last executing test programs: 9.451579074s ago: executing program 1 (id=441): r0 = syz_ublk_setup_io_uring(0x3323, &(0x7f0000000000)={0x0, 0x64ea, 0x1000, 0x3, 0x36a}, &(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) fcntl$setsig(r0, 0xa, 0xb) syz_io_uring_setup(0x7162, &(0x7f0000001080)={0x0, 0xb5ee, 0x80, 0x1, 0x314}, &(0x7f0000001100)=0x0, &(0x7f0000001140)=0x0, &(0x7f0000001180)) syz_io_uring_complete(r2, r3) syz_io_uring_complete(r1, r3) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r5, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = dup3(r5, r4, 0x0) r7 = accept$inet6(r6, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x5450, 0x0) r8 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) r9 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$KDDISABIO(r9, 0x5451) r10 = mq_open(&(0x7f0000000040)='*\x00@\x00', 0x2, 0xc4, &(0x7f0000000080)={0x2, 0x4, 0x248}) ioctl$AUTOFS_IOC_EXPIRE(r10, 0x5451, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r10, 0x5452, &(0x7f0000000800)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000e80)={r11, 0x0, 0x100000000}) ioctl$BTRFS_IOC_BALANCE_V2(r9, 0xc4009420, &(0x7f0000000400)={0x0, 0x0, {0x6, @usage=0xfffffffffffff732, r11, 0x100000001, 0x80000000, 0x7fffffffffffffff, 0x7fff, 0x0, 0x8, @struct={0x7}, 0xe00000, 0x4, [0x8000, 0x7fffffffffffffff, 0x0, 0x7, 0x8, 0x82]}, {0x1, @usage=0x80, 0x0, 0x1000, 0x200, 0x8000000000000001, 0x8000, 0x20, 0x5, @struct={0x7, 0x1ff}, 0x7, 0x5, [0x8, 0x1f, 0x3c9, 0x9, 0x0, 0x99]}, {0x0, @usage, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x7ff, 0x0, 0x95, @usage=0x6, 0x3, 0x3ec, [0x2, 0x28, 0x3ff, 0x7, 0x7, 0xf3ae]}, {0x5, 0x1, 0xfffffffffffffff7}}) ioctl$BTRFS_IOC_DEV_REPLACE(r8, 0xca289435, &(0x7f0000000700)={0x0, 0xfffffffffffffffa, @start={r11, 0x0, "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", "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"}, [0x1, 0x1, 0x6, 0xff, 0x2000, 0x8, 0xffffffffffff18fe, 0x8000, 0xfffffffffffffeff, 0x7, 0x2, 0x9, 0x6, 0x0, 0x0, 0x5, 0x2, 0xd, 0x100000001, 0x6, 0xffffffff7fffffff, 0x7, 0x1, 0xfffffffffffffff9, 0x4, 0x800, 0x33, 0x2816, 0x2, 0x0, 0x5, 0x7, 0x4e, 0x23, 0x1, 0x2, 0x6, 0x50, 0x9, 0x6, 0x8000000000000001, 0x800, 0x6, 0x5, 0x4, 0x8000, 0x5, 0xc, 0x100000000, 0x95, 0x7, 0xd66, 0xd1c4, 0x68fb, 0x854, 0x8, 0x3, 0xfffffffffffffffd, 0x9, 0x9, 0x9, 0x6, 0x3, 0x2]}) 8.981569663s ago: executing program 1 (id=443): pipe2$watch_queue(&(0x7f0000000000), 0xb82e336200000000) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004029) 8.742559977s ago: executing program 1 (id=444): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x9, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x8800) syz_usb_connect(0x2, 0x5, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001080)='./file0/file0\x00', 0x99102, 0x81) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r0) sendmsg$GTP_CMD_ECHOREQ(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x4) r3 = open(&(0x7f0000000180)='./file0\x00', 0x80943, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) keyctl$clear(0x7, 0xfffffffffffffff9) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) close(r3) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000001040)='./file1\x00', 0x42, 0x101) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) write$binfmt_elf64(r5, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x100) 5.281552752s ago: executing program 1 (id=446): r0 = openat$tun(0xffffff9c, &(0x7f0000000080), 0x80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0xb2c2, 0x0) r4 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000ff3790a08f9597f4819d2edb0b4340fefd35497b87ea", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x804c094}, 0x8040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x141}, 0x18) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f00000000c0)) r7 = dup2(r5, r3) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(r9, 0x5452, &(0x7f0000000040)={0xfe80, {0x2, 0x0, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @multicast2}}) sendmsg$IPSET_CMD_PROTOCOL(r8, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={0x0}}, 0x0) r10 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/comedi2\x00', 0x2000, 0x0) ioctl$COMEDI_BUFCONFIG(r10, 0x8020640d, 0x0) sendmsg$NL80211_CMD_FRAME(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x40) sendmsg$inet(r2, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000025c0)}, 0x0) syz_open_dev$mouse(&(0x7f00000000c0), 0x5, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r12 = dup(r11) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETIFF(r13, 0x5450, 0x0) r14 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r14, 0x5451, 0x0) write$FUSE_NOTIFY_STORE(r13, &(0x7f0000000100)=ANY=[@ANYBLOB="31000000040000000000000000000000050000000000000061090000000000000900000000002000"/49], 0x31) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5450, 0x0) 4.081956464s ago: executing program 0 (id=449): r0 = syz_open_dev$audion(&(0x7f0000000000), 0x3, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x1) (fail_nth: 2) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f00000000c0)={0x9, 0x7, 0x3, 0x3b, 0x0, [0x4d, 0x1, 0x7fffffff, 0x7]}) r1 = socket$unix(0x1, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x800) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$XFS_IOC_ERROR_CLEARALL(r2, 0x40085875) r3 = syz_open_dev$audion(&(0x7f0000000100), 0x0, 0xb0900) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast2}, &(0x7f00000001c0)=0xc) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xac, 0x13, 0x400, 0x70bd29, 0x25dfdbfe, {0xa, 0xd, 0xf, 0x3, {0x4e24, 0x4e21, [0x6, 0x6, 0x10000, 0x7], [0x9, 0x10, 0xa, 0x8], r4, [0x0, 0x7]}, 0x741, 0x81}, [@INET_DIAG_REQ_BYTECODE={0x5f, 0x1, "f54e493ade3db50a4733c957b93a2e1b8faed2a6357a7a9857ebd210c3561062ec77249a1a2cfdc65534e1f05bdf7148b66b68316e9b9ce9f5c1d2273a5590ec50653c08d17b58d911d77e544f0ddffc152411b9dca43730ecd5a0"}]}, 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000340)={{0x0, 0x2, 0x7, 0x5, 0x5a0, 0x7, 0x2e, 0x5, 0x2, 0x3, 0xf, 0x8001, 0x4, 0x1, 0x8}, 0x48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP(r3, 0xd0009412, &(0x7f0000000400)={r5, 0x400}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001400)=@can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x3, 0x0, 0x0, "4d53f63520eb4121"}, 0x10}, 0x1, 0x0, 0x0, 0x10000}, 0x4000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r6, &(0x7f0000001580)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x30, 0x4, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8004) r7 = accept4$inet(r3, &(0x7f00000015c0)={0x2, 0x0, @private}, &(0x7f0000001600)=0x10, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001680), r0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r8, &(0x7f0000001780)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001740)={&(0x7f00000016c0)={0x5c, r9, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x1, 0x69}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0xffff}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x7}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x2c, 0x84, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="7f37c2f808fd"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008804}, 0x44001) r10 = dup3(r7, r8, 0x0) r11 = openat$selinux_access(0xffffff9c, &(0x7f00000017c0), 0x2, 0x0) ftruncate(r11, 0x4) write$P9_RRENAMEAT(r3, &(0x7f0000001800)={0x7, 0x4b, 0x2}, 0x7) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f00000019c0)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001980)={&(0x7f0000001880)={0xd4, 0x0, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x18}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3b5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x40}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0xb6ea}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0xfffffffa}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1cd9}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x7468}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x266a}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x5}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0xd4}}, 0x80) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000001b00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a40)={0x54, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x200408d4}, 0x20010000) ioctl$TUNSETCARRIER(r10, 0x400454e2, &(0x7f0000001b40)=0x1) openat$sysfs(0xffffff9c, &(0x7f0000001b80)='/sys/kernel/oops_count', 0x2040, 0xa) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000001c00)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f0000001cc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x1c, r9, 0x100, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r12}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x91}, 0x4004010) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000001d00)) 3.670863261s ago: executing program 0 (id=450): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x9, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x8800) syz_usb_connect(0x2, 0x5, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001080)='./file0/file0\x00', 0x99102, 0x81) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r0) sendmsg$GTP_CMD_ECHOREQ(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x4) r3 = open(&(0x7f0000000180)='./file0\x00', 0x80943, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) keyctl$clear(0x7, 0xfffffffffffffff9) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) close(r3) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r5 = openat(0xffffffffffffff9c, &(0x7f0000001040)='./file1\x00', 0x42, 0x101) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) write$binfmt_elf64(r5, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x100) 2.563537502s ago: executing program 1 (id=451): r0 = socket$inet6_icmp(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x5450, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000010c0)) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_socket_connect_nvme_tcp() sendto(0xffffffffffffffff, 0x0, 0x0, 0x20044844, &(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @local, 0x1}, 0x80) exit(0xffff) openat(0xffffffffffffff9c, &(0x7f0000005180)='./file1\x00', 0x42, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000000)="a59bb9fe7b8e661156a7feb03d720f187eed00fb060206612983b3ce41029fad02e539c7950f64af1a9c3dc216f001c519e08b6e6783ced84e14d55caf0397eb18747be9aa022c992fe00308de2b2c2b935e23a011fec500911129", 0x5b) 632.608308ms ago: executing program 0 (id=452): r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000140)="6cf08161e0736b6c6d1e5c44f55819fc1e42db9ceb82f8da77ec1786662476be8ed235ffe9cf3fa91d2328ee65dfa2d435b3a5f215693fab552bcca7e3587ce7d07e5baf1f678aed2c3a20305bd0e1d24bc462e83458", 0x56, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e24, 0x40, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xe9}, 0x1c) 511.74997ms ago: executing program 0 (id=453): pipe2$watch_queue(&(0x7f0000000000), 0xb82e336200000000) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004029) 439.631661ms ago: executing program 0 (id=454): r0 = openat$vcs(0xffffff9c, &(0x7f0000001c80), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket(0x1e, 0x4, 0x9) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="10000000", @ANYRES16=0x0, @ANYBLOB="00022abd7000fcdbdf250a000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40) 278.958455ms ago: executing program 0 (id=455): r0 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000000), 0x8041, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20002001}, 0x96082edcfbf870bc) r1 = landlock_create_ruleset(&(0x7f0000000080)={0x82f8}, 0x18, 0x0) landlock_restrict_self(r1, 0x5) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82187201, 0x0) r3 = getpgrp(0x0) syz_pidfd_open(r3, 0x0) r4 = openat$fuse(0xffffff9c, &(0x7f0000002280), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$ARCH_MAP_VDSO_64(0x1e, r5, 0x5ae6, 0x2003) openat$drirender128(0xffffff9c, &(0x7f0000000040), 0x2002, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = dup3(r7, r6, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvmsg(r6, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0xfffffffffffffef3, 0x0}, 0x0) close(r9) ioctl$FS_IOC_MEASURE_VERITY(r8, 0x5451, 0x0) unshare(0x28000600) syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000002240), 0x7fffffff, 0x100) r10 = syz_open_procfs$namespace(r3, &(0x7f0000000080)='ns/net\x00') ioctl$NS_GET_PARENT(r10, 0xb702, 0x0) openat$dlm_monitor(0xffffff9c, &(0x7f00000022c0), 0x0, 0x0) close(r6) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)=0x4) 0s ago: executing program 1 (id=456): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x9, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x8800) syz_usb_connect(0x2, 0x5, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001080)='./file0/file0\x00', 0x99102, 0x81) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000240), r0) sendmsg$GTP_CMD_ECHOREQ(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x4) r3 = open(&(0x7f0000000180)='./file0\x00', 0x80943, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) keyctl$clear(0x7, 0xfffffffffffffff9) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) close(r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000001040)='./file1\x00', 0x42, 0x101) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) write$binfmt_elf64(r5, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x100) kernel console output (not intermixed with test programs): syzkaller login: [ 39.858309][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 39.861555][ T28] audit: type=1400 audit(39.780:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.863513][ T28] audit: type=1400 audit(39.780:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:7258' (ED25519) to the list of known hosts. [ 56.067554][ T28] audit: type=1400 audit(55.970:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 57.834024][ T28] audit: type=1400 audit(57.750:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 57.839262][ T28] audit: type=1400 audit(57.760:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.449849][ T28] audit: type=1400 audit(60.370:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 60.453550][ T28] audit: type=1400 audit(60.370:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.463812][ T3091] cgroup: Unknown subsys name 'net' [ 60.468840][ T28] audit: type=1400 audit(60.390:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.604628][ T3091] cgroup: Unknown subsys name 'cpuset' [ 60.610501][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 60.611433][ T3091] cgroup: Unknown subsys name 'rlimit' [ 60.805537][ T28] audit: type=1400 audit(60.720:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 60.805932][ T28] audit: type=1400 audit(60.720:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 60.814854][ T28] audit: type=1400 audit(60.730:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 61.011393][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 61.015456][ T28] audit: type=1400 audit(60.930:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.037275][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 69.058823][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 69.059102][ T28] audit: type=1400 audit(68.980:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 69.115149][ T28] audit: type=1400 audit(69.030:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.116337][ T28] audit: type=1400 audit(69.030:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.121048][ T28] audit: type=1400 audit(69.040:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 69.134733][ T28] audit: type=1400 audit(69.050:75): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 69.136200][ T28] audit: type=1400 audit(69.050:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 69.187879][ T28] audit: type=1400 audit(69.110:77): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 69.544246][ T28] audit: type=1400 audit(69.460:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.447552][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.456067][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.606066][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.614569][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.311796][ T3096] hsr_slave_0: entered promiscuous mode [ 71.315220][ T3096] hsr_slave_1: entered promiscuous mode [ 71.482914][ T3097] hsr_slave_0: entered promiscuous mode [ 71.484771][ T3097] hsr_slave_1: entered promiscuous mode [ 71.489943][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 71.491320][ T3097] Cannot create hsr debugfs directory [ 71.630172][ T28] audit: type=1400 audit(71.550:79): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 71.630594][ T28] audit: type=1400 audit(71.550:80): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 71.637597][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.643291][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 71.648485][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.652393][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 71.655120][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.661394][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 71.663131][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.668056][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 71.851595][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 71.855331][ T3097] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 71.860585][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 71.876307][ T3097] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 71.881904][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 71.891564][ T3097] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 71.896203][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 71.903674][ T3097] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 72.279128][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.589259][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.089271][ T3096] veth0_vlan: entered promiscuous mode [ 75.121475][ T3096] veth1_vlan: entered promiscuous mode [ 75.196010][ T3096] veth0_macvtap: entered promiscuous mode [ 75.225832][ T3096] veth1_macvtap: entered promiscuous mode [ 75.304555][ T3097] veth0_vlan: entered promiscuous mode [ 75.350605][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.353142][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.353310][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.353470][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.364279][ T3097] veth1_vlan: entered promiscuous mode [ 75.510461][ T3097] veth0_macvtap: entered promiscuous mode [ 75.512471][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 75.512965][ T28] audit: type=1400 audit(75.420:82): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 75.527617][ T28] audit: type=1400 audit(75.440:83): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.OnuoC9/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 75.532275][ T3097] veth1_macvtap: entered promiscuous mode [ 75.554728][ T28] audit: type=1400 audit(75.470:84): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 75.592943][ T28] audit: type=1400 audit(75.500:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.OnuoC9/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 75.593446][ T28] audit: type=1400 audit(75.500:86): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.OnuoC9/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 75.600733][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.601290][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.601423][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.601497][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.616213][ T28] audit: type=1400 audit(75.530:87): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 75.634360][ T28] audit: type=1400 audit(75.550:88): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 75.644696][ T28] audit: type=1400 audit(75.560:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=2301 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 75.653172][ T28] audit: type=1400 audit(75.570:90): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 75.684677][ T28] audit: type=1400 audit(75.600:91): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 75.787457][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 75.789731][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.771574][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 82.771820][ T28] audit: type=1400 audit(82.690:108): avc: denied { create } for pid=3760 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 82.800484][ T3761] Zero length message leads to an empty skb [ 83.226925][ T28] audit: type=1400 audit(83.140:109): avc: denied { create } for pid=3765 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 84.017306][ T3779] SELinux: Context $> is not valid (left unmapped). [ 84.022194][ T28] audit: type=1400 audit(83.940:110): avc: denied { relabelto } for pid=3778 comm="syz.1.26" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="$>" [ 84.025918][ T28] audit: type=1400 audit(83.940:111): avc: denied { associate } for pid=3778 comm="syz.1.26" name="uinput" dev="devtmpfs" ino=698 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="$>" [ 84.051887][ T28] audit: type=1400 audit(83.970:112): avc: denied { create } for pid=3778 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 84.065467][ T28] audit: type=1400 audit(83.980:113): avc: denied { bind } for pid=3778 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 84.240294][ T28] audit: type=1400 audit(84.160:114): avc: denied { ioctl } for pid=3778 comm="syz.1.26" path="socket:[3251]" dev="sockfs" ino=3251 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 84.707380][ T28] audit: type=1400 audit(84.620:115): avc: denied { read write } for pid=3785 comm="syz.1.29" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 84.707866][ T28] audit: type=1400 audit(84.620:116): avc: denied { open } for pid=3785 comm="syz.1.29" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 85.248640][ T28] audit: type=1400 audit(85.170:117): avc: denied { create } for pid=3796 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 85.253858][ T3797] FAULT_INJECTION: forcing a failure. [ 85.253858][ T3797] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 85.258669][ T3797] CPU: 1 UID: 0 PID: 3797 Comm: syz.1.33 Not tainted syzkaller #0 PREEMPT [ 85.258867][ T3797] Hardware name: ARM-Versatile Express [ 85.259019][ T3797] Call trace: [ 85.259196][ T3797] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 85.260089][ T3797] r7:600f0013 r6:600f0013 r5:8231c350 r4:00000000 [ 85.260147][ T3797] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 85.260178][ T3797] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 85.260209][ T3797] r7:00000003 r6:00000000 r5:84728c40 r4:82b4ee88 [ 85.260219][ T3797] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 85.260250][ T3797] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 85.260283][ T3797] r8:00000003 r7:00000003 r6:20000140 r5:83334380 r4:00000000 [ 85.260291][ T3797] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 85.260320][ T3797] [<809cd408>] (should_fail_usercopy) from [<8059b0b0>] (do_fcntl+0x810/0x908) [ 85.260357][ T3797] [<8059a8a0>] (do_fcntl) from [<8059b218>] (sys_fcntl+0x70/0xd0) [ 85.260401][ T3797] r8:00000003 r7:20000140 r6:00000010 r5:00000000 r4:83334381 [ 85.260410][ T3797] [<8059b1a8>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 85.260476][ T3797] Exception stack(0xea545fa8 to 0xea545ff0) [ 85.260584][ T3797] 5fa0: 00000000 00000000 00000003 00000010 20000140 00000000 [ 85.260634][ T3797] 5fc0: 00000000 00000000 0012f1a4 00000037 003462d8 00000000 00000001 76f310dc [ 85.260694][ T3797] 5fe0: 76f30e88 76f30e78 00018e58 001307a0 [ 85.260751][ T3797] r9:84728c40 r8:8020029c r7:00000037 r6:0012f1a4 r5:00000000 r4:00000000 [ 85.678278][ T40] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 85.837549][ T40] usb 2-1: Using ep0 maxpacket: 16 [ 85.853368][ T40] usb 2-1: config 1 interface 0 altsetting 9 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 85.853700][ T40] usb 2-1: config 1 interface 0 has no altsetting 0 [ 85.867986][ T40] usb 2-1: New USB device found, idVendor=05ac, idProduct=0247, bcdDevice= 0.40 [ 85.868187][ T40] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 85.870401][ T40] usb 2-1: Product: х [ 85.870816][ T40] usb 2-1: Manufacturer: Д [ 85.870979][ T40] usb 2-1: SerialNumber: х [ 86.179361][ T40] usbhid 2-1:1.0: can't add hid device: -71 [ 86.180645][ T40] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 86.187583][ T40] usb 2-1: USB disconnect, device number 2 [ 86.878490][ T3816] FAULT_INJECTION: forcing a failure. [ 86.878490][ T3816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.878720][ T3816] CPU: 1 UID: 0 PID: 3816 Comm: syz.1.36 Not tainted syzkaller #0 PREEMPT [ 86.878767][ T3816] Hardware name: ARM-Versatile Express [ 86.878781][ T3816] Call trace: [ 86.878802][ T3816] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 86.878859][ T3816] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 86.878868][ T3816] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 86.878894][ T3816] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 86.878922][ T3816] r7:b5403587 r6:00000000 r5:83e13100 r4:82b4ee88 [ 86.878930][ T3816] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 86.878959][ T3816] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 86.878990][ T3816] r8:00000000 r7:b5403587 r6:76f30b80 r5:00000000 r4:ea5c1fb0 [ 86.878998][ T3816] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 86.879023][ T3816] [<809cd408>] (should_fail_usercopy) from [<8022a2d8>] (restore_sigframe+0x90/0x210) [ 86.879050][ T3816] [<8022a248>] (restore_sigframe) from [<8022a498>] (sys_sigreturn+0x40/0x60) [ 86.879078][ T3816] r7:00000077 r6:0012f1a4 r5:00000000 r4:ea5c1fb0 [ 86.879167][ T3816] [<8022a458>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 86.879212][ T3816] Exception stack(0xea5c1fa8 to 0xea5c1ff0) [ 86.879327][ T3816] 1fa0: 00000000 00000000 00000011 20000240 00004000 00000000 [ 86.879356][ T3816] 1fc0: 00000000 00000000 0012f1a4 00000077 003462d8 00000000 00000001 76f310dc [ 86.879476][ T3816] 1fe0: 76f30e88 76f30b80 000f3910 000f3918 [ 86.879558][ T3816] r5:00000000 r4:00000000 [ 89.899466][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 89.902223][ T28] audit: type=1400 audit(89.820:123): avc: denied { allowed } for pid=3836 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 89.987689][ T28] audit: type=1400 audit(89.900:124): avc: denied { create } for pid=3836 comm="syz.0.42" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 90.039518][ T28] audit: type=1400 audit(89.960:125): avc: denied { map } for pid=3836 comm="syz.0.42" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3328 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 90.097904][ T28] audit: type=1400 audit(90.020:126): avc: denied { read write } for pid=3836 comm="syz.0.42" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3328 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 90.429373][ T3840] FAULT_INJECTION: forcing a failure. [ 90.429373][ T3840] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.431946][ T3840] CPU: 0 UID: 0 PID: 3840 Comm: syz.0.43 Not tainted syzkaller #0 PREEMPT [ 90.432097][ T3840] Hardware name: ARM-Versatile Express [ 90.432130][ T3840] Call trace: [ 90.432185][ T3840] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 90.432290][ T3840] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 90.432312][ T3840] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 90.432367][ T3840] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 90.432432][ T3840] r7:00000000 r6:00000000 r5:846c6200 r4:82b4ee88 [ 90.432469][ T3840] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 90.432536][ T3840] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 90.432603][ T3840] r8:76f4cf08 r7:00000000 r6:00000000 r5:ea5c1f68 r4:00000002 [ 90.432621][ T3840] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 90.432683][ T3840] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 90.432761][ T3840] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 90.432833][ T3840] r10:80643b14 r9:00000001 r8:00000002 r7:ea5c1f68 r6:0000000f r5:76f4cf08 [ 90.432857][ T3840] r4:846c6200 r3:ea5c1e9f [ 90.432874][ T3840] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 90.432949][ T3840] r8:846c6200 r7:ea5c1f68 r6:76f4cf08 r5:83336e80 r4:0000000f [ 90.432969][ T3840] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 90.433039][ T3840] r10:00000003 r9:846c6200 r8:8020029c r7:00000000 r6:00000000 r5:83336e80 [ 90.433060][ T3840] r4:83336e80 [ 90.433079][ T3840] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 90.433185][ T3840] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 90.433203][ T3840] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 90.433256][ T3840] Exception stack(0xea5c1fa8 to 0xea5c1ff0) [ 90.433316][ T3840] 1fa0: 00000000 00000000 00000004 76f4cf08 0000000f 00000000 [ 90.433371][ T3840] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f4d0dc [ 90.433404][ T3840] 1fe0: 76f4ce58 76f4ce44 0010b9c4 001125a8 [ 97.737888][ T3882] capability: warning: `syz.1.59' uses deprecated v2 capabilities in a way that may be insecure [ 98.480311][ T28] audit: type=1400 audit(98.400:127): avc: denied { setopt } for pid=3885 comm="syz.1.61" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.489923][ T3886] capability: warning: `syz.1.61' uses 32-bit capabilities (legacy support in use) [ 99.541285][ T3900] FAULT_INJECTION: forcing a failure. [ 99.541285][ T3900] name failslab, interval 1, probability 0, space 0, times 1 [ 99.547504][ T3900] CPU: 0 UID: 0 PID: 3900 Comm: syz.0.65 Not tainted syzkaller #0 PREEMPT [ 99.547630][ T3900] Hardware name: ARM-Versatile Express [ 99.547691][ T3900] Call trace: [ 99.547739][ T3900] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 99.547863][ T3900] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 99.547921][ T3900] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 99.547981][ T3900] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 99.548041][ T3900] r7:00000000 r6:00000000 r5:83e13100 r4:82b17e08 [ 99.548059][ T3900] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 99.548122][ T3900] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 99.548199][ T3900] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 99.548219][ T3900] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 99.548275][ T3900] [<8052d190>] (__kmalloc_noprof) from [<8080b390>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 99.548345][ T3900] r10:00000000 r9:830c0000 r8:00000000 r7:8342c110 r6:83333328 r5:00001000 [ 99.548367][ T3900] r4:00000000 [ 99.548384][ T3900] [<8080b354>] (tomoyo_realpath_from_path) from [<80807458>] (tomoyo_path_number_perm+0xcc/0x22c) [ 99.548461][ T3900] r10:00000000 r9:00000004 r8:83333300 r7:00005403 r6:81cda174 r5:00000004 [ 99.548506][ T3900] r4:83333328 r3:828d1400 [ 99.548550][ T3900] [<8080738c>] (tomoyo_path_number_perm) from [<8080bdac>] (tomoyo_file_ioctl+0x1c/0x20) [ 99.548621][ T3900] r10:83e13100 r9:00000004 r8:83333300 r7:00000000 r6:00000000 r5:00005403 [ 99.548640][ T3900] r4:83333300 [ 99.548657][ T3900] [<8080bd90>] (tomoyo_file_ioctl) from [<807b6e34>] (security_file_ioctl+0x80/0x1d4) [ 99.548715][ T3900] [<807b6db4>] (security_file_ioctl) from [<8059c0b4>] (sys_ioctl+0x4c/0xb5c) [ 99.548785][ T3900] r7:00000000 r6:00005403 r5:83333301 r4:00000000 [ 99.548808][ T3900] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 99.548857][ T3900] Exception stack(0xea90dfa8 to 0xea90dff0) [ 99.548893][ T3900] dfa0: 00000000 00000000 00000004 00005403 00000000 00000000 [ 99.548929][ T3900] dfc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76f4d0dc [ 99.548958][ T3900] dfe0: 76f4ce88 76f4ce78 00018e58 001307a0 [ 99.548994][ T3900] r10:00000036 r9:83e13100 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 99.549017][ T3900] r4:00000000 [ 99.567955][ T3900] ERROR: Out of memory at tomoyo_realpath_from_path. [ 99.859103][ T28] audit: type=1400 audit(99.780:128): avc: denied { create } for pid=3904 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 100.072734][ T3910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3910 comm=syz.0.69 [ 100.903410][ T3925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3925 comm=syz.1.74 [ 101.039072][ T28] audit: type=1400 audit(100.960:129): avc: denied { write } for pid=3928 comm="syz.0.76" path="socket:[2674]" dev="sockfs" ino=2674 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.247537][ T3702] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 101.378217][ T3702] usb 2-1: device descriptor read/64, error -71 [ 101.617007][ T3702] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 101.747416][ T3702] usb 2-1: device descriptor read/64, error -71 [ 101.858573][ T3702] usb usb2-port1: attempt power cycle [ 102.197548][ T3702] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 102.219997][ T3702] usb 2-1: device descriptor read/8, error -71 [ 102.457252][ T3702] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 102.480907][ T3702] usb 2-1: device descriptor read/8, error -71 [ 102.588720][ T3702] usb usb2-port1: unable to enumerate USB device [ 103.842374][ T28] audit: type=1400 audit(103.760:130): avc: denied { accept } for pid=3938 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.973596][ T28] audit: type=1400 audit(104.890:131): avc: denied { block_suspend } for pid=3941 comm="syz.0.80" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.984326][ T28] audit: type=1400 audit(104.900:132): avc: denied { connect } for pid=3941 comm="syz.0.80" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 104.994669][ T28] audit: type=1400 audit(104.910:133): avc: denied { write } for pid=3941 comm="syz.0.80" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.000881][ T28] audit: type=1400 audit(104.920:134): avc: denied { getopt } for pid=3941 comm="syz.0.80" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.017635][ T28] audit: type=1400 audit(104.930:135): avc: denied { ioctl } for pid=3941 comm="syz.0.80" path="socket:[2684]" dev="sockfs" ino=2684 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 106.576291][ T28] audit: type=1400 audit(106.490:136): avc: denied { setattr } for pid=3952 comm="syz.0.84" path="socket:[3549]" dev="sockfs" ino=3549 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 111.158273][ T28] audit: type=1400 audit(111.080:137): avc: denied { create } for pid=3967 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 111.163923][ T28] audit: type=1400 audit(111.080:138): avc: denied { ioctl } for pid=3967 comm="syz.1.89" path="socket:[3578]" dev="sockfs" ino=3578 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 111.180664][ T28] audit: type=1400 audit(111.100:139): avc: denied { read } for pid=3967 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.913842][ T3974] FAULT_INJECTION: forcing a failure. [ 112.913842][ T3974] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.914218][ T3974] CPU: 0 UID: 0 PID: 3974 Comm: syz.0.90 Not tainted syzkaller #0 PREEMPT [ 112.914314][ T3974] Hardware name: ARM-Versatile Express [ 112.914344][ T3974] Call trace: [ 112.914389][ T3974] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 112.914555][ T3974] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 112.914577][ T3974] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 112.914631][ T3974] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 112.914692][ T3974] r7:00000077 r6:00000000 r5:83993d40 r4:82b4ee88 [ 112.914710][ T3974] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 112.914770][ T3974] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 112.914834][ T3974] r8:00000000 r7:00000077 r6:76f4cb80 r5:00000000 r4:ead61fb0 [ 112.914851][ T3974] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 112.914970][ T3974] [<809cd408>] (should_fail_usercopy) from [<8022a290>] (restore_sigframe+0x48/0x210) [ 112.915106][ T3974] [<8022a248>] (restore_sigframe) from [<8022a498>] (sys_sigreturn+0x40/0x60) [ 112.915190][ T3974] r7:00000077 r6:0012f1a4 r5:00000000 r4:ead61fb0 [ 112.915240][ T3974] [<8022a458>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 112.915343][ T3974] Exception stack(0xead61fa8 to 0xead61ff0) [ 112.915402][ T3974] 1fa0: 00000000 00000000 00000011 20000180 04000000 00000000 [ 112.915469][ T3974] 1fc0: 00000000 00000000 0012f1a4 00000077 003462d8 00000000 00000001 76f4d0dc [ 112.915594][ T3974] 1fe0: 76f4ce88 76f4cb80 000f3910 000f3918 [ 112.915694][ T3974] r5:00000000 r4:00000000 [ 114.783190][ T3979] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3979 comm=syz.0.92 [ 114.893555][ T3981] FAULT_INJECTION: forcing a failure. [ 114.893555][ T3981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.894863][ T3981] CPU: 0 UID: 0 PID: 3981 Comm: syz.0.93 Not tainted syzkaller #0 PREEMPT [ 114.894969][ T3981] Hardware name: ARM-Versatile Express [ 114.895015][ T3981] Call trace: [ 114.895061][ T3981] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 114.895162][ T3981] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 114.895179][ T3981] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 114.895240][ T3981] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 114.895349][ T3981] r7:00000000 r6:00000000 r5:83988000 r4:82b4ee88 [ 114.895422][ T3981] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 114.895487][ T3981] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 114.895564][ T3981] r8:eae31eb8 r7:00000000 r6:76f4cf08 r5:00000001 r4:00000001 [ 114.895598][ T3981] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 114.895655][ T3981] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 114.895707][ T3981] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 114.895771][ T3981] r8:80644e50 r7:eae31f68 r6:76f4cf08 r5:83334080 r4:00000001 [ 114.895788][ T3981] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 114.895846][ T3981] r5:83334080 r4:00000001 [ 114.895864][ T3981] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 114.895924][ T3981] r10:00000004 r9:83988000 r8:8020029c r7:00000000 r6:00000002 r5:83334080 [ 114.895942][ T3981] r4:83334083 [ 114.895958][ T3981] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 114.896013][ T3981] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 114.896067][ T3981] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 114.896118][ T3981] Exception stack(0xeae31fa8 to 0xeae31ff0) [ 114.896151][ T3981] 1fa0: 00000000 00000000 00000004 76f4cf08 00000001 00000000 [ 114.896179][ T3981] 1fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f4d0dc [ 114.896206][ T3981] 1fe0: 76f4ce58 76f4ce44 0010b9c4 001125a8 [ 116.378910][ T28] audit: type=1400 audit(116.300:140): avc: denied { ioctl } for pid=3987 comm="syz.1.96" path="socket:[3610]" dev="sockfs" ino=3610 ioctlcmd=0x942d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 117.734706][ T28] audit: type=1400 audit(117.650:141): avc: denied { create } for pid=4000 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 117.744091][ T28] audit: type=1400 audit(117.660:142): avc: denied { ioctl } for pid=4000 comm="syz.0.102" path="socket:[2772]" dev="sockfs" ino=2772 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 117.855751][ T4001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4001 comm=syz.0.102 [ 117.860919][ T4001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=4001 comm=syz.0.102 [ 121.824414][ T28] audit: type=1400 audit(121.740:143): avc: denied { setopt } for pid=4013 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 121.840836][ T28] audit: type=1400 audit(121.760:144): avc: denied { map } for pid=4013 comm="syz.1.107" path="/dev/input/mouse0" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 121.844155][ T28] audit: type=1400 audit(121.760:145): avc: denied { execute } for pid=4013 comm="syz.1.107" path="/dev/input/mouse0" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 124.760644][ T4030] FAULT_INJECTION: forcing a failure. [ 124.760644][ T4030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.763146][ T4030] CPU: 0 UID: 0 PID: 4030 Comm: syz.1.114 Not tainted syzkaller #0 PREEMPT [ 124.763261][ T4030] Hardware name: ARM-Versatile Express [ 124.763312][ T4030] Call trace: [ 124.763355][ T4030] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 124.763453][ T4030] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 124.763471][ T4030] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 124.763518][ T4030] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 124.763572][ T4030] r7:00000000 r6:00000000 r5:847f55c0 r4:82b4ee88 [ 124.763611][ T4030] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 124.763674][ T4030] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 124.763735][ T4030] r8:76f30f08 r7:00000000 r6:00000000 r5:eaf79f68 r4:00000002 [ 124.763753][ T4030] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 124.763804][ T4030] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 124.763860][ T4030] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 124.763929][ T4030] r10:80643b14 r9:00000001 r8:00000002 r7:eaf79f68 r6:0000000f r5:76f30f08 [ 124.763952][ T4030] r4:847f55c0 r3:eaf79e9f [ 124.763969][ T4030] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 124.764035][ T4030] r8:847f55c0 r7:eaf79f68 r6:76f30f08 r5:838ab800 r4:0000000f [ 124.764054][ T4030] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 124.764116][ T4030] r10:00000003 r9:847f55c0 r8:8020029c r7:00000000 r6:00000000 r5:838ab800 [ 124.764142][ T4030] r4:838ab803 [ 124.764159][ T4030] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 124.764221][ T4030] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 124.764238][ T4030] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 124.764285][ T4030] Exception stack(0xeaf79fa8 to 0xeaf79ff0) [ 124.764330][ T4030] 9fa0: 00000000 00000000 00000005 76f30f08 0000000f 00000000 [ 124.764364][ T4030] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f310dc [ 124.764390][ T4030] 9fe0: 76f30e58 76f30e44 0010b9c4 001125a8 [ 126.131281][ T28] audit: type=1400 audit(126.050:146): avc: denied { write } for pid=4040 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 126.131776][ T28] audit: type=1400 audit(126.050:147): avc: denied { read } for pid=4040 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 129.153914][ T28] audit: type=1400 audit(129.070:148): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 133.185605][ T4084] FAULT_INJECTION: forcing a failure. [ 133.185605][ T4084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.187129][ T4084] CPU: 1 UID: 0 PID: 4084 Comm: syz.0.138 Not tainted syzkaller #0 PREEMPT [ 133.187543][ T4084] Hardware name: ARM-Versatile Express [ 133.187763][ T4084] Call trace: [ 133.188780][ T4084] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 133.190272][ T4084] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 133.190381][ T4084] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 133.190459][ T4084] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 133.190529][ T4084] r7:00000000 r6:00000000 r5:847f3100 r4:82b4ee88 [ 133.190547][ T4084] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 133.190613][ T4084] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 133.190686][ T4084] r8:76f4cf08 r7:00000000 r6:00000000 r5:eaf79f68 r4:00000002 [ 133.190727][ T4084] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 133.190793][ T4084] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 133.190853][ T4084] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 133.190962][ T4084] r10:80643b14 r9:00000001 r8:00000002 r7:eaf79f68 r6:0000000f r5:76f4cf08 [ 133.191005][ T4084] r4:847f3100 r3:eaf79e9f [ 133.191029][ T4084] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 133.191106][ T4084] r8:847f3100 r7:eaf79f68 r6:76f4cf08 r5:83333f80 r4:0000000f [ 133.191127][ T4084] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 133.191198][ T4084] r10:00000003 r9:847f3100 r8:8020029c r7:00000000 r6:00000000 r5:83333f80 [ 133.191219][ T4084] r4:83333f83 [ 133.191266][ T4084] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 133.191371][ T4084] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 133.191403][ T4084] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 133.191667][ T4084] Exception stack(0xeaf79fa8 to 0xeaf79ff0) [ 133.191846][ T4084] 9fa0: 00000000 00000000 00000004 76f4cf08 0000000f 00000000 [ 133.191906][ T4084] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f4d0dc [ 133.191948][ T4084] 9fe0: 76f4ce58 76f4ce44 0010b9c4 001125a8 [ 134.977794][ T4112] FAULT_INJECTION: forcing a failure. [ 134.977794][ T4112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.978165][ T4112] CPU: 1 UID: 0 PID: 4112 Comm: syz.0.151 Not tainted syzkaller #0 PREEMPT [ 134.978245][ T4112] Hardware name: ARM-Versatile Express [ 134.978307][ T4112] Call trace: [ 134.978368][ T4112] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 134.978477][ T4112] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 134.978496][ T4112] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 134.978550][ T4112] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 134.978605][ T4112] r7:b5403587 r6:00000000 r5:83e18c40 r4:82b4ee88 [ 134.978624][ T4112] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 134.978678][ T4112] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 134.978738][ T4112] r8:00000000 r7:b5403587 r6:76f4cb80 r5:00000000 r4:ebc51fb0 [ 134.978781][ T4112] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 134.978853][ T4112] [<809cd408>] (should_fail_usercopy) from [<8022a2d8>] (restore_sigframe+0x90/0x210) [ 134.978910][ T4112] [<8022a248>] (restore_sigframe) from [<8022a498>] (sys_sigreturn+0x40/0x60) [ 134.978968][ T4112] r7:00000077 r6:0012f1a4 r5:00000000 r4:ebc51fb0 [ 134.978984][ T4112] [<8022a458>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 134.979030][ T4112] Exception stack(0xebc51fa8 to 0xebc51ff0) [ 134.979066][ T4112] 1fa0: 00000000 00000000 00000011 20000440 00000080 00000000 [ 134.979099][ T4112] 1fc0: 00000000 00000000 0012f1a4 00000077 003462d8 00000000 00000001 76f4d0dc [ 134.979124][ T4112] 1fe0: 76f4ce88 76f4cb80 000f3910 000f3918 [ 134.979148][ T4112] r5:00000000 r4:00000000 [ 140.372964][ T28] audit: type=1400 audit(140.290:149): avc: denied { write } for pid=4127 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 140.742051][ T4153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=4153 comm=syz.1.169 [ 140.849498][ T28] audit: type=1400 audit(140.770:150): avc: denied { execute } for pid=4154 comm="syz.1.170" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 141.183939][ T4163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=4163 comm=syz.1.174 [ 141.287926][ T28] audit: type=1400 audit(141.210:151): avc: denied { append } for pid=4164 comm="syz.1.175" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 150.637904][ T4256] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4256 comm=syz.0.217 [ 151.111774][ T28] audit: type=1400 audit(151.030:152): avc: denied { write } for pid=4269 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 152.367283][ T28] audit: type=1400 audit(152.280:153): avc: denied { prog_run } for pid=4282 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 154.697366][ T4295] FAULT_INJECTION: forcing a failure. [ 154.697366][ T4295] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.710738][ T4295] CPU: 1 UID: 0 PID: 4295 Comm: syz.0.235 Not tainted syzkaller #0 PREEMPT [ 154.710881][ T4295] Hardware name: ARM-Versatile Express [ 154.710906][ T4295] Call trace: [ 154.710951][ T4295] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 154.711054][ T4295] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 154.711072][ T4295] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 154.711125][ T4295] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 154.711184][ T4295] r7:b5403587 r6:00000000 r5:84f8b100 r4:82b4ee88 [ 154.711200][ T4295] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 154.711260][ T4295] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 154.711346][ T4295] r8:00000000 r7:b5403587 r6:76f4cb80 r5:00000000 r4:ec59dfb0 [ 154.711366][ T4295] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 154.711433][ T4295] [<809cd408>] (should_fail_usercopy) from [<8022a2d8>] (restore_sigframe+0x90/0x210) [ 154.713187][ T4295] [<8022a248>] (restore_sigframe) from [<8022a498>] (sys_sigreturn+0x40/0x60) [ 154.716549][ T4295] r7:00000077 r6:0012f1a4 r5:00000000 r4:ec59dfb0 [ 154.716606][ T4295] [<8022a458>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 154.716679][ T4295] Exception stack(0xec59dfa8 to 0xec59dff0) [ 154.716718][ T4295] dfa0: 00000000 00000000 00000011 200001c0 00008800 00000000 [ 154.716750][ T4295] dfc0: 00000000 00000000 0012f1a4 00000077 003462d8 00000000 00000001 76f4d0dc [ 154.716774][ T4295] dfe0: 76f4ce88 76f4cb80 000f3910 000f3918 [ 154.716799][ T4295] r5:00000000 r4:00000000 [ 158.898444][ T4311] FAULT_INJECTION: forcing a failure. [ 158.898444][ T4311] name failslab, interval 1, probability 0, space 0, times 0 [ 158.898908][ T4311] CPU: 0 UID: 0 PID: 4311 Comm: syz.0.240 Not tainted syzkaller #0 PREEMPT [ 158.898992][ T4311] Hardware name: ARM-Versatile Express [ 158.899017][ T4311] Call trace: [ 158.899059][ T4311] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 158.899165][ T4311] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 158.899227][ T4311] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 158.899282][ T4311] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 158.899429][ T4311] r7:00000cc0 r6:00000000 r5:839824c0 r4:82b17e08 [ 158.899465][ T4311] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 158.899565][ T4311] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 158.899726][ T4311] r8:00000001 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4a80 [ 158.899826][ T4311] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 158.899956][ T4311] [<8052c290>] (kmem_cache_alloc_noprof) from [<805901b8>] (do_getname+0x2c/0x14c) [ 158.900074][ T4311] r10:00000015 r9:839824c0 r8:00000001 r7:00000000 r6:20000000 r5:825238b8 [ 158.900097][ T4311] r4:00000000 [ 158.900114][ T4311] [<8059018c>] (do_getname) from [<80596334>] (user_path_at+0x30/0x6c) [ 158.900199][ T4311] r10:00000015 r9:839824c0 r8:00000000 r7:ec67df6c r6:ffffff9c r5:00000001 [ 158.900273][ T4311] r4:00000000 r3:ec67df6c [ 158.900310][ T4311] [<80596304>] (user_path_at) from [<805b6700>] (sys_mount+0x1bc/0x260) [ 158.900374][ T4311] r7:85941600 r6:8596cc40 r5:00000000 r4:00000000 [ 158.900411][ T4311] [<805b6544>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 158.900513][ T4311] Exception stack(0xec67dfa8 to 0xec67dff0) [ 158.900572][ T4311] dfa0: 00000000 00000000 20000000 20000000 20000240 00001040 [ 158.900661][ T4311] dfc0: 00000000 00000000 0012f1a4 00000015 003462d8 00000000 003d0f00 76f4d0dc [ 158.900744][ T4311] dfe0: 76f4ce88 76f4ce78 00018e58 001307a0 [ 158.900809][ T4311] r10:00000015 r9:839824c0 r8:8020029c r7:00000015 r6:0012f1a4 r5:00000000 [ 158.900885][ T4311] r4:00000000 [ 161.175662][ T28] audit: type=1400 audit(161.090:154): avc: denied { create } for pid=4312 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 161.200419][ T28] audit: type=1400 audit(161.120:155): avc: denied { write } for pid=4312 comm="syz.1.242" path="socket:[5290]" dev="sockfs" ino=5290 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 161.955335][ T4325] FAULT_INJECTION: forcing a failure. [ 161.955335][ T4325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 161.958565][ T4325] CPU: 1 UID: 0 PID: 4325 Comm: syz.0.245 Not tainted syzkaller #0 PREEMPT [ 161.958671][ T4325] Hardware name: ARM-Versatile Express [ 161.958697][ T4325] Call trace: [ 161.958739][ T4325] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 161.958837][ T4325] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 161.958856][ T4325] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 161.958904][ T4325] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 161.958960][ T4325] r7:20000340 r6:00000000 r5:839824c0 r4:82b4ee88 [ 161.958978][ T4325] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 161.959042][ T4325] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 161.959110][ T4325] r8:00040004 r7:20000340 r6:dfa55e28 r5:00000000 r4:dfa55f20 [ 161.959127][ T4325] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 161.959179][ T4325] [<809cd408>] (should_fail_usercopy) from [<815df9d0>] (copy_msghdr_from_user+0x50/0x1e0) [ 161.959239][ T4325] [<815df980>] (copy_msghdr_from_user) from [<815dfbd8>] (___sys_sendmsg+0x78/0xd0) [ 161.959306][ T4325] r8:00040004 r7:00000000 r6:855c91c0 r5:dfa55f20 r4:dfa55e6c [ 161.959324][ T4325] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 161.959384][ T4325] r9:839824c0 r8:838ab380 r7:00040004 r6:20000340 r5:838ab381 r4:00000003 [ 161.959402][ T4325] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 161.959456][ T4325] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 161.959474][ T4325] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 161.959514][ T4325] Exception stack(0xdfa55fa8 to 0xdfa55ff0) [ 161.959552][ T4325] 5fa0: 00000000 00000000 00000003 20000340 00040004 00000000 [ 161.959585][ T4325] 5fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f4d0dc [ 161.959611][ T4325] 5fe0: 76f4ce88 76f4ce78 00018e58 001307a0 [ 163.654288][ T4336] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4336 comm=syz.1.250 [ 163.763844][ T4340] FAULT_INJECTION: forcing a failure. [ 163.763844][ T4340] name failslab, interval 1, probability 0, space 0, times 0 [ 163.764997][ T4340] CPU: 1 UID: 0 PID: 4340 Comm: syz.1.252 Not tainted syzkaller #0 PREEMPT [ 163.765068][ T4340] Hardware name: ARM-Versatile Express [ 163.765082][ T4340] Call trace: [ 163.765160][ T4340] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 163.765224][ T4340] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 163.765233][ T4340] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 163.765259][ T4340] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 163.765296][ T4340] r7:00000000 r6:00000000 r5:83fcb100 r4:82b17e08 [ 163.765304][ T4340] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 163.765337][ T4340] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 163.765375][ T4340] r8:8236b970 r7:00000000 r6:83001240 r5:00000d40 r4:00000011 [ 163.765384][ T4340] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 163.765412][ T4340] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 163.765449][ T4340] r10:83fcb100 r9:dfa5df6c r8:8236b970 r7:8236b970 r6:85946880 r5:8236b975 [ 163.765479][ T4340] r4:8236b96f [ 163.765489][ T4340] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 163.765543][ T4340] r9:dfa5df6c r8:8236b970 r7:8236b970 r6:85946880 r5:00000000 r4:8236b970 [ 163.765551][ T4340] [<8080b324>] (tomoyo_encode) from [<808098e4>] (tomoyo_mount_acl+0x80/0x388) [ 163.765580][ T4340] r5:00000000 r4:dfa5de58 [ 163.765588][ T4340] [<80809864>] (tomoyo_mount_acl) from [<80809cd4>] (tomoyo_mount_permission+0xe8/0x208) [ 163.765633][ T4340] r10:83fcb100 r9:8080bd48 r8:8236b970 r7:dfa5df6c r6:85946880 r5:00000040 [ 163.765644][ T4340] r4:00000000 [ 163.765651][ T4340] [<80809bec>] (tomoyo_mount_permission) from [<8080bd64>] (tomoyo_sb_mount+0x1c/0x24) [ 163.765686][ T4340] r8:00000000 r7:00001040 r6:00000000 r5:dfa5df6c r4:85946880 [ 163.765705][ T4340] [<8080bd48>] (tomoyo_sb_mount) from [<807c0a34>] (security_sb_mount+0xa4/0x238) [ 163.765758][ T4340] [<807c0990>] (security_sb_mount) from [<805b556c>] (path_mount+0x78/0xb18) [ 163.765791][ T4340] r9:00000000 r8:00000000 r7:00001040 r6:dfa5df6c r5:00000000 r4:00000000 [ 163.765799][ T4340] [<805b54f4>] (path_mount) from [<805b6720>] (sys_mount+0x1dc/0x260) [ 163.765828][ T4340] r10:00000015 r9:83fcb100 r8:00000000 r7:85946880 r6:00000000 r5:00000000 [ 163.765852][ T4340] r4:00000000 [ 163.765861][ T4340] [<805b6544>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 163.765885][ T4340] Exception stack(0xdfa5dfa8 to 0xdfa5dff0) [ 163.765904][ T4340] dfa0: 00000000 00000000 20000000 20000000 00000000 00001040 [ 163.765920][ T4340] dfc0: 00000000 00000000 0012f1a4 00000015 003462d8 00000000 003d0f00 76f310dc [ 163.765933][ T4340] dfe0: 76f30e88 76f30e78 00018e58 001307a0 [ 163.765950][ T4340] r10:00000015 r9:83fcb100 r8:8020029c r7:00000015 r6:0012f1a4 r5:00000000 [ 163.765959][ T4340] r4:00000000 [ 164.708290][ T28] audit: type=1400 audit(164.630:156): avc: denied { audit_write } for pid=4348 comm="syz.0.256" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 165.598727][ T4354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4354 comm=syz.0.258 [ 165.614396][ T4354] ======================================================= [ 165.614396][ T4354] WARNING: The mand mount option has been deprecated and [ 165.614396][ T4354] and is ignored by this kernel. Remove the mand [ 165.614396][ T4354] option from the mount to silence this warning. [ 165.614396][ T4354] ======================================================= [ 170.804638][ T28] audit: type=1400 audit(170.720:157): avc: denied { connect } for pid=4379 comm="syz.0.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 171.000113][ T28] audit: type=1400 audit(170.920:158): avc: denied { getopt } for pid=4386 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 171.191633][ T28] audit: type=1400 audit(171.110:159): avc: denied { read } for pid=4390 comm="syz.0.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 171.533302][ T28] audit: type=1400 audit(171.450:160): avc: denied { create } for pid=4394 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 171.537631][ T28] audit: type=1400 audit(171.450:161): avc: denied { setattr } for pid=4394 comm="syz.1.270" name="PACKET" dev="sockfs" ino=4450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.023712][ T28] audit: type=1400 audit(173.940:162): avc: denied { map_create } for pid=4411 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 174.031720][ T28] audit: type=1400 audit(173.950:163): avc: denied { map_read map_write } for pid=4411 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 174.258821][ T28] audit: type=1400 audit(174.180:164): avc: denied { setattr } for pid=4417 comm="syz.1.279" name="" dev="pipefs" ino=574 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 174.403343][ T28] audit: type=1400 audit(174.320:165): avc: denied { ioctl } for pid=4420 comm="syz.1.280" path="socket:[5450]" dev="sockfs" ino=5450 ioctlcmd=0x542c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 174.599164][ T28] audit: type=1400 audit(174.520:166): avc: denied { create } for pid=4420 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 177.057677][ T89] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 177.225653][ T89] usb 1-1: config 0 has no interfaces? [ 177.227870][ T89] usb 1-1: New USB device found, idVendor=06cd, idProduct=0202, bcdDevice=92.d4 [ 177.232492][ T89] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 177.240642][ T89] usb 1-1: config 0 descriptor?? [ 177.394055][ T4443] FAULT_INJECTION: forcing a failure. [ 177.394055][ T4443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.394593][ T4443] CPU: 1 UID: 0 PID: 4443 Comm: syz.1.283 Not tainted syzkaller #0 PREEMPT [ 177.394679][ T4443] Hardware name: ARM-Versatile Express [ 177.394704][ T4443] Call trace: [ 177.394750][ T4443] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 177.394851][ T4443] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 177.394871][ T4443] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 177.394998][ T4443] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 177.395067][ T4443] r7:20000580 r6:00000000 r5:83989880 r4:82b4ee88 [ 177.395136][ T4443] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 177.395343][ T4443] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 177.395456][ T4443] r8:00000000 r7:20000580 r6:e01a9e28 r5:00000000 r4:e01a9f20 [ 177.395561][ T4443] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 177.395719][ T4443] [<809cd408>] (should_fail_usercopy) from [<815df9d0>] (copy_msghdr_from_user+0x50/0x1e0) [ 177.395829][ T4443] [<815df980>] (copy_msghdr_from_user) from [<815dfbd8>] (___sys_sendmsg+0x78/0xd0) [ 177.395951][ T4443] r8:00000000 r7:00000000 r6:855be2c0 r5:e01a9f20 r4:e01a9e6c [ 177.395972][ T4443] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 177.396040][ T4443] r9:83989880 r8:8589a180 r7:00000000 r6:20000580 r5:8589a181 r4:00000003 [ 177.396198][ T4443] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 177.396390][ T4443] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 177.396611][ T4443] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 177.396970][ T4443] Exception stack(0xe01a9fa8 to 0xe01a9ff0) [ 177.397021][ T4443] 9fa0: 00000000 00000000 00000003 20000580 00000000 00000000 [ 177.397151][ T4443] 9fc0: 00000000 00000000 0012f1a4 00000128 00346378 00000000 00000001 76f100dc [ 177.397229][ T4443] 9fe0: 76f0fe88 76f0fe78 00018e58 001307a0 [ 177.473929][ T40] usb 1-1: USB disconnect, device number 2 [ 178.008461][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 178.008848][ T28] audit: type=1400 audit(177.930:169): avc: denied { create } for pid=4451 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 190.973527][ T28] audit: type=1400 audit(190.890:170): avc: denied { map } for pid=4527 comm="syz.1.311" path="socket:[5688]" dev="sockfs" ino=5688 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 190.981772][ T28] audit: type=1400 audit(190.890:171): avc: denied { bind } for pid=4527 comm="syz.1.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 190.985604][ T4528] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65028 sclass=netlink_audit_socket pid=4528 comm=syz.1.311 [ 191.571887][ T4542] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=4542 comm=syz.0.317 [ 191.667022][ T28] audit: type=1400 audit(191.580:172): avc: denied { accept } for pid=4544 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 191.704261][ T28] audit: type=1400 audit(191.620:173): avc: denied { write } for pid=4540 comm="syz.0.317" name="psched" dev="proc" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 192.569174][ T28] audit: type=1400 audit(192.490:174): avc: denied { map } for pid=4552 comm="syz.1.321" path="socket:[4743]" dev="sockfs" ino=4743 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 192.571312][ T28] audit: type=1400 audit(192.490:175): avc: denied { accept } for pid=4552 comm="syz.1.321" path="socket:[4743]" dev="sockfs" ino=4743 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 194.289461][ T4587] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4587 comm=syz.0.334 [ 194.347214][ T4591] FAULT_INJECTION: forcing a failure. [ 194.347214][ T4591] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 194.348362][ T4591] CPU: 0 UID: 0 PID: 4591 Comm: syz.0.335 Not tainted syzkaller #0 PREEMPT [ 194.348424][ T4591] Hardware name: ARM-Versatile Express [ 194.348438][ T4591] Call trace: [ 194.348459][ T4591] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 194.348516][ T4591] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 194.348526][ T4591] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 194.348552][ T4591] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 194.348583][ T4591] r7:00000001 r6:00000000 r5:847f8000 r4:82b17e5c [ 194.348591][ T4591] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 194.348623][ T4591] [<809cd1cc>] (should_fail_ex) from [<8054f064>] (should_fail_alloc_page+0x68/0x74) [ 194.348694][ T4591] r8:ea9a9cc4 r7:00000001 r6:00000000 r5:00140cca r4:ea9a9cd0 [ 194.348703][ T4591] [<8054effc>] (should_fail_alloc_page) from [<80514c88>] (prepare_alloc_pages+0xf8/0x1b4) [ 194.348734][ T4591] [<80514b90>] (prepare_alloc_pages) from [<8051dd54>] (__alloc_frozen_pages_noprof+0xb0/0x161c) [ 194.348771][ T4591] r10:00000000 r9:847f8000 r8:20000000 r7:20000000 r6:00140cca r5:00000000 [ 194.348780][ T4591] r4:ea9a9dc0 [ 194.348788][ T4591] [<8051dca4>] (__alloc_frozen_pages_noprof) from [<8051f334>] (__folio_alloc_noprof+0x14/0x6c) [ 194.348823][ T4591] r10:00000000 r9:850652c0 r8:20000000 r7:20000000 r6:84b39a00 r5:00000000 [ 194.348833][ T4591] r4:ea9a9dc0 [ 194.348840][ T4591] [<8051f320>] (__folio_alloc_noprof) from [<804e96a0>] (do_anonymous_page+0xf0/0x648) [ 194.348899][ T4591] r5:00000000 r4:ea9a9dc0 [ 194.348926][ T4591] [<804e95b0>] (do_anonymous_page) from [<804ec568>] (handle_mm_fault+0x5bc/0x6b8) [ 194.348964][ T4591] r10:00000000 r9:00000000 r8:00000000 r7:ea9a9eb8 r6:20000000 r5:847f8000 [ 194.348974][ T4591] r4:00000215 [ 194.348982][ T4591] [<804ebfac>] (handle_mm_fault) from [<80232fac>] (do_page_fault+0xf0/0x4d0) [ 194.349017][ T4591] r10:00000002 r9:850652c0 r8:00000215 r7:20000000 r6:00000a07 r5:200000c0 [ 194.349027][ T4591] r4:ea9a9eb8 [ 194.349035][ T4591] [<80232ebc>] (do_page_fault) from [<8023355c>] (do_DataAbort+0x38/0xac) [ 194.349078][ T4591] r10:00000037 r9:847f8000 r8:80232ebc r7:ea9a9eb8 r6:200000c0 r5:00000a07 [ 194.349136][ T4591] r4:82a1c450 [ 194.349157][ T4591] [<80233524>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 194.349187][ T4591] Exception stack(0xea9a9eb8 to 0xea9a9f00) [ 194.349203][ T4591] 9ea0: 200000c0 ea9a9f40 [ 194.349221][ T4591] 9ec0: ffffffe8 00000000 0000040b b5403587 200000c0 00000003 00000003 00000000 [ 194.349237][ T4591] 9ee0: 00000037 ea9a9f7c 00000018 ea9a9f0c 00000000 81ad2040 00000013 ffffffff [ 194.349255][ T4591] r8:00000003 r7:ea9a9eec r6:ffffffff r5:00000013 r4:81ad2040 [ 194.349263][ T4591] [<8059a8a0>] (do_fcntl) from [<8059b218>] (sys_fcntl+0x70/0xd0) [ 194.349296][ T4591] r8:00000003 r7:200000c0 r6:0000040b r5:00000000 r4:8598ca81 [ 194.349304][ T4591] [<8059b1a8>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 194.349326][ T4591] Exception stack(0xea9a9fa8 to 0xea9a9ff0) [ 194.349342][ T4591] 9fa0: 00000000 00000000 00000003 0000040b 200000c0 00000000 [ 194.349368][ T4591] 9fc0: 00000000 00000000 0012f1a4 00000037 003462d8 00000000 00000001 76f4d0dc [ 194.349382][ T4591] 9fe0: 76f4ce88 76f4ce78 00018e58 001307a0 [ 194.349399][ T4591] r9:847f8000 r8:8020029c r7:00000037 r6:0012f1a4 r5:00000000 r4:00000000 [ 195.409513][ T28] audit: type=1400 audit(195.330:176): avc: denied { setopt } for pid=4600 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 203.449537][ T28] audit: type=1400 audit(203.370:177): avc: denied { create } for pid=4621 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 203.483326][ T28] audit: type=1400 audit(203.400:178): avc: denied { ioctl } for pid=4621 comm="syz.1.346" path="socket:[5963]" dev="sockfs" ino=5963 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 203.593959][ T28] audit: type=1400 audit(203.510:179): avc: denied { create } for pid=4637 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.101919][ T4677] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4677 comm=syz.0.364 [ 207.622541][ T28] audit: type=1400 audit(207.540:180): avc: denied { write } for pid=4686 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 212.472704][ T4715] FAULT_INJECTION: forcing a failure. [ 212.472704][ T4715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 212.473164][ T4715] CPU: 1 UID: 0 PID: 4715 Comm: syz.1.379 Not tainted syzkaller #0 PREEMPT [ 212.473259][ T4715] Hardware name: ARM-Versatile Express [ 212.473288][ T4715] Call trace: [ 212.473335][ T4715] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 212.473513][ T4715] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 212.473745][ T4715] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 212.473992][ T4715] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 212.474091][ T4715] r7:00000000 r6:00000000 r5:847b8000 r4:82b4ee88 [ 212.474149][ T4715] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 212.474244][ T4715] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 212.474386][ T4715] r8:e00d9eb8 r7:00000000 r6:76f30f08 r5:00000001 r4:00000001 [ 212.474434][ T4715] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 212.474512][ T4715] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 212.474578][ T4715] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 212.474692][ T4715] r8:80644e50 r7:e00d9f68 r6:76f30f08 r5:8598cd00 r4:00000001 [ 212.474769][ T4715] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 212.474868][ T4715] r5:8598cd00 r4:00000001 [ 212.475173][ T4715] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 212.475258][ T4715] r10:00000004 r9:847b8000 r8:8020029c r7:00000000 r6:00000002 r5:8598cd00 [ 212.475280][ T4715] r4:8598cd03 [ 212.475334][ T4715] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 212.475405][ T4715] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 212.475449][ T4715] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 212.475535][ T4715] Exception stack(0xe00d9fa8 to 0xe00d9ff0) [ 212.475594][ T4715] 9fa0: 00000000 00000000 00000004 76f30f08 00000001 00000000 [ 212.475629][ T4715] 9fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f310dc [ 212.475683][ T4715] 9fe0: 76f30e58 76f30e44 0010b9c4 001125a8 [ 213.307850][ T28] audit: type=1400 audit(213.230:181): avc: denied { getopt } for pid=4726 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 213.312626][ T28] audit: type=1400 audit(213.230:182): avc: denied { ioctl } for pid=4726 comm="syz.0.385" path="socket:[5014]" dev="sockfs" ino=5014 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 213.458113][ T28] audit: type=1400 audit(213.380:183): avc: denied { setopt } for pid=4726 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 221.383627][ T4779] SELinux: Context system_u:object_r:power_device_t:s0 is not valid (left unmapped). [ 221.387741][ T28] audit: type=1400 audit(221.310:184): avc: denied { relabelto } for pid=4778 comm="syz.0.400" name="file0" dev="tmpfs" ino=1164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:power_device_t:s0" [ 221.391285][ T28] audit: type=1400 audit(221.310:185): avc: denied { associate } for pid=4778 comm="syz.0.400" name="file0" dev="tmpfs" ino=1164 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:power_device_t:s0" [ 222.498114][ T4781] FAULT_INJECTION: forcing a failure. [ 222.498114][ T4781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.498327][ T4781] CPU: 1 UID: 0 PID: 4781 Comm: syz.0.401 Not tainted syzkaller #0 PREEMPT [ 222.498375][ T4781] Hardware name: ARM-Versatile Express [ 222.498389][ T4781] Call trace: [ 222.498410][ T4781] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 222.498467][ T4781] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 222.498476][ T4781] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 222.498500][ T4781] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 222.498529][ T4781] r7:00000000 r6:00000000 r5:84739880 r4:82b4ee88 [ 222.498536][ T4781] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 222.498577][ T4781] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 222.498632][ T4781] r8:76f4cf08 r7:00000000 r6:00000000 r5:df9cdf68 r4:00000002 [ 222.498641][ T4781] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 222.498669][ T4781] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 222.498696][ T4781] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 222.498728][ T4781] r10:80643b14 r9:00000001 r8:00000002 r7:df9cdf68 r6:0000000f r5:76f4cf08 [ 222.498739][ T4781] r4:84739880 r3:df9cde9f [ 222.498747][ T4781] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 222.498780][ T4781] r8:84739880 r7:df9cdf68 r6:76f4cf08 r5:8598d400 r4:0000000f [ 222.498787][ T4781] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 222.498818][ T4781] r10:00000003 r9:84739880 r8:8020029c r7:00000000 r6:00000000 r5:8598d400 [ 222.498828][ T4781] r4:8598d403 [ 222.498835][ T4781] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 222.498919][ T4781] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 222.498943][ T4781] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 222.499108][ T4781] Exception stack(0xdf9cdfa8 to 0xdf9cdff0) [ 222.499371][ T4781] dfa0: 00000000 00000000 00000004 76f4cf08 0000000f 00000000 [ 222.499419][ T4781] dfc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f4d0dc [ 222.499483][ T4781] dfe0: 76f4ce58 76f4ce44 0010b9c4 001125a8 [ 235.070779][ T28] audit: type=1400 audit(234.990:186): avc: denied { map } for pid=4853 comm="syz.1.427" path="socket:[6364]" dev="sockfs" ino=6364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 235.071999][ T28] audit: type=1400 audit(234.990:187): avc: denied { accept } for pid=4853 comm="syz.1.427" path="socket:[6364]" dev="sockfs" ino=6364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 236.793573][ T4872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4872 comm=syz.0.433 [ 236.960258][ T28] audit: type=1400 audit(236.880:188): avc: denied { lock } for pid=4875 comm="syz.0.435" path="/dev/audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 237.592690][ T28] audit: type=1400 audit(237.510:189): avc: denied { create } for pid=4879 comm="syz.0.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 238.454408][ T28] audit: type=1400 audit(238.370:190): avc: denied { map } for pid=4893 comm="syz.0.442" path="/proc/sys/kernel/yama/ptrace_scope" dev="proc" ino=7355 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_kernel_t tclass=file permissive=1 [ 239.004788][ T28] audit: type=1400 audit(238.920:191): avc: denied { ioctl } for pid=4893 comm="syz.0.442" path="socket:[6440]" dev="sockfs" ino=6440 ioctlcmd=0x587b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 242.509472][ T4907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4907 comm=syz.1.446 [ 243.565482][ T4914] FAULT_INJECTION: forcing a failure. [ 243.565482][ T4914] name failslab, interval 1, probability 0, space 0, times 0 [ 243.568191][ T4914] CPU: 0 UID: 0 PID: 4914 Comm: syz.0.449 Not tainted syzkaller #0 PREEMPT [ 243.568309][ T4914] Hardware name: ARM-Versatile Express [ 243.568338][ T4914] Call trace: [ 243.568380][ T4914] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 243.568492][ T4914] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 243.568513][ T4914] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 243.568568][ T4914] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 243.568624][ T4914] r7:84826e40 r6:00000000 r5:84826e40 r4:82b17e08 [ 243.568641][ T4914] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 243.568707][ T4914] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 243.568783][ T4914] r8:ffffffff r7:84826e40 r6:83001240 r5:00100cc0 r4:00000008 [ 243.568805][ T4914] [<8054ef68>] (should_failslab) from [<8052d988>] (__kvmalloc_node_noprof+0xa0/0x57c) [ 243.568867][ T4914] [<8052d8e8>] (__kvmalloc_node_noprof) from [<804bdaf8>] (vmemdup_user+0x2c/0x168) [ 243.568939][ T4914] r10:00000001 r9:20000080 r8:00000003 r7:20000080 r6:00001000 r5:00000008 [ 243.568985][ T4914] r4:00000008 [ 243.569006][ T4914] [<804bdacc>] (vmemdup_user) from [<805bc6c0>] (path_setxattrat+0x124/0x1bc) [ 243.569076][ T4914] r9:20000080 r8:00000003 r7:00000000 r6:00001000 r5:00000008 r4:00000018 [ 243.569127][ T4914] [<805bc59c>] (path_setxattrat) from [<805bc958>] (sys_fsetxattr+0x30/0x38) [ 243.569206][ T4914] r10:000000e4 r9:84826e40 r8:8020029c r7:000000e4 r6:0012f1a4 r5:00000000 [ 243.569226][ T4914] r4:00000001 [ 243.569271][ T4914] [<805bc928>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 243.569329][ T4914] Exception stack(0xea419fa8 to 0xea419ff0) [ 243.569409][ T4914] 9fa0: 00000001 00000000 00000003 20000040 20000080 00000008 [ 243.569449][ T4914] 9fc0: 00000001 00000000 0012f1a4 000000e4 003462d8 00000000 00000001 76f4d0dc [ 243.569477][ T4914] 9fe0: 76f4ce88 76f4ce78 00018e58 001307a0 [ 247.192782][ T28] audit: type=1400 audit(247.110:192): avc: denied { create } for pid=4927 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 248.097051][ T28] audit: type=1400 audit(248.000:193): avc: denied { ioctl } for pid=4930 comm="syz.0.455" path="net:[4026532657]" dev="nsfs" ino=4026532657 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 249.533277][ T4935] ------------[ cut here ]------------ [ 249.533687][ T4935] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#0: syz.0.455/4935 [ 249.535886][ T4935] Modules linked in: [ 249.536911][ T4935] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 249.537560][ T4935] CPU: 0 UID: 0 PID: 4935 Comm: syz.0.455 Not tainted syzkaller #0 PREEMPT [ 249.538022][ T4935] Hardware name: ARM-Versatile Express [ 249.538261][ T4935] Call trace: [ 249.538557][ T4935] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 249.539100][ T4935] r7:82a1e7b8 r6:00000000 r5:8231c350 r4:00000001 [ 249.539456][ T4935] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 249.539973][ T4935] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 249.540710][ T4935] r7:82a1e7b8 r6:00000000 r5:83fcb100 r4:82c7bd3c [ 249.541036][ T4935] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 249.541459][ T4935] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 249.541900][ T4935] r7:80265f80 [ 249.542061][ T4935] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 249.542505][ T4935] r3:82a0b544 r2:00000001 r1:82302e38 r0:8230a718 [ 249.542762][ T4935] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 249.543213][ T4935] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 249.543585][ T4935] r8:00000009 r7:8230b914 r6:ea4b9ebc r5:83fcb100 r4:00000000 [ 249.544001][ T4935] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 249.544488][ T4935] r10:83fcb7f4 r9:00000000 r8:ea4b9f68 r7:ea4b9858 r6:00000080 r5:83fcb100 [ 249.544878][ T4935] r4:83fcb100 [ 249.545041][ T4935] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 249.545528][ T4935] r8:ea4b9f68 r7:ea4b9858 r6:85c34c40 r5:83fcb100 r4:83fcb100 [ 249.545925][ T4935] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 249.546308][ T4935] r7:00000001 [ 249.546612][ T4935] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 249.546968][ T4935] Exception stack(0xea4b9fa8 to 0xea4b9ff0) [ 249.547406][ T4935] 9fa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 249.547777][ T4935] 9fc0: 00000000 00000000 00000000 00000001 00346378 00000000 00000001 76f2c0dc [ 249.548221][ T4935] 9fe0: 76f2be60 76f2be50 000193b4 001307a0 [ 249.550587][ T4935] Rebooting in 86400 seconds..