last executing test programs: 1.800327982s ago: executing program 1 (id=3056): r0 = socket(0x2, 0x2, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x4, 0x6]}, 0x8, 0x800) close_range(r1, r1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x14, 0x15, 0x10, 0x70bd29, 0x25dfdbfc, {0xf, 0xc0}}, 0x14}, 0x1, 0x0, 0x0, 0x24008810}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x14) socket(0x2, 0x2, 0x0) (async) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x4, 0x6]}, 0x8, 0x800) (async) close_range(r1, r1, 0x0) (async) socket$nl_audit(0x10, 0x3, 0x9) (async) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x14, 0x15, 0x10, 0x70bd29, 0x25dfdbfc, {0xf, 0xc0}}, 0x14}, 0x1, 0x0, 0x0, 0x24008810}, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x14) (async) 1.68859792s ago: executing program 1 (id=3057): r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000002c0), 0x109000, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/power_supply', 0x0, 0x0) dup2(r1, r2) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) close(r0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$FS_IOC_MEASURE_VERITY(r4, 0x5451, 0x0) accept4$alg(r3, 0x0, 0x0, 0x80000) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x3f, 0x0, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0xb, 0x0, 0x4, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x24000011}, 0x4004) 1.588163119s ago: executing program 1 (id=3058): r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000002a00)={&(0x7f00000028c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f00000029c0)={&(0x7f0000002940)={0x44, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x14}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x9}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x8}]}, 0x44}}, 0x80) 1.507013235s ago: executing program 1 (id=3059): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) sendto$l2tp6(r1, &(0x7f0000000400)="0d4b3dab301c980b", 0x8, 0x40, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$UHID_CREATE(r0, &(0x7f00000002c0)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000000)=""/205, 0xcd, 0x2, 0x5, 0xfffffffb, 0x0, 0x7}}, 0x11c) 1.408600892s ago: executing program 1 (id=3060): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) write$FUSE_ENTRY(r0, &(0x7f00000024c0)={0x90, 0x0, 0x0, {0x5, 0x2, 0x4, 0xbb, 0x400, 0xf2a6, {0x6, 0x8, 0x6, 0x3ff, 0x7, 0x4, 0x0, 0x4, 0x81, 0xc000, 0x100, 0x0, 0x0, 0x9, 0xe74}}}, 0x90) r1 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x208003, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='ipvlan0\x00', 0x10) 1.298512261s ago: executing program 1 (id=3061): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bind$unix(r0, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = dup3(r1, r2, 0x80000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r3, &(0x7f0000000000)={0x2, 0x0, @private=0xa010101, 0x6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) sendto$l2tp6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3, 0x8000}, 0x20) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000200)={0x1d, 0x0, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x18) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x2000c0c4) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x24, r6, 0x10, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x43}, @val={0x8, 0x3, r7}, @void}}}, 0x24}, 0x1, 0x0, 0x0, 0x400c811}, 0x800) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80000001, 0x32}}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x8881) sendmsg$NL80211_CMD_SET_CQM(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0xa0}}, 0x8004) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f00000001c0)) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r8, 0x84, 0x16, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @remote}}}, &(0x7f0000000200)=0x84) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 619.322973ms ago: executing program 0 (id=3062): r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x800) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xe, 0x1010, r0, 0xe7e8a000) (async) clock_gettime(0x0, &(0x7f00000029c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002980)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002540)=[{&(0x7f0000000100)=""/97, 0x61}, {&(0x7f0000000180)=""/112, 0x70}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/152, 0x98}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/61, 0x3d}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/184, 0xb8}, {&(0x7f0000002440)=""/31, 0x1f}, {&(0x7f0000002480)=""/142, 0x8e}], 0xa, &(0x7f00000025c0)=""/119, 0x77}, 0x4}, {{&(0x7f0000002640)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f00000028c0)=[{&(0x7f00000026c0)=""/217, 0xd9}, {&(0x7f00000027c0)=""/252, 0xfc}], 0x2, &(0x7f0000002900)=""/122, 0x7a}, 0xe9ad}], 0x2, 0x2002, &(0x7f0000002a00)={r2, r3+60000000}) (async) r4 = openat$drirender128(0xffffff9c, &(0x7f0000002a40), 0x80900, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000002a80)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000002ac0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000002b00)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000002b40)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r4, 0xc03064ca, &(0x7f0000002c00)={&(0x7f0000002b80)=[0x0, r5, r6, r7, 0x0, r8], &(0x7f0000002bc0)=[0xe, 0x40, 0x800, 0x2, 0x296811c5, 0xc0], 0xfff, 0x6, 0x4}) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r4, 0xc01064c2, &(0x7f0000002c40)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r4, 0xc00864bf, &(0x7f0000002c80)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r4, 0xc03064ca, &(0x7f0000002d40)={&(0x7f0000002cc0)=[r9, r10, r7, r7, r6, r7, r5, r5, r8], &(0x7f0000002d00)=[0x4000000000000000], 0x333, 0x9, 0xc}) r11 = open(&(0x7f0000002d80)='./file0\x00', 0x30000, 0x8) (async) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000002dc0)={0x0, 0x3}, &(0x7f0000002e00)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r11, 0x84, 0x10, &(0x7f0000002e40)=@sack_info={r12, 0x8, 0x5}, 0xc) (async) io_uring_register$IORING_REGISTER_PBUF_STATUS(r11, 0x1a, &(0x7f0000002e80)={0x9}, 0x1) openat$cgroup_devices(r11, &(0x7f0000002ec0)='devices.allow\x00', 0x2, 0x0) r13 = fsmount(r11, 0x1, 0x72) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r11, 0x28, 0x6, &(0x7f0000002f00)={0x77359400}, 0x8) (async) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000002f40)=0x0) tkill(r14, 0x15) (async) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f0000002f80)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003000)={&(0x7f0000002fc0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffe}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004080}, 0x24000011) (async) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000003080)=@sack_info={r12, 0x40, 0x80000001}, 0xc) (async) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r15 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r15, &(0x7f00000031c0)={&(0x7f00000030c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000003180)={&(0x7f0000003100)={0x4c, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4080) (async) setsockopt$inet6_buf(r13, 0x29, 0xea, &(0x7f0000003200)="9a3683afff3e09421d6dc5fedb8d88c87de172180091738aaa07ee8ac52b9c7090b1758c576568876cf829080a09ffbe6e843c74559bbbb8c7b582134e06c7e30e5f40f0c5a370bc46450ebf1b485798cfec10b885c619b80a3e22bcb76b2bbe3c69c957a718e247038084d481e8771bf87d60e482c0365ebca69f0c757b9e636ef469c77eb07e5560e17c99cda7261ffc9c5d6f2eff3dda2272e53645c1", 0x9e) 492.296322ms ago: executing program 0 (id=3063): r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000002a00)={&(0x7f00000028c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f00000029c0)={&(0x7f0000002940)={0x44, 0x0, 0x8, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x14}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x9}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x8}]}, 0x44}}, 0x80) 418.164498ms ago: executing program 0 (id=3064): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) sendto$l2tp6(r1, &(0x7f0000000400)="0d4b3dab301c980b", 0x8, 0x40, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$UHID_CREATE(r0, &(0x7f00000002c0)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000000)=""/205, 0xcd, 0x2, 0x5, 0xfffffffb, 0x0, 0x7}}, 0x11c) 349.336153ms ago: executing program 0 (id=3065): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x280202, 0x0) close(r0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = dup3(r1, r2, 0x80000) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r5, 0x6, 0x0, 0x0, &(0x7f0000000000)) r6 = dup(r4) accept4$llc(r6, 0x0, &(0x7f0000000300), 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000001c40)='veth0_to_team\x00', 0xfffffffffffffeb2) connect$l2tp(r0, &(0x7f0000000080)={0x2, 0x0, @loopback, 0xfffffffe}, 0x10) ioctl$BTRFS_IOC_SUBVOL_CREATE(r3, 0x5000940e, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x248, 0x2, 0x3, 0x5}, 0x8) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r8 = signalfd(0xffffffffffffffff, &(0x7f0000000600)={[0xfffffffd]}, 0x8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x5450, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x10) r9 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r9, &(0x7f0000004b00)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000002240)='./file0\x00', 0x5) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000100), 0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) r10 = openat2(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0xa4, 0x36}, 0x18) r11 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r3) sendmsg$BATADV_CMD_GET_DAT_CACHE(r10, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRES32=r9, @ANYRES32, @ANYRES16=r11, @ANYBLOB="d08a63b257bccb0e0c5583"], 0x24}, 0x1, 0x0, 0x0, 0x44050}, 0x20000000) r12 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r12, 0x8903, &(0x7f0000000080)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000340), 0x4) 229.605963ms ago: executing program 0 (id=3066): ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000100)={"f010ffffffffff9800134ebcfa9e140e", 0x0, 0x0, {0x100000002, 0xe}, {0x5, 0x509}, 0x8001, [0x3, 0x7, 0x7, 0x80000001, 0x3eae, 0x80, 0x7, 0x8, 0x3, 0xfffffffffffff051, 0x1, 0x2, 0x8, 0x5, 0x12, 0x6]}) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000340)={[0x1, 0x1ff]}, 0x8) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000850}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = accept4$inet(r4, 0x0, 0x0, 0x0) write$P9_RRENAMEAT(r5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc040}, 0x8000) 495.17µs ago: executing program 0 (id=3067): r0 = openat$snapshot(0xffffff9c, &(0x7f0000000000), 0x4880, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000040)={0x6a, 0xa3}) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$hiddev(&(0x7f0000000100), 0x9, 0xa0400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0x5, 0x10, 0xee, 0x5, 0x47b0}) r4 = userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x2}) r5 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x100000, &(0x7f00000002c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, '\x00'}}, {@euid_gt={'euid>', r1}}, {@obj_type={'obj_type', 0x3d, '/dev/usb/hiddev#\x00'}}]}}) ioctl$sock_proto_private(r2, 0x89ea, &(0x7f00000003c0)="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") lseek(r3, 0xf2, 0x4) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f00000004c0)={'filter\x00', 0x0, [0xff, 0x0, 0x8000]}, &(0x7f0000000540)=0x44) ioctl$VT_DISALLOCATE(r5, 0x5608) setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000000580)=0x3, 0x4) ioctl$FIOCLEX(r3, 0x5451) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r5, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/105, 0x69}, {&(0x7f0000000640)=""/218, 0xda}, {&(0x7f0000000740)=""/116, 0x74}, {&(0x7f00000007c0)=""/35, 0x23}, {&(0x7f0000000800)=""/56, 0x38}, {&(0x7f0000000840)=""/199, 0xc7}], 0x6) r7 = socket$kcm(0x29, 0x5, 0x0) r8 = accept4$vsock_stream(r5, &(0x7f0000000980)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f00000009c0)={r8}) openat$cgroup(r5, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000a40)) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000b80)={'wg2\x00', &(0x7f0000000a80)=@ethtool_gstrings={0x1b, 0x5, 0xbc, "75bcacae3370fe7be53064f078da1be499f7fcf29d0dbaefa76668f441ab044722653688c9e6a0977b0e3bfcc3087742291269dd1aa5623180cba71eecc06c1eacf4ddd6eee0c25ddae58ab72c66fd87123c20e0e04e07a32efdfb318ec4c5366ce22cb7d9d1999e0294e767ca90f125c76d3d7675624c9a1bf09c5c21c2591a48a4afc017677b72101aa2a594150c6e23395e201f273d5f564507ee20a8809dc7c78238b86c4fa903d276fe8e909069ef987472637dc5ab3184d510"}}) ioctl$AUTOFS_IOC_SETTIMEOUT(r6, 0x80049367, &(0x7f0000000bc0)=0x2) r9 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto(r9, &(0x7f0000000c00)="b49e8e39bf6d9de20ce2b1417c2fe51ff14ddaaecd870b3dc9996cfc0e231ac31392f708a72c34e19dac2aa2a5c2a2849a333d0cc8b3c108d121521386fdc9e5d409ce84ab83e9981ede19477497110cf7e2379f08055df5b2d52a35ff95d2e5e2e543528e5aca3167404b3e505cad2d2617e5388bcc32e932551d1b9e7893d7fd6cf221bb1857b1caa4edf8af20d9580337b87d8f18f35be995c365aa961bfbfdfa98f8fa7031f34b1d29628c12020788440ff83671", 0xb6, 0x8091, &(0x7f0000000cc0)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f0000000d40)) listen(r5, 0x8) 0s ago: executing program 32 (id=3067): r0 = openat$snapshot(0xffffff9c, &(0x7f0000000000), 0x4880, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000040)={0x6a, 0xa3}) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$hiddev(&(0x7f0000000100), 0x9, 0xa0400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0x5, 0x10, 0xee, 0x5, 0x47b0}) r4 = userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x2}) r5 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x100000, &(0x7f00000002c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, '\x00'}}, {@euid_gt={'euid>', r1}}, {@obj_type={'obj_type', 0x3d, '/dev/usb/hiddev#\x00'}}]}}) ioctl$sock_proto_private(r2, 0x89ea, &(0x7f00000003c0)="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") lseek(r3, 0xf2, 0x4) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f00000004c0)={'filter\x00', 0x0, [0xff, 0x0, 0x8000]}, &(0x7f0000000540)=0x44) ioctl$VT_DISALLOCATE(r5, 0x5608) setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000000580)=0x3, 0x4) ioctl$FIOCLEX(r3, 0x5451) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r5, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/105, 0x69}, {&(0x7f0000000640)=""/218, 0xda}, {&(0x7f0000000740)=""/116, 0x74}, {&(0x7f00000007c0)=""/35, 0x23}, {&(0x7f0000000800)=""/56, 0x38}, {&(0x7f0000000840)=""/199, 0xc7}], 0x6) r7 = socket$kcm(0x29, 0x5, 0x0) r8 = accept4$vsock_stream(r5, &(0x7f0000000980)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f00000009c0)={r8}) openat$cgroup(r5, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000a40)) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000b80)={'wg2\x00', &(0x7f0000000a80)=@ethtool_gstrings={0x1b, 0x5, 0xbc, "75bcacae3370fe7be53064f078da1be499f7fcf29d0dbaefa76668f441ab044722653688c9e6a0977b0e3bfcc3087742291269dd1aa5623180cba71eecc06c1eacf4ddd6eee0c25ddae58ab72c66fd87123c20e0e04e07a32efdfb318ec4c5366ce22cb7d9d1999e0294e767ca90f125c76d3d7675624c9a1bf09c5c21c2591a48a4afc017677b72101aa2a594150c6e23395e201f273d5f564507ee20a8809dc7c78238b86c4fa903d276fe8e909069ef987472637dc5ab3184d510"}}) ioctl$AUTOFS_IOC_SETTIMEOUT(r6, 0x80049367, &(0x7f0000000bc0)=0x2) r9 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto(r9, &(0x7f0000000c00)="b49e8e39bf6d9de20ce2b1417c2fe51ff14ddaaecd870b3dc9996cfc0e231ac31392f708a72c34e19dac2aa2a5c2a2849a333d0cc8b3c108d121521386fdc9e5d409ce84ab83e9981ede19477497110cf7e2379f08055df5b2d52a35ff95d2e5e2e543528e5aca3167404b3e505cad2d2617e5388bcc32e932551d1b9e7893d7fd6cf221bb1857b1caa4edf8af20d9580337b87d8f18f35be995c365aa961bfbfdfa98f8fa7031f34b1d29628c12020788440ff83671", 0xb6, 0x8091, &(0x7f0000000cc0)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f0000000d40)) listen(r5, 0x8) kernel console output (not intermixed with test programs): ][T11361] 5fa0: 00000000 00000000 00000005 20000280 00000001 00008000 [ 1106.170051][T11361] 5fc0: 00000000 00000000 0012fee0 00000176 002d0000 00000000 00006364 76b9f0bc [ 1106.170064][T11361] 5fe0: 76b9eec0 76b9eeb0 0001939c 00131f30 [ 1107.007955][T11363] fuse: Unknown parameter 'grou00000000000000000000' [ 1109.120512][T11378] fuse: Unknown parameter 'grou00000000000000000000' [ 1110.733399][ T31] audit: type=1400 audit(1110.650:387): avc: denied { nlmsg_read } for pid=11389 comm="syz.1.2081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1111.085822][ T31] audit: type=1400 audit(1110.980:388): avc: denied { getopt } for pid=11389 comm="syz.1.2081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1111.289288][T11400] fuse: Unknown parameter 'grou00000000000000000000' [ 1117.444585][T11450] fuse: Unknown parameter 'group_i00000000000000000000' [ 1117.748124][T11459] FAULT_INJECTION: forcing a failure. [ 1117.748124][T11459] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.748378][T11459] CPU: 0 UID: 0 PID: 11459 Comm: syz.0.2091 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1117.748419][T11459] Hardware name: ARM-Versatile Express [ 1117.748433][T11459] Call trace: [ 1117.748454][T11459] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1117.748508][T11459] r7:84bb2400 r6:00000000 r5:60000013 r4:82257e84 [ 1117.748518][T11459] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1117.748546][T11459] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1117.748648][T11459] r5:84bb2400 r4:8291bcc0 [ 1117.748693][T11459] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1117.748924][T11459] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1117.749102][T11459] r8:00000000 r7:84bb2400 r6:00000dc0 r5:00000001 r4:83001480 [ 1117.749227][T11459] [<80525658>] (should_failslab) from [<805094e8>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 1117.749319][T11459] [<8050949c>] (__kmalloc_cache_noprof) from [<8143be08>] (snd_mixer_oss_put_volume1_vol.constprop.0+0x5c/0x1e0) [ 1117.749414][T11459] r10:83c3f380 r9:8332b1e0 r8:8332b040 r7:00000064 r6:8245e6c4 r5:00000001 [ 1117.749473][T11459] r4:00000064 [ 1117.749556][T11459] [<8143bdac>] (snd_mixer_oss_put_volume1_vol.constprop.0) from [<8143c1d0>] (snd_mixer_oss_put_volume1+0x244/0x29c) [ 1117.749614][T11459] r10:8143bf8c r9:841fe5c8 r8:841fe000 r7:849df800 r6:83c3ff80 r5:00000064 [ 1117.749674][T11459] r4:00000064 r3:00000064 [ 1117.749734][T11459] [<8143bf8c>] (snd_mixer_oss_put_volume1) from [<8143a7fc>] (snd_mixer_oss_ioctl1+0x250/0xae4) [ 1117.749788][T11459] r7:00000064 r6:20000080 r5:849df800 r4:00000000 [ 1117.749853][T11459] [<8143a5ac>] (snd_mixer_oss_ioctl1) from [<8143b134>] (snd_mixer_oss_ioctl+0x14/0x18) [ 1117.749906][T11459] r10:84bb2400 r9:00000003 r8:848db480 r7:20000080 r6:848db481 r5:00000000 [ 1117.750004][T11459] r4:c0184800 [ 1117.750056][T11459] [<8143b120>] (snd_mixer_oss_ioctl) from [<8056b428>] (sys_ioctl+0x138/0xd84) [ 1117.750100][T11459] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1117.750139][T11459] Exception stack(0xeb889fa8 to 0xeb889ff0) [ 1117.750191][T11459] 9fa0: 00000000 00000000 00000003 c0184800 20000080 00000000 [ 1117.750238][T11459] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b660bc [ 1117.750357][T11459] 9fe0: 76b65ec0 76b65eb0 0001939c 00131f30 [ 1117.750516][T11459] r10:00000036 r9:84bb2400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1117.750560][T11459] r4:00000000 [ 1118.249041][ T31] audit: type=1400 audit(1118.170:389): avc: denied { read } for pid=11465 comm="syz.0.2094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1118.854293][T11471] fuse: Unknown parameter 'group_i00000000000000000000' [ 1119.940721][T11487] fuse: Unknown parameter 'group_i00000000000000000000' [ 1120.126741][T11489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=11489 comm=syz.1.2102 [ 1120.165079][T11489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=11489 comm=syz.1.2102 [ 1124.544708][T11507] fuse: Unknown parameter 'group_id00000000000000000000' [ 1125.177706][T11511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11511 comm=syz.0.2107 [ 1125.929039][ T31] audit: type=1400 audit(1125.850:390): avc: denied { read } for pid=11497 comm="syz.1.2103" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_notify_exec_t:s0" [ 1125.929453][ T31] audit: type=1400 audit(1125.850:391): avc: denied { open } for pid=11497 comm="syz.1.2103" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_notify_exec_t:s0" [ 1126.449897][T11523] fuse: Unknown parameter 'group_id00000000000000000000' [ 1130.143905][T11545] fuse: Unknown parameter 'group_id00000000000000000000' [ 1130.270064][T11547] FAULT_INJECTION: forcing a failure. [ 1130.270064][T11547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.270974][T11547] CPU: 1 UID: 0 PID: 11547 Comm: syz.1.2117 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1130.271032][T11547] Hardware name: ARM-Versatile Express [ 1130.271045][T11547] Call trace: [ 1130.271066][T11547] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1130.271119][T11547] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1130.271129][T11547] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1130.271156][T11547] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1130.271183][T11547] r5:841f3000 r4:82951710 [ 1130.271191][T11547] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1130.271220][T11547] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1130.271250][T11547] r8:76b9ef30 r7:00000000 r6:00000000 r5:ec3b9f68 r4:00000002 [ 1130.271259][T11547] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1130.271284][T11547] [<8095f854>] (should_fail_usercopy) from [<8058ccf4>] (simple_read_from_buffer+0x80/0x13c) [ 1130.271313][T11547] [<8058cc74>] (simple_read_from_buffer) from [<80604280>] (proc_fail_nth_read+0xb8/0x100) [ 1130.271347][T11547] r10:00000001 r9:806041c8 r8:00000002 r7:ec3b9f68 r6:0000000f r5:76b9ef30 [ 1130.271359][T11547] r4:841f3000 r3:ec3b9e9f [ 1130.271366][T11547] [<806041c8>] (proc_fail_nth_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 1130.271398][T11547] r8:76b9ef30 r7:ec3b9f68 r6:841f3000 r5:0000000f r4:855b0240 [ 1130.271407][T11547] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 1130.271437][T11547] r10:00000003 r9:841f3000 r8:8020029c r7:00000000 r6:00000000 r5:855b0240 [ 1130.271447][T11547] r4:855b0243 [ 1130.271454][T11547] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 1130.271481][T11547] r7:00000003 r6:00000006 r5:76b9ef30 r4:0000000f [ 1130.271490][T11547] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1130.271513][T11547] Exception stack(0xec3b9fa8 to 0xec3b9ff0) [ 1130.271532][T11547] 9fa0: 0000000f 76b9ef30 00000006 76b9ef30 0000000f 00000000 [ 1130.271549][T11547] 9fc0: 0000000f 76b9ef30 00000006 00000003 002d0000 00000000 00006364 76b9f0bc [ 1130.271561][T11547] 9fe0: 00000158 76b9eed0 000d7d68 0012fe04 [ 1131.072867][T11557] fuse: Bad value for 'user_id' [ 1131.074136][T11557] fuse: Bad value for 'user_id' [ 1131.139289][T11552] fuse: Bad value for 'fd' [ 1132.758134][T11576] fuse: Bad value for 'user_id' [ 1132.758567][T11576] fuse: Bad value for 'user_id' [ 1135.759687][T11591] fuse: Bad value for 'user_id' [ 1135.760146][T11591] fuse: Bad value for 'user_id' [ 1136.610116][T11601] fuse: Bad value for 'fd' [ 1137.339886][T11611] fuse: Bad value for 'fd' [ 1139.000673][ T31] audit: type=1400 audit(1138.920:392): avc: denied { write } for pid=11618 comm="syz.0.2146" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_notify_exec_t:s0" [ 1139.179583][T11621] fuse: Bad value for 'fd' [ 1142.308027][T11636] fuse: Bad value for 'fd' [ 1142.947286][T11649] fuse: Bad value for 'fd' [ 1143.692303][T11659] fuse: Bad value for 'fd' [ 1144.392767][T11672] fuse: Invalid rootmode [ 1146.860127][T11687] fuse: Invalid rootmode [ 1147.380060][T11697] fuse: Invalid rootmode [ 1147.693273][T11705] fuse: Unknown parameter 'Õ©H~égÏ0x0000000000000003' [ 1147.959147][T11711] fuse: Bad value for 'rootmode' [ 1148.644351][T11727] fuse: Bad value for 'rootmode' [ 1149.701765][T11764] fuse: Bad value for 'rootmode' [ 1150.439754][T11775] fuse: Unknown parameter 'use00000000000000000000' [ 1151.322110][T11785] fuse: Unknown parameter 'use00000000000000000000' [ 1151.711326][T11795] fuse: Unknown parameter 'use00000000000000000000' [ 1152.189800][T11805] fuse: Unknown parameter 'user_i00000000000000000000' [ 1152.975541][T11818] fuse: Unknown parameter 'user_i00000000000000000000' [ 1153.177892][ T31] audit: type=1400 audit(1153.100:393): avc: denied { watch watch_reads } for pid=11819 comm="syz.1.2227" path="/460/file1" dev="tmpfs" ino=2493 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1153.690951][T11828] fuse: Unknown parameter 'user_i00000000000000000000' [ 1154.933897][T11841] fuse: Unknown parameter 'user_id00000000000000000000' [ 1155.779242][T11852] fuse: Unknown parameter 'user_id00000000000000000000' [ 1157.651738][T11866] fuse: Unknown parameter 'user_id00000000000000000000' [ 1157.866589][T10231] hid (null): unknown global tag 0xd [ 1157.866821][T10231] hid (null): unknown global tag 0xd [ 1157.867249][T10231] hid (null): bogus close delimiter [ 1157.867309][T10231] hid (null): unknown global tag 0xd [ 1157.868501][T10231] hid (null): invalid report_count 62204 [ 1157.868727][T10231] hid (null): unknown global tag 0xd [ 1157.869123][T10231] hid (null): unknown global tag 0xe [ 1157.869397][T10231] hid (null): global environment stack underflow [ 1157.869470][T10231] hid (null): invalid report_count -21704029 [ 1157.871963][T10231] hid-generic 0007:0003:0007.0004: unknown main item tag 0x3 [ 1157.872188][T10231] hid-generic 0007:0003:0007.0004: unknown main item tag 0x2 [ 1157.872315][T10231] hid-generic 0007:0003:0007.0004: unknown main item tag 0x5 [ 1157.872429][T10231] hid-generic 0007:0003:0007.0004: unknown global tag 0xd [ 1157.872463][T10231] hid-generic 0007:0003:0007.0004: item 0 0 1 13 parsing failed [ 1157.872688][T10231] hid-generic 0007:0003:0007.0004: probe with driver hid-generic failed with error -22 [ 1158.566797][T11883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11883 comm=syz.1.2251 [ 1159.271932][T11903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11903 comm=syz.0.2258 [ 1160.931378][T11914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11914 comm=syz.1.2263 [ 1161.983983][T11923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11923 comm=syz.0.2268 [ 1162.270563][ T31] audit: type=1400 audit(1162.190:394): avc: denied { map } for pid=11930 comm="syz.0.2271" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_notify_exec_t:s0" [ 1162.439241][T11937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11937 comm=syz.0.2273 [ 1163.059562][T11949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11949 comm=syz.0.2278 [ 1165.385861][ T2950] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1165.432699][ T2950] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1165.463613][ T2950] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1165.552519][ T2950] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1165.879672][ T2950] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1165.897483][ T2950] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1165.900732][ T2950] bond0 (unregistering): Released all slaves [ 1165.987459][ T2950] hsr_slave_0: left promiscuous mode [ 1165.996737][ T2950] hsr_slave_1: left promiscuous mode [ 1166.003008][ T2950] veth1_macvtap: left promiscuous mode [ 1166.003327][ T2950] veth0_macvtap: left promiscuous mode [ 1166.003674][ T2950] veth1_vlan: left promiscuous mode [ 1166.003896][ T2950] veth0_vlan: left promiscuous mode [ 1168.094076][T11972] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1168.116009][T11972] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1169.512293][T11972] hsr_slave_0: entered promiscuous mode [ 1169.513715][T11972] hsr_slave_1: entered promiscuous mode [ 1169.528858][T11972] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1169.529491][T11972] Cannot create hsr debugfs directory [ 1170.113176][T11972] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1170.120881][T11972] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1170.129632][T11972] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1170.135353][T11972] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1171.131567][T11972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1172.607305][T12390] FAULT_INJECTION: forcing a failure. [ 1172.607305][T12390] name failslab, interval 1, probability 0, space 0, times 0 [ 1172.617934][T12390] CPU: 1 UID: 0 PID: 12390 Comm: syz.1.2299 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1172.617999][T12390] Hardware name: ARM-Versatile Express [ 1172.618014][T12390] Call trace: [ 1172.618036][T12390] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1172.618097][T12390] r7:00000d40 r6:00000000 r5:60000113 r4:82257e84 [ 1172.618107][T12390] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1172.618138][T12390] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1172.618170][T12390] r5:84bb6c00 r4:8291bcc0 [ 1172.618178][T12390] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1172.618211][T12390] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1172.618251][T12390] r8:84bb6c00 r7:00000d40 r6:855b0928 r5:00000019 r4:83001240 [ 1172.618261][T12390] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 1172.618292][T12390] [<8050a41c>] (__kmalloc_noprof) from [<807bc244>] (tomoyo_encode2+0x64/0xf0) [ 1172.618333][T12390] r10:00000fff r9:83351000 r8:00000000 r7:84c0c198 r6:855b0928 r5:840a8ffd [ 1172.618344][T12390] r4:840a8fef [ 1172.618353][T12390] [<807bc1e0>] (tomoyo_encode2) from [<807bc2f4>] (tomoyo_encode+0x24/0x30) [ 1172.618391][T12390] r9:83351000 r8:00000000 r7:84c0c198 r6:855b0928 r5:00001000 r4:840a8ff0 [ 1172.618407][T12390] [<807bc2d0>] (tomoyo_encode) from [<807bc380>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1172.618465][T12390] r5:00001000 r4:840a8000 [ 1172.618481][T12390] [<807bc300>] (tomoyo_realpath_from_path) from [<807b8480>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1172.618541][T12390] r10:84bb6c00 r9:00000000 r8:855b0900 r7:000089f1 r6:00000004 r5:81cd56c4 [ 1172.618555][T12390] r4:855b0928 r3:826c0240 [ 1172.618575][T12390] [<807b83b4>] (tomoyo_path_number_perm) from [<807bcd60>] (tomoyo_file_ioctl+0x1c/0x20) [ 1172.618616][T12390] r9:00000003 r8:855b0900 r7:20000240 r6:20000240 r5:000089f1 r4:855b0900 [ 1172.618627][T12390] [<807bcd44>] (tomoyo_file_ioctl) from [<8076a79c>] (security_file_ioctl+0x64/0x1e4) [ 1172.618662][T12390] [<8076a738>] (security_file_ioctl) from [<8056b33c>] (sys_ioctl+0x4c/0xd84) [ 1172.618697][T12390] r7:20000240 r6:855b0901 r5:00000000 r4:000089f1 [ 1172.618707][T12390] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1172.618732][T12390] Exception stack(0xedde5fa8 to 0xedde5ff0) [ 1172.618754][T12390] 5fa0: 00000000 00000000 00000003 000089f1 20000240 00000000 [ 1172.618774][T12390] 5fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b9f0bc [ 1172.618789][T12390] 5fe0: 76b9eec0 76b9eeb0 0001939c 00131f30 [ 1172.618811][T12390] r10:00000036 r9:84bb6c00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1172.618823][T12390] r4:00000000 [ 1172.619427][T12390] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1175.253150][T11972] veth0_vlan: entered promiscuous mode [ 1175.283908][T11972] veth1_vlan: entered promiscuous mode [ 1175.344103][T11972] veth0_macvtap: entered promiscuous mode [ 1175.370550][T11972] veth1_macvtap: entered promiscuous mode [ 1175.413719][T11972] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1175.413975][T11972] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1175.414035][T11972] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1175.414078][T11972] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1175.533906][ T31] audit: type=1400 audit(1175.450:395): avc: denied { mounton } for pid=11972 comm="syz-executor" path="/syzkaller.V2VE4q/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=29016 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1175.539965][ T31] audit: type=1400 audit(1175.460:396): avc: denied { mount } for pid=11972 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1175.751306][T12449] fuse: Bad value for 'fd' [ 1176.417764][T12463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12463 comm=syz.1.2310 [ 1176.569271][T12468] fuse: Unknown parameter '0x0000000000000003' [ 1177.217561][T12484] fuse: Unknown parameter '0x0000000000000003' [ 1177.944171][T12495] fuse: Unknown parameter '0x0000000000000003' [ 1180.258398][T12508] fuse: Unknown parameter '0x0000000000000003' [ 1180.925780][T12525] fuse: Unknown parameter '0x0000000000000003' [ 1182.153204][ T31] audit: type=1400 audit(1182.070:397): avc: denied { append } for pid=12526 comm="syz.0.2334" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_notify_exec_t:s0" [ 1183.152015][T12542] fuse: Unknown parameter '0x0000000000000003' [ 1183.913479][T12553] fuse: Unknown parameter 'fd0x0000000000000003' [ 1186.267663][T12565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12565 comm=syz.1.2347 [ 1186.333385][T12567] fuse: Unknown parameter 'fd0x0000000000000003' [ 1187.509476][T12581] fuse: Unknown parameter 'fd0x0000000000000003' [ 1187.697543][T12584] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12584 comm=syz.0.2354 [ 1187.722696][T12584] FAULT_INJECTION: forcing a failure. [ 1187.722696][T12584] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.722986][T12584] CPU: 1 UID: 0 PID: 12584 Comm: syz.0.2354 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1187.723033][T12584] Hardware name: ARM-Versatile Express [ 1187.723046][T12584] Call trace: [ 1187.723068][T12584] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1187.723160][T12584] r7:84bb5400 r6:00000000 r5:60000013 r4:82257e84 [ 1187.723176][T12584] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1187.723205][T12584] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1187.723232][T12584] r5:84bb5400 r4:8291bcc0 [ 1187.723240][T12584] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1187.723268][T12584] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1187.723303][T12584] r8:00000000 r7:84bb5400 r6:00000cc0 r5:00000002 r4:83001240 [ 1187.723312][T12584] [<80525658>] (should_failslab) from [<805094e8>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 1187.723339][T12584] [<8050949c>] (__kmalloc_cache_noprof) from [<80328180>] (__request_module+0xe8/0x2c0) [ 1187.723374][T12584] r10:20000180 r9:ee1c9ecb r8:828f87ac r7:84bb5400 r6:8158ac88 r5:00000002 [ 1187.723385][T12584] r4:00000000 [ 1187.723392][T12584] [<80328098>] (__request_module) from [<8158ac88>] (dev_load+0x80/0x8c) [ 1187.723424][T12584] r3:00400140 r2:ee1c9ecc r1:8241fae8 [ 1187.723439][T12584] r8:00000000 r7:84be9b00 r6:ee1c9ecc r5:00000000 r4:ee1c9ecc [ 1187.723447][T12584] [<8158ac08>] (dev_load) from [<8158c2dc>] (dev_ioctl+0x51c/0x62c) [ 1187.723473][T12584] r5:00000002 r4:000089f2 [ 1187.723506][T12584] [<8158bdc0>] (dev_ioctl) from [<8151ad14>] (sock_ioctl+0x464/0x600) [ 1187.723619][T12584] r10:84bb5400 r9:00000003 r8:85725000 r7:b5403587 r6:84be9b00 r5:20000200 [ 1187.723733][T12584] r4:000089f2 r3:20000180 [ 1187.723861][T12584] [<8151a8b0>] (sock_ioctl) from [<8056b428>] (sys_ioctl+0x138/0xd84) [ 1187.724124][T12584] r9:00000003 r8:85725000 r7:20000200 r6:85725001 r5:00000000 r4:000089f2 [ 1187.724248][T12584] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1187.724387][T12584] Exception stack(0xee1c9fa8 to 0xee1c9ff0) [ 1187.724840][T12584] 9fa0: 00000000 00000000 00000003 000089f2 20000200 00000000 [ 1187.724864][T12584] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b8e0bc [ 1187.725534][T12584] 9fe0: 76b8dec0 76b8deb0 0001939c 00131f30 [ 1187.725555][T12584] r10:00000036 r9:84bb5400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1187.725565][T12584] r4:00000000 [ 1196.984432][T12643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12643 comm=syz.0.2372 [ 1197.270726][T12647] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=12647 comm=syz.0.2374 [ 1197.300273][T12647] sctp: [Deprecated]: syz.0.2374 (pid 12647) Use of int in max_burst socket option deprecated. [ 1197.300273][T12647] Use struct sctp_assoc_value instead [ 1198.653517][ T31] audit: type=1400 audit(1198.570:398): avc: denied { setattr } for pid=12658 comm="syz.0.2377" name="ALG" dev="sockfs" ino=30114 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1198.663651][ T31] audit: type=1400 audit(1198.580:399): avc: denied { read } for pid=12658 comm="syz.0.2377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1198.718732][T12659] SELinux: syz.0.2377 (12659) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1205.357434][T12708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12708 comm=syz.0.2390 [ 1205.427551][T12708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12708 comm=syz.0.2390 [ 1205.820598][T12715] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65534 sclass=netlink_tcpdiag_socket pid=12715 comm=syz.1.2391 [ 1209.298339][ T31] audit: type=1400 audit(1209.220:400): avc: denied { name_bind } for pid=12736 comm="syz.1.2398" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1216.480394][T12780] FAULT_INJECTION: forcing a failure. [ 1216.480394][T12780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1216.480825][T12780] CPU: 1 UID: 0 PID: 12780 Comm: syz.1.2409 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1216.480878][T12780] Hardware name: ARM-Versatile Express [ 1216.480899][T12780] Call trace: [ 1216.480935][T12780] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1216.481125][T12780] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1216.481190][T12780] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1216.481318][T12780] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1216.481797][T12780] r5:84213000 r4:82951710 [ 1216.481991][T12780] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1216.482731][T12780] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1216.482925][T12780] r8:8020029c r7:00000000 r6:8245e848 r5:76b9eab0 r4:76b9eab0 [ 1216.482946][T12780] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1216.483065][T12780] [<8095f854>] (should_fail_usercopy) from [<80965908>] (strncpy_from_user+0x20/0x1a0) [ 1216.483582][T12780] [<809658e8>] (strncpy_from_user) from [<80560b78>] (getname_flags.part.0+0x44/0x18c) [ 1216.483767][T12780] r10:00000142 r9:84213000 r8:8020029c r7:00000000 r6:8245e848 r5:76b9eab0 [ 1216.483820][T12780] r4:838ed000 [ 1216.483897][T12780] [<80560b34>] (getname_flags.part.0) from [<80565c44>] (getname_flags+0x3c/0x50) [ 1216.483975][T12780] r9:84213000 r8:8020029c r7:ffffff9c r6:dfbb5f58 r5:00000000 r4:76b9eab0 [ 1216.484287][T12780] [<80565c08>] (getname_flags) from [<8054e744>] (do_sys_openat2+0x60/0xe0) [ 1216.484709][T12780] r5:76b9eab0 r4:00000000 [ 1216.484939][T12780] [<8054e6e4>] (do_sys_openat2) from [<8054eb9c>] (sys_openat+0x98/0xd4) [ 1216.485074][T12780] r7:00000142 r6:00000000 r5:76b9eab0 r4:ffffff9c [ 1216.485287][T12780] [<8054eb04>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1216.485669][T12780] Exception stack(0xdfbb5fa8 to 0xdfbb5ff0) [ 1216.485778][T12780] 5fa0: 00080000 76b9eab0 ffffff9c 76b9eab0 00080000 00000000 [ 1216.486130][T12780] 5fc0: 00080000 76b9eab0 00000000 00000142 00000000 00000000 00006364 76b9f0bc [ 1216.486194][T12780] 5fe0: 81010301 76b9ea68 000d7d68 0012fd28 [ 1216.486756][T12780] r5:76b9eab0 r4:00080000 [ 1220.567188][T12810] FAULT_INJECTION: forcing a failure. [ 1220.567188][T12810] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.568096][T12810] CPU: 0 UID: 0 PID: 12810 Comm: syz.0.2416 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1220.568154][T12810] Hardware name: ARM-Versatile Express [ 1220.568168][T12810] Call trace: [ 1220.568189][T12810] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1220.568245][T12810] r7:00000c40 r6:00000000 r5:60000013 r4:82257e84 [ 1220.568255][T12810] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1220.568284][T12810] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1220.568314][T12810] r5:84216c00 r4:8291bcc0 [ 1220.568322][T12810] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1220.568355][T12810] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1220.568393][T12810] r8:84216c00 r7:00000c40 r6:855b0da8 r5:00001000 r4:830016c0 [ 1220.568402][T12810] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 1220.568431][T12810] [<8050a41c>] (__kmalloc_noprof) from [<807bc33c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1220.568469][T12810] r10:84216c00 r9:83351000 r8:00000000 r7:835efee0 r6:855b0da8 r5:00001000 [ 1220.568480][T12810] r4:00000000 [ 1220.568488][T12810] [<807bc300>] (tomoyo_realpath_from_path) from [<807b8480>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1220.568524][T12810] r10:84216c00 r9:00000000 r8:855b0d80 r7:40049421 r6:00000004 r5:81cd56c4 [ 1220.568536][T12810] r4:855b0da8 r3:826c0240 [ 1220.568544][T12810] [<807b83b4>] (tomoyo_path_number_perm) from [<807bcd60>] (tomoyo_file_ioctl+0x1c/0x20) [ 1220.568580][T12810] r9:00000004 r8:855b0d80 r7:00000001 r6:00000001 r5:40049421 r4:855b0d80 [ 1220.568589][T12810] [<807bcd44>] (tomoyo_file_ioctl) from [<8076a79c>] (security_file_ioctl+0x64/0x1e4) [ 1220.568628][T12810] [<8076a738>] (security_file_ioctl) from [<8056b33c>] (sys_ioctl+0x4c/0xd84) [ 1220.568660][T12810] r7:00000001 r6:855b0d81 r5:00000000 r4:40049421 [ 1220.568669][T12810] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1220.568693][T12810] Exception stack(0xdfaa9fa8 to 0xdfaa9ff0) [ 1220.568712][T12810] 9fa0: 00000000 00000000 00000004 40049421 00000001 00000000 [ 1220.568730][T12810] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b6d0bc [ 1220.568743][T12810] 9fe0: 76b6cec0 76b6ceb0 0001939c 00131f30 [ 1220.568762][T12810] r10:00000036 r9:84216c00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1220.568772][T12810] r4:00000000 [ 1220.582192][T12810] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1225.552225][T12832] FAULT_INJECTION: forcing a failure. [ 1225.552225][T12832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1225.552473][T12832] CPU: 1 UID: 0 PID: 12832 Comm: syz.1.2423 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1225.552514][T12832] Hardware name: ARM-Versatile Express [ 1225.552528][T12832] Call trace: [ 1225.552584][T12832] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1225.552703][T12832] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1225.553003][T12832] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1225.553061][T12832] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1225.553149][T12832] r5:84213000 r4:82951710 [ 1225.553169][T12832] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1225.553254][T12832] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1225.553318][T12832] r8:76b9ef30 r7:00000000 r6:00000000 r5:dfd09f68 r4:00000002 [ 1225.553400][T12832] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1225.553449][T12832] [<8095f854>] (should_fail_usercopy) from [<8058ccf4>] (simple_read_from_buffer+0x80/0x13c) [ 1225.553492][T12832] [<8058cc74>] (simple_read_from_buffer) from [<80604280>] (proc_fail_nth_read+0xb8/0x100) [ 1225.553549][T12832] r10:00000001 r9:806041c8 r8:00000002 r7:dfd09f68 r6:0000000f r5:76b9ef30 [ 1225.553607][T12832] r4:84213000 r3:dfd09e9f [ 1225.553681][T12832] [<806041c8>] (proc_fail_nth_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 1225.553742][T12832] r8:76b9ef30 r7:dfd09f68 r6:84213000 r5:0000000f r4:85725b40 [ 1225.553803][T12832] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 1225.553891][T12832] r10:00000003 r9:84213000 r8:8020029c r7:00000000 r6:00000000 r5:85725b40 [ 1225.553933][T12832] r4:85725b43 [ 1225.553941][T12832] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 1225.554015][T12832] r7:00000003 r6:00000004 r5:76b9ef30 r4:0000000f [ 1225.554055][T12832] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1225.554107][T12832] Exception stack(0xdfd09fa8 to 0xdfd09ff0) [ 1225.554173][T12832] 9fa0: 0000000f 76b9ef30 00000004 76b9ef30 0000000f 00000000 [ 1225.554222][T12832] 9fc0: 0000000f 76b9ef30 00000004 00000003 002d0000 00000000 00006364 76b9f0bc [ 1225.554328][T12832] 9fe0: 00000158 76b9eed0 000d7d68 0012fe04 [ 1233.130772][T12889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=12889 comm=syz.0.2438 [ 1236.192408][T12907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=12907 comm=syz.0.2443 [ 1240.989492][T12928] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 1241.090344][T12930] FAULT_INJECTION: forcing a failure. [ 1241.090344][T12930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1241.098815][T12930] CPU: 0 UID: 0 PID: 12930 Comm: syz.1.2447 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1241.098931][T12930] Hardware name: ARM-Versatile Express [ 1241.098958][T12930] Call trace: [ 1241.099001][T12930] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1241.099124][T12930] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1241.099149][T12930] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1241.099203][T12930] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1241.099266][T12930] r5:84210c00 r4:82951710 [ 1241.099287][T12930] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1241.099353][T12930] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1241.099418][T12930] r8:76b9ef30 r7:00000000 r6:00000000 r5:e04b1f68 r4:00000002 [ 1241.099437][T12930] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1241.099487][T12930] [<8095f854>] (should_fail_usercopy) from [<8058ccf4>] (simple_read_from_buffer+0x80/0x13c) [ 1241.099569][T12930] [<8058cc74>] (simple_read_from_buffer) from [<80604280>] (proc_fail_nth_read+0xb8/0x100) [ 1241.099655][T12930] r10:00000001 r9:806041c8 r8:00000002 r7:e04b1f68 r6:0000000f r5:76b9ef30 [ 1241.099683][T12930] r4:84210c00 r3:e04b1e9f [ 1241.099702][T12930] [<806041c8>] (proc_fail_nth_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 1241.099795][T12930] r8:76b9ef30 r7:e04b1f68 r6:84210c00 r5:0000000f r4:855b00c0 [ 1241.099816][T12930] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 1241.099882][T12930] r10:00000003 r9:84210c00 r8:8020029c r7:00000000 r6:00000000 r5:855b00c0 [ 1241.099905][T12930] r4:855b00c3 [ 1241.099922][T12930] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 1241.099983][T12930] r7:00000003 r6:00000005 r5:76b9ef30 r4:0000000f [ 1241.100002][T12930] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1241.100055][T12930] Exception stack(0xe04b1fa8 to 0xe04b1ff0) [ 1241.100096][T12930] 1fa0: 0000000f 76b9ef30 00000005 76b9ef30 0000000f 00000000 [ 1241.100132][T12930] 1fc0: 0000000f 76b9ef30 00000005 00000003 002d0000 00000000 00006364 76b9f0bc [ 1241.100161][T12930] 1fe0: 00000158 76b9eed0 000d7d68 0012fe04 [ 1246.742218][T12967] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12967 comm=syz.1.2461 [ 1246.743998][T12967] FAULT_INJECTION: forcing a failure. [ 1246.743998][T12967] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.745084][T12967] CPU: 0 UID: 0 PID: 12967 Comm: syz.1.2461 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1246.745243][T12967] Hardware name: ARM-Versatile Express [ 1246.745268][T12967] Call trace: [ 1246.745305][T12967] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1246.745392][T12967] r7:84bb0000 r6:00000000 r5:60000013 r4:82257e84 [ 1246.745410][T12967] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1246.745454][T12967] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1246.745503][T12967] r5:84bb0000 r4:8291bcc0 [ 1246.745517][T12967] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1246.745569][T12967] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1246.745629][T12967] r8:00000000 r7:84bb0000 r6:00000820 r5:8555ec00 r4:832c7240 [ 1246.745645][T12967] [<80525658>] (should_failslab) from [<8050a134>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1246.745691][T12967] [<8050a0e8>] (kmem_cache_alloc_noprof) from [<8152d81c>] (skb_clone+0x60/0x1c8) [ 1246.745750][T12967] r10:000001a2 r9:854e4540 r8:85512c00 r7:8555ec00 r6:8534f6c0 r5:8555ec00 [ 1246.745767][T12967] r4:00000820 [ 1246.745780][T12967] [<8152d7bc>] (skb_clone) from [<81642580>] (__netlink_deliver_tap+0x1f4/0x28c) [ 1246.745840][T12967] r5:00000014 r4:8534f000 [ 1246.745855][T12967] [<8164238c>] (__netlink_deliver_tap) from [<81645778>] (netlink_unicast+0x280/0x29c) [ 1246.745911][T12967] r10:00000000 r9:00000000 r8:850b0d80 r7:8555ec00 r6:854e4540 r5:00000014 [ 1246.745929][T12967] r4:85512c00 [ 1246.745943][T12967] [<816454f8>] (netlink_unicast) from [<81645960>] (netlink_sendmsg+0x1cc/0x444) [ 1246.746044][T12967] r9:00000000 r8:00000000 r7:85347c00 r6:00000014 r5:8555ec00 r4:e0509f20 [ 1246.746077][T12967] [<81645794>] (netlink_sendmsg) from [<81519e8c>] (__sock_sendmsg+0x44/0x78) [ 1246.746141][T12967] r10:00000000 r9:e0509dc4 r8:e0509dc4 r7:00000000 r6:84c68a00 r5:e0509f20 [ 1246.746159][T12967] r4:00000000 [ 1246.746174][T12967] [<81519e48>] (__sock_sendmsg) from [<8151a6fc>] (____sys_sendmsg+0x298/0x2cc) [ 1246.746220][T12967] r7:00000000 r6:84c68a00 r5:00040000 r4:e0509f20 [ 1246.746235][T12967] [<8151a464>] (____sys_sendmsg) from [<8151c49c>] (___sys_sendmsg+0x9c/0xd0) [ 1246.746351][T12967] r10:e0509e24 r9:200001c0 r8:00040000 r7:00000000 r6:84c68a00 r5:e0509f20 [ 1246.746370][T12967] r4:00000000 [ 1246.746386][T12967] [<8151c400>] (___sys_sendmsg) from [<8151c92c>] (__sys_sendmsg+0x8c/0xd8) [ 1246.746442][T12967] r10:00000128 r9:84bb0000 r8:855b0600 r7:00040000 r6:200001c0 r5:855b0601 [ 1246.746461][T12967] r4:00000003 [ 1246.746476][T12967] [<8151c8a0>] (__sys_sendmsg) from [<8151c98c>] (sys_sendmsg+0x14/0x18) [ 1246.746530][T12967] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1246.746545][T12967] [<8151c978>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1246.746588][T12967] Exception stack(0xe0509fa8 to 0xe0509ff0) [ 1246.746619][T12967] 9fa0: 00000000 00000000 00000003 200001c0 00040000 00000000 [ 1246.746650][T12967] 9fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b9f0bc [ 1246.746671][T12967] 9fe0: 76b9eec0 76b9eeb0 0001939c 00131f30 [ 1247.690805][T12980] fuse: Bad value for 'fd' [ 1251.384023][T12998] fuse: Bad value for 'fd' [ 1254.652322][T13015] fuse: Bad value for 'fd' [ 1257.539815][ T2950] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1257.582982][ T2950] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1257.641388][ T2950] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1257.676843][T13023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1257.690790][ T2950] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1257.698069][T13023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1257.978847][ T2950] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1258.001613][ T2950] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1258.017567][ T2950] bond0 (unregistering): Released all slaves [ 1258.088268][ T2950] hsr_slave_0: left promiscuous mode [ 1258.090169][ T2950] hsr_slave_1: left promiscuous mode [ 1258.108658][ T2950] veth1_macvtap: left promiscuous mode [ 1258.109132][ T2950] veth0_macvtap: left promiscuous mode [ 1258.109377][ T2950] veth1_vlan: left promiscuous mode [ 1258.109547][ T2950] veth0_vlan: left promiscuous mode [ 1258.925746][T13023] hsr_slave_0: entered promiscuous mode [ 1258.929918][T13023] hsr_slave_1: entered promiscuous mode [ 1259.435535][T13023] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1259.444833][T13023] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1259.459761][T13023] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1259.464506][T13023] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1259.835922][T13023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1262.020972][T13023] veth0_vlan: entered promiscuous mode [ 1262.036782][T13023] veth1_vlan: entered promiscuous mode [ 1262.069140][T13023] veth0_macvtap: entered promiscuous mode [ 1262.074689][T13023] veth1_macvtap: entered promiscuous mode [ 1262.110974][T13023] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.111705][T13023] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.113715][T13023] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.114841][T13023] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1263.261705][T13465] FAULT_INJECTION: forcing a failure. [ 1263.261705][T13465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1263.262146][T13465] CPU: 0 UID: 0 PID: 13465 Comm: syz.1.2495 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1263.262213][T13465] Hardware name: ARM-Versatile Express [ 1263.262238][T13465] Call trace: [ 1263.262322][T13465] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1263.262428][T13465] r7:85519c00 r6:00000000 r5:60000013 r4:82257e84 [ 1263.262446][T13465] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1263.262497][T13465] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1263.262554][T13465] r5:84890c00 r4:82951710 [ 1263.262568][T13465] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1263.262625][T13465] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1263.263421][T13465] r8:00000000 r7:85519c00 r6:e0575e20 r5:00000000 r4:00000000 [ 1263.263549][T13465] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1263.263814][T13465] [<8095f854>] (should_fail_usercopy) from [<8151df00>] (copy_to_sockptr_offset+0x64/0x108) [ 1263.263992][T13465] [<8151de9c>] (copy_to_sockptr_offset) from [<81524a10>] (sk_getsockopt+0x298/0xe04) [ 1263.264232][T13465] r7:85519c00 r6:00000010 r5:e0575e14 r4:00000000 [ 1263.264319][T13465] [<8152477c>] (sk_getsockopt) from [<8151a41c>] (do_sock_getsockopt+0x254/0x29c) [ 1263.264510][T13465] r10:00000127 r9:20000180 r8:00000000 r7:84c9d180 r6:00000043 r5:00000001 [ 1263.264758][T13465] r4:b5403587 [ 1263.264851][T13465] [<8151a1c8>] (do_sock_getsockopt) from [<8151c07c>] (__sys_getsockopt+0x94/0xcc) [ 1263.264931][T13465] r9:84890c00 r8:84a526c0 r7:e0575f50 r6:00000043 r5:e0575f58 r4:84a526c1 [ 1263.264981][T13465] [<8151bfe8>] (__sys_getsockopt) from [<8151c0d0>] (sys_getsockopt+0x1c/0x24) [ 1263.265091][T13465] r8:8020029c r7:00000127 r6:0012fee0 r5:00000000 r4:20000180 [ 1263.265292][T13465] [<8151c0b4>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1263.265393][T13465] Exception stack(0xe0575fa8 to 0xe0575ff0) [ 1263.265469][T13465] 5fa0: 20000180 00000000 00000003 00000001 00000043 00000000 [ 1263.265646][T13465] 5fc0: 20000180 00000000 0012fee0 00000127 002d0000 00000000 00006364 76b1b0bc [ 1263.265712][T13465] 5fe0: 76b1aec0 76b1aeb0 0001939c 00131f30 [ 1263.291174][ T31] audit: type=1404 audit(1263.210:401): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1263.325866][ T31] audit: type=1400 audit(1263.240:402): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1263.355246][ T31] audit: type=1400 audit(1263.270:403): avc: denied { ioctl } for pid=13461 comm="syz.0.2494" path="socket:[32132]" dev="sockfs" ino=32132 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1263.373068][ T31] audit: type=1400 audit(1263.290:404): avc: denied { ioctl } for pid=13461 comm="syz.0.2494" path="socket:[32132]" dev="sockfs" ino=32132 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1263.408954][ T31] audit: type=1400 audit(1263.330:405): avc: denied { create } for pid=13466 comm="syz.1.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1263.417806][ T31] audit: type=1400 audit(1263.340:406): avc: denied { read write } for pid=13466 comm="syz.1.2496" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1263.454286][ T31] audit: type=1400 audit(1263.370:407): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1263.516913][ T31] audit: type=1400 audit(1263.430:408): avc: denied { create } for pid=13468 comm="syz.1.2497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1263.525065][ T31] audit: type=1400 audit(1263.440:409): avc: denied { read write } for pid=13468 comm="syz.1.2497" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1263.560903][ T31] audit: type=1400 audit(1263.480:410): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1263.659882][T13471] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13471 comm=syz.1.2498 [ 1264.549018][T13494] FAULT_INJECTION: forcing a failure. [ 1264.549018][T13494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1264.550370][T13494] CPU: 1 UID: 0 PID: 13494 Comm: syz.0.2509 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1264.550435][T13494] Hardware name: ARM-Versatile Express [ 1264.550449][T13494] Call trace: [ 1264.550471][T13494] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1264.550528][T13494] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1264.550539][T13494] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1264.550569][T13494] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1264.550602][T13494] r5:84233c00 r4:82951710 [ 1264.550610][T13494] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1264.550655][T13494] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1264.550691][T13494] r8:76b8df30 r7:00000000 r6:00000000 r5:ea885f68 r4:00000002 [ 1264.550701][T13494] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1264.550746][T13494] [<8095f854>] (should_fail_usercopy) from [<8058ccf4>] (simple_read_from_buffer+0x80/0x13c) [ 1264.550779][T13494] [<8058cc74>] (simple_read_from_buffer) from [<80604280>] (proc_fail_nth_read+0xb8/0x100) [ 1264.550818][T13494] r10:00000001 r9:806041c8 r8:00000002 r7:ea885f68 r6:0000000f r5:76b8df30 [ 1264.550832][T13494] r4:84233c00 r3:ea885e9f [ 1264.550841][T13494] [<806041c8>] (proc_fail_nth_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 1264.550880][T13494] r8:76b8df30 r7:ea885f68 r6:84233c00 r5:0000000f r4:85725a80 [ 1264.550890][T13494] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 1264.550937][T13494] r10:00000003 r9:84233c00 r8:8020029c r7:00000000 r6:00000000 r5:85725a80 [ 1264.550949][T13494] r4:85725a83 [ 1264.550958][T13494] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 1264.550992][T13494] r7:00000003 r6:00000002 r5:76b8df30 r4:0000000f [ 1264.551001][T13494] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1264.551027][T13494] Exception stack(0xea885fa8 to 0xea885ff0) [ 1264.551049][T13494] 5fa0: 0000000f 76b8df30 00000002 76b8df30 0000000f 00000000 [ 1264.551068][T13494] 5fc0: 0000000f 76b8df30 00000002 00000003 002d0000 00000000 00006364 76b8e0bc [ 1264.551083][T13494] 5fe0: 00000158 76b8ded0 000d7d68 0012fe04 [ 1268.038739][T13568] FAULT_INJECTION: forcing a failure. [ 1268.038739][T13568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1268.039018][T13568] CPU: 0 UID: 0 PID: 13568 Comm: syz.1.2536 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1268.039060][T13568] Hardware name: ARM-Versatile Express [ 1268.039077][T13568] Call trace: [ 1268.039100][T13568] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1268.039199][T13568] r7:eac79e20 r6:00000000 r5:60000013 r4:82257e84 [ 1268.039211][T13568] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1268.039329][T13568] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1268.039447][T13568] r5:84890000 r4:82951710 [ 1268.039473][T13568] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1268.039547][T13568] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1268.039626][T13568] r8:04000000 r7:eac79e20 r6:20000280 r5:00000000 r4:eac79f20 [ 1268.040009][T13568] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1268.040136][T13568] [<8095f854>] (should_fail_usercopy) from [<8151c320>] (copy_msghdr_from_user+0x50/0x130) [ 1268.040224][T13568] [<8151c2d0>] (copy_msghdr_from_user) from [<8151c478>] (___sys_sendmsg+0x78/0xd0) [ 1268.040297][T13568] r8:04000000 r7:00000000 r6:84c9c280 r5:eac79f20 r4:eac79e64 [ 1268.040364][T13568] [<8151c400>] (___sys_sendmsg) from [<8151c92c>] (__sys_sendmsg+0x8c/0xd8) [ 1268.040534][T13568] r10:00000128 r9:84890000 r8:84a52a80 r7:04000000 r6:20000280 r5:84a52a81 [ 1268.040593][T13568] r4:00000003 [ 1268.040617][T13568] [<8151c8a0>] (__sys_sendmsg) from [<8151c98c>] (sys_sendmsg+0x14/0x18) [ 1268.040690][T13568] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1268.040777][T13568] [<8151c978>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1268.040866][T13568] Exception stack(0xeac79fa8 to 0xeac79ff0) [ 1268.040994][T13568] 9fa0: 00000000 00000000 00000003 20000280 04000000 00000000 [ 1268.041121][T13568] 9fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b1b0bc [ 1268.041256][T13568] 9fe0: 76b1aec0 76b1aeb0 0001939c 00131f30 [ 1268.319931][ T31] kauditd_printk_skb: 281 callbacks suppressed [ 1268.320228][ T31] audit: type=1400 audit(1268.240:692): avc: denied { create } for pid=13579 comm="syz.1.2541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1268.378048][ T31] audit: type=1400 audit(1268.300:693): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1268.440823][ T31] audit: type=1400 audit(1268.360:694): avc: denied { create } for pid=13581 comm="syz.1.2542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1268.450291][ T31] audit: type=1400 audit(1268.370:695): avc: denied { read write } for pid=13581 comm="syz.1.2542" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1268.471981][ T31] audit: type=1400 audit(1268.390:696): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1268.562122][ T31] audit: type=1400 audit(1268.480:697): avc: denied { read write } for pid=13583 comm="syz.1.2543" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1268.570279][ T31] audit: type=1400 audit(1268.490:698): avc: denied { write } for pid=13583 comm="syz.1.2543" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1268.629717][ T31] audit: type=1400 audit(1268.550:699): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1268.674260][ T31] audit: type=1400 audit(1268.590:700): avc: denied { read } for pid=13589 comm="syz.1.2544" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1268.679330][ T31] audit: type=1400 audit(1268.600:701): avc: denied { create } for pid=13589 comm="syz.1.2544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1272.132417][T13616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13616 comm=syz.1.2555 [ 1273.330174][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 1273.330447][ T31] audit: type=1400 audit(1273.250:788): avc: denied { create } for pid=13644 comm="syz.1.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1273.337987][ T31] audit: type=1400 audit(1273.260:789): avc: denied { read write } for pid=13644 comm="syz.1.2567" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1273.341008][ T31] audit: type=1400 audit(1273.260:790): avc: denied { mounton } for pid=13644 comm="syz.1.2567" path="/60/file0" dev="tmpfs" ino=343 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1273.375116][ T31] audit: type=1400 audit(1273.290:791): avc: denied { write } for pid=13645 comm="syz.0.2568" name="tcp6" dev="proc" ino=4026532710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 1273.378793][ T31] audit: type=1400 audit(1273.290:792): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1273.389965][ T31] audit: type=1400 audit(1273.310:793): avc: denied { read } for pid=13645 comm="syz.0.2568" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1273.455151][ T31] audit: type=1400 audit(1273.370:794): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1273.503062][ T31] audit: type=1400 audit(1273.420:795): avc: denied { execute } for pid=13648 comm="syz.1.2569" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1273.541108][ T31] audit: type=1400 audit(1273.460:796): avc: denied { read write } for pid=13650 comm="syz.0.2570" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1273.550906][ T31] audit: type=1400 audit(1273.470:797): avc: denied { read write } for pid=13650 comm="syz.0.2570" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:systemd_notify_exec_t:s0" [ 1273.714182][T13655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13655 comm=syz.0.2572 [ 1273.738749][T13655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=269 sclass=netlink_route_socket pid=13655 comm=syz.0.2572 [ 1274.981804][T13676] FAULT_INJECTION: forcing a failure. [ 1274.981804][T13676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1274.984869][T13676] CPU: 0 UID: 0 PID: 13676 Comm: syz.0.2576 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1274.985062][T13676] Hardware name: ARM-Versatile Express [ 1274.985092][T13676] Call trace: [ 1274.985138][T13676] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1274.985252][T13676] r7:b5403587 r6:00000000 r5:60000013 r4:82257e84 [ 1274.985275][T13676] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1274.985332][T13676] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1274.985383][T13676] r5:838f6000 r4:82951710 [ 1274.985399][T13676] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1274.985455][T13676] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1274.985517][T13676] r8:00000000 r7:b5403587 r6:00000000 r5:838f6830 r4:76b6cca0 [ 1274.985536][T13676] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1274.985593][T13676] [<8095f854>] (should_fail_usercopy) from [<8022b2cc>] (preserve_vfp_context+0x78/0xc4) [ 1274.985653][T13676] [<8022b254>] (preserve_vfp_context) from [<8022b694>] (setup_sigframe+0x16c/0x1c4) [ 1274.985710][T13676] r5:838f6830 r4:76b6cbb8 [ 1274.985730][T13676] [<8022b528>] (setup_sigframe) from [<8022bab4>] (do_work_pending+0x2f4/0x4f8) [ 1274.985788][T13676] r10:00000004 r9:b5403587 r8:00000000 r7:838f6830 r6:76b6cbb8 r5:eb17dfb0 [ 1274.985807][T13676] r4:838f6000 [ 1274.985823][T13676] [<8022b7c0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 1274.985870][T13676] Exception stack(0xeb17dfb0 to 0xeb17dff8) [ 1274.985917][T13676] dfa0: fffffffc 00000000 00000000 00000000 [ 1274.985951][T13676] dfc0: 00000000 00000000 0012fee0 00000004 002d0000 00000000 00006364 76b6d0bc [ 1274.985980][T13676] dfe0: 76b6cec0 76b6ceb0 0001939c 00131f30 60000010 00000005 [ 1274.986090][T13676] r10:00000004 r9:838f6000 r8:8020029c r7:00000004 r6:0012fee0 r5:00000000 [ 1274.986131][T13676] r4:00000000 [ 1275.194998][T13682] FAULT_INJECTION: forcing a failure. [ 1275.194998][T13682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1275.197804][T13682] CPU: 1 UID: 0 PID: 13682 Comm: syz.0.2583 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1275.197906][T13682] Hardware name: ARM-Versatile Express [ 1275.197931][T13682] Call trace: [ 1275.197972][T13682] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1275.198072][T13682] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1275.198091][T13682] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1275.198141][T13682] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1275.198190][T13682] r5:838f6000 r4:82951710 [ 1275.198205][T13682] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1275.198259][T13682] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1275.198449][T13682] r8:76b8df30 r7:00000000 r6:00000000 r5:eb17df68 r4:00000002 [ 1275.198471][T13682] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1275.198524][T13682] [<8095f854>] (should_fail_usercopy) from [<8058ccf4>] (simple_read_from_buffer+0x80/0x13c) [ 1275.198582][T13682] [<8058cc74>] (simple_read_from_buffer) from [<80604280>] (proc_fail_nth_read+0xb8/0x100) [ 1275.198661][T13682] r10:00000001 r9:806041c8 r8:00000002 r7:eb17df68 r6:0000000f r5:76b8df30 [ 1275.198687][T13682] r4:838f6000 r3:eb17de9f [ 1275.198705][T13682] [<806041c8>] (proc_fail_nth_read) from [<805517b0>] (vfs_read+0x98/0x320) [ 1275.198770][T13682] r8:76b8df30 r7:eb17df68 r6:838f6000 r5:0000000f r4:857253c0 [ 1275.198789][T13682] [<80551718>] (vfs_read) from [<80552450>] (ksys_read+0x74/0xe4) [ 1275.198848][T13682] r10:00000003 r9:838f6000 r8:8020029c r7:00000000 r6:00000000 r5:857253c0 [ 1275.198869][T13682] r4:857253c3 [ 1275.198885][T13682] [<805523dc>] (ksys_read) from [<805524d0>] (sys_read+0x10/0x14) [ 1275.198939][T13682] r7:00000003 r6:00000003 r5:76b8df30 r4:0000000f [ 1275.198956][T13682] [<805524c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1275.199002][T13682] Exception stack(0xeb17dfa8 to 0xeb17dff0) [ 1275.199038][T13682] dfa0: 0000000f 76b8df30 00000003 76b8df30 0000000f 00000000 [ 1275.199071][T13682] dfc0: 0000000f 76b8df30 00000003 00000003 002d0000 00000000 00006364 76b8e0bc [ 1275.199096][T13682] dfe0: 00000158 76b8ded0 000d7d68 0012fe04 [ 1278.078705][T13691] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13691 comm=syz.0.2587 [ 1278.359913][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 1278.361687][ T31] audit: type=1400 audit(1278.280:861): avc: denied { create } for pid=13696 comm="syz.0.2590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1278.371745][ T31] audit: type=1400 audit(1278.290:862): avc: denied { read write } for pid=13696 comm="syz.0.2590" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1278.380199][ T31] audit: type=1400 audit(1278.300:863): avc: denied { mounton } for pid=13696 comm="syz.0.2590" path="/119/file0" dev="tmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1278.413239][ T31] audit: type=1400 audit(1278.330:864): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1278.468151][ T31] audit: type=1400 audit(1278.390:865): avc: denied { create } for pid=13698 comm="syz.0.2591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1278.495650][ T31] audit: type=1400 audit(1278.410:866): avc: denied { create } for pid=13698 comm="syz.0.2591" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1278.502095][ T31] audit: type=1400 audit(1278.420:867): avc: denied { read } for pid=13698 comm="syz.0.2591" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1278.506682][ T31] audit: type=1400 audit(1278.420:868): avc: denied { execmem } for pid=13698 comm="syz.0.2591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1278.510478][ T31] audit: type=1400 audit(1278.430:869): avc: denied { create } for pid=13698 comm="syz.0.2591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1278.531165][ T31] audit: type=1400 audit(1278.450:870): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1284.861111][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 1284.861381][ T31] audit: type=1400 audit(1284.780:882): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1284.930556][ T31] audit: type=1400 audit(1284.850:883): avc: denied { create } for pid=13717 comm="syz.1.2598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1284.943208][T13718] FAULT_INJECTION: forcing a failure. [ 1284.943208][T13718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1284.944204][T13718] CPU: 1 UID: 0 PID: 13718 Comm: syz.1.2598 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1284.944273][T13718] Hardware name: ARM-Versatile Express [ 1284.944287][T13718] Call trace: [ 1284.944311][T13718] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1284.944372][T13718] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1284.944394][T13718] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1284.944445][T13718] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1284.944497][T13718] r5:8423c800 r4:82951710 [ 1284.944506][T13718] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1284.944540][T13718] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1284.944575][T13718] r8:eb3b9eb8 r7:00000000 r6:00000001 r5:76b1af30 r4:00000001 [ 1284.944585][T13718] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1284.944632][T13718] [<8095f854>] (should_fail_usercopy) from [<808b79d0>] (kstrtouint_from_user+0x54/0x13c) [ 1284.944683][T13718] [<808b797c>] (kstrtouint_from_user) from [<806056c0>] (proc_fail_nth_write+0x40/0xe8) [ 1284.944723][T13718] r8:eb3b9f68 r7:8423c800 r6:00000001 r5:85725cc0 r4:00000001 [ 1284.944733][T13718] [<80605680>] (proc_fail_nth_write) from [<80552040>] (vfs_write+0xac/0x448) [ 1284.944786][T13718] r5:85725cc0 r4:80605680 [ 1284.944805][T13718] [<80551f94>] (vfs_write) from [<80552548>] (ksys_write+0x74/0xe4) [ 1284.944873][T13718] r10:00000004 r9:8423c800 r8:8020029c r7:00000000 r6:00000002 r5:85725cc0 [ 1284.944886][T13718] r4:85725cc3 [ 1284.944898][T13718] [<805524d4>] (ksys_write) from [<805525c8>] (sys_write+0x10/0x14) [ 1284.944930][T13718] r7:00000004 r6:00000004 r5:76b1af30 r4:00000001 [ 1284.944943][T13718] [<805525b8>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1284.944995][T13718] Exception stack(0xeb3b9fa8 to 0xeb3b9ff0) [ 1284.945031][T13718] 9fa0: 00000001 76b1af30 00000004 76b1af30 00000001 00000000 [ 1284.945051][T13718] 9fc0: 00000001 76b1af30 00000004 00000004 002d0000 00000000 00006364 76b1b0bc [ 1284.945069][T13718] 9fe0: 00000158 76b1aed0 000d7d68 0012fecc [ 1284.979294][ T31] audit: type=1400 audit(1284.900:884): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1285.024939][ T31] audit: type=1400 audit(1284.940:885): avc: denied { create } for pid=13719 comm="syz.1.2599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1285.041133][ T31] audit: type=1400 audit(1284.960:886): avc: denied { mounton } for pid=13719 comm="syz.1.2599" path="/71/file0" dev="tmpfs" ino=403 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1285.050546][ T31] audit: type=1400 audit(1284.970:887): avc: denied { remount } for pid=13719 comm="syz.1.2599" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 1285.102522][ T31] audit: type=1400 audit(1285.020:888): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1285.173578][ T31] audit: type=1400 audit(1285.090:889): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1285.187217][ T31] audit: type=1400 audit(1285.100:890): avc: denied { read write } for pid=13721 comm="syz.1.2600" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1285.187747][ T31] audit: type=1400 audit(1285.100:891): avc: denied { mounton } for pid=13721 comm="syz.1.2600" path="/72/file0" dev="tmpfs" ino=409 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1285.748519][T13740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13740 comm=syz.1.2608 [ 1285.843415][T13742] FAULT_INJECTION: forcing a failure. [ 1285.843415][T13742] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1285.845046][T13742] CPU: 1 UID: 0 PID: 13742 Comm: syz.1.2609 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1285.845153][T13742] Hardware name: ARM-Versatile Express [ 1285.845185][T13742] Call trace: [ 1285.845229][T13742] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1285.845377][T13742] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1285.845401][T13742] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1285.845462][T13742] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1285.845522][T13742] r5:84213000 r4:82951710 [ 1285.845536][T13742] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1285.845591][T13742] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1285.845623][T13742] r8:eb091eb8 r7:00000000 r6:00000001 r5:76b1af30 r4:00000001 [ 1285.845631][T13742] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1285.845656][T13742] [<8095f854>] (should_fail_usercopy) from [<808b79d0>] (kstrtouint_from_user+0x54/0x13c) [ 1285.845693][T13742] [<808b797c>] (kstrtouint_from_user) from [<806056c0>] (proc_fail_nth_write+0x40/0xe8) [ 1285.845764][T13742] r8:eb091f68 r7:84213000 r6:00000001 r5:85725e40 r4:00000001 [ 1285.845786][T13742] [<80605680>] (proc_fail_nth_write) from [<80552040>] (vfs_write+0xac/0x448) [ 1285.845849][T13742] r5:85725e40 r4:80605680 [ 1285.845869][T13742] [<80551f94>] (vfs_write) from [<80552548>] (ksys_write+0x74/0xe4) [ 1285.845946][T13742] r10:00000004 r9:84213000 r8:8020029c r7:00000000 r6:00000002 r5:85725e40 [ 1285.845969][T13742] r4:85725e43 [ 1285.845986][T13742] [<805524d4>] (ksys_write) from [<805525c8>] (sys_write+0x10/0x14) [ 1285.846094][T13742] r7:00000004 r6:00000005 r5:76b1af30 r4:00000001 [ 1285.846114][T13742] [<805525b8>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1285.846177][T13742] Exception stack(0xeb091fa8 to 0xeb091ff0) [ 1285.846218][T13742] 1fa0: 00000001 76b1af30 00000005 76b1af30 00000001 00000000 [ 1285.846254][T13742] 1fc0: 00000001 76b1af30 00000005 00000004 002d0000 00000000 00006364 76b1b0bc [ 1285.846283][T13742] 1fe0: 00000158 76b1aed0 000d7d68 0012fecc [ 1290.006318][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 1290.006864][ T31] audit: type=1400 audit(1289.920:953): avc: denied { mounton } for pid=13764 comm="syz.1.2619" path="/85/file0" dev="tmpfs" ino=478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1290.084003][ T31] audit: type=1400 audit(1290.000:954): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1290.151637][ T31] audit: type=1400 audit(1290.070:955): avc: denied { module_request } for pid=13768 comm="syz.1.2620" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1290.164184][ T31] audit: type=1400 audit(1290.080:956): avc: denied { read } for pid=13768 comm="syz.1.2620" name="controlC0" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1290.191429][ T31] audit: type=1400 audit(1290.110:957): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1290.259682][ T31] audit: type=1400 audit(1290.180:958): avc: denied { create } for pid=13770 comm="syz.1.2621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1290.274674][ T31] audit: type=1400 audit(1290.190:959): avc: denied { read write } for pid=13770 comm="syz.1.2621" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1290.284154][ T31] audit: type=1400 audit(1290.200:960): avc: denied { mounton } for pid=13770 comm="syz.1.2621" path="/87/file0" dev="tmpfs" ino=489 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1290.289454][ T31] audit: type=1400 audit(1290.210:961): avc: granted { setsecparam } for pid=13770 comm="syz.1.2621" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1290.325704][ T31] audit: type=1400 audit(1290.240:962): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1294.300052][T13801] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13801 comm=syz.0.2633 [ 1295.248105][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 1295.249350][ T31] audit: type=1400 audit(1295.170:1034): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1295.300311][ T31] audit: type=1400 audit(1295.220:1035): avc: denied { create } for pid=13820 comm="syz.0.2647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1295.319042][ T31] audit: type=1400 audit(1295.240:1036): avc: denied { read } for pid=13821 comm="syz.1.2643" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1295.324896][ T31] audit: type=1400 audit(1295.240:1037): avc: denied { create } for pid=13821 comm="syz.1.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1295.330353][ T31] audit: type=1400 audit(1295.240:1038): avc: denied { create } for pid=13821 comm="syz.1.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1295.333491][ T31] audit: type=1400 audit(1295.250:1039): avc: denied { read write } for pid=13820 comm="syz.0.2647" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1295.338789][ T31] audit: type=1400 audit(1295.260:1040): avc: denied { mounton } for pid=13820 comm="syz.0.2647" path="/151/file0" dev="tmpfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1295.344625][ T31] audit: type=1400 audit(1295.260:1041): avc: denied { create } for pid=13821 comm="syz.1.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1295.347390][ T31] audit: type=1400 audit(1295.270:1042): avc: denied { create } for pid=13821 comm="syz.1.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1295.381321][ T31] audit: type=1400 audit(1295.300:1043): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1296.100537][T13848] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13848 comm=syz.0.2656 [ 1296.414843][T13861] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13861 comm=syz.1.2662 [ 1296.709533][T13867] FAULT_INJECTION: forcing a failure. [ 1296.709533][T13867] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.710011][T13867] CPU: 0 UID: 0 PID: 13867 Comm: syz.1.2665 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1296.710080][T13867] Hardware name: ARM-Versatile Express [ 1296.710107][T13867] Call trace: [ 1296.710147][T13867] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1296.710245][T13867] r7:00000820 r6:00000000 r5:60000013 r4:82257e84 [ 1296.710266][T13867] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1296.710313][T13867] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1296.710429][T13867] r5:84213c00 r4:8291bcc0 [ 1296.710677][T13867] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1296.710790][T13867] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1296.711192][T13867] r8:84213c00 r7:00000820 r6:842b0ad8 r5:00000017 r4:83001240 [ 1296.711308][T13867] [<80525658>] (should_failslab) from [<8050b16c>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 1296.711457][T13867] [<8050b0cc>] (__kmalloc_node_track_caller_noprof) from [<804a4d30>] (kmemdup_noprof+0x28/0x44) [ 1296.711594][T13867] r10:00000119 r9:83f74204 r8:ec36ddc8 r7:840aa000 r6:842b0ad8 r5:ec36ddc0 [ 1296.711662][T13867] r4:00000017 [ 1296.711685][T13867] [<804a4d08>] (kmemdup_noprof) from [<8079af58>] (sidtab_sid2str_get+0x54/0xa4) [ 1296.711791][T13867] r7:840aa000 r6:ec36ddc8 r5:ec36ddc0 r4:842050c0 [ 1296.711817][T13867] [<8079af04>] (sidtab_sid2str_get) from [<807a23f8>] (sidtab_entry_to_string+0x34/0x94) [ 1296.711974][T13867] r7:840aa000 r6:842050c0 r5:ec36ddc0 r4:0000005f [ 1296.712127][T13867] [<807a23c4>] (sidtab_entry_to_string) from [<807a2570>] (security_sid_to_context_core+0x118/0x17c) [ 1296.712341][T13867] r9:00000000 r8:840aa000 r7:83f74204 r6:ec36ddc8 r5:ec36ddc0 r4:0000005f [ 1296.712470][T13867] [<807a2458>] (security_sid_to_context_core) from [<807a5328>] (security_sid_to_context+0x1c/0x24) [ 1296.712573][T13867] r8:807862b4 r7:807872b8 r6:84213c00 r5:845d8210 r4:ec36de50 [ 1296.712605][T13867] [<807a530c>] (security_sid_to_context) from [<80787338>] (avc_audit_post_callback+0x80/0x2f4) [ 1296.712674][T13867] [<807872b8>] (avc_audit_post_callback) from [<807ad8fc>] (common_lsm_audit+0x104/0x148) [ 1296.712860][T13867] r10:00000119 r9:00000000 r8:807862b4 r7:807872b8 r6:ec36de40 r5:845d8210 [ 1296.712959][T13867] r4:842143f0 [ 1296.713055][T13867] [<807ad7f8>] (common_lsm_audit) from [<807877c4>] (slow_avc_audit+0xbc/0x114) [ 1296.713139][T13867] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 1296.713192][T13867] [<80787708>] (slow_avc_audit) from [<80788244>] (avc_has_perm+0xd4/0xe4) [ 1296.713335][T13867] r5:fffffff3 r4:00000008 [ 1296.713397][T13867] [<80788170>] (avc_has_perm) from [<8078ae78>] (selinux_socket_create+0x190/0x24c) [ 1296.713601][T13867] r9:84bea880 r8:8078ace8 r7:00000000 r6:00000010 r5:0000002c r4:85017948 [ 1296.713685][T13867] [<8078ace8>] (selinux_socket_create) from [<807802bc>] (security_socket_create+0x204/0x210) [ 1296.713796][T13867] r5:00000003 r4:00000010 [ 1296.713949][T13867] [<807800b8>] (security_socket_create) from [<81518718>] (__sock_create+0x68/0x228) [ 1296.714120][T13867] r9:84bea880 r8:8020029c r7:00000010 r6:84213c00 r5:00000003 r4:00000010 [ 1296.714147][T13867] [<815186b0>] (__sock_create) from [<8151b000>] (__sys_socket+0x94/0x10c) [ 1296.714227][T13867] r10:00000119 r9:84213c00 r8:8020029c r7:00000119 r6:84213c00 r5:00000010 [ 1296.714372][T13867] r4:00000003 [ 1296.714434][T13867] [<8151af6c>] (__sys_socket) from [<8151b088>] (sys_socket+0x10/0x14) [ 1296.714531][T13867] r6:00000000 r5:ffffffff r4:76b19eb0 [ 1296.714685][T13867] [<8151b078>] (sys_socket) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1296.714750][T13867] Exception stack(0xec36dfa8 to 0xec36dff0) [ 1296.714867][T13867] dfa0: 76b19eb0 ffffffff 00000010 00000003 00000010 00000000 [ 1296.715091][T13867] dfc0: 76b19eb0 ffffffff 00000000 00000119 002d0000 00000000 00006364 76b1b0bc [ 1296.715224][T13867] dfe0: 00000000 76b19e7c 0001bc14 001345ec [ 1296.981963][T13872] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13872 comm=syz.1.2667 [ 1300.223898][T13968] : renamed from ipvlan1 [ 1300.282233][ T31] kauditd_printk_skb: 278 callbacks suppressed [ 1300.282690][ T31] audit: type=1400 audit(1300.200:1322): avc: denied { read write } for pid=13970 comm="syz.0.2716" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1300.288042][ T31] audit: type=1400 audit(1300.210:1323): avc: denied { mounton } for pid=13970 comm="syz.0.2716" path="/173/file0" dev="tmpfs" ino=961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1300.312728][ T31] audit: type=1400 audit(1300.230:1324): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1300.326962][ T31] audit: type=1400 audit(1300.240:1325): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1300.377284][ T31] audit: type=1400 audit(1300.290:1326): avc: denied { create } for pid=13972 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 1300.396875][ T31] audit: type=1400 audit(1300.310:1327): avc: denied { create } for pid=13972 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1300.411916][ T31] audit: type=1400 audit(1300.330:1328): avc: denied { create } for pid=13972 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1300.419134][ T31] audit: type=1400 audit(1300.340:1329): avc: denied { create } for pid=13973 comm="syz.0.2718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1300.429634][ T31] audit: type=1400 audit(1300.350:1330): avc: denied { read write } for pid=13973 comm="syz.0.2718" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1300.435155][ T31] audit: type=1400 audit(1300.350:1331): avc: denied { mounton } for pid=13973 comm="syz.0.2718" path="/174/file0" dev="tmpfs" ino=967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1301.473350][T14017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14017 comm=syz.0.2738 [ 1304.019842][T14073] FAULT_INJECTION: forcing a failure. [ 1304.019842][T14073] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.020235][T14073] CPU: 0 UID: 0 PID: 14073 Comm: syz.1.2761 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1304.020302][T14073] Hardware name: ARM-Versatile Express [ 1304.020329][T14073] Call trace: [ 1304.020376][T14073] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1304.020489][T14073] r7:00000c40 r6:00000000 r5:60000013 r4:82257e84 [ 1304.020614][T14073] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1304.020726][T14073] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1304.021082][T14073] r5:84890000 r4:8291bcc0 [ 1304.021209][T14073] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1304.021449][T14073] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1304.021569][T14073] r8:84890000 r7:00000c40 r6:855bf328 r5:00001000 r4:830016c0 [ 1304.021638][T14073] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 1304.021699][T14073] [<8050a41c>] (__kmalloc_noprof) from [<807bc33c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1304.021845][T14073] r10:84890000 r9:83351000 r8:00000000 r7:834a47f8 r6:855bf328 r5:00001000 [ 1304.021989][T14073] r4:00000000 [ 1304.022181][T14073] [<807bc300>] (tomoyo_realpath_from_path) from [<807b8480>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1304.022352][T14073] r10:84890000 r9:00000000 r8:855bf300 r7:0000894b r6:00000004 r5:81cd56c4 [ 1304.022507][T14073] r4:855bf328 r3:826c0240 [ 1304.022590][T14073] [<807b83b4>] (tomoyo_path_number_perm) from [<807bcd60>] (tomoyo_file_ioctl+0x1c/0x20) [ 1304.022669][T14073] r9:00000003 r8:855bf300 r7:20000000 r6:20000000 r5:0000894b r4:855bf300 [ 1304.022779][T14073] [<807bcd44>] (tomoyo_file_ioctl) from [<8076a79c>] (security_file_ioctl+0x64/0x1e4) [ 1304.022879][T14073] [<8076a738>] (security_file_ioctl) from [<8056b33c>] (sys_ioctl+0x4c/0xd84) [ 1304.022975][T14073] r7:20000000 r6:855bf301 r5:00000000 r4:0000894b [ 1304.023035][T14073] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1304.023144][T14073] Exception stack(0xec919fa8 to 0xec919ff0) [ 1304.023203][T14073] 9fa0: 00000000 00000000 00000003 0000894b 20000000 00000000 [ 1304.023387][T14073] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b1b0bc [ 1304.023435][T14073] 9fe0: 76b1aec0 76b1aeb0 0001939c 00131f30 [ 1304.023681][T14073] r10:00000036 r9:84890000 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1304.023746][T14073] r4:00000000 [ 1304.033774][T14073] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1305.241057][T14101] FAULT_INJECTION: forcing a failure. [ 1305.241057][T14101] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.244041][T14101] CPU: 1 UID: 0 PID: 14101 Comm: syz.0.2775 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1305.244174][T14101] Hardware name: ARM-Versatile Express [ 1305.244278][T14101] Call trace: [ 1305.244395][T14101] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1305.244505][T14101] r7:84893000 r6:00000000 r5:60000013 r4:82257e84 [ 1305.244528][T14101] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1305.244628][T14101] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1305.244722][T14101] r5:84893000 r4:8291bcc0 [ 1305.244742][T14101] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1305.244809][T14101] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1305.245041][T14101] r8:00000000 r7:84893000 r6:00000dc0 r5:830ab000 r4:830a8f00 [ 1305.245067][T14101] [<80525658>] (should_failslab) from [<8050a134>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1305.245126][T14101] [<8050a0e8>] (kmem_cache_alloc_noprof) from [<80615340>] (__kernfs_new_node+0x54/0x210) [ 1305.245193][T14101] r10:830ab000 r9:84893000 r8:8245e958 r7:830d95d8 r6:8549cf00 r5:830ab000 [ 1305.245213][T14101] r4:830d95d8 [ 1305.245285][T14101] [<806152ec>] (__kernfs_new_node) from [<80616f18>] (kernfs_new_node+0x80/0xa4) [ 1305.245360][T14101] r10:830ab000 r9:8549c840 r8:00000000 r7:00000004 r6:00000000 r5:0000a1ff [ 1305.245384][T14101] r4:830d95d8 [ 1305.245402][T14101] [<80616e98>] (kernfs_new_node) from [<80619650>] (kernfs_create_link+0x44/0xac) [ 1305.245481][T14101] r10:8280c8d4 r9:00000001 r8:84833690 r7:00000000 r6:830d95d8 r5:850f8160 [ 1305.245506][T14101] r4:830d95d8 [ 1305.245605][T14101] [<8061960c>] (kernfs_create_link) from [<8061ac7c>] (sysfs_do_create_link_sd+0x6c/0xe8) [ 1305.245742][T14101] r6:850f8160 r5:8549c840 r4:830d95d8 [ 1305.245762][T14101] [<8061ac10>] (sysfs_do_create_link_sd) from [<8061ad28>] (sysfs_create_link+0x30/0x3c) [ 1305.245829][T14101] r9:a40d8900 r8:84833690 r7:00000000 r6:830d780c r5:00000000 r4:848333c0 [ 1305.245851][T14101] [<8061acf8>] (sysfs_create_link) from [<80b24138>] (device_add+0x298/0x7ec) [ 1305.245993][T14101] [<80b23ea0>] (device_add) from [<81599d84>] (netdev_register_kobject+0x68/0x138) [ 1305.246076][T14101] r9:a40d8900 r8:84833690 r7:00000000 r6:848333c0 r5:848335a8 r4:84833000 [ 1305.246096][T14101] [<81599d1c>] (netdev_register_kobject) from [<8155826c>] (register_netdevice+0x560/0x8a8) [ 1305.246229][T14101] r9:a40d8900 r8:84833690 r7:00000000 r6:84be9b00 r5:84833000 r4:00000001 [ 1305.246257][T14101] [<81557d0c>] (register_netdevice) from [<81872180>] (vti6_tnl_create2+0x3c/0xc0) [ 1305.246338][T14101] r10:000089f1 r9:00000000 r8:855f3b40 r7:84be9b00 r6:855f3b40 r5:82819aec [ 1305.246365][T14101] r4:84833000 [ 1305.246386][T14101] [<81872144>] (vti6_tnl_create2) from [<818724c0>] (vti6_locate+0x1e4/0x210) [ 1305.246459][T14101] r7:84833000 r6:84be9b00 r5:ece11da8 r4:848336c0 [ 1305.246547][T14101] [<818722dc>] (vti6_locate) from [<818737b8>] (vti6_siocdevprivate+0x144/0x454) [ 1305.246642][T14101] r9:00000000 r8:855f3b40 r7:84be9b00 r6:20000640 r5:000089f1 r4:84b87800 [ 1305.246664][T14101] [<81873674>] (vti6_siocdevprivate) from [<8158bc98>] (dev_ifsioc+0x6e4/0x80c) [ 1305.246735][T14101] r10:20000640 r9:81873674 r8:81e767e0 r7:20000640 r6:ece11ecc r5:84b87800 [ 1305.246754][T14101] r4:000089f1 [ 1305.246770][T14101] [<8158b5b4>] (dev_ifsioc) from [<8158c2f4>] (dev_ioctl+0x534/0x62c) [ 1305.246908][T14101] r9:ece11ecb r8:00000000 r7:84be9b00 r6:ece11ecc r5:00000001 r4:000089f1 [ 1305.246990][T14101] [<8158bdc0>] (dev_ioctl) from [<8151ad14>] (sock_ioctl+0x464/0x600) [ 1305.247069][T14101] r10:84893000 r9:00000003 r8:85725900 r7:b5403587 r6:84be9b00 r5:200006c0 [ 1305.247095][T14101] r4:000089f1 r3:20000640 [ 1305.247112][T14101] [<8151a8b0>] (sock_ioctl) from [<8056b428>] (sys_ioctl+0x138/0xd84) [ 1305.247213][T14101] r9:00000003 r8:85725900 r7:200006c0 r6:85725901 r5:00000000 r4:000089f1 [ 1305.247244][T14101] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1305.247326][T14101] Exception stack(0xece11fa8 to 0xece11ff0) [ 1305.247371][T14101] 1fa0: 00000000 00000000 00000003 000089f1 200006c0 00000000 [ 1305.247410][T14101] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b8e0bc [ 1305.247438][T14101] 1fe0: 76b8dec0 76b8deb0 0001939c 00131f30 [ 1305.247475][T14101] r10:00000036 r9:84893000 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1305.247552][T14101] r4:00000000 [ 1305.300933][ T31] kauditd_printk_skb: 237 callbacks suppressed [ 1305.301036][ T31] audit: type=1400 audit(1305.220:1569): avc: denied { module_request } for pid=14100 comm="syz.0.2775" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1305.301245][ T31] audit: type=1400 audit(1305.220:1570): avc: denied { sys_module } for pid=14100 comm="syz.0.2775" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1305.323850][ T31] audit: type=1400 audit(1305.240:1571): avc: denied { create } for pid=14100 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1305.366552][ T31] audit: type=1400 audit(1305.280:1572): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1305.439457][ T31] audit: type=1400 audit(1305.360:1573): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1305.452448][ T31] audit: type=1400 audit(1305.370:1574): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1305.498636][ T31] audit: type=1400 audit(1305.420:1575): avc: denied { create } for pid=14104 comm="syz.0.2777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1305.505703][ T31] audit: type=1400 audit(1305.420:1576): avc: denied { read write } for pid=14104 comm="syz.0.2777" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1305.509715][ T31] audit: type=1400 audit(1305.430:1577): avc: denied { read append } for pid=14106 comm="syz.1.2778" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1305.511916][ T31] audit: type=1400 audit(1305.430:1578): avc: denied { mounton } for pid=14104 comm="syz.0.2777" path="/212/file0" dev="tmpfs" ino=1173 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1310.318592][ T31] kauditd_printk_skb: 178 callbacks suppressed [ 1310.322393][ T31] audit: type=1400 audit(1310.240:1757): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1310.349891][ T31] audit: type=1400 audit(1310.270:1758): avc: denied { create } for pid=14225 comm="syz.1.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1310.368224][ T31] audit: type=1400 audit(1310.290:1759): avc: denied { create } for pid=14225 comm="syz.1.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1310.382675][ T31] audit: type=1400 audit(1310.300:1760): avc: denied { read } for pid=14225 comm="syz.1.2834" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1310.416738][ T31] audit: type=1400 audit(1310.330:1761): avc: denied { create } for pid=14225 comm="syz.1.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1310.419349][ T31] audit: type=1400 audit(1310.330:1762): avc: denied { create } for pid=14227 comm="syz.0.2835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1310.429721][ T31] audit: type=1400 audit(1310.350:1763): avc: denied { create } for pid=14225 comm="syz.1.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1310.472142][ T31] audit: type=1400 audit(1310.390:1764): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1310.480563][ T31] audit: type=1400 audit(1310.400:1765): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1310.577915][T14234] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1543 sclass=netlink_audit_socket pid=14234 comm=syz.0.2837 [ 1310.580997][ T31] audit: type=1400 audit(1310.500:1766): avc: denied { create } for pid=14230 comm="syz.0.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1310.962353][T14244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=14244 comm=syz.0.2842 [ 1315.348478][ T31] kauditd_printk_skb: 178 callbacks suppressed [ 1315.348862][ T31] audit: type=1400 audit(1315.270:1945): avc: denied { allowed } for pid=14349 comm="syz.0.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1315.355072][ T31] audit: type=1400 audit(1315.270:1946): avc: denied { allowed } for pid=14349 comm="syz.0.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1315.355450][ T31] audit: type=1400 audit(1315.270:1947): avc: denied { create } for pid=14349 comm="syz.0.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1315.379092][ T31] audit: type=1400 audit(1315.300:1948): avc: denied { read } for pid=14349 comm="syz.0.2889" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1315.410245][ T31] audit: type=1400 audit(1315.330:1949): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1315.485493][ T31] audit: type=1400 audit(1315.400:1950): avc: denied { create } for pid=14355 comm="syz.1.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1315.505697][ T31] audit: type=1400 audit(1315.420:1951): avc: denied { read write } for pid=14355 comm="syz.1.2891" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1315.510504][ T31] audit: type=1400 audit(1315.430:1952): avc: denied { mounton } for pid=14355 comm="syz.1.2891" path="/225/file0" dev="tmpfs" ino=1245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1315.557152][ T31] audit: type=1400 audit(1315.470:1953): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1315.630260][ T31] audit: type=1400 audit(1315.550:1954): avc: denied { read write } for pid=14357 comm="syz.1.2892" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1316.165245][T14368] FAULT_INJECTION: forcing a failure. [ 1316.165245][T14368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1316.165564][T14368] CPU: 0 UID: 0 PID: 14368 Comm: syz.1.2897 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1316.165612][T14368] Hardware name: ARM-Versatile Express [ 1316.165626][T14368] Call trace: [ 1316.165653][T14368] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1316.165813][T14368] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1316.165831][T14368] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1316.165878][T14368] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1316.165915][T14368] r5:841f0000 r4:82951710 [ 1316.165924][T14368] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1316.165957][T14368] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1316.166012][T14368] r8:ed7cdeb8 r7:00000000 r6:00000001 r5:76b1af30 r4:00000001 [ 1316.166022][T14368] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1316.166053][T14368] [<8095f854>] (should_fail_usercopy) from [<808b79d0>] (kstrtouint_from_user+0x54/0x13c) [ 1316.166085][T14368] [<808b797c>] (kstrtouint_from_user) from [<806056c0>] (proc_fail_nth_write+0x40/0xe8) [ 1316.166124][T14368] r8:ed7cdf68 r7:841f0000 r6:00000001 r5:855bf780 r4:00000001 [ 1316.166134][T14368] [<80605680>] (proc_fail_nth_write) from [<80552040>] (vfs_write+0xac/0x448) [ 1316.166166][T14368] r5:855bf780 r4:80605680 [ 1316.166175][T14368] [<80551f94>] (vfs_write) from [<80552548>] (ksys_write+0x74/0xe4) [ 1316.166211][T14368] r10:00000004 r9:841f0000 r8:8020029c r7:00000000 r6:00000002 r5:855bf780 [ 1316.166222][T14368] r4:855bf783 [ 1316.166230][T14368] [<805524d4>] (ksys_write) from [<805525c8>] (sys_write+0x10/0x14) [ 1316.166263][T14368] r7:00000004 r6:00000003 r5:76b1af30 r4:00000001 [ 1316.166271][T14368] [<805525b8>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1316.166298][T14368] Exception stack(0xed7cdfa8 to 0xed7cdff0) [ 1316.166320][T14368] dfa0: 00000001 76b1af30 00000003 76b1af30 00000001 00000000 [ 1316.166361][T14368] dfc0: 00000001 76b1af30 00000003 00000004 002d0000 00000000 00006364 76b1b0bc [ 1316.166377][T14368] dfe0: 00000158 76b1aed0 000d7d68 0012fecc [ 1316.248016][T14370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=14370 comm=syz.1.2898 [ 1316.252392][T14370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14370 comm=syz.1.2898 [ 1316.313255][T14372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14372 comm=syz.1.2899 [ 1319.817095][T14404] FAULT_INJECTION: forcing a failure. [ 1319.817095][T14404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1319.817452][T14404] CPU: 0 UID: 0 PID: 14404 Comm: syz.0.2913 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1319.817532][T14404] Hardware name: ARM-Versatile Express [ 1319.817561][T14404] Call trace: [ 1319.817605][T14404] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1319.817713][T14404] r7:00000000 r6:00000000 r5:60000013 r4:82257e84 [ 1319.817735][T14404] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1319.817787][T14404] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1319.817849][T14404] r5:84891800 r4:82951710 [ 1319.817864][T14404] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1319.817989][T14404] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1319.818159][T14404] r8:edb85eb8 r7:00000000 r6:00000001 r5:76b8df30 r4:00000001 [ 1319.818631][T14404] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1319.818860][T14404] [<8095f854>] (should_fail_usercopy) from [<808b79d0>] (kstrtouint_from_user+0x54/0x13c) [ 1319.819063][T14404] [<808b797c>] (kstrtouint_from_user) from [<806056c0>] (proc_fail_nth_write+0x40/0xe8) [ 1319.819243][T14404] r8:edb85f68 r7:84891800 r6:00000001 r5:855bf240 r4:00000001 [ 1319.819271][T14404] [<80605680>] (proc_fail_nth_write) from [<80552040>] (vfs_write+0xac/0x448) [ 1319.819595][T14404] r5:855bf240 r4:80605680 [ 1319.820180][T14404] [<80551f94>] (vfs_write) from [<80552548>] (ksys_write+0x74/0xe4) [ 1319.820414][T14404] r10:00000004 r9:84891800 r8:8020029c r7:00000000 r6:00000002 r5:855bf240 [ 1319.820537][T14404] r4:855bf243 [ 1319.820714][T14404] [<805524d4>] (ksys_write) from [<805525c8>] (sys_write+0x10/0x14) [ 1319.820814][T14404] r7:00000004 r6:00000003 r5:76b8df30 r4:00000001 [ 1319.820840][T14404] [<805525b8>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1319.820894][T14404] Exception stack(0xedb85fa8 to 0xedb85ff0) [ 1319.820959][T14404] 5fa0: 00000001 76b8df30 00000003 76b8df30 00000001 00000000 [ 1319.820997][T14404] 5fc0: 00000001 76b8df30 00000003 00000004 002d0000 00000000 00006364 76b8e0bc [ 1319.821028][T14404] 5fe0: 00000158 76b8ded0 000d7d68 0012fecc [ 1320.378970][ T31] kauditd_printk_skb: 89 callbacks suppressed [ 1320.380085][ T31] audit: type=1400 audit(1320.300:2044): avc: denied { read write } for pid=14415 comm="syz.0.2919" name="timer" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1320.386931][ T31] audit: type=1400 audit(1320.300:2045): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.423121][ T31] audit: type=1400 audit(1320.340:2046): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.436816][ T31] audit: type=1400 audit(1320.350:2047): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.437054][ T31] audit: type=1400 audit(1320.350:2048): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.437218][ T31] audit: type=1400 audit(1320.350:2049): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.437394][ T31] audit: type=1400 audit(1320.350:2050): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.437526][ T31] audit: type=1400 audit(1320.350:2051): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.437692][ T31] audit: type=1400 audit(1320.350:2052): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1320.437838][ T31] audit: type=1400 audit(1320.350:2053): avc: denied { create } for pid=14415 comm="syz.0.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1325.428429][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 1325.428991][ T31] audit: type=1400 audit(1325.350:2136): avc: denied { create } for pid=14462 comm="syz.1.2934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1325.471823][ T31] audit: type=1400 audit(1325.390:2137): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1325.534943][ T31] audit: type=1400 audit(1325.450:2138): avc: denied { create } for pid=14464 comm="syz.1.2935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1325.561542][ T31] audit: type=1400 audit(1325.480:2139): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1325.613553][ T31] audit: type=1400 audit(1325.530:2140): avc: denied { create } for pid=14466 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1325.630641][ T31] audit: type=1400 audit(1325.550:2141): avc: denied { create } for pid=14466 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1325.650027][ T31] audit: type=1400 audit(1325.570:2142): avc: denied { create } for pid=14466 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1325.675061][ T31] audit: type=1400 audit(1325.590:2143): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1325.729153][ T31] audit: type=1400 audit(1325.650:2144): avc: denied { create } for pid=14468 comm="syz.1.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1325.739752][ T31] audit: type=1400 audit(1325.660:2145): avc: denied { read write } for pid=14468 comm="syz.1.2937" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1331.464369][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 1331.464668][ T31] audit: type=1400 audit(1331.380:2169): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1331.541388][ T31] audit: type=1400 audit(1331.460:2170): avc: denied { read } for pid=14486 comm="syz.1.2945" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1331.552645][ T31] audit: type=1400 audit(1331.470:2171): avc: denied { read write } for pid=14486 comm="syz.1.2945" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1331.567384][ T31] audit: type=1400 audit(1331.490:2172): avc: denied { create } for pid=14486 comm="syz.1.2945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1331.573166][ T31] audit: type=1400 audit(1331.490:2173): avc: denied { create } for pid=14486 comm="syz.1.2945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1331.588194][ T31] audit: type=1400 audit(1331.510:2174): avc: denied { read write } for pid=14486 comm="syz.1.2945" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1331.593078][ T31] audit: type=1400 audit(1331.510:2175): avc: denied { create } for pid=14486 comm="syz.1.2945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1331.610102][ T31] audit: type=1400 audit(1331.530:2176): avc: denied { read write } for pid=14486 comm="syz.1.2945" name="rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1331.624991][ T31] audit: type=1400 audit(1331.540:2177): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1331.681514][ T31] audit: type=1400 audit(1331.600:2178): avc: denied { create } for pid=14488 comm="syz.1.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1336.492832][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 1336.495699][ T31] audit: type=1400 audit(1336.410:2269): avc: denied { create } for pid=14539 comm="syz.0.2969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1336.509422][ T31] audit: type=1400 audit(1336.430:2270): avc: denied { read write } for pid=14539 comm="syz.0.2969" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1336.512327][ T31] audit: type=1400 audit(1336.430:2271): avc: denied { mounton } for pid=14539 comm="syz.0.2969" path="/303/file0" dev="tmpfs" ino=1671 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1336.542150][ T31] audit: type=1400 audit(1336.460:2272): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1336.604436][ T31] audit: type=1400 audit(1336.520:2273): avc: denied { read } for pid=14541 comm="syz.0.2970" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1336.614454][ T31] audit: type=1400 audit(1336.530:2274): avc: denied { create } for pid=14541 comm="syz.0.2970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1336.619777][ T31] audit: type=1400 audit(1336.540:2275): avc: denied { create } for pid=14541 comm="syz.0.2970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1336.625724][ T31] audit: type=1400 audit(1336.540:2276): avc: denied { module_request } for pid=14541 comm="syz.0.2970" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1336.626885][ T31] audit: type=1400 audit(1336.540:2277): avc: denied { sys_module } for pid=14541 comm="syz.0.2970" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1336.640068][ T31] audit: type=1400 audit(1336.560:2278): avc: denied { create } for pid=14541 comm="syz.0.2970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 1337.977846][T14551] FAULT_INJECTION: forcing a failure. [ 1337.977846][T14551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1337.978292][T14551] CPU: 0 UID: 0 PID: 14551 Comm: syz.0.2973 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1337.978366][T14551] Hardware name: ARM-Versatile Express [ 1337.978389][T14551] Call trace: [ 1337.978425][T14551] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1337.978533][T14551] r7:20000a80 r6:00000000 r5:60000013 r4:82257e84 [ 1337.978574][T14551] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1337.978669][T14551] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1337.978875][T14551] r5:84bb6c00 r4:82951710 [ 1337.978938][T14551] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1337.979010][T14551] [<8095f614>] (should_fail_ex) from [<8095f850>] (should_fail+0x14/0x18) [ 1337.979176][T14551] r8:00000000 r7:20000a80 r6:849d8480 r5:00000000 r4:ee311f20 [ 1337.979248][T14551] [<8095f83c>] (should_fail) from [<8095f870>] (should_fail_usercopy+0x1c/0x20) [ 1337.979301][T14551] [<8095f854>] (should_fail_usercopy) from [<808aed5c>] (_copy_from_iter+0x6c/0x7c8) [ 1337.979381][T14551] [<808aecf0>] (_copy_from_iter) from [<81645920>] (netlink_sendmsg+0x18c/0x444) [ 1337.979458][T14551] r10:00000000 r9:00000000 r8:ee311f30 r7:8551ac00 r6:00000080 r5:854da9c0 [ 1337.979506][T14551] r4:ee311f20 [ 1337.979668][T14551] [<81645794>] (netlink_sendmsg) from [<81519e8c>] (__sock_sendmsg+0x44/0x78) [ 1337.979920][T14551] r10:00000000 r9:ee311dc4 r8:ee311dc4 r7:00000000 r6:84c40280 r5:ee311f20 [ 1337.979943][T14551] r4:00000000 [ 1337.980100][T14551] [<81519e48>] (__sock_sendmsg) from [<8151a6fc>] (____sys_sendmsg+0x298/0x2cc) [ 1337.980262][T14551] r7:00000000 r6:84c40280 r5:00000000 r4:ee311f20 [ 1337.980388][T14551] [<8151a464>] (____sys_sendmsg) from [<8151c49c>] (___sys_sendmsg+0x9c/0xd0) [ 1337.980621][T14551] r10:ee311e24 r9:20000400 r8:00000000 r7:00000000 r6:84c40280 r5:ee311f20 [ 1337.980698][T14551] r4:00000000 [ 1337.981139][T14551] [<8151c400>] (___sys_sendmsg) from [<8151c92c>] (__sys_sendmsg+0x8c/0xd8) [ 1337.981242][T14551] r10:00000128 r9:84bb6c00 r8:855bf480 r7:00000000 r6:20000400 r5:855bf481 [ 1337.981275][T14551] r4:00000003 [ 1337.981314][T14551] [<8151c8a0>] (__sys_sendmsg) from [<8151c98c>] (sys_sendmsg+0x14/0x18) [ 1337.981490][T14551] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1337.981627][T14551] [<8151c978>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1337.981698][T14551] Exception stack(0xee311fa8 to 0xee311ff0) [ 1337.981733][T14551] 1fa0: 00000000 00000000 00000003 20000400 00000000 00000000 [ 1337.981763][T14551] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b8e0bc [ 1337.981788][T14551] 1fe0: 76b8dec0 76b8deb0 0001939c 00131f30 [ 1341.521894][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 1341.522176][ T31] audit: type=1400 audit(1341.440:2387): avc: denied { create } for pid=14585 comm="syz.1.2985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1341.536943][ T31] audit: type=1400 audit(1341.450:2388): avc: denied { read } for pid=14585 comm="syz.1.2985" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1341.547330][ T31] audit: type=1400 audit(1341.470:2389): avc: denied { create } for pid=14585 comm="syz.1.2985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1341.552993][ T31] audit: type=1400 audit(1341.470:2390): avc: denied { read } for pid=14585 comm="syz.1.2985" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1341.592012][ T31] audit: type=1400 audit(1341.510:2391): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1341.626057][ T31] audit: type=1400 audit(1341.540:2392): avc: denied { create } for pid=14589 comm="syz.1.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1341.638044][ T31] audit: type=1400 audit(1341.550:2393): avc: denied { read write } for pid=14589 comm="syz.1.2986" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1341.660753][ T31] audit: type=1400 audit(1341.580:2394): avc: denied { create } for pid=14589 comm="syz.1.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 1341.727199][ T31] audit: type=1400 audit(1341.640:2395): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1341.807524][ T31] audit: type=1400 audit(1341.730:2396): avc: denied { read write } for pid=14591 comm="syz.1.2987" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1347.232061][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 1347.232457][ T31] audit: type=1400 audit(1347.150:2495): avc: denied { create } for pid=14637 comm="syz.0.3005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1347.601625][ T31] audit: type=1400 audit(1347.520:2496): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1347.638248][ T31] audit: type=1400 audit(1347.560:2497): avc: denied { execmem } for pid=14642 comm="syz.1.3006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1347.642908][ T31] audit: type=1400 audit(1347.560:2498): avc: denied { create } for pid=14642 comm="syz.1.3006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1347.729457][T14643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14643 comm=syz.1.3006 [ 1347.763311][ T31] audit: type=1400 audit(1347.680:2499): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1347.830410][ T31] audit: type=1400 audit(1347.750:2500): avc: denied { read } for pid=14644 comm="syz.1.3007" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1347.840283][ T31] audit: type=1400 audit(1347.760:2501): avc: denied { create } for pid=14644 comm="syz.1.3007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1347.879954][ T31] audit: type=1400 audit(1347.800:2502): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1348.451975][ T31] audit: type=1400 audit(1348.370:2503): avc: denied { create } for pid=14646 comm="syz.1.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1348.458336][ T31] audit: type=1400 audit(1348.380:2504): avc: denied { create } for pid=14646 comm="syz.1.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1348.825971][T14656] FAULT_INJECTION: forcing a failure. [ 1348.825971][T14656] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.828056][T14656] CPU: 0 UID: 0 PID: 14656 Comm: syz.0.3011 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1348.828122][T14656] Hardware name: ARM-Versatile Express [ 1348.828137][T14656] Call trace: [ 1348.828160][T14656] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1348.828264][T14656] r7:00000d40 r6:00000000 r5:60000013 r4:82257e84 [ 1348.828276][T14656] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 1348.828309][T14656] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 1348.828345][T14656] r5:838f2400 r4:8291bcc0 [ 1348.828355][T14656] [<8021ffa4>] (dump_stack) from [<8095f7d8>] (should_fail_ex+0x1c4/0x228) [ 1348.828440][T14656] [<8095f614>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 1348.828511][T14656] r8:838f2400 r7:00000d40 r6:84662e68 r5:00000027 r4:83001240 [ 1348.828523][T14656] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 1348.828558][T14656] [<8050a41c>] (__kmalloc_noprof) from [<807bc244>] (tomoyo_encode2+0x64/0xf0) [ 1348.828629][T14656] r10:00000fff r9:846eb000 r8:00000000 r7:834b8110 r6:84662e68 r5:85799ffc [ 1348.828643][T14656] r4:85799fe0 [ 1348.828652][T14656] [<807bc1e0>] (tomoyo_encode2) from [<807bc2f4>] (tomoyo_encode+0x24/0x30) [ 1348.828695][T14656] r9:846eb000 r8:00000000 r7:834b8110 r6:84662e68 r5:00001000 r4:85799fe1 [ 1348.828705][T14656] [<807bc2d0>] (tomoyo_encode) from [<807bc380>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1348.828741][T14656] r5:00001000 r4:85799000 [ 1348.828751][T14656] [<807bc300>] (tomoyo_realpath_from_path) from [<807b8480>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1348.828802][T14656] r10:838f2400 r9:00000000 r8:84662e40 r7:00005452 r6:00000004 r5:81cd56c4 [ 1348.828818][T14656] r4:84662e68 r3:826c0240 [ 1348.828831][T14656] [<807b83b4>] (tomoyo_path_number_perm) from [<807bcd60>] (tomoyo_file_ioctl+0x1c/0x20) [ 1348.828874][T14656] r9:00000003 r8:84662e40 r7:20000200 r6:20000200 r5:00005452 r4:84662e40 [ 1348.828885][T14656] [<807bcd44>] (tomoyo_file_ioctl) from [<8076a79c>] (security_file_ioctl+0x64/0x1e4) [ 1348.828923][T14656] [<8076a738>] (security_file_ioctl) from [<8056b33c>] (sys_ioctl+0x4c/0xd84) [ 1348.828961][T14656] r7:20000200 r6:84662e41 r5:00000000 r4:00005452 [ 1348.828971][T14656] [<8056b2f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1348.828999][T14656] Exception stack(0xee795fa8 to 0xee795ff0) [ 1348.829021][T14656] 5fa0: 00000000 00000000 00000003 00005452 20000200 00000000 [ 1348.829043][T14656] 5fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b8e0bc [ 1348.829060][T14656] 5fe0: 76b8dec0 76b8deb0 0001939c 00131f30 [ 1348.829082][T14656] r10:00000036 r9:838f2400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1348.829094][T14656] r4:00000000 [ 1348.846399][T14656] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1352.299096][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 1352.299505][ T31] audit: type=1400 audit(1352.210:2570): avc: denied { read } for pid=14690 comm="syz.1.3026" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1352.324363][ T31] audit: type=1400 audit(1352.240:2571): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1352.361719][ T31] audit: type=1400 audit(1352.280:2572): avc: denied { create } for pid=14692 comm="syz.1.3027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1352.382494][ T31] audit: type=1400 audit(1352.300:2573): avc: denied { read write } for pid=14692 comm="syz.1.3027" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1352.385576][ T31] audit: type=1400 audit(1352.300:2574): avc: denied { mounton } for pid=14692 comm="syz.1.3027" path="/292/file0" dev="tmpfs" ino=1610 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1352.423371][ T31] audit: type=1400 audit(1352.340:2575): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1352.513040][ T31] audit: type=1400 audit(1352.430:2576): avc: denied { create } for pid=14694 comm="syz.1.3028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1352.546845][ T31] audit: type=1400 audit(1352.460:2577): avc: denied { read write } for pid=13023 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1352.619664][ T31] audit: type=1400 audit(1352.540:2578): avc: denied { create } for pid=14697 comm="syz.1.3029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1352.636027][ T31] audit: type=1400 audit(1352.550:2579): avc: denied { create } for pid=14697 comm="syz.1.3029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1357.338552][ T31] kauditd_printk_skb: 114 callbacks suppressed [ 1357.338800][ T31] audit: type=1400 audit(1357.260:2694): avc: denied { create } for pid=14748 comm="syz.0.3050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1357.354907][ T31] audit: type=1400 audit(1357.270:2695): avc: denied { module_request } for pid=14748 comm="syz.0.3050" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1357.355159][ T31] audit: type=1400 audit(1357.270:2696): avc: denied { sys_module } for pid=14748 comm="syz.0.3050" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1357.362728][ T31] audit: type=1400 audit(1357.280:2697): avc: denied { create } for pid=14748 comm="syz.0.3050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1357.391081][ T31] audit: type=1400 audit(1357.310:2698): avc: denied { read write } for pid=11972 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1357.448504][ T31] audit: type=1400 audit(1357.360:2699): avc: denied { read } for pid=14751 comm="syz.0.3051" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1357.458878][ T31] audit: type=1400 audit(1357.380:2700): avc: denied { create } for pid=14751 comm="syz.0.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1357.459283][ T31] audit: type=1400 audit(1357.380:2701): avc: denied { create } for pid=14751 comm="syz.0.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1357.459861][ T31] audit: type=1400 audit(1357.380:2702): avc: denied { create } for pid=14751 comm="syz.0.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1357.460142][ T31] audit: type=1400 audit(1357.380:2703): avc: denied { create } for pid=14751 comm="syz.0.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1357.964328][T14766] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=14766 comm=syz.1.3056 [ 1358.350569][T14776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14776 comm=syz.1.3060 [ 1359.694232][T13186] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1359.761401][T13186] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1359.849244][T13186] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1359.901500][T13186] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1360.150427][T13186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1360.156071][T13186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1360.164357][T13186] bond0 (unregistering): Released all slaves [ 1360.224373][T13186] hsr_slave_0: left promiscuous mode [ 1360.229136][T13186] hsr_slave_1: left promiscuous mode [ 1360.240649][T13186] veth1_macvtap: left promiscuous mode [ 1360.241247][T13186] veth0_macvtap: left promiscuous mode [ 1360.243576][T13186] veth1_vlan: left promiscuous mode [ 1360.244118][T13186] veth0_vlan: left promiscuous mode [ 1360.394842][T13186] 8<--- cut here --- [ 1360.395124][T13186] Unable to handle kernel paging request at virtual address 7273685f ** replaying previous printk message ** [ 1360.395124][T13186] Unable to handle kernel paging request at virtual address 7273685f when write [ 1360.395391][T13186] [7273685f] *pgd=80000080005003, *pmd=00000000 [ 1360.396154][T13186] Internal error: Oops: a06 [#1] SMP ARM [ 1360.397592][T13186] Modules linked in: [ 1360.398010][T13186] CPU: 1 UID: 0 PID: 13186 Comm: kworker/u8:3 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 1360.398332][T13186] Hardware name: ARM-Versatile Express [ 1360.398606][T13186] Workqueue: netns cleanup_net [ 1360.398850][T13186] PC is at rb_erase+0x2f4/0x394 [ 1360.399021][T13186] LR is at 0x0 [ 1360.399395][T13186] pc : [<81a4039c>] lr : [<00000000>] psr: 60000013 [ 1360.399581][T13186] sp : e03adb10 ip : e03adb28 fp : e03adb24 [ 1360.399838][T13186] r10: 00000000 r9 : 84be9b00 r8 : 00000004 [ 1360.399997][T13186] r7 : 84a9ce00 r6 : 00000001 r5 : 85479948 r4 : 85479900 [ 1360.400195][T13186] r3 : 68746576 r2 : 7273685f r1 : 84a9ce34 r0 : 85479968 [ 1360.400473][T13186] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1360.401137][T13186] Control: 30c5387d Table: 8472b200 DAC: 00000000 [ 1360.401378][T13186] Register r0 information: slab kmalloc-128 start 85479900 pointer offset 104 size 128 [ 1360.403219][T13186] Register r1 information: slab kmalloc-128 start 84a9ce00 pointer offset 52 size 128 [ 1360.403513][T13186] Register r2 information: non-paged memory [ 1360.403936][T13186] Register r3 information: non-paged memory [ 1360.404123][T13186] Register r4 information: slab kmalloc-128 start 85479900 pointer offset 0 size 128 [ 1360.404455][T13186] Register r5 information: slab kmalloc-128 start 85479900 pointer offset 72 size 128 [ 1360.404754][T13186] Register r6 information: non-paged memory [ 1360.404950][T13186] Register r7 information: slab kmalloc-128 start 84a9ce00 pointer offset 0 size 128 [ 1360.405239][T13186] Register r8 information: non-paged memory [ 1360.405438][T13186] Register r9 information: slab net_namespace start 84be9b00 pointer offset 0 size 3456 [ 1360.405737][T13186] Register r10 information: NULL pointer [ 1360.405893][T13186] Register r11 information: 2-page vmalloc region starting at 0xe03ac000 allocated at kernel_clone+0xac/0x3e4 [ 1360.406236][T13186] Register r12 information: 2-page vmalloc region starting at 0xe03ac000 allocated at kernel_clone+0xac/0x3e4 [ 1360.406509][T13186] Process kworker/u8:3 (pid: 13186, stack limit = 0xe03ac000) [ 1360.406815][T13186] Stack: (0xe03adb10 to 0xe03ae000) [ 1360.406974][T13186] db00: 85479900 85479948 e03adb64 e03adb28 [ 1360.407214][T13186] db20: 80610ef4 81a400b4 0000000c 60000013 ddde099c 60000013 00000000 8071a595 [ 1360.407436][T13186] db40: 84b45004 8482da00 84b45004 00000001 85479900 00000011 e03adba4 e03adb68 [ 1360.407668][T13186] db60: 80610f28 80610e30 e03adbac 85502800 85729cc0 82aca2a8 00000000 8071a595 [ 1360.407926][T13186] db80: e03adba4 8482da00 00000000 84be9b00 00000029 8500e800 e03adbbc e03adba8 [ 1360.408154][T13186] dba0: 80610ff8 80610e30 84b45000 00000000 e03adbcc e03adbc0 8198128c 80610fdc [ 1360.408369][T13186] dbc0: e03adbe4 e03adbd0 8155c95c 81981288 84b47800 00000000 e03adc14 e03adbe8 [ 1360.408598][T13186] dbe0: 81804740 8155c940 00000000 81a55a50 84b47800 84b47800 84b47784 00000000 [ 1360.408823][T13186] dc00: 00000000 84b47800 e03adc7c e03adc18 818056ac 818046e8 8022ced4 8022be3c [ 1360.409061][T13186] dc20: 84be9b00 84bc5800 00000001 84b47948 e03adc30 e03adc30 815e37ac 00000000 [ 1360.409292][T13186] dc40: 00000000 8071a595 81a5c4d4 8071a595 e03adc84 84bc5800 84b47800 84be9b00 [ 1360.409535][T13186] dc60: 00000006 8180b828 85729cc0 e03add90 e03adccc e03adc80 8180b8c0 8180501c [ 1360.409774][T13186] dc80: e03adc9c e03adc90 e03adccc e03adc98 e03adccc e03adca0 816e9bd8 8071a595 [ 1360.410030][T13186] dca0: 81c00000 829e57a4 829e494c ffffffd1 00000000 8180b828 85729cc0 e03add90 [ 1360.410274][T13186] dcc0: e03add04 e03adcd0 802926d4 8180b834 83a81800 00000006 e03add04 e03add90 [ 1360.410530][T13186] dce0: 00000006 84be9b00 00000000 855b92c0 85729cc0 00000000 e03add1c e03add08 [ 1360.410793][T13186] dd00: 8029290c 80292680 00000000 802da2e4 e03add44 e03add20 8154bfb4 802928f8 [ 1360.411004][T13186] dd20: 8043a2e8 8071a595 e03add44 000000c0 84bc5800 00000001 e03adddc e03add48 [ 1360.411233][T13186] dd40: 8155754c 8154bf6c 00000000 00000000 00000000 00000000 00000000 80505568 [ 1360.411448][T13186] dd60: 82c1f94c 82c20734 829d255c 00000000 00000000 00000000 83a81800 e03ade08 [ 1360.411678][T13186] dd80: 81557c50 00000000 e03add88 e03add88 84bc5800 00000000 e03adddc e03adda8 [ 1360.411932][T13186] dda0: 81557c50 808c8a4c 00000000 8071a595 e03adddc 84be9afc 84be9bf8 e03ade70 [ 1360.412172][T13186] ddc0: 82c1f980 e03ade90 829d1f04 e03ade70 e03ade54 e03adde0 81558928 8155700c [ 1360.412400][T13186] dde0: e03addfc e03addf0 81a5c3e0 e03ade90 84be9b00 8241ec70 81a4eeb4 81a5c3c0 [ 1360.412647][T13186] de00: 84be9afc 61c88647 847fd10c 849fc90c 8122b314 00000000 00000000 00000000 [ 1360.412876][T13186] de20: 00000000 8071a595 e03ade54 829d25c4 e03ade90 829d25c4 e03ade90 829d1f04 [ 1360.413118][T13186] de40: 829d1f04 84bea880 e03ade74 e03ade58 8153a0e0 81558630 829d25c4 82c1f940 [ 1360.413352][T13186] de60: 829d1ec0 e03ade90 e03aded4 e03ade78 8153c540 8153a088 81a5c4d4 8029ce24 [ 1360.413609][T13186] de80: 82c1f940 829d1ec0 808c9c70 8153a0e4 84be9b20 84be9b20 00000100 00000122 [ 1360.413874][T13186] dea0: 00000000 8071a595 81c01f84 84473980 829d1ed8 8301bc00 8300e600 83a81800 [ 1360.414118][T13186] dec0: 8301bc15 8300f070 e03adf2c e03aded8 802873bc 8153c29c 81c01a40 83a81800 [ 1360.414354][T13186] dee0: e03adf14 e03adef0 829d1edc 829d1ed8 829d1edc 829d1ed8 e03adf2c 00000000 [ 1360.414587][T13186] df00: 80282cf8 84473980 8300e620 8300e600 82804d40 844739ac 83a81800 61c88647 [ 1360.414832][T13186] df20: e03adf6c e03adf30 80288004 80287214 81a5c4d4 8029ce24 e03adf6c e03adf48 [ 1360.415016][T13186] df40: 8028eb98 00000001 83a81800 854de080 dfe99e60 80287e08 84473980 00000000 [ 1360.415203][T13186] df60: e03adfac e03adf70 8028f07c 80287e14 80274ea8 81a5c45c 83a81800 8071a595 [ 1360.415382][T13186] df80: e03adfac 85541240 8028ef50 00000000 00000000 00000000 00000000 00000000 [ 1360.415571][T13186] dfa0: 00000000 e03adfb0 80200114 8028ef5c 00000000 00000000 00000000 00000000 [ 1360.415763][T13186] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1360.415943][T13186] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000 [ 1360.416140][T13186] Call trace: [ 1360.416274][T13186] [<81a400a8>] (rb_erase) from [<80610ef4>] (drop_sysctl_table+0xd0/0x1ac) [ 1360.416520][T13186] r5:85479948 r4:85479900 [ 1360.416667][T13186] [<80610e24>] (drop_sysctl_table) from [<80610f28>] (drop_sysctl_table+0x104/0x1ac) [ 1360.416929][T13186] r8:00000011 r7:85479900 r6:00000001 r5:84b45004 r4:8482da00 [ 1360.417133][T13186] [<80610e24>] (drop_sysctl_table) from [<80610ff8>] (unregister_sysctl_table+0x28/0x38) [ 1360.417412][T13186] r8:8500e800 r7:00000029 r6:84be9b00 r5:00000000 r4:8482da00 [ 1360.417615][T13186] [<80610fd0>] (unregister_sysctl_table) from [<8198128c>] (unregister_net_sysctl_table+0x10/0x14) [ 1360.417899][T13186] r5:00000000 r4:84b45000 [ 1360.418032][T13186] [<8198127c>] (unregister_net_sysctl_table) from [<8155c95c>] (neigh_sysctl_unregister+0x28/0x34) [ 1360.418272][T13186] [<8155c934>] (neigh_sysctl_unregister) from [<81804740>] (addrconf_sysctl_unregister+0x64/0x6c) [ 1360.418487][T13186] r5:00000000 r4:84b47800 [ 1360.418603][T13186] [<818046dc>] (addrconf_sysctl_unregister) from [<818056ac>] (addrconf_ifdown+0x69c/0x764) [ 1360.418819][T13186] r8:84b47800 r7:00000000 r6:00000000 r5:84b47784 r4:84b47800 [ 1360.418968][T13186] [<81805010>] (addrconf_ifdown) from [<8180b8c0>] (addrconf_notify+0x98/0x770) [ 1360.419170][T13186] r10:e03add90 r9:85729cc0 r8:8180b828 r7:00000006 r6:84be9b00 r5:84b47800 [ 1360.419335][T13186] r4:84bc5800 [ 1360.419429][T13186] [<8180b828>] (addrconf_notify) from [<802926d4>] (notifier_call_chain+0x60/0x1b4) [ 1360.419631][T13186] r10:e03add90 r9:85729cc0 r8:8180b828 r7:00000000 r6:ffffffd1 r5:829e494c [ 1360.419820][T13186] r4:829e57a4 [ 1360.419907][T13186] [<80292674>] (notifier_call_chain) from [<8029290c>] (raw_notifier_call_chain+0x20/0x28) [ 1360.420117][T13186] r10:00000000 r9:85729cc0 r8:855b92c0 r7:00000000 r6:84be9b00 r5:00000006 [ 1360.420276][T13186] r4:e03add90 [ 1360.420368][T13186] [<802928ec>] (raw_notifier_call_chain) from [<8154bfb4>] (call_netdevice_notifiers_info+0x54/0xa0) [ 1360.420586][T13186] [<8154bf60>] (call_netdevice_notifiers_info) from [<8155754c>] (unregister_netdevice_many_notify+0x54c/0xbc4) [ 1360.420823][T13186] r6:00000001 r5:84bc5800 r4:000000c0 [ 1360.420946][T13186] [<81557000>] (unregister_netdevice_many_notify) from [<81558928>] (default_device_exit_batch+0x304/0x384) [ 1360.421179][T13186] r10:e03ade70 r9:829d1f04 r8:e03ade90 r7:82c1f980 r6:e03ade70 r5:84be9bf8 [ 1360.421338][T13186] r4:84be9afc [ 1360.421427][T13186] [<81558624>] (default_device_exit_batch) from [<8153a0e0>] (ops_exit_list+0x64/0x68) [ 1360.421638][T13186] r10:84bea880 r9:829d1f04 r8:829d1f04 r7:e03ade90 r6:829d25c4 r5:e03ade90 [ 1360.421803][T13186] r4:829d25c4 [ 1360.421895][T13186] [<8153a07c>] (ops_exit_list) from [<8153c540>] (cleanup_net+0x2b0/0x49c) [ 1360.422081][T13186] r7:e03ade90 r6:829d1ec0 r5:82c1f940 r4:829d25c4 [ 1360.422211][T13186] [<8153c290>] (cleanup_net) from [<802873bc>] (process_one_work+0x1b4/0x4f4) [ 1360.422412][T13186] r10:8300f070 r9:8301bc15 r8:83a81800 r7:8300e600 r6:8301bc00 r5:829d1ed8 [ 1360.422578][T13186] r4:84473980 [ 1360.422666][T13186] [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8) [ 1360.422870][T13186] r10:61c88647 r9:83a81800 r8:844739ac r7:82804d40 r6:8300e600 r5:8300e620 [ 1360.423037][T13186] r4:84473980 [ 1360.423122][T13186] [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280) [ 1360.423309][T13186] r10:00000000 r9:84473980 r8:80287e08 r7:dfe99e60 r6:854de080 r5:83a81800 [ 1360.423469][T13186] r4:00000001 [ 1360.423559][T13186] [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1360.423757][T13186] Exception stack(0xe03adfb0 to 0xe03adff8) [ 1360.423903][T13186] dfa0: 00000000 00000000 00000000 00000000 [ 1360.424073][T13186] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1360.424248][T13186] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1360.424400][T13186] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [ 1360.424573][T13186] r4:85541240 [ 1360.424840][T13186] Code: 089da830 e58e3000 e89da830 e5903000 (e5823000) [ 1360.426451][T13186] ---[ end trace 0000000000000000 ]--- [ 1360.427010][T13186] Kernel panic - not syncing: Fatal exception [ 1360.429094][T13186] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:04:37 Registers: info registers vcpu 0 CPU#0 R00=0000008a R01=7ee2a858 R02=0000008a R03=00004000 R04=00000000 R05=00000000 R06=7ee2a858 R07=00000121 R08=7ee2a858 R09=0000006f R10=0000008a R11=00000000 R12=00000001 R13=ec1f1ff8 R14=76dc0590 R15=76dc0590 PSR=400d0093 -Z-- A S svc32 s00=52502030 s01=504d4545 d00=504d454552502030 s02=31545b5d s03=36383133 d01=3638313331545b5d s04=5043205d s05=31203a55 d02=31203a555043205d s06=44495520 s07=2030203a d03=2030203a44495520 s08=3a444950 s09=31333120 d04=313331203a444950 s10=43203638 s11=3a6d6d6f d05=3a6d6d6f43203638 s12=6f776b20 s13=72656b72 d06=72656b726f776b20 s14=3a38752f s15=6f4e2033 d07=6f4e20333a38752f s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=841aec40 R01=0000005b R02=eaef5000 R03=eaef5018 R04=84224000 R05=841aec40 R06=80a62a28 R07=8422406b R08=8282a2b8 R09=00000000 R10=000015de R11=e03ad6c4 R12=00000002 R13=e03ad6b8 R14=8295b2ec R15=80a62a38 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=fffc0f90 s05=fffc0f90 d02=fffc0f90fffc0f90 s06=08040201 s07=00000000 d03=0000000008040201 s08=c0300c00 s09=c0300c03 d04=c0300c03c0300c00 s10=08040201 s11=80402010 d05=8040201008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000