ 462.551914][ T6450] FAULT_INJECTION: forcing a failure. [ 462.551914][ T6450] name failslab, interval 1, probability 0, space 0, times 0 [ 462.554226][ T6450] CPU: 1 UID: 0 PID: 6450 Comm: syz.1.1076 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 462.554344][ T6450] Hardware name: linux,dummy-virt (DT) [ 462.554378][ T6450] Call trace: [ 462.554407][ T6450] show_stack+0x18/0x24 (C) [ 462.554489][ T6450] dump_stack_lvl+0xdc/0xf4 [ 462.554541][ T6450] dump_stack+0x1c/0x28 [ 462.554582][ T6450] should_fail_ex+0x5a0/0x6ac [ 462.554630][ T6450] should_failslab+0xbc/0x11c [ 462.554676][ T6450] __kmalloc_noprof+0xd0/0x4d0 [ 462.554722][ T6450] tomoyo_realpath_from_path+0x90/0x534 [ 462.554771][ T6450] tomoyo_path_number_perm+0x200/0x438 [ 462.554816][ T6450] tomoyo_file_ioctl+0x1c/0x28 [ 462.554861][ T6450] security_file_ioctl+0x8c/0x19c [ 462.554909][ T6450] __arm64_sys_ioctl+0x90/0x188 [ 462.554954][ T6450] invoke_syscall+0x6c/0x258 [ 462.554995][ T6450] el0_svc_common.constprop.0+0xac/0x230 [ 462.555042][ T6450] do_el0_svc+0x40/0x58 [ 462.555139][ T6450] el0_svc+0x50/0x180 [ 462.555185][ T6450] el0t_64_sync_handler+0x10c/0x138 [ 462.555229][ T6450] el0t_64_sync+0x198/0x19c [ 462.563289][ T6450] ERROR: Out of memory at tomoyo_realpath_from_path. [ 464.446466][ T30] audit: type=1400 audit(464.140:262): avc: granted { setsecparam } for pid=6471 comm="syz.1.1085" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 466.223987][ T6497] FAULT_INJECTION: forcing a failure. [ 466.223987][ T6497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.224670][ T6497] CPU: 1 UID: 0 PID: 6497 Comm: syz.1.1096 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 466.224738][ T6497] Hardware name: linux,dummy-virt (DT) [ 466.224772][ T6497] Call trace: [ 466.224827][ T6497] show_stack+0x18/0x24 (C) [ 466.224908][ T6497] dump_stack_lvl+0xdc/0xf4 [ 466.224961][ T6497] dump_stack+0x1c/0x28 [ 466.225001][ T6497] should_fail_ex+0x5a0/0x6ac [ 466.225050][ T6497] should_fail+0x14/0x20 [ 466.225094][ T6497] should_fail_usercopy+0x1c/0x28 [ 466.225157][ T6497] simple_read_from_buffer+0x94/0x1f0 [ 466.225208][ T6497] proc_fail_nth_read+0x160/0x248 [ 466.225252][ T6497] vfs_read+0x18c/0x97c [ 466.225307][ T6497] ksys_read+0xec/0x1d8 [ 466.225353][ T6497] __arm64_sys_read+0x6c/0x9c [ 466.225397][ T6497] invoke_syscall+0x6c/0x258 [ 466.225439][ T6497] el0_svc_common.constprop.0+0xac/0x230 [ 466.225481][ T6497] do_el0_svc+0x40/0x58 [ 466.225521][ T6497] el0_svc+0x50/0x180 [ 466.225566][ T6497] el0t_64_sync_handler+0x10c/0x138 [ 466.225610][ T6497] el0t_64_sync+0x198/0x19c [ 466.592781][ T6501] FAULT_INJECTION: forcing a failure. [ 466.592781][ T6501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.600258][ T6501] CPU: 1 UID: 0 PID: 6501 Comm: syz.1.1098 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 466.600360][ T6501] Hardware name: linux,dummy-virt (DT) [ 466.600394][ T6501] Call trace: [ 466.600423][ T6501] show_stack+0x18/0x24 (C) [ 466.600496][ T6501] dump_stack_lvl+0xdc/0xf4 [ 466.600545][ T6501] dump_stack+0x1c/0x28 [ 466.600586][ T6501] should_fail_ex+0x5a0/0x6ac [ 466.600635][ T6501] should_fail+0x14/0x20 [ 466.600681][ T6501] should_fail_usercopy+0x1c/0x28 [ 466.600725][ T6501] _inline_copy_from_user+0x38/0x130 [ 466.600773][ T6501] do_sock_getsockopt+0x3e0/0x4e0 [ 466.600815][ T6501] __sys_getsockopt+0xc8/0x15c [ 466.600858][ T6501] __arm64_sys_getsockopt+0xa4/0x100 [ 466.600901][ T6501] invoke_syscall+0x6c/0x258 [ 466.600943][ T6501] el0_svc_common.constprop.0+0xac/0x230 [ 466.600986][ T6501] do_el0_svc+0x40/0x58 [ 466.601033][ T6501] el0_svc+0x50/0x180 [ 466.601079][ T6501] el0t_64_sync_handler+0x10c/0x138 [ 466.601123][ T6501] el0t_64_sync+0x198/0x19c [ 466.665900][ T30] audit: type=1400 audit(466.360:263): avc: denied { mount } for pid=6502 comm="syz.0.1099" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 466.702921][ T6503] devtmpfs: Unknown parameter '€ÿÿÿ' [ 466.717762][ T30] audit: type=1400 audit(466.400:264): avc: denied { remount } for pid=6502 comm="syz.0.1099" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 466.833351][ T30] audit: type=1400 audit(466.520:265): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 467.265460][ T6510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6510 comm=syz.1.1102 [ 467.302517][ T30] audit: type=1400 audit(467.000:266): avc: denied { mounton } for pid=6509 comm="syz.0.1103" path="/484/file0" dev="tmpfs" ino=2460 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 467.309297][ T6511] ======================================================= [ 467.309297][ T6511] WARNING: The mand mount option has been deprecated and [ 467.309297][ T6511] and is ignored by this kernel. Remove the mand [ 467.309297][ T6511] option from the mount to silence this warning. [ 467.309297][ T6511] ======================================================= [ 467.310119][ T6511] fuse: Bad value for 'fd' [ 467.841356][ T6510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6510 comm=syz.1.1102 [ 468.729758][ T10] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 468.940123][ T10] usb 1-1: Invalid ep0 maxpacket: 32 [ 469.104153][ T10] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 469.173884][ T6526] FAULT_INJECTION: forcing a failure. [ 469.173884][ T6526] name failslab, interval 1, probability 0, space 0, times 0 [ 469.174516][ T6526] CPU: 1 UID: 0 PID: 6526 Comm: syz.1.1108 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 469.174585][ T6526] Hardware name: linux,dummy-virt (DT) [ 469.174620][ T6526] Call trace: [ 469.174658][ T6526] show_stack+0x18/0x24 (C) [ 469.174739][ T6526] dump_stack_lvl+0xdc/0xf4 [ 469.174792][ T6526] dump_stack+0x1c/0x28 [ 469.174834][ T6526] should_fail_ex+0x5a0/0x6ac [ 469.174885][ T6526] should_failslab+0xbc/0x11c [ 469.174934][ T6526] __kmalloc_noprof+0xd0/0x4d0 [ 469.174981][ T6526] tomoyo_realpath_from_path+0x90/0x534 [ 469.175041][ T6526] tomoyo_path_number_perm+0x200/0x438 [ 469.175143][ T6526] tomoyo_file_ioctl+0x1c/0x28 [ 469.175191][ T6526] security_file_ioctl+0x8c/0x19c [ 469.175242][ T6526] __arm64_sys_ioctl+0x90/0x188 [ 469.175293][ T6526] invoke_syscall+0x6c/0x258 [ 469.175437][ T6526] el0_svc_common.constprop.0+0xac/0x230 [ 469.175487][ T6526] do_el0_svc+0x40/0x58 [ 469.175671][ T6526] el0_svc+0x50/0x180 [ 469.175884][ T6526] el0t_64_sync_handler+0x10c/0x138 [ 469.176123][ T6526] el0t_64_sync+0x198/0x19c [ 469.177792][ T6526] ERROR: Out of memory at tomoyo_realpath_from_path. [ 469.281277][ T10] usb 1-1: Invalid ep0 maxpacket: 32 [ 469.291118][ T10] usb usb1-port1: attempt power cycle [ 469.700008][ T10] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 469.730644][ T10] usb 1-1: Invalid ep0 maxpacket: 32 [ 469.796917][ T30] audit: type=1400 audit(469.490:267): avc: denied { listen } for pid=6529 comm="syz.1.1110" path=2F3632332FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 469.861286][ T10] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 469.898513][ T10] usb 1-1: Invalid ep0 maxpacket: 32 [ 469.900896][ T10] usb usb1-port1: unable to enumerate USB device [ 470.045520][ T6532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=6532 comm=syz.1.1111 [ 470.730657][ T6540] fuse: Bad value for 'fd' [ 471.004729][ T6542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=6542 comm=syz.1.1116 [ 471.923635][ T30] audit: type=1400 audit(471.620:268): avc: granted { setsecparam } for pid=6551 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 472.151505][ T6554] FAULT_INJECTION: forcing a failure. [ 472.151505][ T6554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.152195][ T6554] CPU: 1 UID: 0 PID: 6554 Comm: syz.1.1122 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 472.152274][ T6554] Hardware name: linux,dummy-virt (DT) [ 472.152311][ T6554] Call trace: [ 472.152342][ T6554] show_stack+0x18/0x24 (C) [ 472.152435][ T6554] dump_stack_lvl+0xdc/0xf4 [ 472.152492][ T6554] dump_stack+0x1c/0x28 [ 472.152539][ T6554] should_fail_ex+0x5a0/0x6ac [ 472.152709][ T6554] should_fail+0x14/0x20 [ 472.152883][ T6554] should_fail_usercopy+0x1c/0x28 [ 472.153114][ T6554] _inline_copy_from_user+0x38/0x130 [ 472.153328][ T6554] do_sock_getsockopt+0x3e0/0x4e0 [ 472.153569][ T6554] __sys_getsockopt+0xc8/0x15c [ 472.153921][ T6554] __arm64_sys_getsockopt+0xa4/0x100 [ 472.153968][ T6554] invoke_syscall+0x6c/0x258 [ 472.154010][ T6554] el0_svc_common.constprop.0+0xac/0x230 [ 472.154056][ T6554] do_el0_svc+0x40/0x58 [ 472.154281][ T6554] el0_svc+0x50/0x180 [ 472.154594][ T6554] el0t_64_sync_handler+0x10c/0x138 [ 472.155016][ T6554] el0t_64_sync+0x198/0x19c [ 472.666380][ T30] audit: type=1400 audit(472.360:269): avc: granted { setsecparam } for pid=6559 comm="syz.1.1125" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 473.611603][ T30] audit: type=1400 audit(473.310:270): avc: denied { write } for pid=6571 comm="syz.1.1131" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 473.643251][ T30] audit: type=1400 audit(473.340:271): avc: denied { setattr } for pid=6571 comm="syz.1.1131" name="SCTP" dev="sockfs" ino=12865 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 476.506637][ T30] audit: type=1400 audit(476.200:272): avc: denied { getopt } for pid=6580 comm="syz.1.1133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 476.532146][ T6581] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 476.760015][ T6584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=6584 comm=syz.1.1134 [ 477.210314][ T6590] FAULT_INJECTION: forcing a failure. [ 477.210314][ T6590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 477.210808][ T6590] CPU: 1 UID: 0 PID: 6590 Comm: syz.1.1137 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 477.210872][ T6590] Hardware name: linux,dummy-virt (DT) [ 477.210904][ T6590] Call trace: [ 477.210932][ T6590] show_stack+0x18/0x24 (C) [ 477.211103][ T6590] dump_stack_lvl+0xdc/0xf4 [ 477.211167][ T6590] dump_stack+0x1c/0x28 [ 477.211248][ T6590] should_fail_ex+0x5a0/0x6ac [ 477.211302][ T6590] should_fail+0x14/0x20 [ 477.211352][ T6590] should_fail_usercopy+0x1c/0x28 [ 477.211408][ T6590] _inline_copy_from_user+0x38/0x130 [ 477.211479][ T6590] do_sock_getsockopt+0x3e0/0x4e0 [ 477.211536][ T6590] __sys_getsockopt+0xc8/0x15c [ 477.211580][ T6590] __arm64_sys_getsockopt+0xa4/0x100 [ 477.211622][ T6590] invoke_syscall+0x6c/0x258 [ 477.211692][ T6590] el0_svc_common.constprop.0+0xac/0x230 [ 477.211756][ T6590] do_el0_svc+0x40/0x58 [ 477.211841][ T6590] el0_svc+0x50/0x180 [ 477.211889][ T6590] el0t_64_sync_handler+0x10c/0x138 [ 477.211975][ T6590] el0t_64_sync+0x198/0x19c [ 477.808644][ T6598] FAULT_INJECTION: forcing a failure. [ 477.808644][ T6598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 477.810152][ T6598] CPU: 0 UID: 0 PID: 6598 Comm: syz.1.1141 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 477.810224][ T6598] Hardware name: linux,dummy-virt (DT) [ 477.810258][ T6598] Call trace: [ 477.810290][ T6598] show_stack+0x18/0x24 (C) [ 477.810362][ T6598] dump_stack_lvl+0xdc/0xf4 [ 477.810411][ T6598] dump_stack+0x1c/0x28 [ 477.810452][ T6598] should_fail_ex+0x5a0/0x6ac [ 477.810501][ T6598] should_fail+0x14/0x20 [ 477.810544][ T6598] should_fail_usercopy+0x1c/0x28 [ 477.810587][ T6598] _inline_copy_from_user+0x38/0x130 [ 477.810676][ T6598] copy_msghdr_from_user+0xa0/0x130 [ 477.810723][ T6598] ___sys_sendmsg+0xfc/0x19c [ 477.810766][ T6598] __sys_sendmsg+0x114/0x198 [ 477.810808][ T6598] __arm64_sys_sendmsg+0x70/0xa0 [ 477.810850][ T6598] invoke_syscall+0x6c/0x258 [ 477.810892][ T6598] el0_svc_common.constprop.0+0xac/0x230 [ 477.810937][ T6598] do_el0_svc+0x40/0x58 [ 477.811021][ T6598] el0_svc+0x50/0x180 [ 477.811107][ T6598] el0t_64_sync_handler+0x10c/0x138 [ 477.811153][ T6598] el0t_64_sync+0x198/0x19c [ 478.232668][ T6602] FAULT_INJECTION: forcing a failure. [ 478.232668][ T6602] name failslab, interval 1, probability 0, space 0, times 0 [ 478.235658][ T6602] CPU: 0 UID: 0 PID: 6602 Comm: syz.1.1143 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 478.235727][ T6602] Hardware name: linux,dummy-virt (DT) [ 478.235760][ T6602] Call trace: [ 478.235789][ T6602] show_stack+0x18/0x24 (C) [ 478.235864][ T6602] dump_stack_lvl+0xdc/0xf4 [ 478.235912][ T6602] dump_stack+0x1c/0x28 [ 478.235953][ T6602] should_fail_ex+0x5a0/0x6ac [ 478.236002][ T6602] should_failslab+0xbc/0x11c [ 478.236058][ T6602] __kmalloc_noprof+0xd0/0x4d0 [ 478.236104][ T6602] tomoyo_realpath_from_path+0x90/0x534 [ 478.236154][ T6602] tomoyo_path_number_perm+0x200/0x438 [ 478.236200][ T6602] tomoyo_file_ioctl+0x1c/0x28 [ 478.236246][ T6602] security_file_ioctl+0x8c/0x19c [ 478.236299][ T6602] __arm64_sys_ioctl+0x90/0x188 [ 478.236345][ T6602] invoke_syscall+0x6c/0x258 [ 478.236386][ T6602] el0_svc_common.constprop.0+0xac/0x230 [ 478.236428][ T6602] do_el0_svc+0x40/0x58 [ 478.236468][ T6602] el0_svc+0x50/0x180 [ 478.236512][ T6602] el0t_64_sync_handler+0x10c/0x138 [ 478.236556][ T6602] el0t_64_sync+0x198/0x19c [ 478.245873][ T6602] ERROR: Out of memory at tomoyo_realpath_from_path. [ 478.619150][ T30] audit: type=1400 audit(478.270:273): avc: denied { getopt } for pid=6603 comm="syz.1.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 485.794262][ T6671] FAULT_INJECTION: forcing a failure. [ 485.794262][ T6671] name failslab, interval 1, probability 0, space 0, times 0 [ 485.794894][ T6671] CPU: 1 UID: 0 PID: 6671 Comm: syz.1.1167 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 485.794965][ T6671] Hardware name: linux,dummy-virt (DT) [ 485.795000][ T6671] Call trace: [ 485.795030][ T6671] show_stack+0x18/0x24 (C) [ 485.795155][ T6671] dump_stack_lvl+0xdc/0xf4 [ 485.795212][ T6671] dump_stack+0x1c/0x28 [ 485.795254][ T6671] should_fail_ex+0x5a0/0x6ac [ 485.795305][ T6671] should_failslab+0xbc/0x11c [ 485.795355][ T6671] __kmalloc_noprof+0xd0/0x4d0 [ 485.795406][ T6671] tomoyo_realpath_from_path+0x90/0x534 [ 485.795460][ T6671] tomoyo_path_number_perm+0x200/0x438 [ 485.795506][ T6671] tomoyo_file_ioctl+0x1c/0x28 [ 485.795552][ T6671] security_file_ioctl+0x8c/0x19c [ 485.795629][ T6671] __arm64_sys_ioctl+0x90/0x188 [ 485.795830][ T6671] invoke_syscall+0x6c/0x258 [ 485.795935][ T6671] el0_svc_common.constprop.0+0xac/0x230 [ 485.796018][ T6671] do_el0_svc+0x40/0x58 [ 485.796078][ T6671] el0_svc+0x50/0x180 [ 485.796135][ T6671] el0t_64_sync_handler+0x10c/0x138 [ 485.796187][ T6671] el0t_64_sync+0x198/0x19c [ 485.804162][ T6671] ERROR: Out of memory at tomoyo_realpath_from_path. [ 487.346372][ T30] audit: type=1400 audit(487.040:274): avc: granted { setsecparam } for pid=6688 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 488.251598][ T30] audit: type=1400 audit(487.950:275): avc: denied { write } for pid=6702 comm="syz.1.1181" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 488.269375][ T30] audit: type=1400 audit(487.960:276): avc: denied { create } for pid=6702 comm="syz.1.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 488.290369][ T30] audit: type=1400 audit(487.990:277): avc: denied { getopt } for pid=6702 comm="syz.1.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 489.614900][ T30] audit: type=1400 audit(489.310:278): avc: denied { create } for pid=6719 comm="syz.1.1188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 490.124961][ T30] audit: type=1400 audit(489.820:279): avc: denied { create } for pid=6719 comm="syz.1.1188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 490.299932][ T30] audit: type=1400 audit(489.990:280): avc: denied { write } for pid=6730 comm="syz.0.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 490.303246][ T30] audit: type=1400 audit(489.990:281): avc: denied { read } for pid=6730 comm="syz.0.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 491.055784][ T6742] FAULT_INJECTION: forcing a failure. [ 491.055784][ T6742] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 491.056449][ T6742] CPU: 0 UID: 0 PID: 6742 Comm: syz.1.1196 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 491.056507][ T6742] Hardware name: linux,dummy-virt (DT) [ 491.056539][ T6742] Call trace: [ 491.056567][ T6742] show_stack+0x18/0x24 (C) [ 491.056647][ T6742] dump_stack_lvl+0xdc/0xf4 [ 491.056700][ T6742] dump_stack+0x1c/0x28 [ 491.056742][ T6742] should_fail_ex+0x5a0/0x6ac [ 491.056790][ T6742] should_fail+0x14/0x20 [ 491.056833][ T6742] should_fail_usercopy+0x1c/0x28 [ 491.056876][ T6742] simple_read_from_buffer+0x94/0x1f0 [ 491.056927][ T6742] proc_fail_nth_read+0x160/0x248 [ 491.056975][ T6742] vfs_read+0x18c/0x97c [ 491.057039][ T6742] ksys_read+0xec/0x1d8 [ 491.057085][ T6742] __arm64_sys_read+0x6c/0x9c [ 491.057150][ T6742] invoke_syscall+0x6c/0x258 [ 491.057199][ T6742] el0_svc_common.constprop.0+0xac/0x230 [ 491.057244][ T6742] do_el0_svc+0x40/0x58 [ 491.057293][ T6742] el0_svc+0x50/0x180 [ 491.057345][ T6742] el0t_64_sync_handler+0x10c/0x138 [ 491.057391][ T6742] el0t_64_sync+0x198/0x19c [ 493.916542][ T6784] FAULT_INJECTION: forcing a failure. [ 493.916542][ T6784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 493.917173][ T6784] CPU: 0 UID: 0 PID: 6784 Comm: syz.0.1216 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 493.917240][ T6784] Hardware name: linux,dummy-virt (DT) [ 493.917273][ T6784] Call trace: [ 493.917302][ T6784] show_stack+0x18/0x24 (C) [ 493.917374][ T6784] dump_stack_lvl+0xdc/0xf4 [ 493.917492][ T6784] dump_stack+0x1c/0x28 [ 493.917552][ T6784] should_fail_ex+0x5a0/0x6ac [ 493.917604][ T6784] should_fail+0x14/0x20 [ 493.917676][ T6784] should_fail_usercopy+0x1c/0x28 [ 493.917752][ T6784] _inline_copy_from_user+0x38/0x130 [ 493.917832][ T6784] copy_msghdr_from_user+0xa0/0x130 [ 493.917892][ T6784] ___sys_sendmsg+0xfc/0x19c [ 493.917937][ T6784] __sys_sendmsg+0x114/0x198 [ 493.918055][ T6784] __arm64_sys_sendmsg+0x70/0xa0 [ 493.918112][ T6784] invoke_syscall+0x6c/0x258 [ 493.918156][ T6784] el0_svc_common.constprop.0+0xac/0x230 [ 493.918198][ T6784] do_el0_svc+0x40/0x58 [ 493.918238][ T6784] el0_svc+0x50/0x180 [ 493.918283][ T6784] el0t_64_sync_handler+0x10c/0x138 [ 493.918326][ T6784] el0t_64_sync+0x198/0x19c [ 494.702012][ T30] audit: type=1400 audit(494.380:282): avc: denied { read write } for pid=6796 comm="syz.1.1223" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 494.702600][ T30] audit: type=1400 audit(494.400:283): avc: denied { open } for pid=6796 comm="syz.1.1223" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 494.797729][ T30] audit: type=1400 audit(494.490:284): avc: denied { ioctl } for pid=6796 comm="syz.1.1223" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0x942b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 495.546172][ T30] audit: type=1400 audit(495.240:285): avc: denied { ioctl } for pid=6807 comm="syz.0.1225" path="socket:[13275]" dev="sockfs" ino=13275 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 497.783261][ T6835] FAULT_INJECTION: forcing a failure. [ 497.783261][ T6835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.783787][ T6835] CPU: 0 UID: 0 PID: 6835 Comm: syz.1.1235 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 497.783844][ T6835] Hardware name: linux,dummy-virt (DT) [ 497.783907][ T6835] Call trace: [ 497.783940][ T6835] show_stack+0x18/0x24 (C) [ 497.784010][ T6835] dump_stack_lvl+0xdc/0xf4 [ 497.784066][ T6835] dump_stack+0x1c/0x28 [ 497.784107][ T6835] should_fail_ex+0x5a0/0x6ac [ 497.784155][ T6835] should_fail+0x14/0x20 [ 497.784226][ T6835] should_fail_usercopy+0x1c/0x28 [ 497.784275][ T6835] simple_read_from_buffer+0x94/0x1f0 [ 497.784334][ T6835] proc_fail_nth_read+0x160/0x248 [ 497.784382][ T6835] vfs_read+0x18c/0x97c [ 497.784429][ T6835] ksys_read+0xec/0x1d8 [ 497.784472][ T6835] __arm64_sys_read+0x6c/0x9c [ 497.784515][ T6835] invoke_syscall+0x6c/0x258 [ 497.784566][ T6835] el0_svc_common.constprop.0+0xac/0x230 [ 497.784611][ T6835] do_el0_svc+0x40/0x58 [ 497.784651][ T6835] el0_svc+0x50/0x180 [ 497.784695][ T6835] el0t_64_sync_handler+0x10c/0x138 [ 497.784739][ T6835] el0t_64_sync+0x198/0x19c [ 500.575477][ T6884] FAULT_INJECTION: forcing a failure. [ 500.575477][ T6884] name failslab, interval 1, probability 0, space 0, times 0 [ 500.576013][ T6884] CPU: 0 UID: 0 PID: 6884 Comm: syz.1.1256 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 500.576081][ T6884] Hardware name: linux,dummy-virt (DT) [ 500.576172][ T6884] Call trace: [ 500.576208][ T6884] show_stack+0x18/0x24 (C) [ 500.576297][ T6884] dump_stack_lvl+0xdc/0xf4 [ 500.576355][ T6884] dump_stack+0x1c/0x28 [ 500.576395][ T6884] should_fail_ex+0x5a0/0x6ac [ 500.576455][ T6884] should_failslab+0xbc/0x11c [ 500.576550][ T6884] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 500.576602][ T6884] __alloc_skb+0x208/0x2f0 [ 500.576649][ T6884] netlink_alloc_large_skb+0xac/0xd8 [ 500.576761][ T6884] netlink_sendmsg+0x4ac/0xa50 [ 500.576836][ T6884] __sock_sendmsg+0xc8/0x168 [ 500.576890][ T6884] ____sys_sendmsg+0x51c/0x734 [ 500.576937][ T6884] ___sys_sendmsg+0x11c/0x19c [ 500.576979][ T6884] __sys_sendmsg+0x114/0x198 [ 500.577065][ T6884] __arm64_sys_sendmsg+0x70/0xa0 [ 500.577114][ T6884] invoke_syscall+0x6c/0x258 [ 500.577158][ T6884] el0_svc_common.constprop.0+0xac/0x230 [ 500.577201][ T6884] do_el0_svc+0x40/0x58 [ 500.577250][ T6884] el0_svc+0x50/0x180 [ 500.577333][ T6884] el0t_64_sync_handler+0x10c/0x138 [ 500.577379][ T6884] el0t_64_sync+0x198/0x19c [ 500.860392][ T6893] capability: warning: `syz.1.1259' uses 32-bit capabilities (legacy support in use) [ 500.953452][ T6895] FAULT_INJECTION: forcing a failure. [ 500.953452][ T6895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 500.954124][ T6895] CPU: 0 UID: 0 PID: 6895 Comm: syz.0.1260 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 500.954185][ T6895] Hardware name: linux,dummy-virt (DT) [ 500.954242][ T6895] Call trace: [ 500.954277][ T6895] show_stack+0x18/0x24 (C) [ 500.954359][ T6895] dump_stack_lvl+0xdc/0xf4 [ 500.954412][ T6895] dump_stack+0x1c/0x28 [ 500.954454][ T6895] should_fail_ex+0x5a0/0x6ac [ 500.954504][ T6895] should_fail+0x14/0x20 [ 500.954548][ T6895] should_fail_usercopy+0x1c/0x28 [ 500.954592][ T6895] simple_read_from_buffer+0x94/0x1f0 [ 500.954671][ T6895] proc_fail_nth_read+0x160/0x248 [ 500.954721][ T6895] vfs_read+0x18c/0x97c [ 500.954770][ T6895] ksys_read+0xec/0x1d8 [ 500.954814][ T6895] __arm64_sys_read+0x6c/0x9c [ 500.954858][ T6895] invoke_syscall+0x6c/0x258 [ 500.954900][ T6895] el0_svc_common.constprop.0+0xac/0x230 [ 500.954943][ T6895] do_el0_svc+0x40/0x58 [ 500.954984][ T6895] el0_svc+0x50/0x180 [ 500.955073][ T6895] el0t_64_sync_handler+0x10c/0x138 [ 500.955160][ T6895] el0t_64_sync+0x198/0x19c [ 501.382077][ T30] audit: type=1400 audit(501.080:286): avc: denied { setattr } for pid=6900 comm="syz.0.1264" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 501.432816][ T30] audit: type=1400 audit(501.130:287): avc: denied { create } for pid=6900 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 503.039676][ T30] audit: type=1400 audit(502.730:288): avc: denied { getopt } for pid=6915 comm="syz.1.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 504.397072][ T6945] FAULT_INJECTION: forcing a failure. [ 504.397072][ T6945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 504.397643][ T6945] CPU: 0 UID: 0 PID: 6945 Comm: syz.1.1273 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 504.397710][ T6945] Hardware name: linux,dummy-virt (DT) [ 504.397745][ T6945] Call trace: [ 504.397774][ T6945] show_stack+0x18/0x24 (C) [ 504.397849][ T6945] dump_stack_lvl+0xdc/0xf4 [ 504.397900][ T6945] dump_stack+0x1c/0x28 [ 504.397984][ T6945] should_fail_ex+0x5a0/0x6ac [ 504.398109][ T6945] should_fail+0x14/0x20 [ 504.398168][ T6945] should_fail_usercopy+0x1c/0x28 [ 504.398245][ T6945] _inline_copy_from_user+0x38/0x130 [ 504.398341][ T6945] copy_msghdr_from_user+0xa0/0x130 [ 504.398402][ T6945] ___sys_sendmsg+0xfc/0x19c [ 504.398502][ T6945] __sys_sendmsg+0x114/0x198 [ 504.398593][ T6945] __arm64_sys_sendmsg+0x70/0xa0 [ 504.398639][ T6945] invoke_syscall+0x6c/0x258 [ 504.398700][ T6945] el0_svc_common.constprop.0+0xac/0x230 [ 504.398745][ T6945] do_el0_svc+0x40/0x58 [ 504.398785][ T6945] el0_svc+0x50/0x180 [ 504.398831][ T6945] el0t_64_sync_handler+0x10c/0x138 [ 504.398875][ T6945] el0t_64_sync+0x198/0x19c [ 505.047369][ T30] audit: type=1400 audit(504.740:289): avc: denied { setattr } for pid=6956 comm="syz.0.1278" name="L2TP/IP" dev="sockfs" ino=14505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 506.741607][ T30] audit: type=1400 audit(506.440:290): avc: denied { write } for pid=6983 comm="syz.1.1290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 507.613855][ T6998] FAULT_INJECTION: forcing a failure. [ 507.613855][ T6998] name failslab, interval 1, probability 0, space 0, times 0 [ 507.614385][ T6998] CPU: 0 UID: 0 PID: 6998 Comm: syz.1.1295 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 507.614444][ T6998] Hardware name: linux,dummy-virt (DT) [ 507.614476][ T6998] Call trace: [ 507.614506][ T6998] show_stack+0x18/0x24 (C) [ 507.614579][ T6998] dump_stack_lvl+0xdc/0xf4 [ 507.614627][ T6998] dump_stack+0x1c/0x28 [ 507.614667][ T6998] should_fail_ex+0x5a0/0x6ac [ 507.614715][ T6998] should_failslab+0xbc/0x11c [ 507.614761][ T6998] __kmalloc_noprof+0xd0/0x4d0 [ 507.614806][ T6998] tomoyo_encode2+0xa8/0x2c0 [ 507.614854][ T6998] tomoyo_encode+0x28/0x40 [ 507.614899][ T6998] tomoyo_realpath_from_path+0x114/0x534 [ 507.614963][ T6998] tomoyo_path_number_perm+0x200/0x438 [ 507.615025][ T6998] tomoyo_file_ioctl+0x1c/0x28 [ 507.615147][ T6998] security_file_ioctl+0x8c/0x19c [ 507.615204][ T6998] __arm64_sys_ioctl+0x90/0x188 [ 507.615263][ T6998] invoke_syscall+0x6c/0x258 [ 507.615310][ T6998] el0_svc_common.constprop.0+0xac/0x230 [ 507.615352][ T6998] do_el0_svc+0x40/0x58 [ 507.615392][ T6998] el0_svc+0x50/0x180 [ 507.615437][ T6998] el0t_64_sync_handler+0x10c/0x138 [ 507.615492][ T6998] el0t_64_sync+0x198/0x19c [ 507.615612][ T6998] ERROR: Out of memory at tomoyo_realpath_from_path. [ 507.830230][ T7003] FAULT_INJECTION: forcing a failure. [ 507.830230][ T7003] name failslab, interval 1, probability 0, space 0, times 0 [ 507.831742][ T7003] CPU: 1 UID: 0 PID: 7003 Comm: syz.1.1297 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 507.831831][ T7003] Hardware name: linux,dummy-virt (DT) [ 507.831899][ T7003] Call trace: [ 507.831956][ T7003] show_stack+0x18/0x24 (C) [ 507.832057][ T7003] dump_stack_lvl+0xdc/0xf4 [ 507.832108][ T7003] dump_stack+0x1c/0x28 [ 507.832149][ T7003] should_fail_ex+0x5a0/0x6ac [ 507.832198][ T7003] should_failslab+0xbc/0x11c [ 507.832245][ T7003] __kmalloc_noprof+0xd0/0x4d0 [ 507.832290][ T7003] tomoyo_realpath_from_path+0x90/0x534 [ 507.832340][ T7003] tomoyo_path_number_perm+0x200/0x438 [ 507.832387][ T7003] tomoyo_file_ioctl+0x1c/0x28 [ 507.832433][ T7003] security_file_ioctl+0x8c/0x19c [ 507.832513][ T7003] __arm64_sys_ioctl+0x90/0x188 [ 507.832582][ T7003] invoke_syscall+0x6c/0x258 [ 507.832626][ T7003] el0_svc_common.constprop.0+0xac/0x230 [ 507.832669][ T7003] do_el0_svc+0x40/0x58 [ 507.832710][ T7003] el0_svc+0x50/0x180 [ 507.832755][ T7003] el0t_64_sync_handler+0x10c/0x138 [ 507.832804][ T7003] el0t_64_sync+0x198/0x19c [ 507.841392][ T7003] ERROR: Out of memory at tomoyo_realpath_from_path. [ 513.063357][ T7054] FAULT_INJECTION: forcing a failure. [ 513.063357][ T7054] name failslab, interval 1, probability 0, space 0, times 0 [ 513.065759][ T7054] CPU: 1 UID: 0 PID: 7054 Comm: syz.0.1314 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 513.065843][ T7054] Hardware name: linux,dummy-virt (DT) [ 513.065877][ T7054] Call trace: [ 513.065907][ T7054] show_stack+0x18/0x24 (C) [ 513.065987][ T7054] dump_stack_lvl+0xdc/0xf4 [ 513.066040][ T7054] dump_stack+0x1c/0x28 [ 513.066081][ T7054] should_fail_ex+0x5a0/0x6ac [ 513.066130][ T7054] should_failslab+0xbc/0x11c [ 513.066178][ T7054] __kmalloc_noprof+0xd0/0x4d0 [ 513.066224][ T7054] tomoyo_encode2+0xa8/0x2c0 [ 513.066283][ T7054] tomoyo_encode+0x28/0x40 [ 513.066329][ T7054] tomoyo_realpath_from_path+0x114/0x534 [ 513.066376][ T7054] tomoyo_path_number_perm+0x200/0x438 [ 513.066422][ T7054] tomoyo_file_ioctl+0x1c/0x28 [ 513.066468][ T7054] security_file_ioctl+0x8c/0x19c [ 513.066517][ T7054] __arm64_sys_ioctl+0x90/0x188 [ 513.066563][ T7054] invoke_syscall+0x6c/0x258 [ 513.066605][ T7054] el0_svc_common.constprop.0+0xac/0x230 [ 513.066648][ T7054] do_el0_svc+0x40/0x58 [ 513.066688][ T7054] el0_svc+0x50/0x180 [ 513.066732][ T7054] el0t_64_sync_handler+0x10c/0x138 [ 513.066776][ T7054] el0t_64_sync+0x198/0x19c [ 513.076815][ T7054] ERROR: Out of memory at tomoyo_realpath_from_path. [ 513.427776][ T7058] FAULT_INJECTION: forcing a failure. [ 513.427776][ T7058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.430931][ T7058] CPU: 1 UID: 0 PID: 7058 Comm: syz.1.1316 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 513.431019][ T7058] Hardware name: linux,dummy-virt (DT) [ 513.431084][ T7058] Call trace: [ 513.431116][ T7058] show_stack+0x18/0x24 (C) [ 513.431189][ T7058] dump_stack_lvl+0xdc/0xf4 [ 513.431238][ T7058] dump_stack+0x1c/0x28 [ 513.431293][ T7058] should_fail_ex+0x5a0/0x6ac [ 513.431343][ T7058] should_fail+0x14/0x20 [ 513.431386][ T7058] should_fail_usercopy+0x1c/0x28 [ 513.431430][ T7058] _inline_copy_from_user+0x38/0x130 [ 513.431477][ T7058] copy_msghdr_from_user+0xa0/0x130 [ 513.431520][ T7058] ___sys_sendmsg+0xfc/0x19c [ 513.431563][ T7058] __sys_sendmsg+0x114/0x198 [ 513.431605][ T7058] __arm64_sys_sendmsg+0x70/0xa0 [ 513.431648][ T7058] invoke_syscall+0x6c/0x258 [ 513.431689][ T7058] el0_svc_common.constprop.0+0xac/0x230 [ 513.431730][ T7058] do_el0_svc+0x40/0x58 [ 513.431770][ T7058] el0_svc+0x50/0x180 [ 513.431813][ T7058] el0t_64_sync_handler+0x10c/0x138 [ 513.431857][ T7058] el0t_64_sync+0x198/0x19c [ 520.215934][ T1545] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.467414][ T1545] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.712745][ T1545] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.959492][ T1545] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 521.356797][ T7131] FAULT_INJECTION: forcing a failure. [ 521.356797][ T7131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 521.357521][ T7131] CPU: 0 UID: 0 PID: 7131 Comm: syz.0.1332 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 521.357582][ T7131] Hardware name: linux,dummy-virt (DT) [ 521.357614][ T7131] Call trace: [ 521.357642][ T7131] show_stack+0x18/0x24 (C) [ 521.357718][ T7131] dump_stack_lvl+0xdc/0xf4 [ 521.357768][ T7131] dump_stack+0x1c/0x28 [ 521.357809][ T7131] should_fail_ex+0x5a0/0x6ac [ 521.357857][ T7131] should_fail+0x14/0x20 [ 521.357932][ T7131] should_fail_usercopy+0x1c/0x28 [ 521.357982][ T7131] simple_read_from_buffer+0x94/0x1f0 [ 521.358043][ T7131] proc_fail_nth_read+0x160/0x248 [ 521.358199][ T7131] vfs_read+0x18c/0x97c [ 521.358264][ T7131] ksys_read+0xec/0x1d8 [ 521.358311][ T7131] __arm64_sys_read+0x6c/0x9c [ 521.358355][ T7131] invoke_syscall+0x6c/0x258 [ 521.358397][ T7131] el0_svc_common.constprop.0+0xac/0x230 [ 521.358439][ T7131] do_el0_svc+0x40/0x58 [ 521.358479][ T7131] el0_svc+0x50/0x180 [ 521.358565][ T7131] el0t_64_sync_handler+0x10c/0x138 [ 521.358614][ T7131] el0t_64_sync+0x198/0x19c [ 521.554710][ T30] audit: type=1400 audit(521.250:291): avc: denied { read } for pid=3154 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 523.800507][ T30] audit: type=1400 audit(523.490:292): avc: denied { append } for pid=7141 comm="syz.0.1335" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 524.565882][ T1545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 524.641215][ T1545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 524.704368][ T1545] bond0 (unregistering): Released all slaves [ 524.985088][ T1545] hsr_slave_0: left promiscuous mode [ 524.992112][ T1545] hsr_slave_1: left promiscuous mode [ 525.032244][ T1545] veth1_macvtap: left promiscuous mode [ 525.034281][ T1545] veth0_macvtap: left promiscuous mode [ 525.037354][ T1545] veth1_vlan: left promiscuous mode [ 535.204394][ T7113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 535.276267][ T7113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 535.429296][ T962] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 535.609199][ T962] usb 1-1: Using ep0 maxpacket: 8 [ 535.701867][ T962] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 535.702506][ T962] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 535.702750][ T962] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 535.703235][ T962] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 535.703428][ T962] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 535.703645][ T962] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 535.703792][ T962] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 536.012012][ T962] usb 1-1: GET_CAPABILITIES returned 0 [ 536.012578][ T962] usbtmc 1-1:16.0: can't read capabilities [ 536.287587][ T912] usb 1-1: USB disconnect, device number 7 [ 537.132323][ T30] audit: type=1400 audit(536.820:293): avc: denied { setopt } for pid=7201 comm="syz.0.1344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 537.551164][ T30] audit: type=1400 audit(537.250:294): avc: denied { block_suspend } for pid=7210 comm="syz.0.1345" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 538.923742][ T30] audit: type=1400 audit(538.620:295): avc: denied { execute } for pid=7222 comm="syz.0.1347" path=2F6D656D66643A01FDAE2E2BA68CB63F32193994532C7C783F55655BBDE1210333BC2723FF179B25F35B64202097F5479741C2D8F05571E62BA56C940BB607175CFB0421E4C4B1A21CFF433B94510DB67D9CEC430BCFEBE49A52E52C8203202864656C6574656429 dev="hugetlbfs" ino=14914 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 538.925212][ T7113] hsr_slave_0: entered promiscuous mode [ 538.933842][ T7113] hsr_slave_1: entered promiscuous mode [ 543.942403][ T7113] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 544.015306][ T7113] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 544.083107][ T7113] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 544.157192][ T7113] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 546.954030][ T7113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 551.595597][ T30] audit: type=1400 audit(551.290:296): avc: denied { nlmsg_write } for pid=7256 comm="syz.0.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 554.131082][ T7113] veth0_vlan: entered promiscuous mode [ 554.185104][ T7113] veth1_vlan: entered promiscuous mode [ 554.377521][ T7113] veth0_macvtap: entered promiscuous mode [ 554.411147][ T7113] veth1_macvtap: entered promiscuous mode [ 554.641114][ T7113] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 554.641598][ T7113] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 554.641996][ T7113] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 554.642227][ T7113] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 554.941932][ T30] audit: type=1400 audit(554.630:297): avc: denied { mounton } for pid=7113 comm="syz-executor" path="/syzkaller.gm7ywP/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 554.964104][ T30] audit: type=1400 audit(554.660:298): avc: denied { mount } for pid=7113 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 555.079082][ T30] audit: type=1400 audit(554.760:299): avc: denied { mounton } for pid=7113 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 556.373790][ T30] audit: type=1400 audit(556.070:300): avc: denied { bind } for pid=7323 comm="syz.1.1351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 556.384636][ T30] audit: type=1400 audit(556.080:301): avc: denied { setopt } for pid=7323 comm="syz.1.1351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 556.585439][ T7324] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 556.802368][ T7324] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 557.026592][ T7324] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 557.215166][ T7324] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 557.607215][ T7324] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 557.666145][ T7324] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 557.726603][ T7324] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 557.805580][ T7324] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 560.463342][ T1545] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 560.695646][ T1545] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 562.961893][ T1545] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.342089][ T1545] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 568.379271][ T30] audit: type=1400 audit(568.060:302): avc: denied { lock } for pid=7352 comm="syz.1.1357" path="socket:[15538]" dev="sockfs" ino=15538 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 569.562646][ T1545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 569.645759][ T1545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 569.751283][ T1545] bond0 (unregistering): Released all slaves [ 570.121366][ T1545] hsr_slave_0: left promiscuous mode [ 570.126063][ T1545] hsr_slave_1: left promiscuous mode [ 570.170653][ T1545] veth1_macvtap: left promiscuous mode [ 570.171983][ T1545] veth0_macvtap: left promiscuous mode [ 570.178382][ T1545] veth1_vlan: left promiscuous mode [ 575.029561][ T7366] capability: warning: `syz.1.1361' uses deprecated v2 capabilities in a way that may be insecure [ 577.864870][ T7374] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 577.929666][ T7374] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 578.417183][ T7380] mmap: syz.1.1365 (7380) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 581.899968][ T7335] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 581.920696][ T7335] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 582.875823][ T30] audit: type=1400 audit(582.490:303): avc: denied { ioctl } for pid=7401 comm="syz.1.1368" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15635 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 586.785564][ T7335] hsr_slave_0: entered promiscuous mode [ 586.803783][ T7335] hsr_slave_1: entered promiscuous mode [ 586.816952][ T7335] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 586.817560][ T7335] Cannot create hsr debugfs directory [ 589.864949][ T30] audit: type=1400 audit(589.530:304): avc: denied { watch } for pid=7432 comm="syz.1.1369" path="/18" dev="tmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 593.092183][ T7335] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 593.162894][ T7335] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 593.232291][ T7335] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 593.282888][ T7335] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 595.673228][ T7335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 596.495016][ T7480] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1373'. [ 599.484140][ T30] audit: type=1400 audit(599.170:305): avc: denied { name_connect } for pid=7507 comm="syz.1.1374" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 604.126712][ T7335] veth0_vlan: entered promiscuous mode [ 604.211988][ T7335] veth1_vlan: entered promiscuous mode [ 604.404577][ T7335] veth0_macvtap: entered promiscuous mode [ 604.451196][ T7335] veth1_macvtap: entered promiscuous mode [ 604.676086][ T7335] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 604.676678][ T7335] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 604.676898][ T7335] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 604.677070][ T7335] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 605.140537][ T30] audit: type=1400 audit(604.830:306): avc: denied { unmount } for pid=7335 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 612.547468][ C1] vcan0: j1939_tp_rxtimer: 0x00000000afcfabcb: rx timeout, send abort [ 613.047370][ C1] vcan0: j1939_tp_rxtimer: 0x00000000a561d85f: rx timeout, send abort [ 613.050638][ C1] vcan0: j1939_tp_rxtimer: 0x00000000afcfabcb: abort rx timeout. Force session deactivation [ 613.548549][ C1] vcan0: j1939_tp_rxtimer: 0x00000000a561d85f: abort rx timeout. Force session deactivation [ 615.931173][ T30] audit: type=1400 audit(615.560:307): avc: denied { create } for pid=7538 comm="syz.1.1378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 615.974001][ T30] audit: type=1400 audit(615.580:308): avc: denied { write } for pid=7538 comm="syz.1.1378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 618.319270][ T31] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 618.644653][ T31] usb 1-1: New USB device found, idVendor=1a86, idProduct=7522, bcdDevice=35.36 [ 618.645153][ T31] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 618.645484][ T31] usb 1-1: Product: syz [ 618.645685][ T31] usb 1-1: Manufacturer: syz [ 618.645875][ T31] usb 1-1: SerialNumber: syz [ 618.686585][ T31] usb 1-1: config 0 descriptor?? [ 618.723849][ T31] ch341 1-1:0.0: ch341-uart converter detected [ 618.942445][ T31] usb 1-1: failed to receive control message: -71 [ 618.950728][ T31] ch341-uart ttyUSB0: probe with driver ch341-uart failed with error -71 [ 619.017589][ T31] usb 1-1: USB disconnect, device number 8 [ 619.074666][ T31] ch341 1-1:0.0: device disconnected [ 620.083522][ T7558] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1384'. [ 626.536377][ T30] audit: type=1400 audit(625.510:309): avc: denied { read } for pid=7569 comm="syz.0.1389" dev="nsfs" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 626.537195][ T30] audit: type=1400 audit(625.830:310): avc: denied { open } for pid=7569 comm="syz.0.1389" path="net:[4026532745]" dev="nsfs" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 637.027319][ T30] audit: type=1326 audit(636.700:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7600 comm="syz.0.1396" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff83f5ad28 code=0x0 [ 643.650716][ T30] audit: type=1400 audit(643.350:312): avc: denied { create } for pid=7633 comm="syz.0.1406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 643.696912][ T30] audit: type=1400 audit(643.390:313): avc: denied { connect } for pid=7633 comm="syz.0.1406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 683.156338][ T30] audit: type=1400 audit(682.850:314): avc: denied { read } for pid=7713 comm="syz.1.1431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 686.282575][ T30] audit: type=1400 audit(685.980:315): avc: denied { getopt } for pid=7727 comm="syz.1.1435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 687.305497][ T30] audit: type=1400 audit(686.770:316): avc: denied { read } for pid=7722 comm="syz.0.1433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 710.698585][ T30] audit: type=1400 audit(710.390:317): avc: denied { create } for pid=7855 comm="syz.1.1480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 710.710964][ T30] audit: type=1400 audit(710.400:318): avc: denied { bind } for pid=7855 comm="syz.1.1480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 710.727862][ T30] audit: type=1400 audit(710.420:319): avc: denied { connect } for pid=7855 comm="syz.1.1480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 710.730960][ T30] audit: type=1400 audit(710.430:320): avc: denied { write } for pid=7855 comm="syz.1.1480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 712.250630][ T30] audit: type=1400 audit(711.950:321): avc: denied { read } for pid=7867 comm="syz.0.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 712.661928][ T30] audit: type=1400 audit(712.360:322): avc: denied { setopt } for pid=7874 comm="syz.0.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 713.020451][ T30] audit: type=1400 audit(712.720:323): avc: denied { bind } for pid=7874 comm="syz.0.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 715.033124][ T30] audit: type=1400 audit(714.730:324): avc: denied { shutdown } for pid=7882 comm="syz.1.1491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 715.556769][ T30] audit: type=1400 audit(715.250:325): avc: denied { bind } for pid=7887 comm="syz.0.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 715.569375][ T30] audit: type=1400 audit(715.260:326): avc: denied { listen } for pid=7887 comm="syz.0.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 716.160118][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 716.161265][ T30] audit: type=1400 audit(715.850:330): avc: denied { accept } for pid=7887 comm="syz.0.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 716.183110][ T30] audit: type=1400 audit(715.880:331): avc: denied { read } for pid=7887 comm="syz.0.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 716.355149][ T7897] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1496'. [ 717.647197][ T30] audit: type=1400 audit(717.340:332): avc: denied { name_bind } for pid=7904 comm="syz.0.1500" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 717.651870][ T30] audit: type=1400 audit(717.340:333): avc: denied { node_bind } for pid=7904 comm="syz.0.1500" saddr=224.0.0.1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 718.068359][ C1] hrtimer: interrupt took 1255952 ns [ 720.155495][ T30] audit: type=1400 audit(719.850:334): avc: denied { write } for pid=7915 comm="syz.0.1503" path="socket:[17499]" dev="sockfs" ino=17499 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 723.785196][ T30] audit: type=1400 audit(723.480:335): avc: denied { write } for pid=7929 comm="syz.1.1507" path="socket:[17514]" dev="sockfs" ino=17514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 723.795369][ T30] audit: type=1400 audit(723.490:336): avc: denied { nlmsg_read } for pid=7929 comm="syz.1.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 726.727277][ T30] audit: type=1400 audit(726.420:337): avc: denied { create } for pid=7949 comm="syz.0.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 729.593955][ T30] audit: type=1400 audit(729.290:338): avc: denied { read } for pid=7978 comm="syz.0.1530" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 731.782439][ T7998] syz.0.1536 uses obsolete (PF_INET,SOCK_PACKET) [ 737.137484][ T8046] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1552'. [ 737.246080][ T8048] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1553'. [ 737.713801][ T30] audit: type=1400 audit(737.410:339): avc: denied { write } for pid=8051 comm="syz.0.1555" lport=51274 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 737.717069][ T30] audit: type=1400 audit(737.410:340): avc: denied { setopt } for pid=8051 comm="syz.0.1555" lport=51274 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 738.646795][ T30] audit: type=1400 audit(738.340:341): avc: denied { read } for pid=8058 comm="syz.0.1558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 739.878647][ T30] audit: type=1400 audit(739.570:342): avc: denied { write } for pid=8060 comm="syz.0.1559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 743.955071][ T8079] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1565'. [ 743.964421][ T8079] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1565'. [ 749.255116][ T8134] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1587'. [ 749.273184][ T8134] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1587'. [ 809.066378][ T8399] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1692'. [ 832.896966][ T30] audit: type=1400 audit(832.380:343): avc: denied { write } for pid=8472 comm="syz.0.1718" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 834.316928][ T8485] Illegal XDP return value 4294967274 on prog (id 37) dev syz_tun, expect packet loss! [ 838.350715][ T30] audit: type=1400 audit(838.050:344): avc: denied { read } for pid=8519 comm="syz.1.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 861.448682][ T30] audit: type=1400 audit(860.910:345): avc: denied { write } for pid=8601 comm="syz.0.1765" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 869.952637][ T8624] netlink: 'syz.1.1771': attribute type 21 has an invalid length. [ 869.953356][ T8624] netlink: 'syz.1.1771': attribute type 22 has an invalid length. [ 870.760084][ T8634] lo: entered promiscuous mode [ 870.762586][ T8634] lo: entered allmulticast mode [ 870.772873][ T8634] lo: left allmulticast mode [ 870.775836][ T8634] lo: left promiscuous mode [ 871.444456][ T30] audit: type=1400 audit(871.140:346): avc: denied { bind } for pid=8645 comm="syz.0.1782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 871.982596][ T8656] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1787'. [ 871.983395][ T8656] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1787'. [ 877.584784][ T30] audit: type=1400 audit(877.280:347): avc: denied { bind } for pid=8720 comm="syz.1.1816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 877.970570][ T8725] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1818'. [ 881.340393][ T8763] netlink: 'syz.1.1834': attribute type 39 has an invalid length. [ 884.701202][ T8770] random: crng reseeded on system resumption [ 884.857869][ T30] audit: type=1400 audit(884.360:348): avc: denied { write } for pid=8767 comm="syz.1.1836" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 895.833116][ T30] audit: type=1400 audit(895.440:349): avc: denied { create } for pid=8790 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 895.867854][ T30] audit: type=1400 audit(895.460:350): avc: denied { write } for pid=8790 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 904.910381][ T30] audit: type=1400 audit(904.610:351): avc: denied { append } for pid=8818 comm="syz.0.1856" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 906.240834][ T30] audit: type=1400 audit(905.940:352): avc: denied { connect } for pid=8829 comm="syz.1.1861" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 908.061249][ T8847] dvmrp5: entered allmulticast mode [ 908.070204][ T8847] dvmrp5: left allmulticast mode [ 923.086644][ T8904] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1891'. [ 926.201415][ T8914] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1893'. [ 929.069866][ T30] audit: type=1400 audit(928.760:353): avc: denied { read write } for pid=8945 comm="syz.0.1907" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 929.070901][ T30] audit: type=1400 audit(928.770:354): avc: denied { open } for pid=8945 comm="syz.0.1907" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 932.421769][ T30] audit: type=1400 audit(932.120:355): avc: denied { mount } for pid=8971 comm="syz.0.1919" name="/" dev="configfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 932.430384][ T30] audit: type=1400 audit(932.130:356): avc: denied { search } for pid=8971 comm="syz.0.1919" name="/" dev="configfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 942.663704][ T30] audit: type=1400 audit(942.360:357): avc: denied { setattr } for pid=9010 comm="syz.0.1932" name="NETLINK" dev="sockfs" ino=20974 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 944.170519][ T30] audit: type=1400 audit(943.390:358): avc: denied { bind } for pid=9010 comm="syz.0.1932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 962.483158][ T9112] netlink: 312 bytes leftover after parsing attributes in process `syz.1.1972'. [ 968.394503][ T9162] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1994'. [ 968.573549][ T30] audit: type=1400 audit(968.270:359): avc: denied { accept } for pid=9163 comm="syz.1.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 969.283174][ T30] audit: type=1400 audit(968.980:360): avc: denied { create } for pid=9173 comm="syz.1.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 972.019384][ T9194] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2007'. [ 972.184840][ T9196] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2008'. [ 972.595209][ T30] audit: type=1400 audit(972.280:361): avc: denied { name_bind } for pid=9201 comm="syz.1.2011" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 990.881714][ T9265] netlink: 10 bytes leftover after parsing attributes in process `syz.0.2035'. [ 999.846986][ T30] audit: type=1400 audit(999.540:362): avc: denied { name_connect } for pid=9294 comm="syz.1.2047" dest=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 1011.010018][ T30] audit: type=1400 audit(1010.700:363): avc: denied { read } for pid=9339 comm="syz.1.2067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1050.753403][ T30] audit: type=1326 audit(1050.450:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9454 comm="syz.0.2116" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff83f5ad28 code=0x7ffc0000 [ 1050.765469][ T30] audit: type=1326 audit(1050.460:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9454 comm="syz.0.2116" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff83f5ad28 code=0x7ffc0000 [ 1050.774063][ T30] audit: type=1326 audit(1050.460:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9454 comm="syz.0.2116" exe="/syz-executor" sig=0 arch=c00000b7 syscall=62 compat=0 ip=0xffff83f5ad28 code=0x7ffc0000 [ 1050.775827][ T30] audit: type=1326 audit(1050.470:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9454 comm="syz.0.2116" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff83f5ad28 code=0x7ffc0000 [ 1059.790955][ T9472] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2121'. [ 1084.787727][ T9522] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1084.794132][ T9522] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1093.667537][ T30] audit: type=1400 audit(1092.940:368): avc: denied { read } for pid=9549 comm="syz.0.2145" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1093.668906][ T30] audit: type=1400 audit(1092.940:369): avc: denied { open } for pid=9549 comm="syz.0.2145" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1106.472215][ T9590] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1106.481301][ T9590] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1113.536935][ T30] audit: type=1400 audit(1113.160:370): avc: denied { map } for pid=9617 comm="syz.0.2170" path="socket:[23094]" dev="sockfs" ino=23094 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1123.618945][ T30] audit: type=1400 audit(1123.300:371): avc: denied { bind } for pid=9655 comm="syz.0.2183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1136.402244][ T30] audit: type=1400 audit(1136.100:372): avc: denied { read write } for pid=9702 comm="syz.0.2200" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1136.405238][ T30] audit: type=1400 audit(1136.100:373): avc: denied { open } for pid=9702 comm="syz.0.2200" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1161.413289][ T30] audit: type=1326 audit(1161.110:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9740 comm="syz.1.2210" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5ad28 code=0x0 [ 1162.431422][ T9750] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2210'. [ 1191.059009][ T9835] syzkaller0: entered promiscuous mode [ 1191.062831][ T9835] syzkaller0: entered allmulticast mode [ 1226.930673][ T30] audit: type=1400 audit(1226.630:375): avc: denied { ioctl } for pid=9914 comm="syz.0.2275" path="pid:[4026532622]" dev="nsfs" ino=4026532622 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1255.542433][ T9999] sctp: [Deprecated]: syz.0.2302 (pid 9999) Use of int in max_burst socket option deprecated. [ 1255.542433][ T9999] Use struct sctp_assoc_value instead [ 1271.905195][T10044] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2317'. [ 1272.117835][ T30] audit: type=1400 audit(1271.810:376): avc: denied { create } for pid=10045 comm="syz.1.2318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1285.755278][T10096] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1285.757573][T10096] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1286.302201][ T30] audit: type=1400 audit(1286.000:377): avc: denied { write } for pid=10101 comm="syz.1.2339" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1286.621693][T10106] netlink: 96 bytes leftover after parsing attributes in process `syz.1.2341'. [ 1286.777070][T10108] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2342'. [ 1286.986245][T10110] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1287.007380][T10110] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1287.030343][ T30] audit: type=1400 audit(1286.720:378): avc: denied { unlink } for pid=3109 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1288.946755][T10124] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1288.964492][T10124] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1310.173406][T10233] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10233 comm=syz.1.2391 [ 1314.162203][T10241] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1318.943517][T10243] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 1323.504939][T10252] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1325.753541][T10270] batadv_slave_0: entered promiscuous mode [ 1326.086326][T10276] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1326.090239][T10276] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1341.407250][ T30] audit: type=1400 audit(1341.040:379): avc: denied { bind } for pid=10299 comm="syz.0.2410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1341.505273][ T30] audit: type=1400 audit(1341.050:380): avc: denied { name_bind } for pid=10299 comm="syz.0.2410" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1341.562214][ T30] audit: type=1400 audit(1341.060:381): avc: denied { node_bind } for pid=10299 comm="syz.0.2410" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1378.807283][T10369] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1381.037429][ T51] block nbd0: Receive control failed (result -107) [ 1381.170711][T10367] nbd0: detected capacity change from 0 to 67108884 [ 1381.197867][T10373] block nbd0: Dead connection, failed to find a fallback [ 1381.199636][T10373] block nbd0: shutting down sockets [ 1381.203121][T10373] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1381.205687][T10373] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1381.208485][T10373] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1381.208922][T10373] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1381.209532][T10373] nbd0: unable to read partition table [ 1382.446571][T10373] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1382.483894][T10373] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1382.501050][T10373] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1382.529388][T10373] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1382.535812][T10373] nbd0: unable to read partition table [ 1382.610740][T10373] I/O error, dev nbd0, sector 67108736 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1382.622499][T10373] I/O error, dev nbd0, sector 67108736 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1382.632823][T10373] Buffer I/O error on dev nbd0, logical block 8388592, async page read [ 1384.037491][T10386] netlink: 'syz.0.2431': attribute type 4 has an invalid length. [ 1384.038927][T10386] netlink: 17 bytes leftover after parsing attributes in process `syz.0.2431'. [ 1389.204601][ T30] audit: type=1400 audit(1387.541:382): avc: denied { shutdown } for pid=10416 comm="syz.1.2441" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1390.592652][ T30] audit: type=1400 audit(1388.841:383): avc: denied { listen } for pid=10416 comm="syz.1.2441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1392.239907][T10427] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2443'. [ 1392.242789][T10427] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2443'. [ 1405.811180][T10468] syzkaller1: entered promiscuous mode [ 1405.811634][T10468] syzkaller1: entered allmulticast mode [ 1409.799362][ T30] audit: type=1400 audit(1406.808:384): avc: denied { mounton } for pid=10485 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1410.284494][ T12] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1410.452416][ T12] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1410.626061][ T12] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1410.760663][ T12] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1414.802677][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1414.865759][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1414.916298][ T12] bond0 (unregistering): Released all slaves [ 1415.033923][ T30] audit: type=1400 audit(1411.709:385): avc: denied { read } for pid=3154 comm="dhcpcd" name="n26" dev="tmpfs" ino=3357 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1415.040025][ T30] audit: type=1400 audit(1411.709:386): avc: denied { open } for pid=3154 comm="dhcpcd" path="/run/udev/data/n26" dev="tmpfs" ino=3357 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1415.044176][ T30] audit: type=1400 audit(1411.709:387): avc: denied { getattr } for pid=3154 comm="dhcpcd" path="/run/udev/data/n26" dev="tmpfs" ino=3357 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1415.364693][ T12] hsr_slave_0: left promiscuous mode [ 1415.377741][ T12] hsr_slave_1: left promiscuous mode [ 1415.413370][ T12] veth1_macvtap: left promiscuous mode [ 1415.416081][ T12] veth0_macvtap: left promiscuous mode [ 1415.419070][ T12] veth1_vlan: left promiscuous mode [ 1415.420578][ T12] veth0_vlan: left promiscuous mode [ 1417.075204][T10518] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2467'. [ 1422.864573][ T30] audit: type=1400 audit(1419.023:388): avc: denied { create } for pid=10522 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1422.866568][ T30] audit: type=1400 audit(1419.023:389): avc: denied { write } for pid=10522 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=3361 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1422.877062][ T30] audit: type=1400 audit(1419.033:390): avc: denied { append } for pid=10522 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=3361 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1423.426925][ T30] audit: type=1400 audit(1419.547:391): avc: denied { unlink } for pid=10529 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3361 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1425.218740][T10485] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1425.280066][T10485] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1428.050719][T10485] hsr_slave_0: entered promiscuous mode [ 1428.069096][T10485] hsr_slave_1: entered promiscuous mode [ 1430.860207][T10485] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1430.893210][T10485] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1430.916330][T10485] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1430.965575][T10485] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1432.407070][T10485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1440.259087][T10485] veth0_vlan: entered promiscuous mode [ 1440.351169][T10485] veth1_vlan: entered promiscuous mode [ 1440.533527][T10485] veth0_macvtap: entered promiscuous mode [ 1440.571278][T10485] veth1_macvtap: entered promiscuous mode [ 1440.640063][T10654] block nbd0: shutting down sockets [ 1440.776749][T10485] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1440.777234][T10485] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1440.777424][T10485] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1440.777599][T10485] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1441.338601][T10679] lo: entered allmulticast mode [ 1441.356088][T10678] lo: left allmulticast mode [ 1445.223000][T10688] block nbd0: shutting down sockets [ 1446.340699][T10723] sctp: [Deprecated]: syz.1.2501 (pid 10723) Use of int in max_burst socket option. [ 1446.340699][T10723] Use struct sctp_assoc_value instead [ 1446.818474][ T30] audit: type=1400 audit(1441.414:392): avc: denied { getopt } for pid=10720 comm="syz.0.2500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1446.983104][T10721] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2500'. [ 1447.001205][T10721] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2500'. [ 1451.741855][ T30] audit: type=1400 audit(1446.025:393): avc: denied { relabelfrom } for pid=10754 comm="syz.0.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1451.747229][ T30] audit: type=1400 audit(1446.035:394): avc: denied { relabelto } for pid=10754 comm="syz.0.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1470.111543][T10780] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2525'. [ 1470.123557][T10780] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2525'. [ 1472.959528][T10815] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2535'. [ 1473.116426][T10817] xt_hashlimit: max too large, truncated to 1048576 [ 1475.221521][T10829] netlink: 'syz.0.2541': attribute type 27 has an invalid length. [ 1476.525985][T10839] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2545'. [ 1478.138076][T10852] netlink: 180 bytes leftover after parsing attributes in process `syz.0.2550'. [ 1478.138876][T10852] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2550'. [ 1478.139324][T10852] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2550'. [ 1478.139483][T10852] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2550'. [ 1478.238023][T10852] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 1487.732459][T10922] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2580'. [ 1510.342755][ T6728] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1510.554815][ T6728] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1510.798909][ T6728] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1511.297853][ T6728] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1515.601411][ T6728] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1515.684412][ T6728] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1515.750080][ T6728] bond0 (unregistering): Released all slaves [ 1516.073896][ T6728] hsr_slave_0: left promiscuous mode [ 1516.087981][ T6728] hsr_slave_1: left promiscuous mode [ 1516.154765][ T6728] veth1_macvtap: left promiscuous mode [ 1516.156508][ T6728] veth0_macvtap: left promiscuous mode [ 1516.158207][ T6728] veth1_vlan: left promiscuous mode [ 1516.159626][ T6728] veth0_vlan: left promiscuous mode [ 1523.175092][T11046] hsr0: entered promiscuous mode [ 1523.190246][T11046] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2613'. [ 1523.213014][T11046] hsr_slave_0: left promiscuous mode [ 1523.225376][T11046] hsr_slave_1: left promiscuous mode [ 1523.319622][T11046] hsr0 (unregistering): left promiscuous mode [ 1527.023149][T11022] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1527.055216][T11022] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1528.351862][ T30] audit: type=1400 audit(1517.688:395): avc: denied { setopt } for pid=11087 comm="syz.1.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1530.361990][T11022] hsr_slave_0: entered promiscuous mode [ 1530.388048][T11022] hsr_slave_1: entered promiscuous mode [ 1533.095827][T11022] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1533.169205][T11022] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1533.231780][T11022] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1533.319612][T11022] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1536.539621][T11022] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1538.443009][T11158] trusted_key: syz.1.2623 sent an empty control message without MSG_MORE. [ 1542.747185][T11022] veth0_vlan: entered promiscuous mode [ 1542.841505][T11022] veth1_vlan: entered promiscuous mode [ 1543.101190][T11022] veth0_macvtap: entered promiscuous mode [ 1543.132925][T11022] veth1_macvtap: entered promiscuous mode [ 1543.316511][T11022] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1543.318293][T11022] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1543.321804][T11022] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1543.322303][T11022] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1545.279663][T11209] block nbd0: shutting down sockets [ 1546.447369][T11219] block nbd0: shutting down sockets [ 1547.380046][T11228] netlink: 'syz.0.2639': attribute type 27 has an invalid length. [ 1547.636960][T11231] netlink: 'syz.0.2640': attribute type 10 has an invalid length. [ 1550.368108][T11244] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2646'. [ 1556.497744][T11285] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2659'. [ 1556.539315][T11285] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2659'. [ 1577.293727][ T30] audit: type=1400 audit(1563.462:396): avc: denied { write } for pid=11377 comm="syz.0.2690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1580.720247][ T30] audit: type=1400 audit(1566.660:397): avc: denied { getopt } for pid=11405 comm="syz.0.2704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1582.027513][T11415] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2709'. [ 1582.033013][T11416] fuse: Unknown parameter '0x0000000000000004' [ 1584.905609][ T30] audit: type=1400 audit(1570.589:398): avc: denied { listen } for pid=11441 comm="syz.0.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1587.024775][T11474] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2730'. [ 1589.225583][T11499] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2744'. [ 1589.298496][T11499] netlink: 'syz.0.2744': attribute type 2 has an invalid length. [ 1591.054692][T11511] [ 1591.055284][T11511] ====================================================== [ 1591.055560][T11511] WARNING: possible circular locking dependency detected [ 1591.055881][T11511] 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 Not tainted [ 1591.056145][T11511] ------------------------------------------------------ [ 1591.056598][T11511] syz.1.2749/11511 is trying to acquire lock: [ 1591.056930][T11511] ffff8000887e2a28 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1591.058199][T11511] [ 1591.058199][T11511] but task is already holding lock: [ 1591.058491][T11511] ffff00001292ad20 (&smc->clcsock_release_lock){+.+.}-{4:4}, at: smc_setsockopt+0xd8/0x9ac [ 1591.060412][T11511] [ 1591.060412][T11511] which lock already depends on the new lock. [ 1591.060412][T11511] [ 1591.060714][T11511] [ 1591.060714][T11511] the existing dependency chain (in reverse order) is: [ 1591.061057][T11511] [ 1591.061057][T11511] -> #2 (&smc->clcsock_release_lock){+.+.}-{4:4}: [ 1591.061637][T11511] __mutex_lock+0x144/0x9d8 [ 1591.061893][T11511] mutex_lock_nested+0x24/0x30 [ 1591.062121][T11511] smc_switch_to_fallback+0x34/0x804 [ 1591.062371][T11511] smc_sendmsg+0xe4/0x8f8 [ 1591.062580][T11511] __sock_sendmsg+0xc8/0x168 [ 1591.062799][T11511] __sys_sendto+0x1d8/0x26c [ 1591.063009][T11511] __arm64_sys_sendto+0xc0/0x134 [ 1591.063269][T11511] invoke_syscall+0x6c/0x258 [ 1591.063486][T11511] el0_svc_common.constprop.0+0xac/0x230 [ 1591.063720][T11511] do_el0_svc+0x40/0x58 [ 1591.063918][T11511] el0_svc+0x50/0x180 [ 1591.064116][T11511] el0t_64_sync_handler+0x10c/0x138 [ 1591.064353][T11511] el0t_64_sync+0x198/0x19c [ 1591.064636][T11511] [ 1591.064636][T11511] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 1591.065091][T11511] lock_sock_nested+0x38/0xe8 [ 1591.065317][T11511] sockopt_lock_sock+0x58/0x74 [ 1591.065541][T11511] do_ip_setsockopt+0xe0/0x2354 [ 1591.065758][T11511] ip_setsockopt+0x34/0x9c [ 1591.065967][T11511] sock_common_setsockopt+0x70/0xe0 [ 1591.066197][T11511] do_sock_setsockopt+0x17c/0x354 [ 1591.066414][T11511] __sys_setsockopt+0xcc/0x144 [ 1591.066627][T11511] __arm64_sys_setsockopt+0xa4/0x100 [ 1591.066853][T11511] invoke_syscall+0x6c/0x258 [ 1591.067080][T11511] el0_svc_common.constprop.0+0xac/0x230 [ 1591.067319][T11511] do_el0_svc+0x40/0x58 [ 1591.067511][T11511] el0_svc+0x50/0x180 [ 1591.067708][T11511] el0t_64_sync_handler+0x10c/0x138 [ 1591.067932][T11511] el0t_64_sync+0x198/0x19c [ 1591.068159][T11511] [ 1591.068159][T11511] -> #0 (rtnl_mutex){+.+.}-{4:4}: [ 1591.068580][T11511] __lock_acquire+0x15f4/0x2314 [ 1591.068802][T11511] lock_acquire+0x310/0x38c [ 1591.069006][T11511] __mutex_lock+0x144/0x9d8 [ 1591.069201][T11511] mutex_lock_nested+0x24/0x30 [ 1591.069518][T11511] rtnl_lock+0x1c/0x28 [ 1591.069971][T11511] do_ip_setsockopt+0xd8/0x2354 [ 1591.070230][T11511] ip_setsockopt+0x34/0x9c [ 1591.070556][T11511] tcp_setsockopt+0x90/0xcc [ 1591.070778][T11511] sock_common_setsockopt+0x70/0xe0 [ 1591.071008][T11511] smc_setsockopt+0x14c/0x9ac [ 1591.071264][T11511] do_sock_setsockopt+0x17c/0x354 [ 1591.071478][T11511] __sys_setsockopt+0xcc/0x144 [ 1591.071694][T11511] __arm64_sys_setsockopt+0xa4/0x100 [ 1591.071919][T11511] invoke_syscall+0x6c/0x258 [ 1591.072130][T11511] el0_svc_common.constprop.0+0xac/0x230 [ 1591.072367][T11511] do_el0_svc+0x40/0x58 [ 1591.072565][T11511] el0_svc+0x50/0x180 [ 1591.072760][T11511] el0t_64_sync_handler+0x10c/0x138 [ 1591.072981][T11511] el0t_64_sync+0x198/0x19c [ 1591.073212][T11511] [ 1591.073212][T11511] other info that might help us debug this: [ 1591.073212][T11511] [ 1591.073578][T11511] Chain exists of: [ 1591.073578][T11511] rtnl_mutex --> sk_lock-AF_INET --> &smc->clcsock_release_lock [ 1591.073578][T11511] [ 1591.074273][T11511] Possible unsafe locking scenario: [ 1591.074273][T11511] [ 1591.074523][T11511] CPU0 CPU1 [ 1591.074735][T11511] ---- ---- [ 1591.074951][T11511] lock(&smc->clcsock_release_lock); [ 1591.075313][T11511] lock(sk_lock-AF_INET); [ 1591.075676][T11511] lock(&smc->clcsock_release_lock); [ 1591.076046][T11511] lock(rtnl_mutex); [ 1591.076716][T11511] [ 1591.076716][T11511] *** DEADLOCK *** [ 1591.076716][T11511] [ 1591.077084][T11511] 1 lock held by syz.1.2749/11511: [ 1591.077331][T11511] #0: ffff00001292ad20 (&smc->clcsock_release_lock){+.+.}-{4:4}, at: smc_setsockopt+0xd8/0x9ac [ 1591.078024][T11511] [ 1591.078024][T11511] stack backtrace: [ 1591.078320][T11511] CPU: 0 UID: 0 PID: 11511 Comm: syz.1.2749 Not tainted 6.14.0-syzkaller-13423-ga8662bcd2ff1 #0 PREEMPT [ 1591.078713][T11511] Hardware name: linux,dummy-virt (DT) [ 1591.078917][T11511] Call trace: [ 1591.079070][T11511] show_stack+0x18/0x24 (C) [ 1591.079257][T11511] dump_stack_lvl+0xa4/0xf4 [ 1591.079427][T11511] dump_stack+0x1c/0x28 [ 1591.079592][T11511] print_circular_bug+0x28c/0x370 [ 1591.079776][T11511] check_noncircular+0x168/0x17c [ 1591.080011][T11511] __lock_acquire+0x15f4/0x2314 [ 1591.080344][T11511] lock_acquire+0x310/0x38c [ 1591.080713][T11511] __mutex_lock+0x144/0x9d8 [ 1591.080970][T11511] mutex_lock_nested+0x24/0x30 [ 1591.081194][T11511] rtnl_lock+0x1c/0x28 [ 1591.081493][T11511] do_ip_setsockopt+0xd8/0x2354 [ 1591.081718][T11511] ip_setsockopt+0x34/0x9c [ 1591.081885][T11511] tcp_setsockopt+0x90/0xcc [ 1591.082059][T11511] sock_common_setsockopt+0x70/0xe0 [ 1591.082251][T11511] smc_setsockopt+0x14c/0x9ac [ 1591.082425][T11511] do_sock_setsockopt+0x17c/0x354 [ 1591.082597][T11511] __sys_setsockopt+0xcc/0x144 [ 1591.082773][T11511] __arm64_sys_setsockopt+0xa4/0x100 [ 1591.082955][T11511] invoke_syscall+0x6c/0x258 [ 1591.083152][T11511] el0_svc_common.constprop.0+0xac/0x230 [ 1591.083337][T11511] do_el0_svc+0x40/0x58 [ 1591.083504][T11511] el0_svc+0x50/0x180 [ 1591.083656][T11511] el0t_64_sync_handler+0x10c/0x138 [ 1591.083834][T11511] el0t_64_sync+0x198/0x19c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1591.946299][ T6728] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1592.086757][ T6728] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1592.212533][ T6728] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1592.348824][ T6728] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1594.740177][ T6728] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1594.815421][ T6728] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1594.894521][ T6728] bond0 (unregistering): Released all slaves [ 1595.052483][ T6728] veth1_macvtap: left promiscuous mode [ 1595.053575][ T6728] veth0_macvtap: left promiscuous mode [ 1595.064615][ T6728] veth1_vlan: left promiscuous mode [ 1595.067086][ T6728] veth0_vlan: left promiscuous mode [ 1601.390694][ T6728] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1601.558443][ T6728] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1601.704334][ T6728] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1601.861197][ T6728] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1604.127572][ T6728] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1604.197990][ T6728] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1604.240739][ T6728] bond0 (unregistering): Released all slaves [ 1604.378396][ T6728] hsr_slave_0: left promiscuous mode [ 1604.380988][ T6728] hsr_slave_1: left promiscuous mode [ 1604.390542][ T6728] veth1_macvtap: left promiscuous mode [ 1604.391024][ T6728] veth0_macvtap: left promiscuous mode [ 1604.391725][ T6728] veth1_vlan: left promiscuous mode [ 1604.393447][ T6728] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 14:18:59 Registers: info registers vcpu 0 CPU#0 PC=ffff80008098dc10 X00=0000000000000001 X01=0000000000000010 X02=0000000000000001 X03=ffff800080344f6c X04=ffff7000144f6e0d X05=ffff8000a27b7058 X06=ffff7000144f6e0b X07=0000000000000002 X08=ffff8000a27b7067 X09=dfff800000000000 X10=ffff7000144f6e0c X11=1ffff000144f6e0c X12=ffff7000144f6e0d X13=00000000fffffffd X14=000000000000000f X15=0000000000000002 X16=0000000000000000 X17=0000000000000000 X18=00000000000007ab X19=0000000000000010 X20=ffff800080344f6c X21=ffff800087261df8 X22=ffff8000a27b7058 X23=ffff8000a27b7020 X24=ffff8000871e5250 X25=ffff80008724ea40 X26=40000000ffffecd2 X27=ffff800087261df0 X28=1ffff00010e4c3be X29=ffff8000a27b6e70 X30=ffff80008098dc10 SP=ffff8000a27b6e70 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffdc109170:2d38f80627449200 Q02=0000ffffdc109150:ffffff80ffffffd8 Q03=0000ffffdc109200:0000ffffdc109200 Q04=0000ffffdc109200:0000ffffa8936e08 Q05=0000ffffdc1091d0:0000ffffdc109200 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdc109420:0000ffffdc109420 Q17=ffffff80ffffffd0:0000ffffdc1093f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854416f4 X00=ffff8000854416f0 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001be3791 X04=dfff800000000000 X05=1fffe00001be3791 X06=0000000041b58ab3 X07=1ffff00011a80ff4 X08=ffff80008d0f9ac3 X09=dfff800000000000 X10=ffff00006a0cc14c X11=1ffff00011a1f358 X12=ffff700011a1f359 X13=000000000c520832 X14=0000475b940003e8 X15=0000000000000000 X16=ffff80008d400000 X17=ffff7fffe309e000 X18=ffff8000a292712c X19=ffff8000872d05f0 X20=ffff00000df1bc80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000872d05c0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000872d05f0 X28=ffff8000854db7e0 X29=ffff80008d407de0 X30=ffff800080428c5c SP=ffff80008d407de0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffdc109170:2d38f80627449200 Q02=0000ffffdc109150:ffffff80ffffffd8 Q03=0000ffffdc109200:0000ffffdc109200 Q04=0000ffffdc109200:0000ffffa8936e08 Q05=0000ffffdc1091d0:0000ffffdc109200 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdc109420:0000ffffdc109420 Q17=ffffff80ffffffd0:0000ffffdc1093f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000