last executing test programs: 57m51.899671047s ago: executing program 1 (id=108): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x26, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x4, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@ccm_128={{0x303}, "4eff51afaef09474", "d373a417660000000000000021000008", "e8b29a2c", "662e229672253891"}, 0x28) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0xfdef}], 0x1) 57m39.952335043s ago: executing program 1 (id=110): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(r3, 0x4b45, 0x0) 57m29.630237943s ago: executing program 1 (id=113): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x20, 0xa, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES16=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = dup(0xffffffffffffffff) socket$nl_sock_diag(0x10, 0x3, 0x4) write$binfmt_aout(r3, 0x0, 0xfffffeb7) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000380)=0x5) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) futex(0x0, 0x8, 0x2, 0x0, &(0x7f0000000480)=0x2, 0x80000) mount$tmpfs(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='quo']) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1e, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @sk_lookup}, 0x94) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r7 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020033797a30000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) 57m19.162744248s ago: executing program 1 (id=115): prlimit64(0x0, 0x4, &(0x7f0000000140)={0x200, 0x8b}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0x800fa11, 0xffffffff}, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x275a, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) socket$inet6_mptcp(0xa, 0x1, 0x106) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x4048010) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) 57m10.472199142s ago: executing program 1 (id=118): socket$netlink(0x10, 0x3, 0x10) socket$inet6(0xa, 0x80002, 0x88) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000003c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f0000000040)={0x28, 0x7, r1, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r1, 0x0, 0xffffffffffffffff, 0x1}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x40001e0, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x3ba0, &(0x7f0000000200)={0x48, 0x7, r2, 0x0, 0x10001, 0x0, 0x6, 0xa9613, 0x313829, 0x2838310000000000}) openat(0xffffffffffffff9c, 0x0, 0x193042, 0x0) r6 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) r8 = openat$cgroup_subtree(r7, 0x0, 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000480), 0x0) 57m0.111018823s ago: executing program 1 (id=121): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r3) r4 = epoll_create(0x3ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000240)={0xa0000000}) 56m14.576595485s ago: executing program 32 (id=121): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r3) r4 = epoll_create(0x3ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000240)={0xa0000000}) 11.487082941s ago: executing program 0 (id=5366): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) sendto$l2tp6(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$NL80211_CMD_SET_QOS_MAP(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20048010}, 0x40) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffeca}, 0x1, 0x0, 0x0, 0x480c0}, 0x8000) 10.254014801s ago: executing program 2 (id=5368): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x1, {0x1, 0x0, 0x3}, 0xff}, 0x18) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x1e}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x8080) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x14, 0x0, 0x4f9bc1daaf4b2926, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x4080) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, 0x3, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x81) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0008253e0000fb27df2701000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 8.682432013s ago: executing program 0 (id=5369): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f00000000c0)) r1 = openat$uinput(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000400)=0xfff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r4 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x230300) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$dma_heap(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r4) socket$nl_audit(0x10, 0x3, 0x9) setreuid(0x0, 0xee00) sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1401008c868779b834a969f00045e27418bb51c5702e1d0617869041386fabb8fc2d619fc4f88feef52340f63e553f60ba00b18ee0ec82c65bb351c357a29bfc37a7616a6f003a6d18fcbe9c26a82987721c7063289e4fea32028a9cb900acbd398e8b3a4237f8188ae49ccd0bf4473bf4f539b23830886961a4098b40cb579af0d21b36ff956ace2b44ada81f7695bab14b3d50facfe4435c736065acc1e6be5369685335a8a4c49205f2d67091d56a54bb68c1b99f36638c7b7aba55c4ae4b232f443be0", @ANYRES16=0x0, @ANYBLOB="200028bd7000ffdbdf2506000000"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0xc004040) chroot(&(0x7f00000000c0)='./file0\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) syz_fuse_handle_req(r3, &(0x7f0000004140)="d93720db4195e1a34be0ad2f56793935d453c377b35280952f39a19a1c8aacd2cc08dadc1451ecf3ea5602c4fa11e48f06f5c22319277e0ecdb53e2eda975d8b0c0703a4299a9ea93c68dafd02607b4a3fe826919b5010e88399105cacd421aa27d0544308c67ddcc8ff8517d764ffdad87a0dbe21d14a2503d0e96b506de87ea8c0540d52272460cdacaa16211442539f7fe78e5bb111ee23ff07f71a84f64490211f584aebce5979ffc51196826d5688fd197222f5b5b97cff2009a2845c699caa42420e8cea4ea07953369cd8e1f641273236d745f419b4d9922155209b212331da3aa5f73672aa21bb2d574372fa957b3a287d6ebe921bef5b55428bfd6460032889d75a3ee4018353773d52124165020d2eb95dd39e04b2a74886ab6fffd382297d01fb2cb60a978968975d54c66c3912fb40a0e8aa264da07aa9be4f0e01b94446266c4521aa9bbfd034e158a7c7a20a2ba328cc054088bd3f88cc921fecb6e81d83cf43616a7240f76ef1da19cfec4207aa8998417e7dc568719ca154ae9bb38ad2fadddaa995de3a7073c53bcb05a4a13e0ad1d4ffdef949549081819986e07d150e5a000e0fe4d80544732dd3cfe0c9922f4f1773a55c5957e4788eb54d9299456b2c67d353fcd06a8ee6c679013ecbbc9690a22483bd7201c6582d97c1064beadceb37fa5ecbcce3589e1981e0ab13a5a1c9d4433ed3ad5aa23c38e5ec3628c75801d783ac39db125db8d9b6179ec9fa898140c07e30ba85b7e570c5ea1e8cab93586bb5f21918bda1fc4e3966276b736ab987fedca531c81ec0d1b833db24f54751d2d0c28ba9afd26e570cd35a02a4ccdcf9f8ff3a637befb831dee77d4cc084cc17e6eeb813b9c2016672b02e9c6f0364729b0b0c5d821bc4a621a9c95658967c83978042c07a562ca74971bfcdb25109aa90e7c3b8d1ceffd243cfa9cd3bdcb40e3cdadcfcaad0dac169c0187cce25f7de991f6c90ac27ee9bfd2713e88f100b1716f8bd33bd56be5109c20bb36a8f913037bcbe4c3e530d8e87ce0f90f2e0f75d4ece99de86441af8ad7f4f61fcfbcb0f370255e651d99c2f3ba139f6fe73fa43d3084f6930c7f8c436ff5e591d7c117dd7a4b6db5f6ec75484f859ac56e5d721b914b4cc9266ad2797f721f6d2a0ac0c4547136f3959c21f7f13a1cc62a9dc64a9b90afd753b18554cf35c5892b4da6cc12c17ce35ac37cf5b355d325de3b1dd7c4c7777b58e301e33ec1637a99423d1c98e363fbf28c1d4e99c2d2f979cba6f092574a4bad6e231df33a509f74140a3d038fbec7ec9642d618eb8e539f872b3464fb8f79a2975c6744dfa4cf607e2f497f91965c83cf0c77752dd9b4b12876150d916da828640be87402ebd7228518995dc612ed05faa6decbc4ddeae47693ac515f62fc0038ed9942c6f4d9bc4b5f73c4818ee6f08c6b37e8efd647057fbd91e1bdb5b2bc4076fff1b6bcc254d8a6ee92f61a74da856ae11c898a3c44ae3e4d1d375216a46354055c3c41642e687fca57686b592eb9444e89e420bd2bdd7a76a1113f7c7d77244002b26466d2c7d20a27d67649fb174fe42821c23b1938b5e19fa07292bed86eee6f9ff58bcdf23715cac06fc2f9bfef5085279c1ca0200d8c3e2a6f3e0bb77fa3b1007a0995124b94baf563dc27aa79a65bb589a51481311655ce2aabfec217101bc915cb215f16bb380b233e7535b54aef19abbd1c31fc9e3500dd227caa36377a5ef4d9fb085226c5d3798f6462d616751978753efabe90ad79cdc85fc06f4dfab89002fb7f2fa2189cec8fdc0d6d2a83df9aa2a4fd3f1d11944c2bf49c92f73970acb8a673595f88bab87821a5f05971204fbdc3065a167a6631ffd0cfa5f701d7c0332557b1ba18f20b37478d5bd0e6554b6f73944d6ca3f550dfaace341c437003f079dcc0eaac0f764d16307ade63a2125ba686f5028f2e6972c9875abfda0dc3aa0c2116202d0d66798f2410be640a5553d9400dd8510799963dcc296ec29484b61770e4520d752e04da3dbf60ddcdc6a4976b5ce7356accc79dbd0f48ec114ea4f2cb5d53e7d2a1757f6bc7ca65eeeee3f63f36db72af868c117718f41c428444ff494e857198fccfbe89e8cffa5d587ea59208e47e002f16fd8770d950c5a8ec894927b2105c41aa5e92a68829791c2f8a16a3949da8168f173864a20a389f0b20c446aebea7e0cffaf114182513256de11c8866e0f652d0ec2d8e745c6cf76232dbafa7dc9d5337fa87ae61bbefb2a4b9c90403198bfe1b7035169e97eb2ef7bac31801ee32dc415c06062d0c19c70960377ea2a851b2229d8d306c95106477245d758808a993440834687739543a08484a7e23678f141adce3397ceab56e83cc490a6530cc60c84f721aa342f351b08391e795633cf19b7bfe8dc2233234a96c796584bdaba4c7eedda1277aae5c57eda8acfd046a75604dee4a275a6b6abcd63d54f1abe272703c00d79e1ba85f3464fcd58cbfe0d6f8872e3d99c06456fd80e126b3e9e1dc46b1773dcc9eda7acd7dba6f7d703b08307c75a2b2413f443d7e90c1dbafb0d68bb4dc8353cba5e5bb3d1d527baf9bda6d7a21288e7719ed106633435e3a6a85c743c243f38dc4d2365ce16c5d21aa55a30869c5992a5be2ae13d96b2caff60bca18dd5faa6e329dc3f4e9e029963a6ec0edff0d4f9da8c27d7cc987076d50d9e3d88dd6a18ce4de277d8e73efee3aa97413ae2b7a4ef9875f6ffa04872572b65ba828c42fd23614d22809b5be5a91ac0b96839e5e2346e3cb8d448c93a4d98a07dbf6dce164459deb30518bf4b3272e7e4f499d7b253e486878f3d8d9fa7ad404946e9cbe31bfcf43fce405a5f93588a04c656faa32a05e66a5595ed301dde5a126469f0b679708fe58edd86c2eb6b97a03c0b019eddd7f6d88db1e475021b0879c344018a130233a7ca57c448b263cf802cdc09f965fead4f48ba2d4049c6b88f752f112dbcf8882b26f27b15e5971834ec4ab94c936b15b8f74a38cb96344a445aee1ff02467b6cb4c76df8c4b68523028d7f59d30d4dbe984b989ed1870a59b202072252c306b38a0530780dc031c6015702230e744701032d36507d417293fbb21fe75a01ae3128640d1e03138e2680bec75c0af12ddf95300ba3f126e2f8019ca09a67ea5053f30bf724e5670c17851c537201c8bcb248a5e9849e467b26a2a7b0c6cf6f4690b2e72740591e85b0e7cdeb876390338b8cf74946726a0dd8226718b29d8450e2089cfeb21ff37961afb408c24dac407567ce728607d37e9847a4e82ac84a256d1625d812a1c581fe65e66baa741bed0977c1a728370da67908ea6bec47f5845fd1da0862b4eb94e2b724fcc18732bd1973e92301a33aa022fa7c913a7f43f43f15eef223c7b193c129f861232e4683fa0d86a31db99b4239ff85d14b0fb8b87adbfab7383aabe4748aea807e4c3fe37ce6cd536ad283878598455a9ff7d0baa3f27f7a57fac2f47afdc14b4a334cafb21a8380ad141eeda6f3e069359e98c522c97559a1de5ff7d0f71edc4e433a57dd2d7a035485cf4ad4a55bbdd056dfe03a30bc85c7cf47ba8ed4de220fc056cea68ab77e5cc30f6a2de9abfdbdbd88725b8542b593d81e65945bb0b53bf9815fee368520939ba9fb55588c956d07db9770c6e3b325bd2641cdd1e5201d6910b2ae50feffd28d85ca166cf2949d5a335fd9fd7d77906dbfade2ee6884ae8ca66c39a920ad0a309a8ccb2956306458902116074c4541c85ca4b3e3ba968f17feb17d1a2436424578393ff56a0112635180f0af89db2e33e6935507b025779aea9dbd067edecbd49634ebc77c0d6c4dd4c295dc0e8eb1c44406c64a33ea23c6a93c3a2895fc23cb4f773a29efb05d90beb96479888c55639931e024733a4c32dc576d6e52142b38d8a9b9d2fe312f0159ede1d25df20114b7955c3bb78ecc54add0f357670d031931dbb640f4b57c017e97e71a97c571605125faeca107f8beeb58079b90e6a6cabb1677210c5b2d2659d552fa2daa15faa7b17061abfea725b49dd016a078517c285cf47592bbff7cafa16595884f48e11346b1e4588a083d9dceecd146b3ea0a6b87d049f71b1222ed8864c697e2ccfdb9fc3c7f22187e10a91598e479d25d1546e4fc68dbe56ec94d5bc792e246e817d7769f166104853e405b08b246a2022bda6f9c3f739c6d6d2f3a7f870ee183a76978ec00c43d94aefafe468f0f1021fc74770142db7e5967bae852291ab9c3e56f00a1229b12eea414b8b6fb2c9635f0b5d32175f5be4a04fb572368258a4ed72d4d3494637c8d6ee4c6d4bf35c8c494ac4d2da1864786ad0f41d362d1cf07d60dacd9779c3ef8b8b120b27aab34d9805df829db55e6a691740e118cf542b4f6b28c0d860d4aae677e2702dcfd822fe5457c66dc2f8c457715eede8cac7837a936b731c297927c463b463c1d03d502485b41306dd2063780afe9543f96da9c086fffe3910f2314a382dbbee9f72b7e66e90f44b9049f1059a819ec8ca7af8f836704c6d188e94e7f8bebacc682c4c46de1fde391ab0e5ec89e2a488639e70fc1d9cd5e04c4122903d958d3a03419121e3424a23231289634d010f582c440d87e91286abbe95a86481927f2765f6d0f3c2e9ef60b33ad763035055840c64ada2c841adad19b7d5924a2b86da236f15ee50c0914a0a1cfba62317aa2d33de78d08ab6287618bba0e3fe9496a695f059a475d37c6c937e9dfa77215aa3af6f0a862c23e1c9d15921982e8e17c63a1208b9da06c5f0bc72c4bf855600950cf0ea6e77a91b81e6aebe0e35809464599bf916984ecf8268813a3faee2260c3e28545637e463de165dac512e8b784e5163da5471ee710ffec3c496e78d5c5ec941d2616286960f0a7bbc4d4f778309cf5091ba7e05b7a598d7865ee10e1813515dba5e7b4a3e23c1ba33bec878b0b8f3a13e17b59aa07452fe645069c4e2f7b82f106dc1a6093d45abf393f4a68f57f6521662f639d8136914823c393e0cae4bd3784e6b2bda5671fc8ebc68b3dc7aee2d876a48c205a4e7df8ea786f124f6c83baa8b85df819e8ee366eb5507809a1e36fd3f17facb562dfe511b9183b62852312eaf947fe6a61dc168de4602910c6d12ce15e35e3b4125b5f9714ea1c49a1fdfff7a8ead500b288549b30bf2a1f4f198393432498334e65e198f0352b6c181491859f166e64846570dc551b909d1bf8bc15935ba82183c81c6c49210a347a37db3467c32c7d1e3a8aa3c7957ba2c37eb3f27b928f45908cfd22dab3c604dd053ca2425f122e11fc09cea1344d0e850a28240128e501b4425333dbd5dbba9269d62c516b4d3b16783489c7e25b2816a6f167ffeb6f19a8636b18e15926f5ad1ee4a4dd242a7f1a2fdfc7bfbf40b75da981a566d4965f50657e8179e0d3b40185f29a5061ea351e60970cb3d142c28375a5d8dced003a5b01846b4ed6460acdf2cbde7529da68aecd562d3ae10aa1c1e2325f09884df99e0f4246b2f9b879d711ab49757910c54f8fa48439dd47ce70935cd4f3b1ff85a28232b6ccbb51fd5d36a69c4eb5abf9cef8642172399f94cb2daed8d2d6ed279c6e35284e7ac5db840ca12ed7d168454725e19f552aad7de59ab368e4d42238444a8672f937aedc61c2159b6d1d4aada07c6de08ae40a1bae8ca696273f5748a6259ff4bcc39510e11a5f8ba25766c6779f07761c936ac0d0d01f1d4b488c3d2742c1a3029da837cc33dd1780695c5fc1542830006989b3faa62a9c8538ae840c8285cde8a13085cd295f695a0ab6d27b03a16b1904fc62fe25776df3fa792f54f4a5ad98f1f0be45848c81e34d70d4850a4ac3a5a7dbc56fff68eb4212bb1109f6f129c12babef6ef9671901c73da50966fb18d1f0c1575cbf985fd5a5c36f33386a1ce35c2ca4422b3c0522fbcbd873d8f0f80734b4f3e0bd1aa80beb6b1ec9a40a2d39adac14b7de089820c1314ef3b2fc2988778b9cbca0fe0f64cb858a90a6bcf67961644f6bd5825c43c9d4d4b0a8e5c7321346edf5f56558c00550891392055e15a6402220301235ac8593dbbe26f1f5105d50b1199d2fe2d74a78ea8e83fb409716c7d508ac1476d067c5aa77b1f689488e406bb6702648aa1faeecdcce8702f3d66e66c927487cfba756c070065126f225afc58fe54d50923f1c7b14ce478d40f4bf9eccc441c8c931359f97898e6d8fe42a175546ec8c6d52672947e0233c1cccad78d44494361f6c81c530e9bea0e911d30998f0aeddeda8269e1a87e86509a5a4c2ed5f49e8b1bfdae1cfda352dee261ea029f80418e2232616e9f8443fce5d3f82e6bc8b8fc1e65419dc2fd1451e445f6e06ea3d12206ecadf4e45f9bf1340e162be57ea63787580c50a452af6d3b12fe4e2b8aa861e435f7766f35fa272841094149c81a40e7bff1f7177c38787b53b1b4fcf18e50c89ad3049f35f306fe628d4bdbacc07c44f8fc0006023407b4484ad6fbc15094b02a009f50e34efc0e75ab23dcc1b8355f4cd5f693aaf01e6fde20ce36fbd7fac42e00ce6100b0dfa974680dfef60ffa7f905840a2c345410abc5907edbd18d01556e6ce2593c910b282be64b225e6ce5b9b2388d602023959680981f0ee1296ecdf08e57c6a797421997a022e869f8e8a48a91a1bbe30169f608a2e854bd4de33adf2fe67577de2feee46424a679f7666307ab2134bbe9e79a12af724f97dda27d075e00cd59a260ca33be676df34ee96e13d436395edbafe4a83e1246b7b0194bd4c40d74521e52f06572102ecddd71da2bc35057eb66e7278801512f349d9f798ac8c38ba4fd2523d9f2f9586749b64dc8a0e3461cd7b7fb82e575bbba20c359ca2076cd669cb1ef83f082f21868c31fd750a2dac5670317c550a79324db88b68dd0f16e98c4b83710024d059569f5402eae23e8052b5b4b48502e0fc2483a20e38417f57cdb7ae870ce3c8352b1f4c6ffd61ed8e2751f5b93e266617b087c94a68ef704731409f3fd49bf677bdcc0c58e6094a8fd99cce1df278570390c37f51faf6fe93923f62984d5672a2d867f18ca76b964e2f7c259f639ab1122e749dd9c4f9b4470d8b68502f6f40685b74a24323837cf7e32b433c3ccbf064be0e70ffc2e5c2eae587154a7958d6c3f696fe42da49e4292404461908f7a1437b000a7f115cba487a9b426aa6ebdecbf0673e39356f894c0b3417491d0dd266a97b8711d16e6ed053028995e414d602f3296542ed46591c44a5dd1c466a92d8826bc12973e44028d37fb13bbe9ed2947334787c60f48b4f61089e3425fd165eaa1e3a2707891732875018420060afa179687c9e0f3f43b45e81fff95e07a518c9db494d0e4e453b8a35c7a0dd1ae81f4c0fd49f40fc9a6165a01ec00e0a97cd7282fb0c264709fa6e8310372bf06f66fd0f53d7919cba43d59cfcbb9f3b148b73edbdd75acdfe5f5fe2ffe40416c097e18a0fc0619bfbb78066f372d21f5d52fe4753ab29a0edf66b05c5bd3e6a5190f248561919dea3f20185e89f79fea4aaa12a44f14041a0620b23f28d5c535f40bae130843125a879e7f33d6c61cbe55ba51837b3194245237317d8532f94ed06543f5cc55535045b8b514c0d76097f520387e7b182c48c7b0173ac353d48566fafa00e7e5f7962f79645f73150d1921b6d6bcd240898aedb21b4453d63ba838bf90efbc5363beae5ad0609469a5b1c51aeae051fa57b16ad7f7c7a3f018e292ca5fbd9be583cfa9babbbb21caa574d35d8d778b1ae56e627ace9121fe5de64ed6dc684e5ee65c85baf2237953a0ced94eaa01e8c1911f487fb8324089f687040aac05dbb39475b26b1549c3d0a6b2d701fabd478b0d2e22cf720a6c80dc8971b1f0a9f39b4732fc7923a23b736966ee1537199511018723632631d36f6eca17c1192b6ec5cd68fd0de31c256270d668db457bbf57de66cb5054f446cdba23440cf485c5b379639284fb653141e20f8ab14c43f1faa181feae3a09cc6654ccc76e901c9c2fa67eeb17f488db52cde8cd26fba1f20db19c1dd92d9b09d1d2e9c8383aca4029492e5b91039fe624b35212c068120cd33a40b3ee7369bed5a705e0f7b13f0f266ff985a535d99c0a99366ab9767254da39964cd1a5df670bb7cebc06a5054d8a63aa5472f4a1d381cfc3d0e0ca8ee8c6f06974facc76538f6eaad66fc673f2dcc5cc65309fa7c821045813a1cf30d6b0a7e83e65b78f47957f28a7a80f34a14754b3347cd16e1b4d2a596099d1a17c681be6d9e4aa3724ea8a6fd6cf1a7492bedca5b47d22f1fbd710a77146acf6a11b95b36eeb2dd15c76ce7a54817c4181c90799ded1cf8c1168b39f5338822f485fc258ca42e1474927f6fb0ebf46bde59fe4e0b216fcb4015c40af76da02ef309039bc9fad472d5e9088b1f47b4a03e50458392a9d1cf4612690289429bbb60be45d9b658d1e88c2df6383c766b6246760238ff968f344311f6d9c3619763c573b7f27b99cdff92d6090003164ca5e684c60690fb13118f46424e98592b37755d715416c7fc758881f29f87371d086d24c759eb4455b50eff93123b5b150186e5a9e20945d0833a7d1039712736f5b266a7041a2ea20e959ed0a5286352f9a5f96b5b72df30df35c693379304d02200052b491a1dc18239ad5b953ae70c0f33623de25256cbf637bf25e24b21d4c78ba4591481e8424f1a1f329958c5f3ec3cc8ee72a6950dc2c1cfdf2354143e285ca9f82bec1fdf51ccab28ee51035c8dbcef7170843e858d01360266860800571a4fe0936ba82b97c8fcf76f19d49f6f95bc37b23997f8153c22b49d43598af71797547e02050f24fdaa4defe4513aab82f18e2223e2372cfaa95ec24fac636025bfdba5a4fbe25bb4beb596d272d06bc5c19e88e323d4c3afac75ded11b05cf3a0aef570e2700fad7d4b714cc8db83ed5a1c8d398d37bf1a3686ff122b76f06f4ece5413c5da26944e31177e5088e5b4255ff0cd2358b997f511bbc6593b3a6d14b3411a3a22a4e1751c3d0459fadbeae6f0bc399c7e526ba309708fc374e4c3dffbf03355b5147794704a71d6714e2329523dcfbdd6137c87212bc13d9b83d00b11422ba73abee769374762df22f55efde6766ca37c351a07552255a42aba6b9aab9ccb8576da44a7341797af0d86b68d3ab17821e86405e34e49cb73198b78b2536d49f5590ba2cc75ba9d0cb7b7f7c13bce023301a84b67d1afddad8bd1904803f9a4392ae7742bfb35530f0da566a295ba5a0786db745bd4ad5de86120fbc0b453131b4f21bd519aefe216cd7658d80e3a6afdf0f8c28ce0df38a38f0ffb5d7dac8692808be0299423253b91a347aabdf60db0a5c35404ee4148d31ae75e0095b8f07e6471be0c19fb41591cb290342a04ad89f17b3d00af14a0763a71ae376c9f707ee7cf3254e42d2641239d531e7e1c94805df8bc58a8075ce535cc648da9a3e0a9decf6d699173b1f65d25e366b0c8701eb53e0b509ca077bfd142f5a1b2782838bbafcfffb0b8c0d6751de09f68d0b23834ea46370568c9a4fb7630fc1e82dffc56da06090ce3d61aa1dd5807a98dc6aac17518a0cebb0bd0ff4d828743fa9ff0381e730df6c6b0137667a0875f1c4d8c820b0ae44253a5e3047f4a64bbcc64dcb1035b43c2c63a97df5a8cbf3be7ec92ac92e3d8ab7f257ab63eefde2ffe5abbf040d3776bef144c5e372f044fafdaba0540368615c92dfb61a3ff45651835bbd6610f4f6e5b7875d9c74367e913fb2dca9f6c755a070d01a600633f399af71d99aef87871ebdd8c0a27dbbab4961ca83df205c9440658ad3192dc116281e26eb6f236fd701667d5dae9f1c48e66c7396366b48f2557dcfd30ca4a96a7daf292c3a6b3278d910a728bcc39e66dec14969b1742d960307c45bb38fdec8f9c26775cbc7ec671873f4af31eaf9339de30b60fc3613724de2171ae81d86949c534f169b8ee5fe8318a2ec64e3b690da09e0c355225c8205c6adacde1f25c242aa1b456d6b23f0bda02b369bb0c751623fe4d40c6e6999d9e494423481ce01c85dd45ae4f6f6993388bdd32bdf01b9c22215c644ba8b517498ca02dee7f32fde3d8f591896c21cb68c82b90d84694ffbf2fcc875abce3ecbc33d9a6c58807cb0c2f3a5f77f107653c1dca780ee861799498e8165c2be957ba9f6c8bf57549674b389d341e2b99fc7931ea40793d9a17604298220af7254eb8e972cd28ea877d8ed52bab1162de7a66a0e9afd10e649b5554f41df0a7623c3e1744f439f39685de6afc65dd6c37069681afd30e476c09142c8460191526ddde6c651767ac59371a881f757d3cf2bae6d48ea781e89931b9e3ea3f65097b006fe15b61cbefede125e949abf541d670f122eff8be716b2cd662d69ead1dc797d58efe39aab72af7e610452746cff38d63b8eb217b4fc66de320aebac6e02e149f197b1ab53544162c22597ad7499f7bd75d0307ce75ce5f3b606b009c7dae85615bccaadb3cf261549be0cfe29e8faa175403342384b3efb79ecbdd4350ac768ab6d40957dd185fc4509938f9d387c86c06ed93baf9b4f931f53ded6aa431531a64a39e4fbe92b25d2c28f9314a5570b72ec33a0080d3ab68bc9fcb1786ccd5876856fa1310480f8272ee931679195e19ba116ccfe4b82c928698fe6b96b03d5f33b332bf2fb9fdfb82e386a716853d35a4374f092c2ab00e43fb8639fc525a87d41548e2289074345ca780e29c871c1ae27d27abb25dc9f5cc7460fedea216fd36ee28f69b00f7535dbf931d638f4ed710720cd94de10938ac2018888df4d1aee5676d09e4999b92d48a579916d86faebdefb9562e32e4a43857ab90af69ebd6b22ae50a1a99f8f0ffc731b2db79889824b587b75043265fa1dca7b68c2c2df36b774b5103a149bcfd4d1b3cbce3e4f257f981f973693a8120c4d4d1aefad1451c24dc12fdf798c23786c7498c6faa2b46057bd4d4be51d219a373a6153711a490c588c2085befdaa31c17cc1efc08e341e065e27489ec987a994aceffc0d3ed764606e2195bf3553fbab72a0583396f49743c7059371a3083a4fe7dcc553e26a871503990a9b99539ff0cf90866b90b6183e65756c3f5c9387aa83854c8b5335fd6a71b32383c34f22241cd25d538989d19ec7052a41523d7bdd8a834315dab3c27d9b92274fb9148119d458b38eba62d8cf955a326437f7d13ff61142748410a2fbba9341f58ddfdd45cfd77106b1ec6bae9666537705bd79e645f7a735f07865e603ed2583936a4c92377ba099fd6de8cf29b1761846a6bb803fb6ad1830e6d72beb73d89956ceaab9c2e711ac22e5823e341e14d33093d382344f811c105e7e0e0a8d73602edb2e9860235cf5e65a7c4f91d85f8038ea6706f68688576bfb75b4832fad45e4d31a3832e56b83cdacb09f10097028de8931d155b6b68adae12d7c3fb030b9436697ce648d33d0c6ce9d281e11d4c126634f50693b5edee21526b96f69f565668b7cb811151a2d27f44cca69bc36edab2cdf09de88d53246c5bcfd91c2a409f98075e64ff2d716701e28b30f5e3e2834f8cce5b8", 0x2000, &(0x7f00000008c0)={&(0x7f0000000340)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x7fff, 0x2061890e}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 7.876514516s ago: executing program 2 (id=5370): r0 = syz_open_dev$hiddev(&(0x7f0000000100), 0x200, 0x400800) r1 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x25, 0x4, @void}, 0x10) fcntl$dupfd(r0, 0x80c, r1) r2 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x280202, 0x0) close(r2) socket$inet_smc(0x2b, 0x1, 0x0) getsockname$inet6(r2, 0x0, &(0x7f0000000140)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x0, 0x722a91845c720dd2, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0xc044) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000002500), 0x81002, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f00000003c0)=""/40, &(0x7f0000000400)=0x28) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000680)={0x14, 0x0, 0x20, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0xc800) r6 = dup(r4) ioctl$SOUND_MIXER_READ_RECSRC(r6, 0x80044dff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r6, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) r9 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000000)={0x1d, r10, 0x2, {0x2}}, 0x18) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r7, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x98, r8, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r10}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x20, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x1e}}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x98}}, 0x80) 7.705406293s ago: executing program 0 (id=5371): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x4, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/mnt\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r3}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48080}, 0x18010) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_MPATH(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r5, 0x300, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1aa, 0x47}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x40}}, 0x1) (async) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), r0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$selinux_status(0xffffff9c, &(0x7f0000000540), 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000400), 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0xb0, r6, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffd}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x26}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x40, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r7}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r8}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r9}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r11}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x91}, 0x48081) (async) r12 = socket$nl_generic(0x10, 0x3, 0x10) (async) r13 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000700), r11) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r12, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x68, r13, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x2}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x48, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xe}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004001}, 0x20004081) (async) r14 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000880), r4) sendmsg$SEG6_CMD_SET_TUNSRC(r11, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x70, r14, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x17b}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7f}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x70}, 0x1, 0x0, 0x0, 0x8040}, 0x0) r15 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), r11) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000a40)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000c40)={&(0x7f00000009c0), 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x164, r15, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x114, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf03e}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'nbd\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'mptcp_pm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfc4}]}]}, @ETHTOOL_A_BITSET_MASK={0x9f, 0x5, "35008e199e75b878bedb1658018ad0495b15cffab6a5b27dd483591cb647f53c33b8a26e0554a1e0b8e6de8b5df4704e9ce13c26e6867ac12e88aced9e5980948529f7e966969c1a1bbd43f044adc6489659611ff5949a5b503d610fb0212e8781d8925c439ff4585e77270733282b9edff48e226632cfe8b30affa6c71018d7327dd8a939b2cb24c339a195df020d58aec276e974a7a23f684ff1"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x27d1e49e}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_VALUE={0x28, 0x4, "626c31299e0d44d1f65abdd0c1d26edce794f3f46180e6a7c1d06995516c19a31fa1eb2d"}]}, @ETHTOOL_A_FEATURES_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x24000080}, 0x80) (async) fsetxattr$trusted_overlay_redirect(r10, &(0x7f0000000c80), &(0x7f0000000cc0)='./file0\x00', 0x8, 0x5) (async) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r11, 0xc01064bd, &(0x7f0000000d80)={&(0x7f0000000d00)="199e8082077344d9e33cbbee0c3b02ed6843d44b2f70b10404a229a8ac67f22c4ae8a2b3fa905d333f50882b971a4205e1902c3c40b28a7197065cee5762ad7956827c7f6dd3233992e87d93cea8", 0x4e, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r11, 0xc01064ac, &(0x7f0000000e00)={r17, 0x1d, &(0x7f0000000dc0)=""/29}) r18 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r19 = syz_genetlink_get_family_id$nfc(&(0x7f0000000e80), r0) ioctl$IOCTL_GET_NCIDEV_IDX(r11, 0x0, &(0x7f0000000ec0)=0x0) sendmsg$NFC_CMD_LLC_SDREQ(r18, &(0x7f0000001040)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001000)={&(0x7f0000000f00)={0xfc, r19, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_LLC_SDP={0x90, 0x13, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [{0x5, 0x1, '-'}, {0x9, 0x1, '(-%^,'}]}, {0x60, 0x0, 0x0, 0x1, [{0xe, 0x1, '[/^*!:&:{,'}, {0x7, 0x1, '#$#'}, {0xa, 0x1, '\xff\xff\xff\xff\xff\xff'}, {0x9, 0x1, '\xf4$\xad{-'}, {0x5, 0x1, '\x00'}, {0x14, 0x1, '/selinux/status\x00'}, {0xd, 0x1, 'nl802154\x00'}]}, {0x14, 0x0, 0x0, 0x1, [{0x5, 0x1, ':'}, {0x6, 0x1, '{:'}]}]}, @NFC_ATTR_LLC_SDP={0x50, 0x13, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [{0xb, 0x1, '#}\xbf,)@^'}, {0x4}, {0xd, 0x1, 'mptcp_pm\x00'}, {0x4}, {0x4}, {0x7, 0x1, '-!\x1d'}, {0x8, 0x1, ')\\\x84*'}, {0x4}, {0xb, 0x1, '&([(^>('}]}]}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r20}]}, 0xfc}, 0x1, 0x0, 0x0, 0x10}, 0x80c0) 7.378027946s ago: executing program 2 (id=5372): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, 0x0, 0x40) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x8800}, 0x4804) close_range(r0, r0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/cgroup', 0x0, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 6.980771132s ago: executing program 2 (id=5373): ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82187202, &(0x7f0000000000)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f00000002c0)={0x4, 0x50, '\x00', 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x15, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @exit, @map_fd={0x18, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000400)=""/247, 0x41100, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x10, 0x5, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000580)=[0xffffffffffffffff], &(0x7f00000005c0)=[{0x4, 0x2, 0x5, 0x2}, {0x0, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x3}], 0x10, 0x9}, 0x94) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000006c0)) fcntl$getflags(0xffffffffffffffff, 0x401) write(0xffffffffffffffff, &(0x7f00000008c0)="7a22e674f2791b1d0da932bec4ebd513031c28fb22db9d2cb3f176b44aa35e5291fe78c51af083b1e6ee19aca54a73a7ac2362061f00", 0x36) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000940), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x28, r2, 0xf2f7b8dd9528c37e, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x73}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x20000000) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r4, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x18, 0x140c, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) listen(r4, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14, r5, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40040080}, 0x4000080) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000e00)={&(0x7f0000000cc0), 0xc, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x88, r2, 0x800, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xd8, 0xa}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x88}, 0x1, 0x0, 0x0, 0x41}, 0x0) r6 = openat$fuse(0xffffff9c, &(0x7f0000000e40), 0x2, 0x0) write$FUSE_DIRENT(r6, &(0x7f0000000e80)={0x70, 0x0, 0x0, [{0x4, 0x9, 0x1, 0x400, '+'}, {0x2, 0x9, 0x1, 0x4, '\x00'}, {0x3, 0x3, 0x8, 0x8f19, 'ethtool\x00'}]}, 0x70) r7 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={0x1, 0x58, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route_sched_retired(r7, &(0x7f00000014c0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001480)={&(0x7f0000001000)=@delchain={0x470, 0x65, 0x100, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x0, 0xfff3}, {0xfff3, 0xfff3}, {0x2, 0xffe0}}, [@f_tcindex={{0xc}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8, 0x1, 0x3d55}]}}, @f_tcindex={{0xc}, {0x428, 0x2, [@TCA_TCINDEX_SHIFT={0x8, 0x3, 0x8}, @TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_POLICE={0x414, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x6, 0x7fffffff, 0x7fff, 0x80000001, 0x9, 0x5, 0x8, 0x7ff, 0x2, 0xfffffff9, 0xdfe, 0xfffffffb, 0xfe9b, 0xd, 0x9, 0x7fffffff, 0x92, 0x9, 0x7ff, 0x4, 0x3, 0xfffffffd, 0x3ca7, 0x1, 0x3, 0x3, 0x1, 0x80, 0x4, 0x8000, 0x7, 0x8, 0x81, 0x3, 0xffffffdd, 0x9, 0x3, 0xffffffff, 0x6, 0x8, 0x80000000, 0x3, 0x80000000, 0x1, 0x8, 0x7, 0x5, 0x7f, 0x2, 0x81, 0xf8dc, 0xfffffff2, 0x8, 0x4, 0x7, 0x4, 0x2, 0x8000, 0x10001, 0x3, 0x7, 0xb, 0x5, 0x0, 0xf031591, 0x7, 0x80b, 0x6, 0x7ff, 0x8, 0xb, 0x1, 0x3, 0xc, 0x9, 0x10, 0xecee, 0x8001, 0xbaa, 0x1ff, 0x8, 0x5, 0x0, 0xc, 0xfff, 0x2, 0x4, 0xd87, 0x5, 0x4, 0x81, 0x4, 0x6c000000, 0xfff, 0x5, 0x3, 0x7ff, 0x101, 0x3, 0xffff, 0xe1, 0x3, 0xb82, 0x0, 0x1, 0x9, 0x7, 0x3, 0x1, 0x80000001, 0x5, 0x80000000, 0x1, 0x100, 0x3, 0x2a3, 0x5, 0xb7, 0x8, 0x5, 0x1, 0xfffffff9, 0x5, 0xb, 0x7, 0xc, 0xffff79ec, 0x6, 0x9, 0x7, 0xfffffffa, 0x1, 0x6, 0x5d1, 0x7, 0x0, 0x5, 0x3, 0x71e2e36c, 0xc, 0x6, 0xe, 0x7f43, 0x8001, 0x5, 0x6, 0x6, 0xb, 0x3, 0x3, 0x7, 0x1, 0x3, 0x3, 0xc7, 0x4a1, 0x6, 0x6f8e, 0x0, 0x4e, 0x9, 0x6, 0x2, 0x1, 0x40, 0x6, 0x3, 0x1, 0x5, 0x8, 0xd, 0xc, 0x6, 0x0, 0xd2, 0x1, 0x7, 0x3, 0xff, 0x1, 0xffffff00, 0x5, 0xd4, 0xef5, 0x4, 0x2, 0xfff, 0x26, 0x9, 0x9, 0x2, 0x10001, 0x8, 0x1, 0x10, 0x9, 0xc, 0x2, 0x4, 0x800, 0x5, 0x9, 0x7f, 0x100, 0x3, 0x7fff, 0xfffffc00, 0x80000000, 0x5, 0x7, 0x3, 0x9d1c, 0x687, 0x7, 0x8000, 0x6, 0x0, 0x1, 0x7fffffff, 0x8, 0xfffffff7, 0xfffffe01, 0x3ff, 0x1, 0x2, 0x3, 0xa000000, 0x7, 0xffffc62e, 0x8, 0x6, 0x0, 0x2d, 0xd, 0x3, 0x7, 0xc, 0x9, 0xc0000000, 0x2, 0x0, 0xff, 0x9, 0x5, 0x1ff, 0xc, 0x4, 0x4, 0xe8, 0x4, 0x8, 0xc, 0x5, 0xfff, 0x7f]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6}]}]}}]}, 0x470}, 0x1, 0x0, 0x0, 0x800}, 0x40040) r9 = socket$inet6(0xa, 0xa, 0x2) r10 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$nl_route_sched_retired(r7, &(0x7f0000001700)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x84a}, 0xc, &(0x7f00000016c0)={&(0x7f0000001540)=@newtclass={0x14c, 0x28, 0x400, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xffff, 0x4}, {0xfff2, 0xfff2}, {0x8, 0x8}}, [@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_MASK={0x5, 0x4, 0xf}}}, @c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_MASK={0x5, 0x4, 0x3}}}, @c_atm={{0x8}, {0xc, 0x2, [@TCA_ATM_EXCESS={0x8, 0x4, {0xfff2, 0xe}}]}}, @c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x5, 0x5, 0x6}}}, @c_atm={{0x8}, {0xac, 0x2, [@TCA_ATM_HDR={0x2a, 0x3, "38c76dac73a801a1c35596751c75ed03b39b476edd4b93bcb1d7de9a21dfa37c89f05115a826"}, @TCA_ATM_EXCESS={0x8, 0x4, {0xffff, 0xfff2}}, @TCA_ATM_FD={0x8, 0x1, r9}, @TCA_ATM_FD={0x8, 0x1, r7}, @TCA_ATM_HDR={0x12, 0x3, "d9a8d043b5f3fda0ff3b29915383"}, @TCA_ATM_FD={0x8, 0x1, r1}, @TCA_ATM_FD={0x8, 0x1, r10}, @TCA_ATM_FD={0x8, 0x1, r7}, @TCA_ATM_HDR={0x36, 0x3, "0d704f104e75d161b69f5813e0353b741cd9ea54e7edf9ed7047d6e8418402cb3e561f8698b15e6e9c788af6bd6d5d9fe435"}]}}, @c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_MASK={0x5, 0x4, 0xff}}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x24040021}, 0x4008490) ioctl$BTRFS_IOC_ADD_DEV(r7, 0x5000940a, &(0x7f0000001740)={{r7}, "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"}) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000002740)) memfd_create(&(0x7f0000002780)='ethtool\x00', 0x0) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000002a80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002a40)={&(0x7f0000002800)={0x234, r2, 0x1, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x9, 0x7c}}}}, [@NL80211_ATTR_IE_ASSOC_RESP={0x199, 0x80, [@mesh_id={0x72, 0x6}, @ssid={0x0, 0x20, @random="4ff6df8a774ac006ed5590e809d3bd8a2501b16ac79223983a0c5827cbf6ebd5"}, @sec_chan_ofs={0x3e, 0x1}, @random={0x0, 0xca, "8fb273d259926a662d4adfc165204c689a13417b87ba987ba98db8a79142ac0ed32de05275c6e69afb5c3f19ec53b67269c6436acf4a4148ea4223378ad8eeb9832087f369239f21f60b9aa16a4e8bbf0c8f77c706e47f8ed9785d2cd4ccf88c05a43e249f54acb5e9e32538489f6ca0e6c62509945a4b40f1c02d1f2188d1f70fbab8345ed2a2d2757fefa846acbbf88328969b87a66a0af8c1f7234be786d0c3393fcaa97d4dd009a602987d01dd055f67356cd12562c1752f433185b92e9a2ad3a22c206aa4277148"}, @random_vendor={0xdd, 0x9a, "513a0a6b331b94eebd308bf01980dda0b5aae9a01997fddbc985ef5e41f588a53e1cde03505ef1c22037cfb5c93827c41dde39a2a1ed91a3db92895a5a4bb5893ca5476b516755d17a4495f480261d2c31132646fe610993655c5f3956266dab99dd5c508827fee1c26c9728ba2abcc45a82e6f79a016a2377600b7fb8dc27e42c471c64e9f4d6870686bb8287e737cdd22e866db7e4cded7b86"}]}, @NL80211_ATTR_FTM_RESPONDER={0x78, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x71, 0x2, "a10268ac2cf6223e7884a1d79e83baf7c61e99cfdea432402ea3aefa2c01b1125050700a44c41449950f4e79b55fcd92aa38c98882502cb112385bbeec5a1e094796746ab7e3516f67b9a2e50f11a8a2c7a52f1a09f0a87247ca7b8c9804f95cd21b1bbfc96c6f0c5bd53a7af8"}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x20040804}, 0x40081) mlockall(0x3) mq_open(&(0x7f0000002ac0)='+', 0x1, 0x1, &(0x7f0000002b00)={0x8, 0x7, 0x2, 0x40}) 4.143189105s ago: executing program 0 (id=5374): r0 = socket(0x22, 0x5, 0x80000000) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x33fe0}}, 0x48041) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000580)={0x0, 0x4a, &(0x7f0000000180)={0x0, 0x43}, 0x1, 0x0, 0x0, 0x2040080}, 0x81) close_range(r0, r0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000000300)={0x1, 0xfffffffc, {0x0}, {0xee01}, 0x78, 0x5}) timer_create(0x4, &(0x7f00000000c0)={0x0, 0x21, 0x2, @tid=r1}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 3.321186928s ago: executing program 0 (id=5375): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f00000000c0)) r1 = openat$uinput(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000400)=0xfff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r4 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x230300) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$dma_heap(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r4) socket$nl_audit(0x10, 0x3, 0x9) setreuid(0x0, 0xee00) sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1401008c868779b834a969f00045e27418bb51c5702e1d0617869041386fabb8fc2d619fc4f88feef52340f63e553f60ba00b18ee0ec82c65bb351c357a29bfc37a7616a6f003a6d18fcbe9c26a82987721c7063289e4fea32028a9cb900acbd398e8b3a4237f8188ae49ccd0bf4473bf4f539b23830886961a4098b40cb579af0d21b36ff956ace2b44ada81f7695bab14b3d50facfe4435c736065acc1e6be5369685335a8a4c49205f2d67091d56a54bb68c1b99f36638c7b7aba55c4ae4b232f443be0", @ANYRES16=0x0, @ANYBLOB="200028bd7000ffdbdf2506000000"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0xc004040) chroot(&(0x7f00000000c0)='./file0\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) 402.890364ms ago: executing program 0 (id=5376): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x26, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = signalfd(r3, &(0x7f0000000040)={[0x3, 0x4]}, 0x8) r5 = openat(r4, &(0x7f0000000100)='./file0\x00', 0x42, 0x1ff) write$FUSE_NOTIFY_INVAL_INODE(r5, 0x0, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r6 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$TCGETA(r6, 0x5450, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x4, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@ccm_128={{0x303}, "4eff51afaef09474", "d373a417660000000000000021000008", "e8b29a2c", "662e229672253800"}, 0x28) r7 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x280202, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/psched\x00') write$selinux_context(r8, 0x0, 0x0) close(r7) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r7, 0xc01064bd, &(0x7f0000001340)={&(0x7f0000000c80)="4fd2", 0x2, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r7, 0xc01064ac, &(0x7f0000000100)={r9, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r4, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[r9], 0x1, 0x80000}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0xcc, 0x0, r5, 0xfffffffb, '\x00', 0x0, r5, 0x4, 0x5, 0x3}, 0x50) 305.004138ms ago: executing program 2 (id=5377): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, 0x0, 0x40) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x8800}, 0x4804) close_range(r0, r0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/cgroup', 0x0, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 0s ago: executing program 2 (id=5378): write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='FROZEN\x00', 0x7) r0 = socket$xdp(0x2c, 0x3, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) (async, rerun: 64) r1 = openat$binderfs(0xffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x4, 0x0) (rerun: 64) mmap$binder(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x1, 0x11, r1, 0xffffff9e) (async, rerun: 32) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) (rerun: 32) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x6, 0x210840) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0186415, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x8, 0x4}) (async) r3 = syz_open_dev$audion(&(0x7f0000000180), 0x3, 0x40081) r4 = openat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) (async, rerun: 64) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) (async, rerun: 64) r5 = socket(0x27, 0x80000, 0x1b4) readv(r5, &(0x7f0000000440)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/144, 0x90}], 0x4) (async) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f00000004c0)={r6, 0x1}) (async) sendmsg$IPCTNL_MSG_CT_GET_STATS(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x5, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24008840}, 0x44080) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000680)=[0x0, 0x0]}) (rerun: 64) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000700)={r7, r8, 0x4, 0x0, 0x6}) (async, rerun: 32) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) (async, rerun: 32) write$P9_RSTAT(r3, &(0x7f0000000740)={0x68, 0x7d, 0x2, {0x0, 0x61, 0x4, 0x4, {0x40, 0x1, 0x3}, 0x980000, 0x3ff, 0x1, 0x400, 0x8, '%\xc2\xee,$\n&\\', 0x13, './binderfs/binder1\x00', 0x7, '{*]$\\@&', 0xc, ']!\'.!}(&+/$-'}}, 0x68) (async) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0086401, &(0x7f00000008c0)={0xce, &(0x7f00000007c0)=""/206}) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r3}, 0x8) ioctl$TIOCL_PASTESEL(r9, 0x541c, &(0x7f0000000940)) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000009c0)={&(0x7f0000000980)=[0x0, 0x0], 0x2}) (async, rerun: 64) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000a00)=r3) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) ioctl$FIONCLEX(r4, 0x5450) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000a40)={0x2}) kernel console output (not intermixed with test programs): Not tainted syzkaller #0 PREEMPT [ 3671.919451][T24161] Hardware name: ARM-Versatile Express [ 3671.919486][T24161] Call trace: [ 3671.919553][T24161] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3671.919775][T24161] r7:ead59e20 r6:00000000 r5:60070113 r4:82260bc4 [ 3671.919839][T24161] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3671.920045][T24161] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3671.920109][T24161] r5:838e8c00 r4:8294f190 [ 3671.920127][T24161] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3671.920400][T24161] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3671.920513][T24161] r8:04008010 r7:ead59e20 r6:20000400 r5:00000000 r4:ead59f20 [ 3671.920861][T24161] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3671.920960][T24161] [<80972e40>] (should_fail_usercopy) from [<81546e6c>] (copy_msghdr_from_user+0x50/0x130) [ 3671.921089][T24161] [<81546e1c>] (copy_msghdr_from_user) from [<81546fc4>] (___sys_sendmsg+0x78/0xd0) [ 3671.921255][T24161] r8:04008010 r7:00000000 r6:837d4f00 r5:ead59f20 r4:ead59e64 [ 3671.921378][T24161] [<81546f4c>] (___sys_sendmsg) from [<81547480>] (__sys_sendmsg+0x8c/0xe0) [ 3671.921807][T24161] r10:00000128 r9:838e8c00 r8:8564af00 r7:04008010 r6:20000400 r5:8564af01 [ 3671.921986][T24161] r4:00000003 [ 3671.922080][T24161] [<815473f4>] (__sys_sendmsg) from [<815474e8>] (sys_sendmsg+0x14/0x18) [ 3671.922152][T24161] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 3671.922174][T24161] [<815474d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3671.922229][T24161] Exception stack(0xead59fa8 to 0xead59ff0) [ 3671.922276][T24161] 9fa0: 00000000 00000000 00000003 20000400 04008010 00000000 [ 3671.922312][T24161] 9fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3671.922338][T24161] 9fe0: 76f4cec0 76f4ceb0 0001948c 001322a0 [ 3672.793834][T24173] fuse: Bad value for 'rootmode' [ 3673.066704][T24176] fuse: Unknown parameter '0x0000000000000003' [ 3675.062706][T24194] fuse: Bad value for 'rootmode' [ 3675.265824][T24196] FAULT_INJECTION: forcing a failure. [ 3675.265824][T24196] name failslab, interval 1, probability 0, space 0, times 0 [ 3675.266238][T24196] CPU: 1 UID: 0 PID: 24196 Comm: syz.0.5037 Not tainted syzkaller #0 PREEMPT [ 3675.266330][T24196] Hardware name: ARM-Versatile Express [ 3675.266361][T24196] Call trace: [ 3675.266404][T24196] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3675.266515][T24196] r7:00000c40 r6:00000000 r5:60000013 r4:82260bc4 [ 3675.266535][T24196] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3675.266701][T24196] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3675.266882][T24196] r5:838ee000 r4:82917c00 [ 3675.267053][T24196] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3675.267166][T24196] [<80972c00>] (should_fail_ex) from [<8051f300>] (should_failslab+0x6c/0x94) [ 3675.267384][T24196] r8:838ee000 r7:00000c40 r6:855d9328 r5:00001000 r4:830016c0 [ 3675.267524][T24196] [<8051f294>] (should_failslab) from [<80503c90>] (__kmalloc_noprof+0x9c/0x458) [ 3675.267729][T24196] [<80503bf4>] (__kmalloc_noprof) from [<807c3794>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3675.267817][T24196] r10:838ee000 r9:83318400 r8:00000000 r7:852bd908 r6:855d9328 r5:00001000 [ 3675.267838][T24196] r4:00000000 [ 3675.267855][T24196] [<807c3758>] (tomoyo_realpath_from_path) from [<807bf8d8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3675.268278][T24196] r10:838ee000 r9:00000000 r8:855d9300 r7:80284504 r6:00000004 r5:81cd6504 [ 3675.268343][T24196] r4:855d9328 r3:826c0200 [ 3675.268509][T24196] [<807bf80c>] (tomoyo_path_number_perm) from [<807c41b8>] (tomoyo_file_ioctl+0x1c/0x20) [ 3675.268673][T24196] r9:00000003 r8:855d9300 r7:00000000 r6:00000000 r5:80284504 r4:855d9300 [ 3675.268876][T24196] [<807c419c>] (tomoyo_file_ioctl) from [<80770a0c>] (security_file_ioctl+0x64/0x1e4) [ 3675.268979][T24196] [<807709a8>] (security_file_ioctl) from [<8056cdf8>] (sys_ioctl+0x4c/0xba0) [ 3675.269185][T24196] r7:00000000 r6:855d9301 r5:00000000 r4:80284504 [ 3675.269501][T24196] [<8056cdac>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3675.269563][T24196] Exception stack(0xead91fa8 to 0xead91ff0) [ 3675.269667][T24196] 1fa0: 00000000 00000000 00000003 80284504 00000000 00000000 [ 3675.269933][T24196] 1fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f1b0bc [ 3675.269974][T24196] 1fe0: 76f1aec0 76f1aeb0 0001948c 001322a0 [ 3675.270036][T24196] r10:00000036 r9:838ee000 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 3675.270065][T24196] r4:00000000 [ 3675.271673][T24196] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3675.598706][T24198] fuse: Unknown parameter '0x0000000000000003' [ 3675.867726][T24201] fuse: Invalid rootmode [ 3676.327633][ T31] kauditd_printk_skb: 510 callbacks suppressed [ 3676.328115][ T31] audit: type=1400 audit(3676.236:62466): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.332581][ T31] audit: type=1400 audit(3676.236:62467): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.345983][ T31] audit: type=1400 audit(3676.256:62468): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.355788][ T31] audit: type=1400 audit(3676.266:62469): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.358295][ T31] audit: type=1400 audit(3676.266:62470): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.382399][ T31] audit: type=1400 audit(3676.276:62471): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.382674][ T31] audit: type=1400 audit(3676.286:62472): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3676.406386][ T31] audit: type=1400 audit(3676.316:62473): avc: denied { create } for pid=24206 comm="syz.0.5042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3676.409006][ T31] audit: type=1400 audit(3676.316:62474): avc: denied { module_request } for pid=24206 comm="syz.0.5042" kmod="net-pf-10-proto-3-type-2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3676.568110][ T31] audit: type=1400 audit(3676.476:62475): avc: denied { module_request } for pid=24206 comm="syz.0.5042" kmod="net-pf-10-proto-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3676.812551][T24207] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24207 comm=syz.0.5042 [ 3676.833461][T24212] fuse: Unknown parameter '0x0000000000000003' [ 3676.977376][T24214] fuse: Invalid rootmode [ 3678.484978][T24224] FAULT_INJECTION: forcing a failure. [ 3678.484978][T24224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3678.485466][T24224] CPU: 1 UID: 0 PID: 24224 Comm: syz.2.5048 Not tainted syzkaller #0 PREEMPT [ 3678.485572][T24224] Hardware name: ARM-Versatile Express [ 3678.485606][T24224] Call trace: [ 3678.485657][T24224] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3678.485819][T24224] r7:b5403587 r6:00000000 r5:60000013 r4:82260bc4 [ 3678.486497][T24224] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3678.486643][T24224] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3678.486810][T24224] r5:85cb6000 r4:8294f190 [ 3678.486836][T24224] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3678.486908][T24224] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3678.486976][T24224] r8:00000000 r7:b5403587 r6:76f4cbb8 r5:00000000 r4:eada9fb0 [ 3678.486994][T24224] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3678.487056][T24224] [<80972e40>] (should_fail_usercopy) from [<8022b3c4>] (restore_sigframe+0x94/0x210) [ 3678.487116][T24224] [<8022b330>] (restore_sigframe) from [<8022b7a8>] (sys_rt_sigreturn+0x44/0x74) [ 3678.487180][T24224] r7:000000ad r6:00130250 r5:76f4cb38 r4:eada9fb0 [ 3678.487289][T24224] [<8022b764>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3678.487353][T24224] Exception stack(0xeada9fa8 to 0xeada9ff0) [ 3678.487591][T24224] 9fa0: 00000000 00000000 000001bf 76f4cb38 76f4cbb8 00000000 [ 3678.487671][T24224] 9fc0: 00000000 00000000 00130250 000000ad 002f0000 00000000 00006364 76f4d0bc [ 3678.487706][T24224] 9fe0: 76f4cec0 76f4cb38 0015ac30 000ef4e8 [ 3678.487736][T24224] r5:00000000 r4:00000000 [ 3678.719265][T24228] fuse: Unknown parameter '0x0000000000000003' [ 3680.181515][T24240] fuse: Unknown parameter 'fd0x0000000000000003' [ 3681.140771][T24246] fuse: Bad value for 'rootmode' [ 3681.332837][ T31] kauditd_printk_skb: 195 callbacks suppressed [ 3681.333245][ T31] audit: type=1400 audit(3681.236:62671): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3681.449456][ T31] audit: type=1400 audit(3681.356:62672): avc: denied { append } for pid=24247 comm="syz.2.5058" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3681.455986][ T31] audit: type=1400 audit(3681.366:62673): avc: denied { append open } for pid=24247 comm="syz.2.5058" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3681.472631][ T31] audit: type=1400 audit(3681.376:62674): avc: denied { ioctl } for pid=24247 comm="syz.2.5058" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x542d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3681.483843][ T31] audit: type=1400 audit(3681.396:62675): avc: denied { read write } for pid=24247 comm="syz.2.5058" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3681.490087][ T31] audit: type=1400 audit(3681.396:62676): avc: denied { read open } for pid=24247 comm="syz.2.5058" path="/dev/ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3681.501023][ T31] audit: type=1400 audit(3681.406:62677): avc: denied { ioctl } for pid=24247 comm="syz.2.5058" path="/dev/ttyprintk" dev="devtmpfs" ino=609 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3681.541835][ T31] audit: type=1400 audit(3681.446:62678): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3681.547082][ T31] audit: type=1400 audit(3681.446:62679): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3681.559159][ T31] audit: type=1400 audit(3681.466:62680): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3681.786518][T24252] fuse: Unknown parameter 'fd0x0000000000000003' [ 3682.168529][T24256] fuse: Bad value for 'rootmode' [ 3683.645388][T24263] FAULT_INJECTION: forcing a failure. [ 3683.645388][T24263] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3683.647524][T24263] CPU: 1 UID: 0 PID: 24263 Comm: syz.2.5064 Not tainted syzkaller #0 PREEMPT [ 3683.647669][T24263] Hardware name: ARM-Versatile Express [ 3683.647911][T24263] Call trace: [ 3683.647973][T24263] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3683.648196][T24263] r7:00006364 r6:00000000 r5:60000013 r4:82260bc4 [ 3683.648221][T24263] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3683.648338][T24263] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3683.648404][T24263] r5:85cb0c00 r4:8294f190 [ 3683.648478][T24263] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3683.648559][T24263] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3683.648633][T24263] r8:00000000 r7:00006364 r6:76f4d0bc r5:85cb1430 r4:76f4cbb8 [ 3683.648655][T24263] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3683.648732][T24263] [<80972e40>] (should_fail_usercopy) from [<8022b624>] (setup_sigframe+0xe4/0x1c4) [ 3683.648809][T24263] [<8022b540>] (setup_sigframe) from [<8022bbcc>] (do_work_pending+0x3f4/0x4f8) [ 3683.648888][T24263] r10:b5403587 r9:76f4cbb8 r8:00000000 r7:85cb1430 r6:76f4cb38 r5:eadcdfb0 [ 3683.648938][T24263] r4:85cb0c00 [ 3683.648957][T24263] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3683.649017][T24263] Exception stack(0xeadcdfb0 to 0xeadcdff8) [ 3683.649060][T24263] dfa0: 00000003 20000380 04044010 00000000 [ 3683.649096][T24263] dfc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3683.649128][T24263] dfe0: 76f4cec0 76f4ceb0 0001948c 0013229c 60000010 000001dd [ 3683.649162][T24263] r10:000000ad r9:85cb0c00 r8:00000000 r7:000000ad r6:00130250 r5:00000000 [ 3683.649182][T24263] r4:00000000 [ 3683.902750][T24266] fuse: Unknown parameter 'fd0x0000000000000003' [ 3684.173440][T24269] fuse: Unknown parameter 'use00000000000000000000' [ 3686.966734][ T31] kauditd_printk_skb: 175 callbacks suppressed [ 3686.967155][ T31] audit: type=1400 audit(3686.856:62856): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3686.967385][ T31] audit: type=1400 audit(3686.856:62857): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.011260][ T31] audit: type=1400 audit(3686.916:62858): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.019163][ T31] audit: type=1400 audit(3686.926:62859): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.050149][ T31] audit: type=1400 audit(3686.956:62860): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.074563][ T31] audit: type=1400 audit(3686.986:62861): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.077804][ T31] audit: type=1400 audit(3686.986:62862): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.118857][ T31] audit: type=1400 audit(3687.026:62863): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.133175][ T31] audit: type=1400 audit(3687.036:62864): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3687.218277][ T31] audit: type=1400 audit(3687.126:62865): avc: denied { read write } for pid=24284 comm="syz.0.5072" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3687.228054][T24285] fuse: Unknown parameter 'use00000000000000000000' [ 3687.868678][T24294] FAULT_INJECTION: forcing a failure. [ 3687.868678][T24294] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3687.871852][T24294] CPU: 1 UID: 0 PID: 24294 Comm: syz.2.5076 Not tainted syzkaller #0 PREEMPT [ 3687.872066][T24294] Hardware name: ARM-Versatile Express [ 3687.872102][T24294] Call trace: [ 3687.872148][T24294] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3687.872281][T24294] r7:eadf5e20 r6:00000000 r5:60000013 r4:82260bc4 [ 3687.872303][T24294] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3687.872479][T24294] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3687.872543][T24294] r5:838eb000 r4:8294f190 [ 3687.872561][T24294] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3687.872621][T24294] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3687.872683][T24294] r8:20054187 r7:eadf5e20 r6:20000400 r5:00000000 r4:eadf5f20 [ 3687.872701][T24294] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3687.872773][T24294] [<80972e40>] (should_fail_usercopy) from [<81546e6c>] (copy_msghdr_from_user+0x50/0x130) [ 3687.872829][T24294] [<81546e1c>] (copy_msghdr_from_user) from [<81546fc4>] (___sys_sendmsg+0x78/0xd0) [ 3687.873072][T24294] r8:20054187 r7:00000000 r6:837d5400 r5:eadf5f20 r4:eadf5e64 [ 3687.873098][T24294] [<81546f4c>] (___sys_sendmsg) from [<81547480>] (__sys_sendmsg+0x8c/0xe0) [ 3687.873162][T24294] r10:00000128 r9:838eb000 r8:855d9300 r7:20054187 r6:20000400 r5:855d9301 [ 3687.873181][T24294] r4:00000004 [ 3687.873203][T24294] [<815473f4>] (__sys_sendmsg) from [<815474e8>] (sys_sendmsg+0x14/0x18) [ 3687.873260][T24294] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 3687.873279][T24294] [<815474d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3687.873331][T24294] Exception stack(0xeadf5fa8 to 0xeadf5ff0) [ 3687.873371][T24294] 5fa0: 00000000 00000000 00000004 20000400 20054187 00000000 [ 3687.873405][T24294] 5fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3687.873430][T24294] 5fe0: 76f4cec0 76f4ceb0 0001948c 001322a0 [ 3688.176540][T24296] fuse: Unknown parameter 'use00000000000000000000' [ 3691.127256][T24312] fuse: Unknown parameter 'user_i00000000000000000000' [ 3691.366994][T24314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24314 comm=syz.2.5083 [ 3691.578887][T24318] fuse: Unknown parameter 'fd0x0000000000000003' [ 3692.038799][ T31] kauditd_printk_skb: 176 callbacks suppressed [ 3692.039241][ T31] audit: type=1400 audit(3691.946:63042): avc: denied { read append } for pid=24315 comm="syz.0.5084" name="ubi_ctrl" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3692.053160][ T31] audit: type=1400 audit(3691.956:63043): avc: denied { read open } for pid=24315 comm="syz.0.5084" path="/dev/ubi_ctrl" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3692.060434][ T31] audit: type=1400 audit(3691.966:63044): avc: denied { write } for pid=24315 comm="syz.0.5084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3692.344639][ T31] audit: type=1400 audit(3692.256:63045): avc: denied { read write } for pid=24319 comm="syz.2.5086" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3692.347599][ T31] audit: type=1400 audit(3692.256:63046): avc: denied { read write open } for pid=24319 comm="syz.2.5086" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3692.356997][ T31] audit: type=1400 audit(3692.266:63047): avc: denied { read write } for pid=24319 comm="syz.2.5086" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3692.364094][ T31] audit: type=1400 audit(3692.266:63048): avc: denied { read write open } for pid=24319 comm="syz.2.5086" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3692.568883][ T31] audit: type=1400 audit(3692.476:63049): avc: denied { create } for pid=24315 comm="syz.0.5084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3692.591396][ T31] audit: type=1400 audit(3692.496:63050): avc: denied { write } for pid=24315 comm="syz.0.5084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3692.601125][ T31] audit: type=1400 audit(3692.506:63051): avc: denied { write } for pid=24315 comm="syz.0.5084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3692.836811][T24326] fuse: Unknown parameter 'user_i00000000000000000000' [ 3694.788444][T24334] fuse: Unknown parameter 'fd0x0000000000000003' [ 3695.225874][T24338] fuse: Unknown parameter 'user_i00000000000000000000' [ 3697.129883][ T31] kauditd_printk_skb: 153 callbacks suppressed [ 3697.131740][ T31] audit: type=1400 audit(3697.036:63205): avc: denied { write } for pid=24351 comm="syz.0.5096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3698.626406][ T31] audit: type=1400 audit(3698.536:63206): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.633424][ T31] audit: type=1400 audit(3698.536:63207): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.644762][ T31] audit: type=1400 audit(3698.556:63208): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.669926][ T31] audit: type=1400 audit(3698.576:63209): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.679294][ T31] audit: type=1400 audit(3698.586:63210): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.700323][ T31] audit: type=1400 audit(3698.606:63211): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.703915][ T31] audit: type=1400 audit(3698.606:63212): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.727808][ T31] audit: type=1400 audit(3698.636:63213): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.733055][ T31] audit: type=1400 audit(3698.636:63214): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3698.807624][T24356] fuse: Unknown parameter 'user_id00000000000000000000' [ 3700.461850][T24372] fuse: Unknown parameter 'user_id00000000000000000000' [ 3702.136224][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 3702.136563][ T31] audit: type=1400 audit(3702.046:63333): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3702.143419][ T31] audit: type=1400 audit(3702.046:63334): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3702.155606][ T31] audit: type=1400 audit(3702.056:63335): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3702.156247][ T31] audit: type=1400 audit(3702.066:63336): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3702.244510][ T31] audit: type=1400 audit(3702.156:63337): avc: denied { read write } for pid=24378 comm="syz.2.5104" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3702.246949][ T31] audit: type=1400 audit(3702.156:63338): avc: denied { read write open } for pid=24378 comm="syz.2.5104" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3702.251808][ T31] audit: type=1400 audit(3702.156:63339): avc: denied { mounton } for pid=24378 comm="syz.2.5104" path="/203/file0" dev="tmpfs" ino=1113 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3702.269261][ T31] audit: type=1400 audit(3702.176:63340): avc: denied { mount } for pid=24378 comm="syz.2.5104" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3702.799662][ T31] audit: type=1400 audit(3702.706:63341): avc: denied { read write } for pid=24378 comm="syz.2.5104" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3702.807943][ T31] audit: type=1400 audit(3702.716:63342): avc: denied { read write open } for pid=24378 comm="syz.2.5104" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3704.040207][T24393] fuse: Unknown parameter 'user_id00000000000000000000' [ 3707.440821][ T31] kauditd_printk_skb: 230 callbacks suppressed [ 3707.441198][ T31] audit: type=1400 audit(3707.346:63573): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.442691][ T31] audit: type=1400 audit(3707.346:63574): avc: denied { unmount } for pid=22317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3707.445653][ T31] audit: type=1400 audit(3707.356:63575): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.457461][ T31] audit: type=1400 audit(3707.366:63576): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.473935][ T31] audit: type=1400 audit(3707.376:63577): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.495478][ T31] audit: type=1400 audit(3707.406:63578): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.525136][ T31] audit: type=1400 audit(3707.426:63579): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.525472][ T31] audit: type=1400 audit(3707.426:63580): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.569792][ T31] audit: type=1400 audit(3707.476:63581): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3707.570224][ T31] audit: type=1400 audit(3707.476:63582): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3712.461795][ T31] kauditd_printk_skb: 161 callbacks suppressed [ 3712.462500][ T31] audit: type=1400 audit(3712.366:63744): avc: denied { write } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3712.472630][ T31] audit: type=1400 audit(3712.376:63745): avc: denied { write } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3712.473999][ T31] audit: type=1400 audit(3712.386:63746): avc: denied { module_request } for pid=24451 comm="syz.0.5123" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3712.703712][ T31] audit: type=1400 audit(3712.616:63747): avc: denied { read } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3712.708445][ T31] audit: type=1400 audit(3712.616:63748): avc: denied { write } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3712.719026][ T31] audit: type=1400 audit(3712.626:63749): avc: denied { read } for pid=24451 comm="syz.0.5123" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3712.726508][ T31] audit: type=1400 audit(3712.626:63750): avc: denied { read open } for pid=24451 comm="syz.0.5123" path="net:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3712.735095][ T31] audit: type=1400 audit(3712.626:63751): avc: denied { create } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3712.737230][ T31] audit: type=1400 audit(3712.636:63752): avc: denied { write } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3712.739202][ T31] audit: type=1400 audit(3712.646:63753): avc: denied { read } for pid=24451 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3716.063265][T24501] fuse: Unknown parameter '0x0000000000000003' [ 3717.500084][ T31] kauditd_printk_skb: 177 callbacks suppressed [ 3717.505596][ T31] audit: type=1400 audit(3717.406:63931): avc: denied { write } for pid=24496 comm="syz.0.5133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3717.573797][ T31] audit: type=1400 audit(3717.476:63932): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.574345][ T31] audit: type=1400 audit(3717.476:63933): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.581381][ T31] audit: type=1400 audit(3717.486:63934): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.601678][ T31] audit: type=1400 audit(3717.496:63935): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.623611][ T31] audit: type=1400 audit(3717.526:63936): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.633673][ T31] audit: type=1400 audit(3717.536:63937): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.634061][ T31] audit: type=1400 audit(3717.536:63938): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.655346][ T31] audit: type=1400 audit(3717.566:63939): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3717.660551][ T31] audit: type=1400 audit(3717.566:63940): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3718.059921][T24522] fuse: Unknown parameter '0x0000000000000003' [ 3719.381675][T24538] fuse: Unknown parameter '0x0000000000000003' [ 3720.892029][T24554] fuse: Unknown parameter 'fd0x0000000000000003' [ 3723.300377][ T31] kauditd_printk_skb: 241 callbacks suppressed [ 3723.301344][ T31] audit: type=1400 audit(3723.206:64182): avc: denied { read write } for pid=24562 comm="syz.0.5152" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3723.315618][ T31] audit: type=1400 audit(3723.226:64183): avc: denied { read write open } for pid=24562 comm="syz.0.5152" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3723.502868][ T31] audit: type=1400 audit(3723.406:64184): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.505751][ T31] audit: type=1400 audit(3723.416:64185): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.527624][ T31] audit: type=1400 audit(3723.436:64186): avc: denied { recv } for pid=23658 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.551627][ T31] audit: type=1400 audit(3723.456:64187): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.561477][ T31] audit: type=1400 audit(3723.466:64188): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.608781][ T31] audit: type=1400 audit(3723.506:64189): avc: denied { recv } for pid=22317 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.609221][ T31] audit: type=1400 audit(3723.516:64190): avc: denied { recv } for pid=22317 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3723.645844][ T31] audit: type=1400 audit(3723.556:64191): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3724.035021][T24570] fuse: Unknown parameter 'fd0x0000000000000003' [ 3727.764292][T24585] fuse: Unknown parameter 'fd0x0000000000000003' [ 3728.535120][ T31] kauditd_printk_skb: 261 callbacks suppressed [ 3728.535464][ T31] audit: type=1400 audit(3728.446:64453): avc: denied { write } for pid=24579 comm="syz.2.5157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3729.021045][ T31] audit: type=1400 audit(3728.926:64454): avc: denied { read write } for pid=24586 comm="syz.0.5160" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3729.024270][ T31] audit: type=1400 audit(3728.936:64455): avc: denied { read write open } for pid=24586 comm="syz.0.5160" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3729.055433][ T31] audit: type=1400 audit(3728.966:64456): avc: denied { write } for pid=24579 comm="syz.2.5157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3730.139164][ T31] audit: type=1400 audit(3730.046:64457): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3730.139549][ T31] audit: type=1400 audit(3730.046:64458): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3730.160572][ T31] audit: type=1400 audit(3730.066:64459): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3730.171234][ T31] audit: type=1400 audit(3730.076:64460): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3730.176106][ T31] audit: type=1400 audit(3730.086:64461): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3730.179076][ T31] audit: type=1400 audit(3730.086:64462): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3730.911757][T24606] FAULT_INJECTION: forcing a failure. [ 3730.911757][T24606] name failslab, interval 1, probability 0, space 0, times 0 [ 3730.914369][T24606] CPU: 0 UID: 0 PID: 24606 Comm: syz.0.5165 Not tainted syzkaller #0 PREEMPT [ 3730.914513][T24606] Hardware name: ARM-Versatile Express [ 3730.914546][T24606] Call trace: [ 3730.914590][T24606] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3730.914718][T24606] r7:00000c40 r6:00000000 r5:60000013 r4:82260bc4 [ 3730.914740][T24606] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3730.914812][T24606] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3730.914874][T24606] r5:8400bc00 r4:82917c00 [ 3730.914891][T24606] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3730.914963][T24606] [<80972c00>] (should_fail_ex) from [<8051f300>] (should_failslab+0x6c/0x94) [ 3730.915037][T24606] r8:8400bc00 r7:00000c40 r6:85cf9268 r5:00001000 r4:830016c0 [ 3730.915056][T24606] [<8051f294>] (should_failslab) from [<80503c90>] (__kmalloc_noprof+0x9c/0x458) [ 3730.915107][T24606] [<80503bf4>] (__kmalloc_noprof) from [<807c3794>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3730.915175][T24606] r10:8400bc00 r9:83318000 r8:00000000 r7:834262a8 r6:85cf9268 r5:00001000 [ 3730.915197][T24606] r4:00000000 [ 3730.915213][T24606] [<807c3758>] (tomoyo_realpath_from_path) from [<807bf8d8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3730.915276][T24606] r10:8400bc00 r9:00000000 r8:85cf9240 r7:c038943b r6:00000004 r5:81cd6504 [ 3730.915299][T24606] r4:85cf9268 r3:826c0200 [ 3730.915316][T24606] [<807bf80c>] (tomoyo_path_number_perm) from [<807c41b8>] (tomoyo_file_ioctl+0x1c/0x20) [ 3730.915381][T24606] r9:00000003 r8:85cf9240 r7:00000000 r6:00000000 r5:c038943b r4:85cf9240 [ 3730.915400][T24606] [<807c419c>] (tomoyo_file_ioctl) from [<80770a0c>] (security_file_ioctl+0x64/0x1e4) [ 3730.915456][T24606] [<807709a8>] (security_file_ioctl) from [<8056cdf8>] (sys_ioctl+0x4c/0xba0) [ 3730.915516][T24606] r7:00000000 r6:85cf9241 r5:00000000 r4:c038943b [ 3730.915533][T24606] [<8056cdac>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3730.915582][T24606] Exception stack(0xeaf8dfa8 to 0xeaf8dff0) [ 3730.915615][T24606] dfa0: 00000000 00000000 00000003 c038943b 00000000 00000000 [ 3730.915651][T24606] dfc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f1b0bc [ 3730.915683][T24606] dfe0: 76f1aec0 76f1aeb0 0001948c 001322a0 [ 3730.915719][T24606] r10:00000036 r9:8400bc00 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 3730.915741][T24606] r4:00000000 [ 3730.931110][T24606] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3733.543543][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 3733.544036][ T31] audit: type=1400 audit(3733.456:64572): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.551245][ T31] audit: type=1400 audit(3733.456:64573): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.583304][ T31] audit: type=1400 audit(3733.486:64574): avc: denied { recv } for pid=2936 comm="klogd" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.583641][ T31] audit: type=1400 audit(3733.486:64575): avc: denied { recv } for pid=2936 comm="klogd" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.599752][ T31] audit: type=1400 audit(3733.506:64576): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.600210][ T31] audit: type=1400 audit(3733.506:64577): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.723074][ T31] audit: type=1400 audit(3733.626:64578): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.723531][ T31] audit: type=1400 audit(3733.626:64579): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.750677][ T31] audit: type=1400 audit(3733.656:64580): avc: denied { recv } for pid=24618 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3733.761615][ T31] audit: type=1400 audit(3733.666:64581): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3737.827803][T24668] fuse: Bad value for 'fd' [ 3738.927370][ T31] kauditd_printk_skb: 236 callbacks suppressed [ 3738.927822][ T31] audit: type=1400 audit(3738.826:64818): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3738.928092][ T31] audit: type=1400 audit(3738.836:64819): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3738.952857][ T31] audit: type=1400 audit(3738.856:64820): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3738.970797][ T31] audit: type=1400 audit(3738.876:64821): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3738.978231][ T31] audit: type=1400 audit(3738.886:64822): avc: denied { unmount } for pid=23658 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3738.995987][ T31] audit: type=1400 audit(3738.906:64823): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3739.045371][ T31] audit: type=1400 audit(3738.956:64824): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3739.048463][ T31] audit: type=1400 audit(3738.956:64825): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3739.069352][ T31] audit: type=1400 audit(3738.976:64826): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3739.069794][ T31] audit: type=1400 audit(3738.976:64827): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.329248][ T31] kauditd_printk_skb: 133 callbacks suppressed [ 3744.329764][ T31] audit: type=1400 audit(3744.236:64961): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.330012][ T31] audit: type=1400 audit(3744.236:64962): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.343194][ T31] audit: type=1400 audit(3744.246:64963): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.380617][ T31] audit: type=1400 audit(3744.286:64964): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.399644][ T31] audit: type=1400 audit(3744.306:64965): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.428477][ T31] audit: type=1400 audit(3744.326:64966): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.431419][ T31] audit: type=1400 audit(3744.336:64967): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.443280][ T31] audit: type=1400 audit(3744.346:64968): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.448171][ T31] audit: type=1400 audit(3744.356:64969): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3744.553002][ T31] audit: type=1400 audit(3744.456:64970): avc: denied { create } for pid=24713 comm="syz.0.5197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3745.716617][T24729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24729 comm=syz.0.5202 [ 3748.668374][T24746] binder: 24734:24746 ioctl 80184560 0 returned -22 [ 3749.576060][ T31] kauditd_printk_skb: 159 callbacks suppressed [ 3749.576428][ T31] audit: type=1400 audit(3749.486:65130): avc: denied { write } for pid=24747 comm="syz.0.5206" path="socket:[57352]" dev="sockfs" ino=57352 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3749.585566][ T31] audit: type=1400 audit(3749.496:65131): avc: denied { write } for pid=24747 comm="syz.0.5206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3750.086123][ T31] audit: type=1400 audit(3749.996:65132): avc: denied { write } for pid=24747 comm="syz.0.5206" path="socket:[57352]" dev="sockfs" ino=57352 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3750.087586][ T31] audit: type=1400 audit(3749.996:65133): avc: denied { write } for pid=24747 comm="syz.0.5206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3750.315524][ T31] audit: type=1400 audit(3750.206:65134): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3750.316098][ T31] audit: type=1400 audit(3750.216:65135): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3750.316519][ T31] audit: type=1400 audit(3750.226:65136): avc: denied { recv } for pid=22317 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3750.340896][ T31] audit: type=1400 audit(3750.236:65137): avc: denied { unmount } for pid=22317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3750.359446][ T31] audit: type=1400 audit(3750.266:65138): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3750.401705][ T31] audit: type=1400 audit(3750.286:65139): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3753.433460][T24772] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=24772 comm=syz.2.5211 [ 3753.438700][T24772] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24772 comm=syz.2.5211 [ 3754.620671][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 3754.620952][ T31] audit: type=1400 audit(3754.526:65247): avc: denied { write } for pid=24776 comm="syz.0.5213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3754.733333][ T31] audit: type=1400 audit(3754.636:65248): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.778529][ T31] audit: type=1400 audit(3754.686:65249): avc: denied { recv } for pid=24776 comm="syz.0.5213" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.789388][ T31] audit: type=1400 audit(3754.696:65250): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.797299][ T31] audit: type=1400 audit(3754.706:65251): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.821980][ T31] audit: type=1400 audit(3754.726:65252): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.863390][ T31] audit: type=1400 audit(3754.766:65253): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.877936][ T31] audit: type=1400 audit(3754.786:65254): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.878327][ T31] audit: type=1400 audit(3754.786:65255): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3754.889960][ T31] audit: type=1400 audit(3754.796:65256): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3758.384494][T24811] fuse: Bad value for 'fd' [ 3758.766442][T24814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24814 comm=syz.2.5223 [ 3759.670037][ T31] kauditd_printk_skb: 179 callbacks suppressed [ 3759.670453][ T31] audit: type=1400 audit(3759.576:65436): avc: denied { write } for pid=24812 comm="syz.2.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3759.686157][T24814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24814 comm=syz.2.5223 [ 3759.724878][ T31] audit: type=1400 audit(3759.636:65437): avc: denied { create } for pid=24812 comm="syz.2.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3759.772708][ T31] audit: type=1400 audit(3759.676:65438): avc: denied { write } for pid=24812 comm="syz.2.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3759.799991][ T31] audit: type=1400 audit(3759.686:65439): avc: denied { create } for pid=24819 comm="syz.0.5226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3759.811185][ T31] audit: type=1400 audit(3759.716:65440): avc: denied { write } for pid=24812 comm="syz.2.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3759.845376][ T31] audit: type=1400 audit(3759.756:65441): avc: denied { write } for pid=24819 comm="syz.0.5226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3759.947988][ T31] audit: type=1400 audit(3759.846:65442): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3759.948660][ T31] audit: type=1400 audit(3759.856:65443): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3759.970748][ T31] audit: type=1400 audit(3759.876:65444): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3759.979226][ T31] audit: type=1400 audit(3759.886:65445): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3760.127848][T24825] fuse: Bad value for 'fd' [ 3761.137729][T24840] fuse: Bad value for 'fd' [ 3762.903880][T24861] FAULT_INJECTION: forcing a failure. [ 3762.903880][T24861] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3762.904175][T24861] CPU: 1 UID: 0 PID: 24861 Comm: syz.2.5240 Not tainted syzkaller #0 PREEMPT [ 3762.904245][T24861] Hardware name: ARM-Versatile Express [ 3762.904295][T24861] Call trace: [ 3762.904327][T24861] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3762.904408][T24861] r7:eb5ede20 r6:00000000 r5:60000013 r4:82260bc4 [ 3762.904417][T24861] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3762.904447][T24861] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3762.904477][T24861] r5:83a6b000 r4:8294f190 [ 3762.904484][T24861] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3762.904516][T24861] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3762.904551][T24861] r8:00000094 r7:eb5ede20 r6:200001c0 r5:00000000 r4:eb5edf20 [ 3762.904559][T24861] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3762.904589][T24861] [<80972e40>] (should_fail_usercopy) from [<81546e6c>] (copy_msghdr_from_user+0x50/0x130) [ 3762.904621][T24861] [<81546e1c>] (copy_msghdr_from_user) from [<81546fc4>] (___sys_sendmsg+0x78/0xd0) [ 3762.904653][T24861] r8:00000094 r7:00000000 r6:8534e500 r5:eb5edf20 r4:eb5ede64 [ 3762.904661][T24861] [<81546f4c>] (___sys_sendmsg) from [<81547480>] (__sys_sendmsg+0x8c/0xe0) [ 3762.904694][T24861] r10:00000128 r9:83a6b000 r8:855d99c0 r7:00000094 r6:200001c0 r5:855d99c1 [ 3762.904705][T24861] r4:00000003 [ 3762.904714][T24861] [<815473f4>] (__sys_sendmsg) from [<815474e8>] (sys_sendmsg+0x14/0x18) [ 3762.904745][T24861] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 3762.904765][T24861] [<815474d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3762.904792][T24861] Exception stack(0xeb5edfa8 to 0xeb5edff0) [ 3762.904813][T24861] dfa0: 00000000 00000000 00000003 200001c0 00000094 00000000 [ 3762.904834][T24861] dfc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3762.904849][T24861] dfe0: 76f4cec0 76f4ceb0 0001948c 001322a0 [ 3764.680022][ T31] kauditd_printk_skb: 326 callbacks suppressed [ 3764.680323][ T31] audit: type=1400 audit(3764.586:65770): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3764.685932][ T31] audit: type=1400 audit(3764.596:65771): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3764.750494][ T31] audit: type=1400 audit(3764.656:65772): avc: denied { create } for pid=24878 comm="syz.2.5247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3764.757317][ T31] audit: type=1400 audit(3764.666:65773): avc: denied { write } for pid=24878 comm="syz.2.5247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3764.767459][ T31] audit: type=1400 audit(3764.676:65774): avc: denied { write } for pid=24878 comm="syz.2.5247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3764.777822][ T31] audit: type=1400 audit(3764.686:65775): avc: denied { write } for pid=24878 comm="syz.2.5247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3764.781792][ T31] audit: type=1400 audit(3764.686:65776): avc: denied { write } for pid=24871 comm="syz.0.5244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3764.827198][ T31] audit: type=1400 audit(3764.736:65777): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3764.831730][ T31] audit: type=1400 audit(3764.736:65778): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3764.853892][ T31] audit: type=1400 audit(3764.756:65779): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.720807][ T31] kauditd_printk_skb: 111 callbacks suppressed [ 3769.721178][ T31] audit: type=1400 audit(3769.626:65891): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.741120][ T31] audit: type=1400 audit(3769.646:65892): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.761621][ T31] audit: type=1400 audit(3769.666:65893): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.781818][ T31] audit: type=1400 audit(3769.686:65894): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.807615][ T31] audit: type=1400 audit(3769.716:65895): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.832741][ T31] audit: type=1400 audit(3769.736:65896): avc: denied { recv } for pid=24904 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.833170][ T31] audit: type=1400 audit(3769.736:65897): avc: denied { recv } for pid=24904 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.847266][ T31] audit: type=1400 audit(3769.756:65898): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.855418][ T31] audit: type=1400 audit(3769.756:65899): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3769.910132][ T31] audit: type=1400 audit(3769.816:65900): avc: denied { create } for pid=24904 comm="syz.2.5257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3773.950869][T24935] SELinux: syz.2.5266 (24935) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 3774.783943][ T31] kauditd_printk_skb: 188 callbacks suppressed [ 3774.784349][ T31] audit: type=1400 audit(3774.686:66089): avc: denied { write } for pid=24944 comm="syz.0.5268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3774.949710][ T31] audit: type=1400 audit(3774.856:66090): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3774.950472][ T31] audit: type=1400 audit(3774.856:66091): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3774.976484][ T31] audit: type=1400 audit(3774.876:66092): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3774.997504][ T31] audit: type=1400 audit(3774.896:66093): avc: denied { recv } for pid=2936 comm="klogd" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3774.997949][ T31] audit: type=1400 audit(3774.906:66094): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3775.040778][ T31] audit: type=1400 audit(3774.936:66095): avc: denied { recv } for pid=24933 comm="syz.2.5266" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3775.044620][ T31] audit: type=1400 audit(3774.936:66096): avc: denied { recv } for pid=24933 comm="syz.2.5266" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3775.074156][ T31] audit: type=1400 audit(3774.986:66097): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3775.082859][ T31] audit: type=1400 audit(3774.986:66098): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3777.548485][T24952] fuse: Bad value for 'fd' [ 3778.478847][T24956] FAULT_INJECTION: forcing a failure. [ 3778.478847][T24956] name failslab, interval 1, probability 0, space 0, times 0 [ 3778.480405][T24956] CPU: 0 UID: 0 PID: 24956 Comm: syz.0.5272 Not tainted syzkaller #0 PREEMPT [ 3778.480529][T24956] Hardware name: ARM-Versatile Express [ 3778.480554][T24956] Call trace: [ 3778.480590][T24956] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3778.480687][T24956] r7:85f98000 r6:00000000 r5:60000013 r4:82260bc4 [ 3778.480703][T24956] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3778.480760][T24956] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3778.480807][T24956] r5:85f98000 r4:82917c00 [ 3778.480820][T24956] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3778.480871][T24956] [<80972c00>] (should_fail_ex) from [<8051f300>] (should_failslab+0x6c/0x94) [ 3778.480975][T24956] r8:00000000 r7:85f98000 r6:00000dc0 r5:82ad2948 r4:830a7900 [ 3778.480993][T24956] [<8051f294>] (should_failslab) from [<8050390c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3778.481039][T24956] [<805038c0>] (kmem_cache_alloc_noprof) from [<8072f2f8>] (fuse_request_alloc+0x24/0x84) [ 3778.481096][T24956] r10:85f98000 r9:00000001 r8:8291ee30 r7:85c2a7c0 r6:85c2a7c0 r5:82ad2948 [ 3778.481114][T24956] r4:85e0a000 [ 3778.481128][T24956] [<8072f2d4>] (fuse_request_alloc) from [<8072f9fc>] (fuse_get_req+0x1b4/0x2d8) [ 3778.481178][T24956] r7:85c2a7c0 r6:85e0a000 r5:00000000 r4:85e0a000 [ 3778.481192][T24956] [<8072f848>] (fuse_get_req) from [<807310ec>] (__fuse_simple_request+0x54/0x498) [ 3778.481247][T24956] r10:84d69980 r9:00000000 r8:8291ee30 r7:85f98000 r6:85e0a000 r5:eb6a1e80 [ 3778.481264][T24956] r4:85c2a7c0 [ 3778.481278][T24956] [<80731098>] (__fuse_simple_request) from [<8073bfb4>] (fuse_fsync_common+0xa8/0xcc) [ 3778.481331][T24956] r8:85e0a000 r7:00000000 r6:00000001 r5:00000000 r4:00000000 [ 3778.481346][T24956] [<8073bf0c>] (fuse_fsync_common) from [<80734548>] (fuse_dir_fsync+0x84/0xc0) [ 3778.481395][T24956] r7:00000000 r6:00000000 r5:7fffffff r4:ffffffff [ 3778.481410][T24956] [<807344c4>] (fuse_dir_fsync) from [<805a0024>] (vfs_fsync_range+0x44/0x8c) [ 3778.481464][T24956] r10:00000076 r9:85f98000 r8:8020029c r7:00000076 r6:85a06780 r5:7fffffff [ 3778.481481][T24956] r4:ffffffff [ 3778.481495][T24956] [<8059ffe0>] (vfs_fsync_range) from [<805a01b0>] (do_fsync+0x44/0x80) [ 3778.481537][T24956] r5:00000000 r4:85a06781 [ 3778.481550][T24956] [<805a016c>] (do_fsync) from [<805a044c>] (sys_fsync+0x14/0x18) [ 3778.481592][T24956] r6:00130250 r5:00000000 r4:00000000 [ 3778.481606][T24956] [<805a0438>] (sys_fsync) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3778.481644][T24956] Exception stack(0xeb6a1fa8 to 0xeb6a1ff0) [ 3778.481682][T24956] 1fa0: 00000000 00000000 00000005 00000000 00000000 00000000 [ 3778.481831][T24956] 1fc0: 00000000 00000000 00130250 00000076 002f0000 00000000 00006364 76f1b0bc [ 3778.481864][T24956] 1fe0: 76f1aec0 76f1aeb0 0001948c 001322a0 [ 3779.211874][T24967] fuse: Bad value for 'fd' [ 3779.797813][ T31] kauditd_printk_skb: 101 callbacks suppressed [ 3779.798034][ T31] audit: type=1400 audit(3779.706:66200): avc: denied { create } for pid=24966 comm="syz.2.5276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3779.863973][ T31] audit: type=1400 audit(3779.776:66201): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.868393][ T31] audit: type=1400 audit(3779.776:66202): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.893933][ T31] audit: type=1400 audit(3779.796:66203): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.909108][ T31] audit: type=1400 audit(3779.816:66204): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.926200][ T31] audit: type=1400 audit(3779.836:66205): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.954677][ T31] audit: type=1400 audit(3779.856:66206): avc: denied { recv } for pid=24969 comm="syz.0.5277" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.955125][ T31] audit: type=1400 audit(3779.856:66207): avc: denied { recv } for pid=24969 comm="syz.0.5277" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.987500][ T31] audit: type=1400 audit(3779.886:66208): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3779.987993][ T31] audit: type=1400 audit(3779.896:66209): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3781.009807][T24978] fuse: Unknown parameter '!' [ 3781.557370][T24980] fuse: Bad value for 'fd' [ 3784.837306][ T31] kauditd_printk_skb: 257 callbacks suppressed [ 3784.838813][ T31] audit: type=1400 audit(3784.746:66467): avc: denied { create } for pid=24997 comm="syz.2.5287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3784.873346][ T31] audit: type=1400 audit(3784.776:66468): avc: denied { ioctl } for pid=24997 comm="syz.2.5287" path="socket:[57344]" dev="sockfs" ino=57344 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3784.924303][ T31] audit: type=1400 audit(3784.836:66469): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3784.932584][ T31] audit: type=1400 audit(3784.836:66470): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3784.939704][ T31] audit: type=1400 audit(3784.846:66471): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3784.993495][ T31] audit: type=1400 audit(3784.866:66472): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3784.993887][ T31] audit: type=1400 audit(3784.876:66473): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3784.994137][ T31] audit: type=1400 audit(3784.886:66474): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3784.994238][ T31] audit: type=1400 audit(3784.886:66475): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3785.014370][ T31] audit: type=1400 audit(3784.926:66476): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3786.790412][T25009] FAULT_INJECTION: forcing a failure. [ 3786.790412][T25009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3786.790612][T25009] CPU: 1 UID: 0 PID: 25009 Comm: syz.2.5291 Not tainted syzkaller #0 PREEMPT [ 3786.790679][T25009] Hardware name: ARM-Versatile Express [ 3786.790696][T25009] Call trace: [ 3786.790719][T25009] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3786.790800][T25009] r7:b5403587 r6:00000000 r5:60000113 r4:82260bc4 [ 3786.790810][T25009] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3786.790841][T25009] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3786.790873][T25009] r5:85ea3000 r4:8294f190 [ 3786.790881][T25009] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3786.790915][T25009] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3786.790952][T25009] r8:00000000 r7:b5403587 r6:00000000 r5:85ea3830 r4:76f4cbb8 [ 3786.790961][T25009] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3786.790990][T25009] [<80972e40>] (should_fail_usercopy) from [<8022b664>] (setup_sigframe+0x124/0x1c4) [ 3786.791048][T25009] [<8022b540>] (setup_sigframe) from [<8022bbcc>] (do_work_pending+0x3f4/0x4f8) [ 3786.791535][T25009] r10:b5403587 r9:76f4cbb8 r8:00000000 r7:85ea3830 r6:76f4cb38 r5:eb6f1fb0 [ 3786.791697][T25009] r4:85ea3000 [ 3786.791808][T25009] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3786.792202][T25009] Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) [ 3786.792553][T25009] 1fa0: 00000004 20000080 00000011 00000000 [ 3786.792609][T25009] 1fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3786.792647][T25009] 1fe0: 76f4cec0 76f4ceb0 0001948c 0013229c 60000010 00000004 [ 3786.792695][T25009] r10:00000128 r9:85ea3000 r8:8020029c r7:00000128 r6:00130250 r5:00000000 [ 3786.792718][T25009] r4:00000000 [ 3789.845231][ T31] kauditd_printk_skb: 139 callbacks suppressed [ 3789.845484][ T31] audit: type=1400 audit(3789.756:66616): avc: denied { read open } for pid=25023 comm="syz.0.5296" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3789.867164][ T31] audit: type=1400 audit(3789.776:66617): avc: denied { ioctl } for pid=25023 comm="syz.0.5296" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x1262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3789.889673][ T31] audit: type=1400 audit(3789.796:66618): avc: denied { create } for pid=25028 comm="syz.2.5297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3789.890063][ T31] audit: type=1400 audit(3789.796:66619): avc: denied { write } for pid=25028 comm="syz.2.5297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3789.911563][ T31] audit: type=1400 audit(3789.796:66620): avc: denied { read } for pid=25028 comm="syz.2.5297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3789.912541][ T31] audit: type=1400 audit(3789.816:66621): avc: denied { read } for pid=25028 comm="syz.2.5297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3789.912677][ T31] audit: type=1400 audit(3789.816:66622): avc: denied { write } for pid=25028 comm="syz.2.5297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3789.996869][ T31] audit: type=1400 audit(3789.906:66623): avc: denied { write } for pid=25023 comm="syz.0.5296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3790.020000][ T31] audit: type=1400 audit(3789.926:66624): avc: denied { write } for pid=25023 comm="syz.0.5296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3790.103303][ T31] audit: type=1400 audit(3790.006:66625): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3791.020665][T25039] FAULT_INJECTION: forcing a failure. [ 3791.020665][T25039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3791.023393][T25039] CPU: 0 UID: 0 PID: 25039 Comm: syz.0.5300 Not tainted syzkaller #0 PREEMPT [ 3791.023536][T25039] Hardware name: ARM-Versatile Express [ 3791.023567][T25039] Call trace: [ 3791.023613][T25039] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3791.023728][T25039] r7:eb711e20 r6:00000000 r5:60000013 r4:82260bc4 [ 3791.023756][T25039] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3791.023819][T25039] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3791.023882][T25039] r5:83a6bc00 r4:8294f190 [ 3791.023900][T25039] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3791.023969][T25039] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3791.024052][T25039] r8:04000000 r7:eb711e20 r6:20000100 r5:00000000 r4:eb711f20 [ 3791.024071][T25039] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3791.024124][T25039] [<80972e40>] (should_fail_usercopy) from [<81546e6c>] (copy_msghdr_from_user+0x50/0x130) [ 3791.024182][T25039] [<81546e1c>] (copy_msghdr_from_user) from [<81546fc4>] (___sys_sendmsg+0x78/0xd0) [ 3791.024237][T25039] r8:04000000 r7:00000000 r6:85350a00 r5:eb711f20 r4:eb711e64 [ 3791.024256][T25039] [<81546f4c>] (___sys_sendmsg) from [<81547480>] (__sys_sendmsg+0x8c/0xe0) [ 3791.024316][T25039] r10:00000128 r9:83a6bc00 r8:84931cc0 r7:04000000 r6:20000100 r5:84931cc1 [ 3791.024340][T25039] r4:00000004 [ 3791.024358][T25039] [<815473f4>] (__sys_sendmsg) from [<815474e8>] (sys_sendmsg+0x14/0x18) [ 3791.024418][T25039] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 3791.024436][T25039] [<815474d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3791.024483][T25039] Exception stack(0xeb711fa8 to 0xeb711ff0) [ 3791.024524][T25039] 1fa0: 00000000 00000000 00000004 20000100 04000000 00000000 [ 3791.024561][T25039] 1fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f1b0bc [ 3791.024587][T25039] 1fe0: 76f1aec0 76f1aeb0 0001948c 001322a0 [ 3792.312767][ T12] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 3792.462854][ T12] usb 1-1: Using ep0 maxpacket: 32 [ 3792.547320][ T12] usb 1-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 3792.548267][ T12] usb 1-1: config 1 interface 0 has no altsetting 0 [ 3792.605812][ T12] usb 1-1: New USB device found, idVendor=0eef, idProduct=7302, bcdDevice= 0.40 [ 3792.606713][ T12] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3792.607508][ T12] usb 1-1: Product: ␊ [ 3792.608598][ T12] usb 1-1: Manufacturer: 헒鉯㴭붦 [ 3792.609114][ T12] usb 1-1: SerialNumber: لꏍ㾈퍙穜鈰쮄坧ᖃཱུ኏삌审矌튝ዤ몄ﶩ냣↞㻹筨쿐悚䊽臜ᤫꍊἒ䍱ࡶ味臁䟹ᚲ儧왊䂀˶杏⬘췱㎠亱┵罙囓▇㸰 [ 3792.906514][ T12] usbhid 1-1:1.0: can't add hid device: -71 [ 3792.911742][ T12] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 3792.942948][ T12] usb 1-1: USB disconnect, device number 31 [ 3794.852659][ T31] kauditd_printk_skb: 198 callbacks suppressed [ 3794.853043][ T31] audit: type=1400 audit(3794.756:66824): avc: denied { read } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3794.859306][ T31] audit: type=1400 audit(3794.766:66825): avc: denied { read } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3794.867422][ T31] audit: type=1400 audit(3794.776:66826): avc: denied { write } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3794.876054][ T31] audit: type=1400 audit(3794.786:66827): avc: denied { write } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3794.914327][ T31] audit: type=1400 audit(3794.816:66828): avc: denied { ioctl } for pid=25072 comm="syz.2.5308" path="socket:[57802]" dev="sockfs" ino=57802 ioctlcmd=0x8981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3794.920169][ T31] audit: type=1400 audit(3794.826:66829): avc: denied { write } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3794.926035][ T31] audit: type=1400 audit(3794.836:66830): avc: denied { module_request } for pid=25072 comm="syz.2.5308" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3795.094530][ T31] audit: type=1400 audit(3795.006:66831): avc: denied { read } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3795.099284][ T31] audit: type=1400 audit(3795.006:66832): avc: denied { write } for pid=25072 comm="syz.2.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3795.113354][ T31] audit: type=1400 audit(3795.006:66833): avc: denied { module_request } for pid=25072 comm="syz.2.5308" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3796.295204][T25080] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3796.301780][T25080] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3799.867109][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 3799.867439][ T31] audit: type=1400 audit(3799.776:66941): avc: denied { ioctl } for pid=25098 comm="syz.2.5314" path="socket:[57847]" dev="sockfs" ino=57847 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3799.896343][ T31] audit: type=1400 audit(3799.806:66942): avc: denied { create } for pid=25098 comm="syz.2.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3799.906535][ T31] audit: type=1400 audit(3799.816:66943): avc: denied { ioctl } for pid=25098 comm="syz.2.5314" path="socket:[57848]" dev="sockfs" ino=57848 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3799.910792][ T31] audit: type=1400 audit(3799.816:66944): avc: denied { read } for pid=25098 comm="syz.2.5314" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3799.915031][ T31] audit: type=1400 audit(3799.826:66945): avc: denied { read open } for pid=25098 comm="syz.2.5314" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3799.925640][ T31] audit: type=1400 audit(3799.826:66946): avc: denied { read } for pid=25098 comm="syz.2.5314" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3799.929685][ T31] audit: type=1400 audit(3799.836:66947): avc: denied { read open } for pid=25098 comm="syz.2.5314" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3799.951397][ T31] audit: type=1400 audit(3799.856:66948): avc: denied { ioctl } for pid=25098 comm="syz.2.5314" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3800.019938][ T31] audit: type=1400 audit(3799.926:66949): avc: denied { read } for pid=25098 comm="syz.2.5314" dev="nsfs" ino=4026532783 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3800.020197][ T31] audit: type=1400 audit(3799.926:66950): avc: denied { read open } for pid=25098 comm="syz.2.5314" path="net:[4026532783]" dev="nsfs" ino=4026532783 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3800.451722][T25112] FAULT_INJECTION: forcing a failure. [ 3800.451722][T25112] name failslab, interval 1, probability 0, space 0, times 0 [ 3800.457621][T25112] CPU: 0 UID: 0 PID: 25112 Comm: syz.2.5316 Not tainted syzkaller #0 PREEMPT [ 3800.457793][T25112] Hardware name: ARM-Versatile Express [ 3800.457828][T25112] Call trace: [ 3800.457874][T25112] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3800.457996][T25112] r7:00000d40 r6:00000000 r5:60000013 r4:82260bc4 [ 3800.458020][T25112] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3800.458077][T25112] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3800.458136][T25112] r5:85ea2400 r4:82917c00 [ 3800.458153][T25112] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3800.458215][T25112] [<80972c00>] (should_fail_ex) from [<8051f300>] (should_failslab+0x6c/0x94) [ 3800.458281][T25112] r8:85ea2400 r7:00000d40 r6:85a060e8 r5:00000026 r4:83001240 [ 3800.458300][T25112] [<8051f294>] (should_failslab) from [<80503c90>] (__kmalloc_noprof+0x9c/0x458) [ 3800.458353][T25112] [<80503bf4>] (__kmalloc_noprof) from [<807c369c>] (tomoyo_encode2+0x64/0xf0) [ 3800.458416][T25112] r10:00000fff r9:83318000 r8:00000000 r7:83412088 r6:85a060e8 r5:84924ffc [ 3800.458436][T25112] r4:84924fe1 [ 3800.458452][T25112] [<807c3638>] (tomoyo_encode2) from [<807c374c>] (tomoyo_encode+0x24/0x30) [ 3800.458510][T25112] r9:83318000 r8:00000000 r7:83412088 r6:85a060e8 r5:00001000 r4:84924fe2 [ 3800.458528][T25112] [<807c3728>] (tomoyo_encode) from [<807c37d8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3800.458579][T25112] r5:00001000 r4:84924000 [ 3800.458597][T25112] [<807c3758>] (tomoyo_realpath_from_path) from [<807bf8d8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3800.458658][T25112] r10:85ea2400 r9:00000000 r8:85a060c0 r7:c01864cd r6:00000004 r5:81cd6504 [ 3800.458678][T25112] r4:85a060e8 r3:826c0200 [ 3800.458694][T25112] [<807bf80c>] (tomoyo_path_number_perm) from [<807c41b8>] (tomoyo_file_ioctl+0x1c/0x20) [ 3800.458767][T25112] r9:00000003 r8:85a060c0 r7:20000300 r6:20000300 r5:c01864cd r4:85a060c0 [ 3800.458786][T25112] [<807c419c>] (tomoyo_file_ioctl) from [<80770a0c>] (security_file_ioctl+0x64/0x1e4) [ 3800.458840][T25112] [<807709a8>] (security_file_ioctl) from [<8056cdf8>] (sys_ioctl+0x4c/0xba0) [ 3800.458904][T25112] r7:20000300 r6:85a060c1 r5:00000000 r4:c01864cd [ 3800.458924][T25112] [<8056cdac>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3800.458975][T25112] Exception stack(0xeb7b1fa8 to 0xeb7b1ff0) [ 3800.459018][T25112] 1fa0: 00000000 00000000 00000003 c01864cd 20000300 00000000 [ 3800.459053][T25112] 1fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f4d0bc [ 3800.459081][T25112] 1fe0: 76f4cec0 76f4ceb0 0001948c 001322a0 [ 3800.459115][T25112] r10:00000036 r9:85ea2400 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 3800.459135][T25112] r4:00000000 [ 3800.477463][T25112] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3804.880472][ T31] kauditd_printk_skb: 163 callbacks suppressed [ 3804.881131][ T31] audit: type=1400 audit(3804.786:67114): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3804.894950][ T31] audit: type=1400 audit(3804.796:67115): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3804.897623][ T31] audit: type=1400 audit(3804.806:67116): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3804.943274][ T31] audit: type=1400 audit(3804.836:67117): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3804.989613][ T31] audit: type=1400 audit(3804.896:67118): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3805.022428][ T31] audit: type=1400 audit(3804.926:67119): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3805.022770][ T31] audit: type=1400 audit(3804.936:67120): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3805.082498][ T31] audit: type=1400 audit(3804.986:67121): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3805.083051][ T31] audit: type=1400 audit(3804.986:67122): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3805.366657][ T31] audit: type=1400 audit(3805.276:67123): avc: denied { create } for pid=25140 comm="syz.0.5323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3810.170005][ T31] kauditd_printk_skb: 142 callbacks suppressed [ 3810.170432][ T31] audit: type=1400 audit(3810.076:67266): avc: denied { read write } for pid=25165 comm="syz.2.5329" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3810.196359][ T31] audit: type=1400 audit(3810.096:67267): avc: denied { read write open } for pid=25165 comm="syz.2.5329" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3810.224801][ T31] audit: type=1400 audit(3810.136:67268): avc: denied { create } for pid=25163 comm="syz.0.5328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3810.266640][ T31] audit: type=1400 audit(3810.176:67269): avc: denied { read } for pid=25163 comm="syz.0.5328" path="socket:[57923]" dev="sockfs" ino=57923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3810.294909][ T31] audit: type=1400 audit(3810.206:67270): avc: denied { read } for pid=25163 comm="syz.0.5328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3810.372966][ T31] audit: type=1400 audit(3810.276:67271): avc: denied { read } for pid=25163 comm="syz.0.5328" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3810.410107][ T31] audit: type=1400 audit(3810.316:67272): avc: denied { read open } for pid=25163 comm="syz.0.5328" path="net:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3810.438325][ T31] audit: type=1400 audit(3810.346:67273): avc: denied { create } for pid=25163 comm="syz.0.5328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3810.559195][ T31] audit: type=1400 audit(3810.466:67274): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3810.559554][ T31] audit: type=1400 audit(3810.466:67275): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3815.184978][ T31] kauditd_printk_skb: 203 callbacks suppressed [ 3815.185308][ T31] audit: type=1400 audit(3815.096:67479): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3815.218029][ T31] audit: type=1400 audit(3815.126:67480): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3815.221936][ T31] audit: type=1400 audit(3815.126:67481): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3815.250173][ T31] audit: type=1400 audit(3815.146:67482): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3815.250553][ T31] audit: type=1400 audit(3815.146:67483): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3815.262859][ T31] audit: type=1400 audit(3815.166:67484): avc: denied { create } for pid=25198 comm="syz.2.5335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3815.281759][ T31] audit: type=1400 audit(3815.186:67485): avc: denied { write } for pid=25198 comm="syz.2.5335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3815.339907][ T31] audit: type=1400 audit(3815.246:67486): avc: denied { write } for pid=25198 comm="syz.2.5335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3815.366819][ T31] audit: type=1400 audit(3815.276:67487): avc: denied { write } for pid=25198 comm="syz.2.5335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3815.464461][ T31] audit: type=1400 audit(3815.376:67488): avc: denied { create } for pid=25200 comm="syz.0.5336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3820.206327][ T31] kauditd_printk_skb: 199 callbacks suppressed [ 3820.206677][ T31] audit: type=1400 audit(3820.116:67688): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.242931][ T31] audit: type=1400 audit(3820.146:67689): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.267140][ T31] audit: type=1400 audit(3820.176:67690): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.291248][ T31] audit: type=1400 audit(3820.196:67691): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.342411][ T31] audit: type=1400 audit(3820.246:67692): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.372694][ T31] audit: type=1400 audit(3820.276:67693): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.415131][ T31] audit: type=1400 audit(3820.316:67694): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.465820][ T31] audit: type=1400 audit(3820.366:67695): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.502775][ T31] audit: type=1400 audit(3820.406:67696): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3820.551640][ T31] audit: type=1400 audit(3820.456:67697): avc: denied { write } for pid=25216 comm="syz.2.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3822.356536][T25223] FAULT_INJECTION: forcing a failure. [ 3822.356536][T25223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3822.356872][T25223] CPU: 1 UID: 0 PID: 25223 Comm: syz.2.5345 Not tainted syzkaller #0 PREEMPT [ 3822.357022][T25223] Hardware name: ARM-Versatile Express [ 3822.357054][T25223] Call trace: [ 3822.357171][T25223] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3822.357287][T25223] r7:b5403587 r6:00000000 r5:60000013 r4:82260bc4 [ 3822.357307][T25223] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3822.357421][T25223] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3822.357505][T25223] r5:85ea3c00 r4:8294f190 [ 3822.357529][T25223] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3822.357623][T25223] [<80972c00>] (should_fail_ex) from [<80972e3c>] (should_fail+0x14/0x18) [ 3822.357724][T25223] r8:00000000 r7:b5403587 r6:00000000 r5:85ea4430 r4:76f4cca0 [ 3822.357799][T25223] [<80972e28>] (should_fail) from [<80972e5c>] (should_fail_usercopy+0x1c/0x20) [ 3822.357866][T25223] [<80972e40>] (should_fail_usercopy) from [<8022b2e4>] (preserve_vfp_context+0x78/0xc4) [ 3822.357941][T25223] [<8022b26c>] (preserve_vfp_context) from [<8022b6ac>] (setup_sigframe+0x16c/0x1c4) [ 3822.358035][T25223] r5:85ea4430 r4:76f4cbb8 [ 3822.358116][T25223] [<8022b540>] (setup_sigframe) from [<8022bbcc>] (do_work_pending+0x3f4/0x4f8) [ 3822.358194][T25223] r10:b5403587 r9:76f4cbb8 r8:00000000 r7:85ea4430 r6:76f4cb38 r5:eb82dfb0 [ 3822.358312][T25223] r4:85ea3c00 [ 3822.358365][T25223] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3822.358446][T25223] Exception stack(0xeb82dfb0 to 0xeb82dff8) [ 3822.358529][T25223] dfa0: 00000003 20000580 20000000 00000000 [ 3822.358586][T25223] dfc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3822.358699][T25223] dfe0: 76f4cec0 76f4ceb0 0001948c 0013229c 60000010 00000003 [ 3822.358783][T25223] r10:00000128 r9:85ea3c00 r8:8020029c r7:00000128 r6:00130250 r5:00000000 [ 3822.358843][T25223] r4:00000000 [ 3825.253784][ T31] kauditd_printk_skb: 145 callbacks suppressed [ 3825.254145][ T31] audit: type=1400 audit(3825.136:67843): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.254381][ T31] audit: type=1400 audit(3825.146:67844): avc: denied { recv } for pid=22317 comm="syz-executor" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.254589][ T31] audit: type=1400 audit(3825.156:67845): avc: denied { write } for pid=25239 comm="syz.0.5349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3825.276652][ T31] audit: type=1400 audit(3825.186:67846): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.299693][ T31] audit: type=1400 audit(3825.206:67847): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.338619][ T31] audit: type=1400 audit(3825.246:67848): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.351415][ T31] audit: type=1400 audit(3825.256:67849): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.351850][ T31] audit: type=1400 audit(3825.256:67850): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.453272][ T31] audit: type=1400 audit(3825.346:67851): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3825.453688][ T31] audit: type=1400 audit(3825.356:67852): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3830.236936][T25268] FAULT_INJECTION: forcing a failure. [ 3830.236936][T25268] name failslab, interval 1, probability 0, space 0, times 0 [ 3830.237380][T25268] CPU: 1 UID: 0 PID: 25268 Comm: syz.2.5359 Not tainted syzkaller #0 PREEMPT [ 3830.237492][T25268] Hardware name: ARM-Versatile Express [ 3830.237532][T25268] Call trace: [ 3830.237576][T25268] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3830.237736][T25268] r7:00000820 r6:00000000 r5:60000013 r4:82260bc4 [ 3830.237758][T25268] [<80201b08>] (show_stack) from [<8021fc00>] (dump_stack_lvl+0x70/0x7c) [ 3830.237822][T25268] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 3830.237879][T25268] r5:85ea4800 r4:82917c00 [ 3830.237896][T25268] [<8021fc0c>] (dump_stack) from [<80972dc4>] (should_fail_ex+0x1c4/0x228) [ 3830.237957][T25268] [<80972c00>] (should_fail_ex) from [<8051f300>] (should_failslab+0x6c/0x94) [ 3830.238035][T25268] r8:85ea4800 r7:00000820 r6:8485d558 r5:00000017 r4:83001240 [ 3830.238059][T25268] [<8051f294>] (should_failslab) from [<80504944>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 3830.238121][T25268] [<805048a4>] (__kmalloc_node_track_caller_noprof) from [<8049b728>] (kmemdup_noprof+0x28/0x44) [ 3830.238191][T25268] r10:00000000 r9:841ccc04 r8:eb86dbd0 r7:84000000 r6:8485d558 r5:eb86dbc8 [ 3830.238213][T25268] r4:00000017 [ 3830.238231][T25268] [<8049b700>] (kmemdup_noprof) from [<807a2100>] (sidtab_sid2str_get+0x54/0xa4) [ 3830.238303][T25268] r7:84000000 r6:eb86dbd0 r5:eb86dbc8 r4:84b180c0 [ 3830.238322][T25268] [<807a20ac>] (sidtab_sid2str_get) from [<807a9608>] (sidtab_entry_to_string+0x34/0x94) [ 3830.238389][T25268] r7:84000000 r6:84b180c0 r5:eb86dbc8 r4:0000005f [ 3830.238408][T25268] [<807a95d4>] (sidtab_entry_to_string) from [<807a9780>] (security_sid_to_context_core+0x118/0x17c) [ 3830.238477][T25268] r9:eb86dcec r8:84000000 r7:841ccc04 r6:eb86dbd0 r5:eb86dbc8 r4:0000005f [ 3830.238498][T25268] [<807a9668>] (security_sid_to_context_core) from [<807ac794>] (security_sid_to_context+0x1c/0x24) [ 3830.238597][T25268] r8:8078c8b8 r7:8078d8bc r6:85ea4800 r5:85474a40 r4:eb86dc58 [ 3830.238624][T25268] [<807ac778>] (security_sid_to_context) from [<8078d93c>] (avc_audit_post_callback+0x80/0x2f4) [ 3830.238775][T25268] [<8078d8bc>] (avc_audit_post_callback) from [<807b4d50>] (common_lsm_audit+0x104/0x148) [ 3830.239004][T25268] r10:00000000 r9:eb86dcec r8:8078c8b8 r7:8078d8bc r6:eb86dcec r5:85474a40 [ 3830.239428][T25268] r4:85ea4ff0 [ 3830.239651][T25268] [<807b4c4c>] (common_lsm_audit) from [<8078ddc8>] (slow_avc_audit+0xbc/0x114) [ 3830.239786][T25268] r8:00000055 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 3830.239941][T25268] [<8078dd0c>] (slow_avc_audit) from [<8078e84c>] (avc_has_perm+0xd8/0xe8) [ 3830.240131][T25268] r5:00000000 r4:00000004 [ 3830.240159][T25268] [<8078e774>] (avc_has_perm) from [<80794c64>] (sock_has_perm+0xd0/0xfc) [ 3830.240250][T25268] r9:eb86ddc4 r8:85ea4800 r7:85cf6080 r6:00000004 r5:83a1aa00 r4:00000000 [ 3830.240470][T25268] [<80794b94>] (sock_has_perm) from [<80794d18>] (selinux_socket_sendmsg+0x18/0x1c) [ 3830.240577][T25268] r8:eb86ddc4 r7:00000000 r6:00000000 r5:eb86df20 r4:837cec80 [ 3830.240727][T25268] [<80794d00>] (selinux_socket_sendmsg) from [<8078729c>] (security_socket_sendmsg+0x64/0x1e4) [ 3830.240893][T25268] [<80787238>] (security_socket_sendmsg) from [<81543ca0>] (__sock_sendmsg+0x1c/0x78) [ 3830.241001][T25268] r7:00000000 r6:837cec80 r5:eb86df20 r4:eb86df20 [ 3830.241031][T25268] [<81543c84>] (__sock_sendmsg) from [<81545020>] (____sys_sendmsg+0x298/0x2cc) [ 3830.241220][T25268] r7:00000000 r6:837cec80 r5:04008000 r4:eb86df20 [ 3830.241268][T25268] [<81544d88>] (____sys_sendmsg) from [<81546fe8>] (___sys_sendmsg+0x9c/0xd0) [ 3830.241386][T25268] r10:eb86de24 r9:200002c0 r8:04008000 r7:00000000 r6:837cec80 r5:eb86df20 [ 3830.241606][T25268] r4:00000000 [ 3830.241706][T25268] [<81546f4c>] (___sys_sendmsg) from [<81547480>] (__sys_sendmsg+0x8c/0xe0) [ 3830.242031][T25268] r10:00000128 r9:85ea4800 r8:85585540 r7:04008000 r6:200002c0 r5:85585541 [ 3830.242204][T25268] r4:00000003 [ 3830.242253][T25268] [<815473f4>] (__sys_sendmsg) from [<815474e8>] (sys_sendmsg+0x14/0x18) [ 3830.242324][T25268] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 3830.242342][T25268] [<815474d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3830.242398][T25268] Exception stack(0xeb86dfa8 to 0xeb86dff0) [ 3830.242435][T25268] dfa0: 00000000 00000000 00000003 200002c0 04008000 00000000 [ 3830.242473][T25268] dfc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f4d0bc [ 3830.242501][T25268] dfe0: 76f4cec0 76f4ceb0 0001948c 001322a0 [ 3830.274101][ T31] kauditd_printk_skb: 147 callbacks suppressed [ 3830.274206][ T31] audit: type=1400 audit(3830.146:67998): avc: denied { write } for pid=25267 comm="syz.2.5359" scontext=root:sysadm_r:sysadm_t tsid=95 tclass=kcm_socket permissive=1 [ 3830.824816][ T31] audit: type=1400 audit(3830.726:67999): avc: denied { write } for pid=25264 comm="syz.0.5358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3831.025587][ T31] audit: type=1400 audit(3830.916:68000): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.026163][ T31] audit: type=1400 audit(3830.926:68001): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.026454][ T31] audit: type=1400 audit(3830.936:68002): avc: denied { recv } for pid=25075 comm="syz.2.5308" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.080794][ T31] audit: type=1400 audit(3830.986:68003): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.111982][ T31] audit: type=1400 audit(3831.016:68004): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.158574][ T31] audit: type=1400 audit(3831.066:68005): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.160252][ T31] audit: type=1400 audit(3831.066:68006): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3831.165167][ T31] audit: type=1400 audit(3831.076:68007): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.699555][ T31] kauditd_printk_skb: 80 callbacks suppressed [ 3835.699933][ T31] audit: type=1400 audit(3835.606:68088): avc: denied { read append } for pid=25290 comm="syz.2.5365" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3835.723445][ T31] audit: type=1400 audit(3835.626:68089): avc: denied { read append open } for pid=25290 comm="syz.2.5365" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3835.860203][ T31] audit: type=1400 audit(3835.766:68090): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.860614][ T31] audit: type=1400 audit(3835.766:68091): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.905628][ T31] audit: type=1400 audit(3835.816:68092): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.934763][ T31] audit: type=1400 audit(3835.846:68093): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.975078][ T31] audit: type=1400 audit(3835.886:68094): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3836.021468][ T31] audit: type=1400 audit(3835.926:68095): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3836.025200][ T31] audit: type=1400 audit(3835.936:68096): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3836.085433][ T31] audit: type=1400 audit(3835.986:68097): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.899333][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 3840.899687][ T31] audit: type=1400 audit(3840.806:68228): avc: denied { write } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3840.907886][ T31] audit: type=1400 audit(3840.816:68229): avc: denied { write } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3840.936538][ T31] audit: type=1400 audit(3840.846:68230): avc: denied { read } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3840.982948][ T31] audit: type=1400 audit(3840.886:68231): avc: denied { read } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3840.988658][ T31] audit: type=1400 audit(3840.896:68232): avc: denied { create } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3840.995712][ T31] audit: type=1400 audit(3840.906:68233): avc: denied { write } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3841.043244][ T31] audit: type=1400 audit(3840.946:68234): avc: denied { write } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3841.043577][ T31] audit: type=1400 audit(3840.946:68235): avc: denied { read } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3841.043815][ T31] audit: type=1400 audit(3840.946:68236): avc: denied { read } for pid=25308 comm="syz.0.5371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3841.076756][ T31] audit: type=1400 audit(3840.986:68237): avc: denied { ioctl } for pid=25308 comm="syz.0.5371" path="socket:[58798]" dev="sockfs" ino=58798 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3845.973557][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 3845.973845][ T31] audit: type=1400 audit(3845.886:68278): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3845.977984][ T31] audit: type=1400 audit(3845.886:68279): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3845.995807][ T31] audit: type=1400 audit(3845.906:68280): avc: denied { unmount } for pid=23658 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3846.022529][ T31] audit: type=1400 audit(3845.926:68281): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3846.034627][ T31] audit: type=1400 audit(3845.946:68282): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3846.044789][ T31] audit: type=1400 audit(3845.956:68283): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3846.071662][ T31] audit: type=1400 audit(3845.976:68284): avc: denied { recv } for pid=3120 comm="syz-executor" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3846.122997][ T31] audit: type=1400 audit(3846.016:68285): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43846 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3846.123319][ T31] audit: type=1400 audit(3846.026:68286): avc: denied { recv } for pid=3119 comm="sshd-session" saddr=127.0.0.1 src=43846 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3846.171981][ T31] audit: type=1400 audit(3846.066:68287): avc: denied { recv } for pid=24558 comm="syz.2.5150" saddr=10.0.2.2 src=40934 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 4147.843099][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 4147.847916][ C1] rcu: 0-...0: (1 GPs behind) idle=018c/1/0x40000002 softirq=168767/168768 fqs=5998 [ 4147.850119][ C1] rcu: hardirqs softirqs csw/system [ 4147.851318][ C1] rcu: number: 0 0 0 [ 4147.851973][ C1] rcu: cputime: 0 0 0 ==> 150000(ms) [ 4147.852669][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P25344/3:b..l [ 4147.853576][ C1] rcu: (detected by 1, t=30002 jiffies, g=346089, q=610 ncpus=2) [ 4147.854458][ C1] Sending NMI from CPU 1 to CPUs 0: [ 4157.942337][ C1] task:syz.0.5376 state:R running task stack:0 pid:25344 tgid:25337 ppid:23658 task_flags:0x400040 flags:0x00000005 [ 4157.943944][ C1] Call trace: [ 4157.944387][ C1] [<81a3d95c>] (__schedule) from [<81a3ea88>] (preempt_schedule+0x4c/0xb4) [ 4157.945361][ C1] r10:00000003 r9:ec11dd88 r8:85f8d400 r7:8046b954 r6:00000001 r5:85ea3c00 [ 4157.946203][ C1] r4:81a47858 [ 4157.946582][ C1] [<81a3ea3c>] (preempt_schedule) from [<81a47858>] (_raw_spin_unlock+0x4c/0x50) [ 4157.947624][ C1] r7:85ea3c00 r6:0000024b r5:0000024b r4:85595380 [ 4157.948278][ C1] [<81a4780c>] (_raw_spin_unlock) from [<8046b954>] (filemap_map_pages+0x4f4/0x694) [ 4157.949186][ C1] [<8046b460>] (filemap_map_pages) from [<804c75d0>] (handle_mm_fault+0xb98/0x14dc) [ 4157.950121][ C1] r10:00000000 r9:00000040 r8:85595380 r7:00000000 r6:2024c000 r5:85ea3c00 [ 4157.950727][ C1] r4:00000014 [ 4157.951120][ C1] [<804c6a38>] (handle_mm_fault) from [<804b8f84>] (__get_user_pages+0x254/0x6f0) [ 4157.951678][ C1] r10:0000024c r9:2024c000 r8:85ea3c00 r7:00000000 r6:00000014 r5:85f8d400 [ 4157.951943][ C1] r4:00210008 [ 4157.952521][ C1] [<804b8d30>] (__get_user_pages) from [<804bbc04>] (populate_vma_page_range+0xd8/0x220) [ 4157.953562][ C1] r10:20000000 r9:85595380 r8:ec11deb8 r7:20b36000 r6:20000000 r5:85f8d400 [ 4157.954308][ C1] r4:00000b36 [ 4157.954679][ C1] [<804bbb2c>] (populate_vma_page_range) from [<804bc3e4>] (__mm_populate+0x11c/0x1b8) [ 4157.955738][ C1] r10:20000000 r9:85595404 r8:00000001 r7:85595380 r6:20b36000 r5:20b36000 [ 4157.956675][ C1] r4:85f8d400 [ 4157.956996][ C1] [<804bc2c8>] (__mm_populate) from [<8049cca0>] (vm_mmap_pgoff+0x18c/0x204) [ 4157.957770][ C1] r10:85595380 r9:20000000 r8:00b36000 r7:ec11df18 r6:00000000 r5:06ebbeee [ 4157.958695][ C1] r4:20000000 [ 4157.958892][ C1] [<8049cb14>] (vm_mmap_pgoff) from [<804cec2c>] (ksys_mmap_pgoff+0x48/0xec) [ 4157.959724][ C1] r10:000000c0 r9:85ea3c00 r8:8020029c r7:20000000 r6:00b36000 r5:06ebbeee [ 4157.960394][ C1] r4:00008031 [ 4157.960702][ C1] [<804cebe4>] (ksys_mmap_pgoff) from [<804cecec>] (sys_mmap_pgoff+0x1c/0x24) [ 4157.961583][ C1] r8:8020029c r7:000000c0 r6:003063b4 r5:00000000 r4:ffffffff [ 4157.962216][ C1] [<804cecd0>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4157.963010][ C1] Exception stack(0xec11dfa8 to 0xec11dff0) [ 4157.963588][ C1] dfa0: ffffffff 00000000 20000000 00b36000 06ebbeee 00008031 [ 4157.964388][ C1] dfc0: ffffffff 00000000 003063b4 000000c0 002f0000 00000000 00006364 76efa0bc [ 4157.965350][ C1] dfe0: 76ef9ec0 76ef9eb0 0001948c 001322a0 VM DIAGNOSIS: 15:18:52 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000000 R03=00000000 R04=eae4a090 R05=00000000 R06=830fdc68 R07=00000001 R08=00000005 R09=ec14f000 R10=830fdcb8 R11=df801f1c R12=ec147e90 R13=df801ee8 R14=00000180 R15=81495714 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84b44c40 R01=00000073 R02=eb87f000 R03=00000000 R04=8322402d R05=84b44c40 R06=80a79c9c R07=83224046 R08=82826ef8 R09=00000000 R10=00002b68 R11=df805acc R12=00000002 R13=df805ac0 R14=829590c4 R15=80a79cf4 PSR=80000193 N--- A S svc32 s00=fc000000 s01=ffffffff d00=fffffffffc000000 s02=fc000000 s03=00042065 d01=00042065fc000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=00270f0a s09=ffcc2301 d04=ffcc230100270f0a s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=ffb8a2ec s13=00676744 d06=00676744ffb8a2ec s14=ffffffff s15=00000000 d07=00000000ffffffff s16=00000000 s17=031496dc d08=031496dc00000000 s18=e0000000 s19=ffffcae1 d09=ffffcae1e0000000 s20=fe6d654b s21=00676745 d10=00676745fe6d654b s22=ffffffff s23=00000000 d11=00000000ffffffff s24=fe270f0a s25=ffffffff d12=fffffffffe270f0a s26=fc000000 s27=00042065 d13=00042065fc000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=015c3e35 s33=ffe268ff d16=ffe268ff015c3e35 s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=ffdeb718 s37=00b22ece d18=00b22eceffdeb718 s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=ffb052d0 s43=ffffffff d21=ffffffffffb052d0 s44=ffffffff s45=ffffffff d22=ffffffffffffffff s46=ffe570f0 s47=ffffffff d23=ffffffffffe570f0 s48=012232fd s49=031496dc d24=031496dc012232fd s50=fe0761d0 s51=ffffffff d25=fffffffffe0761d0 s52=feb5a201 s53=00cb2614 d26=00cb2614feb5a201 s54=ff8790e0 s55=fe709a24 d27=fe709a24ff8790e0 s56=018b3a95 s57=ff6237f8 d28=ff6237f8018b3a95 s58=ffb11bfc s59=ff8790e0 d29=ff8790e0ffb11bfc s60=057f8478 s61=00042066 d30=00042066057f8478 s62=5e1fad3a s63=ffa3301b d31=ffa3301b5e1fad3a FPSCR: 00000000