last executing test programs: 16.941339934s ago: executing program 1 (id=619): r0 = syz_open_dev$mouse(&(0x7f0000000180), 0x0, 0x2) r1 = getpgrp(0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40641, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sendmsg$NFC_CMD_VENDOR(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x4) r5 = ioctl$TUNGETDEVNETNS(r3, 0x5450, 0x0) pidfd_getfd(r2, r5, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, 0x0, 0x0) 15.417491863s ago: executing program 1 (id=621): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x200041, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$TUNSETLINK(r0, 0x5451, 0x0) 14.341339303s ago: executing program 1 (id=624): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x8906, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0xfffffffffffffe8b) r2 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x121, {{0xa, 0x4e20, 0x3, @private1, 0x3}}, {{0xa, 0x4e20, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}}, 0x104) r3 = openat$sequencer(0xffffff9c, &(0x7f0000000040), 0x2000, 0x0) r4 = dup(r3) ioctl$VHOST_SET_VRING_ENDIAN(r4, 0x4008af13, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x49d9, 0x4) sendmmsg$inet6(r2, &(0x7f00000000c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x2, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$selinux_access(r5, &(0x7f0000000180)={'system_u:object_r:pinentry_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x8}, 0x49) 11.539045635s ago: executing program 0 (id=627): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x40, 0x0) ioctl$TIOCMIWAIT(r0, 0x5451, 0x0) openat$uinput(0xffffff9c, &(0x7f0000001680), 0x802, 0x0) r1 = eventfd2(0x0, 0x0) write$eventfd(r1, &(0x7f0000000280)=0xffffffffffffffc0, 0x8) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000040)={'vcan0'}, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) close_range(r2, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NFC_CMD_DEACTIVATE_TARGET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="2400015b", @ANYBLOB="43b08d063c8cc91cd20e3e60529846706e137f77", @ANYBLOB="d316aef6db9f0552eef402e4986057c4507d9516ae2d6993715544e50f37caa8aa601a5a66f24a402c05dee8c6b66e69f8ec93f5d52bd21b6ec8d2458efc277a29902e152114ff44410ac9b61614b26a670ac8d62bf58b4e391efd3115419d0c0eb0065faa8690ac79ca36136e1bdcb3d518758458828121fd73ffbd20d99e35b1c9cf680ca668744081522dd45553c61cc6f2e305d2976e3fd2", @ANYRESDEC=r3, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 11.408829437s ago: executing program 1 (id=628): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x200041, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$TUNSETLINK(r0, 0x5451, 0x0) 10.849426608s ago: executing program 1 (id=629): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/rcu_normal', 0x0, 0x9) syz_open_procfs$namespace(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup(r0) sendto$inet_nvme_icreq_pdu(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) gettid() r5 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) r6 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r6, 0x5450, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) socket$unix(0x1, 0x0, 0x0) r7 = open(&(0x7f0000000000)='./file0\x00', 0x60247, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0x7, 0x0, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)=[0x8, 0x0, 0x40]) madvise(&(0x7f0000000000/0x800000)=nil, 0x800002, 0xe) keyctl$session_to_parent(0x12) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), 0x0}, 0x20) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2e, 0x0, 0x0) 9.207718188s ago: executing program 0 (id=630): r0 = openat$fb0(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) write$fb(r0, &(0x7f0000000040)="184ed0829e3504cf69ccfcf9cb6f3e1fd8331c0cc7", 0x15) r1 = syz_open_dev$dmmidi(&(0x7f0000000080), 0x4, 0x2000) readahead(r1, 0x0, 0x5) r2 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$XFS_IOC_AG_GEOMETRY(r0, 0xc080583d, &(0x7f0000000100)={0x2, 0x9544, 0x60000000, 0x8, 0x9, 0x1, 0x0, 0x1}) ioctl$XFS_IOC_PATH_TO_HANDLE(r0, 0xc01c5869, &(0x7f0000000280)={r3, &(0x7f0000000180)=',)$+!\"/\x00', 0x101200, &(0x7f00000001c0)={@align=0x52, {0xc, 0x5, 0x2, 0xfffffffffffffffd}}, 0xa2d, &(0x7f0000000200), &(0x7f0000000240)=0x9}) ioctl$BLKCRYPTOGENERATEKEY(r5, 0xc030128a, &(0x7f0000000300)={&(0x7f00000002c0)=""/43, 0x2b}) ioctl$XFS_IOC_ATTRMULTI_BY_HANDLE(r4, 0x4024587b, &(0x7f0000001dc0)={{r5, &(0x7f0000000340)='\'t\x00', 0x200000, &(0x7f0000000380)={@_ha_fsid={[0x6, 0x3]}, {0xfffe, 0x7, 0x40, 0xfe}}, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0xb8b}, 0xa, &(0x7f0000001cc0)=[{0x2, 0x9, &(0x7f0000000440)='\x00', &(0x7f0000000480)="1c2cf1b60527998fc053c93a7f9aa2b4ccee2ba19db61cc90e123942237e3f79b63d847f32018bf0cd32e55fc22bec2e907b7adda23a3ca7678c23e5f0728b8d44d0fb8c4f43ddf4ed67514b4006092ca2d6bde96377b7cd6b81a3d464eaaf7eaedaa3592fdde594577951bb847b0fa4b412551f9b0d5c5b5a0de1ed6cf107999b", 0x81, 0x2}, {0x3, 0x2, &(0x7f0000000540)=',)$+!\"/\x00', &(0x7f0000000580)="ddba2733d6f2e06b6d99ffdc6d2658db7b", 0x11, 0x14}, {0x2, 0x4000, &(0x7f00000005c0)=':^})\x00', &(0x7f0000000600)="9707ee5d8932ad6f264dc41fb942310d2ce8f963ef90325d10e7367872dcda0c029c62700130336117abd8ef50ddd77e11fd7a546de615cb3418de94d777284da846b33650ef70216424", 0x4a, 0x8}, {0x1, 0x5, &(0x7f0000000680)=',)$+!\"/\x00', &(0x7f00000006c0)="a4daae1b723caf64fcec19b050e167373f80cafd241730147fbd413c0eae04a9dbe36dfde55458fd08600cc5914b8d4703cc0f4fa861d7f6c7db83f8cc208b31134b60d6aed1d72f97a5e1866ce4edbbc57bfa651ac6b38ea2b0ade7f91418195063b5b6e3b6e1c844b70abf1a3507c54dbaa098df3dc413847e94c49457d82312e74f25c2a227b8cd7d614eb0669fd806f34c9ea7d293efd5f96d2f09e0d98a982558ca192aadb51fedcd6ffeabc77fdbe3fdc2a1", 0xb5, 0x10}, {0x3, 0x2, &(0x7f0000000780)='\'/@{\x00', &(0x7f00000007c0)="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", 0xfa, 0x2}, {0x1, 0x1, &(0x7f00000008c0)='/dev/fb0\x00', &(0x7f0000000900)="a94fe7afb98cfaeabc486d180ad7de030b094d90fed0d6969d9d5489fa6699a10fd9690c2229de82837998c2594a0e5876381538855dca683880eaf1c70d97accab26461aae84dc8fad1919b4de0d254f87bed1d197d560a3f24f101ae68988af03eea5b6db74c67b5d86bbb036d809e1d08263be3293fee64758eef42e95218a9e888ac2ade907754e636cbf7e4b23bee1fba9ea0d09e1dbd", 0x99, 0x18}, {0x2, 0x9f, &(0x7f00000009c0)=']\\@^\x00', &(0x7f0000000a00)="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", 0x1000, 0x10}, {0x3, 0xffffff81, &(0x7f0000001a00)='/dev/dmmidi#\x00', &(0x7f0000001a40)="d9d1d4dbb51764938e434051cb3a71b32633352a78a1b67f1a647ca928a0c867f4fe16eb61fdb4a94f37a317b9753dd581d41c9c18e40043c9dd3c51b66f597865c82d2a3bdb8e9fa1bf7d38bcbd281eedb3a5d91b7157f40051d0ae3b97b72d3db1661724ed5bff07b1064156f5dfff9ec99b8f638a0cba2a7f995ed265e0ee072354f762ee0b5b5c91d17b3a1dd88536b7e9aaf9", 0x95, 0x2a}, {0x3, 0x3, &(0x7f0000001b00)='\x00', &(0x7f0000001b40)="7188b1b0f52162a09cc6d8b4d70eaf351878b4831572f16058457fb5d3403733adf60543b242010d361df84673f60629fc2960945d2298ea31a21a0c10866740669e7a4c2830ae20adc22df2c0e49de81d4cd592da830df60d943bf170b5c4ab442ac4e602feb8df107d9f58ca8865a5442a8312041edde4681c3bc37fc5b70b50d606b5452932682e51de24c5e9b9a6d3be06df39ed154e5e8ca7ff8ff33f59acaa053bf74cb5c690bc70ba7f43833ad154a823bcae3fdb11bbe1e80a075878450e", 0xc2}, {0x2, 0xec, &(0x7f0000001c40)=',)$+!\"/\x00', &(0x7f0000001c80)="b3fc82886c25a4b15484dad2d7635d", 0xf}]}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000001e40), r5) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r5, &(0x7f0000001f00)={&(0x7f0000001e00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e80)={0x1c, r7, 0x0, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8085}, 0x20000000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000001f40)={{0x8}, 0x0, 0x10000, 0x8, {0xf9, 0x5}, 0x0, 0x9}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000001fc0)={0xc0000000}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002040), r6) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000002080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000002140)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002100)={&(0x7f00000020c0)={0x28, r8, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0xa, 0x54}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4891}, 0x44) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000002180)={r3}) close_range(r3, r10, 0x2) fsetxattr$security_ima(r6, &(0x7f00000021c0), &(0x7f0000002200)=@sha1={0x1, "9c107c9252cb09eb28552f22b380ddb9cfb68f51"}, 0x15, 0x3) ptrace$ARCH_SHSTK_STATUS(0x1e, r2, &(0x7f0000002240), 0x5005) recvmsg(r3, &(0x7f00000049c0)={&(0x7f0000002280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000004900)=[{&(0x7f0000002300)=""/141, 0x8d}, {&(0x7f00000023c0)=""/208, 0xd0}, {&(0x7f00000024c0)=""/123, 0x7b}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/101, 0x65}, {&(0x7f00000035c0)=""/99, 0x63}, {&(0x7f0000003640)=""/170, 0xaa}, {&(0x7f0000003700)=""/197, 0xc5}, {&(0x7f0000003800)=""/200, 0xc8}, {&(0x7f0000003900)=""/4096, 0x1000}], 0xa, &(0x7f0000004980)=""/22, 0x16}, 0x80) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000004b80)={&(0x7f0000004a00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000004b40)={&(0x7f0000004a40)={0xcc, 0xb, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x54, 0x8, 0x0, 0x1, [{0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x11, 0x1a, 'security.ima\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x4}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x7}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x5, 0x1a, '\x00'}}]}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_COMMENT={0x9, 0x1a, '\'/@{\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010102}}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x8000000000000000}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0xcc}, 0x1, 0x0, 0x0, 0x80010}, 0x40) r12 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000004bc0), 0x4a040, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r12, &(0x7f0000004d00)={&(0x7f0000004c00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c40)={0x50, r8, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xc}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x1}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xc}]}, 0x50}, 0x1, 0x0, 0x0, 0x2c004000}, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f0000004d40)={0x5, 0x3, {0x1, 0x1, 0x9, 0x0, 0x1}, 0x4}) syz_usb_connect$hid(0x6, 0x3f, &(0x7f0000004dc0)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0xff, 0x79, 0x11, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x90, 0x6, "", [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x3, 0x1, 0x1, 0x1, {0x9, 0x21, 0x8, 0x7, 0x1, {0x22, 0x96a}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x6, 0xc4, 0x1}}, [{{0x9, 0x5, 0x2, 0x3, 0x3ff, 0x7, 0x97, 0xc1}}]}}}]}}]}}, &(0x7f0000005000)={0xa, &(0x7f0000004e00)={0xa, 0x6, 0x200, 0x3, 0x8, 0xe, 0x8, 0x9}, 0xee, &(0x7f0000004e40)={0x5, 0xf, 0xee, 0x5, [@ssp_cap={0x10, 0x10, 0xa, 0x5, 0x1, 0x4, 0xf00, 0xa, [0x30]}, @ssp_cap={0x20, 0x10, 0xa, 0x7, 0x5, 0x9, 0x793a763afb951368, 0x3, [0x6000, 0x3ff0, 0xc0c0, 0x30, 0xff0030]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x10, 0x7, 0x5, 0x3f7d, 0x9}, @ss_container_id={0x14, 0x10, 0x4, 0x9, "df40654d26159a6b87d19bd8c7e76de3"}, @generic={0x9a, 0x10, 0x3, "d4e4b53bc1f48609956d940ef1556082e3c36cad1325baa52fc549557573eabcedbe75f1b7b78e1c2e436e6ab8879aee76e081f0adbec46c6eb6b2782c51a3952844fe76f3ed9f72055f3a82d24b488a1b4c5e55b3bc4f6b003745b8b3b3d0a4ce1262a06ecc590f3e81382909ffdc6a3045bf616d39a046006a629625aab40ccf1571f8f7877f09eeb3f91f8626676ff16d8edfd6eab9"}]}, 0x1, [{0xb8, &(0x7f0000004f40)=@string={0xb8, 0x3, "210d97760ee28f9d4818debe30e7b9f0616be6ef4e8f3b5d01ebb260589455a1e7afa28d54f25890d2c3238904f731955694f23f288337664038f5675f264e4bb9abf89a5228b744bfbaf532982dc23559552a005e16aaa3f85ce562b0fbc2283cdfbbe85e8cb040b1ee2db6bbd53f4a9c4296cb5380fe2f1e95fe721d52ce7ca544e19ae47b10f1c06c5a3448147ba74f1f1263b4b2dab87c0abdc85506d479bd23cca15fc6c21b9850363a6d7b12126871050777b4"}}]}) getsockopt$IP6T_SO_GET_ENTRIES(r11, 0x29, 0x41, &(0x7f0000005040)={'filter\x00', 0x92, "9eec864660bea1c30a1ae16fd14a4d4785cecac466782f1e1a78a5181236b6b9aecaa961f98518a4d6804b02a6791fb27000b9094d4e728b1272f6460ff2084135f9233b2b77f93f0cbcf262e40cbf2da2544bf3dd5cca38bd346ae999c4244c48b9c89332b08281d2a2ff3415da1e7b870eb28043d736c1b1d0521f43b738ea0d9829e08d4ff97a56d1d6bbd32806605a5d"}, &(0x7f0000005100)=0xb6) socket$nl_route(0x10, 0x3, 0x0) getsockopt$nfc_llcp(r11, 0x118, 0x1, &(0x7f0000005140)=""/193, 0xc1) 7.589161249s ago: executing program 1 (id=631): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) r1 = socket(0x29, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f00000000c0)={'raw\x00', 0x0, [0x40, 0x1, 0x4, 0x7, 0x80]}, &(0x7f0000000140)=0x54) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000f, 0x204031, 0xffffffffffffffff, 0xec773000) r4 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_clone(0x8d200580, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$sock_inet_SIOCRTMSG(r6, 0x5411, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) recvmsg$unix(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x2) ioctl$TUNGETVNETBE(r4, 0x5451, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r7, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) sendmsg$NL80211_CMD_FRAME(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x0) r9 = syz_open_dev$admmidi(&(0x7f00000001c0), 0x20, 0x0) readv(r9, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 6.070687197s ago: executing program 0 (id=632): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x8906, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0xfffffffffffffe8b) r2 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x121, {{0xa, 0x4e20, 0x3, @private1, 0x3}}, {{0xa, 0x4e20, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}}, 0x104) r3 = openat$sequencer(0xffffff9c, &(0x7f0000000040), 0x2000, 0x0) r4 = dup(r3) ioctl$VHOST_SET_VRING_ENDIAN(r4, 0x4008af13, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x49d9, 0x4) sendmmsg$inet6(r2, &(0x7f00000000c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x2, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000), 0x1000e) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000180)={'system_u:object_r:pinentry_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x8}, 0x49) 2.748335639s ago: executing program 0 (id=633): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x200041, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$TUNSETLINK(r0, 0x5451, 0x0) 1.749336507s ago: executing program 0 (id=634): r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) close_range(0xffffffffffffffff, r0, 0x2) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000040)={{r0}, "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"}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000001180)={'batadv0\x00', 0x0}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001140)={@ifindex=r1, 0xf, 0x1, 0xe, &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000001080)=[0x0, 0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) fcntl$setflags(r0, 0x2, 0x0) r2 = add_key$user(&(0x7f00000011c0), &(0x7f0000001200)={'syz', 0x0}, &(0x7f0000001240)="485a200592c05b56ce43e626f7b654a047df91e4a1205cacbcfbdb37f36e48452aa67c37ca208f66035d0d80f04e127fa405e66e7687662a13f19e9fb22162cacdc255b192d5b6d3a66f193dae47a7ca24147a7d7ff67c4afe767016a40d855ff4c58133d3a5cbd386dcd8eaddd5aede218661bc36de58e26b0282c85c3535", 0x7f, 0xfffffffffffffff8) fchown(r0, 0xee01, 0x0) r3 = mq_open(&(0x7f00000012c0)='user\x00', 0xc2, 0x2, &(0x7f0000001300)={0x5, 0x0, 0x8}) flistxattr(r0, &(0x7f0000001340)=""/44, 0x2c) socket$netlink(0x10, 0x3, 0x8) r4 = add_key(&(0x7f0000001400)='cifs.idmap\x00', &(0x7f0000001440)={'syz', 0x0}, &(0x7f0000001480)="6a05334b9e38e5206a06c1852e5f5891b0d45bca4d25d540b1abe050f377203e434947f9a2e69f2e90f6dbb3c6522068411df2d8b12f346c13ce6b33c9447627", 0x40, 0xfffffffffffffffe) keyctl$search(0xa, r2, &(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, r4) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) ioctl$XFS_IOC_GETVERSION(0xffffffffffffffff, 0x80047601, &(0x7f00000014c0)) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) bind(r6, &(0x7f0000001500)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0x80) keyctl$search(0xa, r4, &(0x7f0000001580)='rxrpc_s\x00', &(0x7f00000015c0)={'syz', 0x2}, r4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000001600)) r8 = signalfd4(r3, &(0x7f0000001640)={[0x5, 0x101]}, 0x8, 0x800) ioctl$XFS_IOC_PATH_TO_HANDLE(0xffffffffffffffff, 0xc01c5869, &(0x7f00000019c0)={r6, &(0x7f00000018c0)='-\x00', 0x40080, &(0x7f0000001900)={@_ha_fsid={[0xb8, 0x5]}, {0x3, 0x5, 0xfff, 0x1fffffffc0}}, 0x8, &(0x7f0000001940)={@_ha_fsid}, &(0x7f0000001980)=0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x4, 0x13, &(0x7f0000001680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xaed, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0xb}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001740)='syzkaller\x00', 0xd, 0xbc, &(0x7f0000001780)=""/188, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000001880)={0x1, 0x2, 0x4, 0xc0}, 0x10, 0x0, r9, 0x5, 0x0, &(0x7f0000001a00)=[{0x0, 0x2, 0xe, 0xb}, {0x2, 0x3, 0x1, 0x1}, {0x0, 0x1, 0x7, 0x8}, {0x2, 0x5, 0x3, 0x4}, {0x4, 0x2, 0xf, 0x8}], 0x10, 0x8}, 0x94) r10 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r10, 0x8955, &(0x7f0000001b40)={{0x2, 0x4e20, @remote}, {0x1}, 0x22, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, 'veth1_virt_wifi\x00'}) recvmsg(r5, &(0x7f0000002c80)={&(0x7f0000001bc0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001c40)=""/4096, 0x1000}], 0x1}, 0x100) read$rfkill(r5, &(0x7f0000002cc0), 0x8) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$XFS_IOC_FSGETXATTRA(r11, 0x801c582d, &(0x7f0000002d00)) 0s ago: executing program 0 (id=635): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x58) add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) (async) close(r0) (async) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) (async) r1 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x640c83, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="000825bd7000fedbdf250c0016003f12ca76714b5a855d033b4faaa3cf954b98bb708e5cfc9121bb52c26a07d7337910978f4e5078dbeea185a6f4a776bef21adb1def7fcc57f1c3cc266c6288964a1909f895ac493f00"/100], 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x40800) (async) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) fgetxattr(r2, &(0x7f00000000c0)=@known='system.sockprotoname\x00', 0x0, 0x0) (async) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x4004814}, 0x40880) kernel console output (not intermixed with test programs): from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 190.269062][ T4380] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 190.269133][ T4380] r8:76ffdf08 r7:00000000 r6:00000000 r5:ecd79f68 r4:00000002 [ 190.269168][ T4380] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 190.269232][ T4380] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 190.269306][ T4380] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 190.269375][ T4380] r10:80643b14 r9:00000001 r8:00000002 r7:ecd79f68 r6:0000000f r5:76ffdf08 [ 190.269424][ T4380] r4:8394a4c0 r3:ecd79e9f [ 190.269469][ T4380] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 190.269551][ T4380] r8:8394a4c0 r7:ecd79f68 r6:76ffdf08 r5:83327680 r4:0000000f [ 190.269570][ T4380] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 190.269636][ T4380] r10:00000003 r9:8394a4c0 r8:8020029c r7:00000000 r6:00000000 r5:83327680 [ 190.269656][ T4380] r4:83327683 [ 190.269673][ T4380] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 190.269734][ T4380] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 190.269750][ T4380] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 190.269800][ T4380] Exception stack(0xecd79fa8 to 0xecd79ff0) [ 190.269847][ T4380] 9fa0: 00000000 00000000 00000003 76ffdf08 0000000f 00000000 [ 190.269881][ T4380] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76ffe0dc [ 190.269909][ T4380] 9fe0: 76ffde58 76ffde44 0010b9c4 001125a8 [ 194.838120][ T28] kauditd_printk_skb: 48 callbacks suppressed [ 194.838448][ T28] audit: type=1400 audit(194.770:988): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 194.966519][ T28] audit: type=1400 audit(194.900:989): avc: denied { create } for pid=4412 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 194.976986][ T28] audit: type=1400 audit(194.900:990): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 194.985045][ T28] audit: type=1400 audit(194.910:991): avc: denied { read } for pid=4412 comm="syz.0.254" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 194.990503][ T28] audit: type=1400 audit(194.920:992): avc: denied { create } for pid=4412 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 194.999664][ T28] audit: type=1400 audit(194.930:993): avc: denied { read } for pid=4412 comm="syz.0.254" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 195.017753][ T28] audit: type=1400 audit(194.950:994): avc: denied { read write } for pid=4412 comm="syz.0.254" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 195.044142][ T28] audit: type=1400 audit(194.970:995): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 195.075909][ T28] audit: type=1400 audit(195.000:996): avc: denied { create } for pid=4414 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 195.078447][ T28] audit: type=1400 audit(195.010:997): avc: denied { create } for pid=4414 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 196.067854][ T4429] FAULT_INJECTION: forcing a failure. [ 196.067854][ T4429] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.070413][ T4429] CPU: 0 UID: 0 PID: 4429 Comm: syz.0.261 Not tainted syzkaller #0 PREEMPT [ 196.070578][ T4429] Hardware name: ARM-Versatile Express [ 196.070620][ T4429] Call trace: [ 196.070685][ T4429] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 196.070857][ T4429] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 196.070889][ T4429] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 196.070960][ T4429] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 196.071056][ T4429] r7:00000000 r6:00000000 r5:8394a4c0 r4:82b4ee88 [ 196.071076][ T4429] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 196.071163][ T4429] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 196.071270][ T4429] r8:76f7ff08 r7:00000000 r6:00000000 r5:ecfd9f68 r4:00000002 [ 196.071294][ T4429] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 196.071386][ T4429] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 196.071470][ T4429] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 196.071575][ T4429] r10:80643b14 r9:00000001 r8:00000002 r7:ecfd9f68 r6:0000000f r5:76f7ff08 [ 196.071631][ T4429] r4:8394a4c0 r3:ecfd9e9f [ 196.071658][ T4429] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 196.071763][ T4429] r8:8394a4c0 r7:ecfd9f68 r6:76f7ff08 r5:85679d00 r4:0000000f [ 196.071786][ T4429] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 196.071873][ T4429] r10:00000003 r9:8394a4c0 r8:8020029c r7:00000000 r6:00000000 r5:85679d00 [ 196.071902][ T4429] r4:85679d03 [ 196.071921][ T4429] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 196.071988][ T4429] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 196.072005][ T4429] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 196.072054][ T4429] Exception stack(0xecfd9fa8 to 0xecfd9ff0) [ 196.072102][ T4429] 9fa0: 00000000 00000000 00000005 76f7ff08 0000000f 00000000 [ 196.072144][ T4429] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f800dc [ 196.072174][ T4429] 9fe0: 76f7fe58 76f7fe44 0010b9c4 001125a8 [ 198.547307][ T4449] SELinux: syz.1.272 (4449) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 198.869375][ T4455] FAULT_INJECTION: forcing a failure. [ 198.869375][ T4455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.870798][ T4455] CPU: 0 UID: 0 PID: 4455 Comm: syz.0.275 Not tainted syzkaller #0 PREEMPT [ 198.870895][ T4455] Hardware name: ARM-Versatile Express [ 198.870913][ T4455] Call trace: [ 198.870951][ T4455] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 198.871010][ T4455] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 198.871019][ T4455] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 198.871045][ T4455] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 198.871094][ T4455] r7:00000000 r6:00000000 r5:83bcee40 r4:82b4ee88 [ 198.871111][ T4455] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 198.871171][ T4455] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 198.871207][ T4455] r8:76f7ff08 r7:00000000 r6:00000000 r5:ed139f68 r4:00000002 [ 198.871216][ T4455] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 198.871243][ T4455] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 198.871271][ T4455] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 198.871309][ T4455] r10:80643b14 r9:00000001 r8:00000002 r7:ed139f68 r6:0000000f r5:76f7ff08 [ 198.871320][ T4455] r4:83bcee40 r3:ed139e9f [ 198.871327][ T4455] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 198.871386][ T4455] r8:83bcee40 r7:ed139f68 r6:76f7ff08 r5:85679000 r4:0000000f [ 198.871395][ T4455] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 198.871461][ T4455] r10:00000003 r9:83bcee40 r8:8020029c r7:00000000 r6:00000000 r5:85679000 [ 198.871472][ T4455] r4:85679003 [ 198.871481][ T4455] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 198.871539][ T4455] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 198.871565][ T4455] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 198.871592][ T4455] Exception stack(0xed139fa8 to 0xed139ff0) [ 198.871624][ T4455] 9fa0: 00000000 00000000 00000003 76f7ff08 0000000f 00000000 [ 198.871641][ T4455] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f800dc [ 198.871654][ T4455] 9fe0: 76f7fe58 76f7fe44 0010b9c4 001125a8 [ 200.770253][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 200.770705][ T28] audit: type=1400 audit(200.700:1077): avc: denied { execmem } for pid=4464 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 200.915474][ T28] audit: type=1400 audit(200.840:1078): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 201.026737][ T28] audit: type=1400 audit(200.960:1079): avc: denied { create } for pid=4468 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 201.044258][ T28] audit: type=1400 audit(200.970:1080): avc: denied { read } for pid=4468 comm="syz.0.281" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 201.064283][ T28] audit: type=1400 audit(200.990:1081): avc: denied { create } for pid=4468 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 201.096316][ T28] audit: type=1400 audit(201.030:1082): avc: denied { read } for pid=4468 comm="syz.0.281" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 201.109458][ T28] audit: type=1400 audit(201.040:1083): avc: denied { read write } for pid=4468 comm="syz.0.281" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 201.160367][ T28] audit: type=1400 audit(201.090:1084): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 201.319462][ T28] audit: type=1400 audit(201.250:1085): avc: denied { read write } for pid=4470 comm="syz.0.282" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 201.426374][ T28] audit: type=1400 audit(201.360:1086): avc: denied { read } for pid=4470 comm="syz.0.282" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 201.685788][ T4474] FAULT_INJECTION: forcing a failure. [ 201.685788][ T4474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.686151][ T4474] CPU: 1 UID: 0 PID: 4474 Comm: syz.0.283 Not tainted syzkaller #0 PREEMPT [ 201.686200][ T4474] Hardware name: ARM-Versatile Express [ 201.686214][ T4474] Call trace: [ 201.686237][ T4474] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 201.686294][ T4474] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 201.686304][ T4474] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 201.686330][ T4474] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 201.686360][ T4474] r7:b5403587 r6:00000000 r5:83bb24c0 r4:82b4ee88 [ 201.686367][ T4474] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 201.686397][ T4474] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 201.686429][ T4474] r8:00000000 r7:b5403587 r6:76f7fc68 r5:00000000 r4:ed269f0c [ 201.686437][ T4474] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 201.686497][ T4474] [<809cd408>] (should_fail_usercopy) from [<80229f14>] (restore_vfp_context+0x3c/0xe0) [ 201.686534][ T4474] [<80229ed8>] (restore_vfp_context) from [<8022a3c4>] (restore_sigframe+0x17c/0x210) [ 201.686579][ T4474] r6:76f7fc68 r5:00000000 r4:ed269fb0 [ 201.686589][ T4474] [<8022a248>] (restore_sigframe) from [<8022a4fc>] (sys_rt_sigreturn+0x44/0x74) [ 201.686619][ T4474] r7:000000ad r6:0012f1a4 r5:76f7fb00 r4:ed269fb0 [ 201.686855][ T4474] [<8022a4b8>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 201.686979][ T4474] Exception stack(0xed269fa8 to 0xed269ff0) [ 201.687054][ T4474] 9fa0: 00000000 00000000 fffffff3 00000000 00000000 00000000 [ 201.687107][ T4474] 9fc0: 00000000 00000000 0012f1a4 0000000b 003462d8 00000000 00000001 76f800dc [ 201.687185][ T4474] 9fe0: 76f7fe88 76f7fe78 00018e58 001307a0 [ 201.687288][ T4474] r5:00000000 r4:00000000 [ 204.790542][ T4494] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4494 comm=syz.1.292 [ 205.809585][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 205.809926][ T28] audit: type=1400 audit(205.740:1128): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 205.957064][ T28] audit: type=1400 audit(205.890:1129): avc: denied { create } for pid=4505 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 205.971504][ T28] audit: type=1400 audit(205.900:1130): avc: denied { read } for pid=4505 comm="syz.1.296" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 205.991209][ T28] audit: type=1400 audit(205.920:1131): avc: denied { create } for pid=4505 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 206.007120][ T28] audit: type=1400 audit(205.940:1132): avc: denied { read } for pid=4505 comm="syz.1.296" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 206.025405][ T28] audit: type=1400 audit(205.950:1133): avc: denied { read write } for pid=4505 comm="syz.1.296" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 206.101280][ T28] audit: type=1400 audit(206.030:1134): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 206.388496][ T28] audit: type=1400 audit(206.320:1135): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 206.676503][ T28] audit: type=1400 audit(206.610:1136): avc: denied { read write } for pid=4509 comm="syz.1.298" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 206.900508][ T28] audit: type=1400 audit(206.830:1137): avc: denied { read } for pid=4509 comm="syz.1.298" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 210.836843][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 210.837187][ T28] audit: type=1400 audit(210.770:1199): avc: denied { read } for pid=4558 comm="syz.0.321" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 210.842434][ T28] audit: type=1400 audit(210.770:1200): avc: denied { create } for pid=4558 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 210.844624][ T28] audit: type=1400 audit(210.770:1201): avc: denied { create } for pid=4557 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 210.850800][ T28] audit: type=1400 audit(210.780:1202): avc: denied { read } for pid=4558 comm="syz.0.321" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 210.902669][ T28] audit: type=1400 audit(210.830:1203): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 210.909652][ T28] audit: type=1400 audit(210.840:1204): avc: denied { create } for pid=4557 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 211.056356][ T28] audit: type=1400 audit(210.990:1205): avc: denied { read write } for pid=4561 comm="syz.0.322" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 211.068168][ T28] audit: type=1400 audit(211.000:1206): avc: denied { create } for pid=4561 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 211.087831][ T28] audit: type=1400 audit(211.020:1207): avc: denied { mounton } for pid=4561 comm="syz.0.322" path="/154/file0" dev="tmpfs" ino=840 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 211.278658][ T28] audit: type=1400 audit(211.210:1208): avc: denied { create } for pid=4557 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 213.992494][ T4591] FAULT_INJECTION: forcing a failure. [ 213.992494][ T4591] name failslab, interval 1, probability 0, space 0, times 0 [ 213.997214][ T4591] CPU: 0 UID: 0 PID: 4591 Comm: syz.0.330 Not tainted syzkaller #0 PREEMPT [ 213.997339][ T4591] Hardware name: ARM-Versatile Express [ 213.997354][ T4591] Call trace: [ 213.997376][ T4591] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 213.997436][ T4591] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 213.997445][ T4591] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 213.997472][ T4591] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 213.997501][ T4591] r7:00000dc0 r6:00000000 r5:83bbee40 r4:82b17e08 [ 213.997517][ T4591] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 213.997550][ T4591] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 213.997589][ T4591] r8:8567a000 r7:00000dc0 r6:00000000 r5:00000000 r4:830c4480 [ 213.997597][ T4591] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 213.997627][ T4591] [<8052c290>] (kmem_cache_alloc_noprof) from [<807c66cc>] (security_file_alloc+0x30/0x184) [ 213.997663][ T4591] r10:ed831f18 r9:83bbee40 r8:8567a000 r7:838b4d80 r6:82ce8080 r5:8567a000 [ 213.997673][ T4591] r4:8567a000 [ 213.997680][ T4591] [<807c669c>] (security_file_alloc) from [<80582af8>] (init_file+0x48/0xfc) [ 213.997713][ T4591] r7:838b4d80 r6:00000002 r5:82b1af50 r4:8567a000 [ 213.997721][ T4591] [<80582ab0>] (init_file) from [<80583348>] (alloc_empty_file+0x68/0x13c) [ 213.997754][ T4591] r7:838b4d80 r6:00000002 r5:82b1af50 r4:825238a8 [ 213.997762][ T4591] [<805832e0>] (alloc_empty_file) from [<80597320>] (path_openat+0x44/0x1214) [ 213.997795][ T4591] r8:ed831e50 r7:ffffff9c r6:ed831f18 r5:83bbee40 r4:8387e780 [ 213.997802][ T4591] [<805972dc>] (path_openat) from [<805985a8>] (do_file_open+0xb8/0x150) [ 213.997833][ T4591] r10:00000142 r9:83bbee40 r8:00000001 r7:ffffff9c r6:ed831f18 r5:83bbee40 [ 213.997842][ T4591] r4:8387e780 [ 213.997849][ T4591] [<805984f0>] (do_file_open) from [<8057d930>] (do_sys_openat2+0x8c/0xf0) [ 213.997880][ T4591] r8:8020029c r7:20000700 r6:ffffff9c r5:8387e780 r4:00000005 [ 213.997888][ T4591] [<8057d8a4>] (do_sys_openat2) from [<8057dd0c>] (sys_openat+0x80/0xd0) [ 213.997917][ T4591] r7:00000142 r6:00000000 r5:20000700 r4:ffffff9c [ 213.997925][ T4591] [<8057dc8c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 213.997949][ T4591] Exception stack(0xed831fa8 to 0xed831ff0) [ 213.997969][ T4591] 1fa0: 00000000 00000000 ffffff9c 20000700 00000002 00000000 [ 213.997986][ T4591] 1fc0: 00000000 00000000 0012f1a4 00000142 00346418 00000000 00000001 76f3e0dc [ 213.997999][ T4591] 1fe0: 76f3de88 76f3de78 00018e58 001307a0 [ 213.998012][ T4591] r6:0012f1a4 r5:00000000 r4:00000000 [ 214.235822][ T4590] FAULT_INJECTION: forcing a failure. [ 214.235822][ T4590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.237614][ T4590] CPU: 0 UID: 0 PID: 4590 Comm: syz.1.334 Not tainted syzkaller #0 PREEMPT [ 214.237716][ T4590] Hardware name: ARM-Versatile Express [ 214.237744][ T4590] Call trace: [ 214.237783][ T4590] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 214.237859][ T4590] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 214.237869][ T4590] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 214.237895][ T4590] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 214.237925][ T4590] r7:b5403587 r6:00000000 r5:847b6200 r4:82b4ee88 [ 214.237933][ T4590] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 214.237964][ T4590] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 214.237998][ T4590] r8:003462d8 r7:b5403587 r6:00000000 r5:847b6a6c r4:76ffdc68 [ 214.238006][ T4590] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 214.238033][ T4590] [<809cd408>] (should_fail_usercopy) from [<8022a034>] (preserve_vfp_context+0x7c/0xc8) [ 214.238061][ T4590] [<80229fb8>] (preserve_vfp_context) from [<8022a23c>] (setup_sigframe+0x1bc/0x1c8) [ 214.238089][ T4590] r5:847b6a6c r4:76ffdb80 [ 214.238096][ T4590] [<8022a080>] (setup_sigframe) from [<8022a8d8>] (do_work_pending+0x3ac/0x4e8) [ 214.238130][ T4590] r10:b5403587 r9:76ffdb80 r8:00000000 r7:847b6a6c r6:76ffdb00 r5:ed0d1fb0 [ 214.238140][ T4590] r4:847b6200 [ 214.238147][ T4590] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 214.238171][ T4590] Exception stack(0xed0d1fb0 to 0xed0d1ff8) [ 214.238189][ T4590] 1fa0: 00000003 20000040 00000008 00000000 [ 214.238205][ T4590] 1fc0: 00000000 00000000 0012f1a4 00000004 003462d8 00000000 00000001 76ffe0dc [ 214.238220][ T4590] 1fe0: 76ffde88 76ffde78 00018e58 0013079c 60000010 00000003 [ 214.238238][ T4590] r10:00000004 r9:847b6200 r8:8020029c r7:00000004 r6:0012f1a4 r5:00000000 [ 214.238247][ T4590] r4:00000000 [ 215.347541][ T4608] FAULT_INJECTION: forcing a failure. [ 215.347541][ T4608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.350133][ T4608] CPU: 0 UID: 0 PID: 4608 Comm: syz.1.342 Not tainted syzkaller #0 PREEMPT [ 215.350289][ T4608] Hardware name: ARM-Versatile Express [ 215.350313][ T4608] Call trace: [ 215.350348][ T4608] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 215.350444][ T4608] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 215.350461][ T4608] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 215.350506][ T4608] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 215.350569][ T4608] r7:20000180 r6:00000000 r5:847ba4c0 r4:82b4ee88 [ 215.350583][ T4608] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 215.350634][ T4608] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 215.350693][ T4608] r8:00040c00 r7:20000180 r6:ed855e28 r5:00000000 r4:ed855f20 [ 215.350708][ T4608] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 215.350757][ T4608] [<809cd408>] (should_fail_usercopy) from [<815dfa00>] (copy_msghdr_from_user+0x50/0x1e0) [ 215.350811][ T4608] [<815df9b0>] (copy_msghdr_from_user) from [<815dfc08>] (___sys_sendmsg+0x78/0xd0) [ 215.350870][ T4608] r8:00040c00 r7:00000000 r6:834a6040 r5:ed855f20 r4:ed855e6c [ 215.350884][ T4608] [<815dfb90>] (___sys_sendmsg) from [<815e1c90>] (__sys_sendmsg+0x8c/0xe0) [ 215.350940][ T4608] r9:847ba4c0 r8:85679800 r7:00040c00 r6:20000180 r5:85679801 r4:00000003 [ 215.350956][ T4608] [<815e1c04>] (__sys_sendmsg) from [<815e1cf8>] (sys_sendmsg+0x14/0x18) [ 215.351004][ T4608] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 215.351019][ T4608] [<815e1ce4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 215.351056][ T4608] Exception stack(0xed855fa8 to 0xed855ff0) [ 215.351092][ T4608] 5fa0: 00000000 00000000 00000003 20000180 00040c00 00000000 [ 215.351122][ T4608] 5fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76ffe0dc [ 215.351146][ T4608] 5fe0: 76ffde88 76ffde78 00018e58 001307a0 [ 215.789829][ T4614] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4614 comm=syz.0.344 [ 215.885444][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 215.886307][ T28] audit: type=1400 audit(215.810:1258): avc: denied { module_request } for pid=4611 comm="syz.0.344" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 215.887403][ T28] audit: type=1400 audit(215.810:1259): avc: denied { sys_module } for pid=4611 comm="syz.0.344" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 215.888320][ T28] audit: type=1400 audit(215.810:1260): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 215.902116][ T28] audit: type=1400 audit(215.830:1261): avc: denied { module_request } for pid=4611 comm="syz.0.344" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 215.903503][ T28] audit: type=1400 audit(215.830:1262): avc: denied { sys_module } for pid=4611 comm="syz.0.344" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 215.945217][ T28] audit: type=1400 audit(215.870:1263): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 215.949636][ T28] audit: type=1400 audit(215.880:1264): avc: denied { read } for pid=4615 comm="syz.1.345" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 216.190160][ T4616] FAULT_INJECTION: forcing a failure. [ 216.190160][ T4616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.190631][ T4616] CPU: 1 UID: 0 PID: 4616 Comm: syz.1.345 Not tainted syzkaller #0 PREEMPT [ 216.190725][ T4616] Hardware name: ARM-Versatile Express [ 216.190753][ T4616] Call trace: [ 216.190799][ T4616] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 216.190907][ T4616] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 216.190974][ T4616] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 216.191083][ T4616] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 216.191147][ T4616] r7:00000000 r6:00000000 r5:83bcee40 r4:82b4ee88 [ 216.191196][ T4616] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 216.191279][ T4616] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 216.191397][ T4616] r8:76ffdf08 r7:00000000 r6:00000000 r5:ed949f68 r4:00000002 [ 216.191424][ T4616] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 216.191549][ T4616] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 216.191666][ T4616] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 216.191765][ T4616] r10:80643b14 r9:00000001 r8:00000002 r7:ed949f68 r6:0000000f r5:76ffdf08 [ 216.191810][ T4616] r4:83bcee40 r3:ed949e9f [ 216.191912][ T4616] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 216.192012][ T4616] r8:83bcee40 r7:ed949f68 r6:76ffdf08 r5:85679800 r4:0000000f [ 216.192063][ T4616] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 216.192229][ T4616] r10:00000003 r9:83bcee40 r8:8020029c r7:00000000 r6:00000000 r5:85679800 [ 216.192280][ T4616] r4:85679803 [ 216.192307][ T4616] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 216.192384][ T4616] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 216.192422][ T4616] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 216.192532][ T4616] Exception stack(0xed949fa8 to 0xed949ff0) [ 216.192613][ T4616] 9fa0: 00000000 00000000 00000003 76ffdf08 0000000f 00000000 [ 216.192654][ T4616] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76ffe0dc [ 216.192684][ T4616] 9fe0: 76ffde58 76ffde44 0010b9c4 001125a8 [ 216.300490][ T28] audit: type=1400 audit(216.230:1265): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 216.332054][ T28] audit: type=1400 audit(216.260:1266): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 216.517445][ T28] audit: type=1400 audit(216.450:1267): avc: denied { read write } for pid=4619 comm="syz.1.347" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 216.851859][ T4629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4629 comm=syz.0.351 [ 220.975658][ T28] kauditd_printk_skb: 55 callbacks suppressed [ 220.976158][ T28] audit: type=1400 audit(220.900:1323): avc: denied { create } for pid=4661 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.007986][ T28] audit: type=1400 audit(220.940:1324): avc: denied { read } for pid=4661 comm="syz.0.366" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 221.132487][ T28] audit: type=1400 audit(221.060:1325): avc: denied { read } for pid=4661 comm="syz.0.366" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 221.137022][ T28] audit: type=1400 audit(221.070:1326): avc: denied { create } for pid=4661 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.138599][ T28] audit: type=1400 audit(221.070:1327): avc: denied { create } for pid=4661 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.183239][ T28] audit: type=1400 audit(221.110:1328): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 221.948494][ T28] audit: type=1400 audit(221.880:1329): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 222.205629][ T28] audit: type=1400 audit(222.130:1330): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 222.400937][ T28] audit: type=1400 audit(222.330:1331): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 222.593751][ T28] audit: type=1400 audit(222.520:1332): avc: denied { read write } for pid=4671 comm="syz.0.369" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 225.992058][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 225.992337][ T28] audit: type=1400 audit(225.920:1371): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.015448][ T28] audit: type=1400 audit(225.940:1372): avc: denied { create } for pid=4698 comm="syz.1.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 226.156658][ T28] audit: type=1400 audit(226.090:1373): avc: denied { create } for pid=4698 comm="syz.1.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 226.208066][ T28] audit: type=1400 audit(226.140:1374): avc: denied { write } for pid=4698 comm="syz.1.381" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 226.279562][ T28] audit: type=1400 audit(226.210:1375): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.356068][ T28] audit: type=1400 audit(226.290:1376): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.778105][ T28] audit: type=1400 audit(226.710:1377): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.980923][ T28] audit: type=1400 audit(226.910:1378): avc: denied { read write } for pid=4711 comm="syz.1.386" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 227.025976][ T28] audit: type=1400 audit(226.960:1379): avc: denied { read } for pid=4711 comm="syz.1.386" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 227.227329][ T28] audit: type=1400 audit(227.160:1380): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 231.007751][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 231.008191][ T28] audit: type=1400 audit(230.940:1408): avc: denied { read } for pid=4742 comm="syz.0.400" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 231.116657][ T28] audit: type=1400 audit(231.050:1409): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 231.236968][ T28] audit: type=1400 audit(231.170:1410): avc: denied { create } for pid=4742 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 231.307444][ T28] audit: type=1400 audit(231.240:1411): avc: denied { read } for pid=4744 comm="syz.1.401" name="userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 231.442004][ T28] audit: type=1400 audit(231.370:1412): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 231.481877][ T28] audit: type=1400 audit(231.410:1413): avc: denied { create } for pid=4744 comm="syz.1.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 231.507105][ T28] audit: type=1400 audit(231.440:1414): avc: denied { create } for pid=4744 comm="syz.1.401" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 231.646461][ T28] audit: type=1400 audit(231.580:1415): avc: denied { create } for pid=4746 comm="syz.0.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 231.673893][ T28] audit: type=1400 audit(231.600:1416): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 231.902349][ T28] audit: type=1400 audit(231.830:1417): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 232.020607][ T4751] FAULT_INJECTION: forcing a failure. [ 232.020607][ T4751] name failslab, interval 1, probability 0, space 0, times 0 [ 232.025435][ T4751] CPU: 0 UID: 0 PID: 4751 Comm: syz.0.405 Not tainted syzkaller #0 PREEMPT [ 232.025519][ T4751] Hardware name: ARM-Versatile Express [ 232.025532][ T4751] Call trace: [ 232.025555][ T4751] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 232.025614][ T4751] r7:60000113 r6:60000113 r5:8231c340 r4:00000000 [ 232.025623][ T4751] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 232.025649][ T4751] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 232.025679][ T4751] r7:00000000 r6:00000000 r5:83bac980 r4:82b17e08 [ 232.025686][ T4751] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 232.025738][ T4751] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 232.025890][ T4751] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:0000001e [ 232.025899][ T4751] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 232.025929][ T4751] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 232.025968][ T4751] r10:00000fff r9:85d04000 r8:00000000 r7:858b9110 r6:861b0528 r5:86021ffd [ 232.025977][ T4751] r4:86021fea [ 232.025985][ T4751] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 232.026021][ T4751] r9:85d04000 r8:00000000 r7:858b9110 r6:861b0528 r5:86022000 r4:86021feb [ 232.026030][ T4751] [<8080b324>] (tomoyo_encode) from [<8080b3d4>] (tomoyo_realpath_from_path+0x80/0x16c) [ 232.026062][ T4751] r5:86022000 r4:86021000 [ 232.026069][ T4751] [<8080b354>] (tomoyo_realpath_from_path) from [<80807708>] (tomoyo_check_open_permission+0x150/0x1c0) [ 232.026105][ T4751] r10:ee021f18 r9:85653e00 r8:00000000 r7:861b0528 r6:00000004 r5:00000000 [ 232.026116][ T4751] r4:00000001 r3:00000001 [ 232.026124][ T4751] [<808075b8>] (tomoyo_check_open_permission) from [<8080c234>] (tomoyo_file_open+0x34/0x38) [ 232.026157][ T4751] r9:861b0500 r8:861b0528 r7:00000000 r6:8452cf18 r5:81c2378c r4:861b0500 [ 232.026165][ T4751] [<8080c200>] (tomoyo_file_open) from [<807c7b70>] (security_file_open+0x70/0x184) [ 232.026195][ T4751] r5:81c2378c r4:861b0500 [ 232.026202][ T4751] [<807c7b00>] (security_file_open) from [<8057b8ec>] (do_dentry_open+0xe4/0x508) [ 232.026231][ T4751] r5:81c2378c r4:861b0500 [ 232.026239][ T4751] [<8057b808>] (do_dentry_open) from [<8057d498>] (vfs_open+0x2c/0xe8) [ 232.026286][ T4751] r9:861b0500 r8:ee021e50 r7:85891a18 r6:861b0528 r5:82b1ed40 r4:861b0500 [ 232.026295][ T4751] [<8057d46c>] (vfs_open) from [<80597abc>] (path_openat+0x7e0/0x1214) [ 232.026327][ T4751] r6:00000000 r5:82b1ed40 r4:00000000 [ 232.026335][ T4751] [<805972dc>] (path_openat) from [<805985a8>] (do_file_open+0xb8/0x150) [ 232.026366][ T4751] r10:00000142 r9:83bac980 r8:00000001 r7:ffffff9c r6:ee021f18 r5:83bac980 [ 232.026376][ T4751] r4:8387e6c0 [ 232.026383][ T4751] [<805984f0>] (do_file_open) from [<8057d930>] (do_sys_openat2+0x8c/0xf0) [ 232.026413][ T4751] r8:8020029c r7:20004280 r6:ffffff9c r5:8387e6c0 r4:00000004 [ 232.026421][ T4751] [<8057d8a4>] (do_sys_openat2) from [<8057dd0c>] (sys_openat+0x80/0xd0) [ 232.026452][ T4751] r7:00000142 r6:00000000 r5:20004280 r4:ffffff9c [ 232.026460][ T4751] [<8057dc8c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 232.026484][ T4751] Exception stack(0xee021fa8 to 0xee021ff0) [ 232.026504][ T4751] 1fa0: 00000000 00000000 ffffff9c 20004280 00000000 00000234 [ 232.026537][ T4751] 1fc0: 00000000 00000000 0012f1a4 00000142 003462d8 00000000 00000001 76f800dc [ 232.026559][ T4751] 1fe0: 76f7fe88 76f7fe78 00018e58 001307a0 [ 232.026574][ T4751] r6:0012f1a4 r5:00000000 r4:00000000 [ 232.095638][ T4751] ERROR: Out of memory at tomoyo_realpath_from_path. [ 233.081948][ T4767] FAULT_INJECTION: forcing a failure. [ 233.081948][ T4767] name failslab, interval 1, probability 0, space 0, times 0 [ 233.084207][ T4767] CPU: 0 UID: 0 PID: 4767 Comm: syz.0.410 Not tainted syzkaller #0 PREEMPT [ 233.084287][ T4767] Hardware name: ARM-Versatile Express [ 233.084301][ T4767] Call trace: [ 233.084323][ T4767] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 233.084379][ T4767] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 233.084388][ T4767] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 233.084414][ T4767] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 233.084443][ T4767] r7:8527a080 r6:00000000 r5:83babd40 r4:82b17e08 [ 233.084451][ T4767] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 233.084480][ T4767] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 233.084520][ T4767] r8:83babd40 r7:8527a080 r6:00000cc0 r5:00000000 r4:830c4c00 [ 233.084529][ T4767] [<8054ef68>] (should_failslab) from [<8052c6a0>] (kmem_cache_alloc_lru_noprof+0x58/0x3c4) [ 233.084557][ T4767] [<8052c648>] (kmem_cache_alloc_lru_noprof) from [<805a9874>] (alloc_inode+0xa0/0xd0) [ 233.084592][ T4767] r10:830c0c00 r9:81c23d40 r8:00000000 r7:8527a080 r6:81c23c40 r5:830c0c00 [ 233.084602][ T4767] r4:830ed9d0 [ 233.084610][ T4767] [<805a97d4>] (alloc_inode) from [<805c1930>] (path_from_stashed+0xc4/0x208) [ 233.084638][ T4767] r7:8527a080 r6:8527a0c4 r5:ee0c9e84 r4:830ed9d0 [ 233.084646][ T4767] [<805c186c>] (path_from_stashed) from [<805d616c>] (open_namespace+0x48/0xd4) [ 233.084687][ T4767] r10:83babd40 r9:00000003 r8:85679680 r7:8527a000 r6:83babd40 r5:00000000 [ 233.084732][ T4767] r4:0000894c [ 233.084744][ T4767] [<805d6124>] (open_namespace) from [<805d6214>] (open_related_ns+0x1c/0x20) [ 233.084775][ T4767] r6:00000000 r5:8365c2c0 r4:0000894c [ 233.084783][ T4767] [<805d61f8>] (open_related_ns) from [<815e0598>] (sock_ioctl+0x350/0x4c0) [ 233.084830][ T4767] [<815e0248>] (sock_ioctl) from [<8059c2ac>] (sys_ioctl+0x244/0xb5c) [ 233.084876][ T4767] r9:00000003 r8:85679680 r7:00000000 r6:0000894c r5:85679681 r4:00000000 [ 233.084886][ T4767] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 233.084909][ T4767] Exception stack(0xee0c9fa8 to 0xee0c9ff0) [ 233.084934][ T4767] 9fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 233.084953][ T4767] 9fc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76f800dc [ 233.084967][ T4767] 9fe0: 76f7fe88 76f7fe78 00018e58 001307a0 [ 233.084984][ T4767] r10:00000036 r9:83babd40 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 233.084993][ T4767] r4:00000000 [ 236.138340][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 236.138704][ T28] audit: type=1400 audit(236.070:1468): avc: denied { read } for pid=4782 comm="syz.0.417" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 240.093646][ T28] audit: type=1400 audit(240.020:1469): avc: denied { create } for pid=4782 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 240.318853][ T28] audit: type=1400 audit(240.250:1470): avc: denied { read } for pid=4782 comm="syz.0.417" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 241.928773][ T28] audit: type=1400 audit(241.860:1471): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 242.547159][ T28] audit: type=1400 audit(242.480:1472): avc: denied { read write } for pid=4786 comm="syz.1.418" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 242.878387][ T28] audit: type=1400 audit(242.810:1473): avc: denied { read } for pid=4786 comm="syz.1.418" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 243.006414][ T28] audit: type=1400 audit(242.870:1474): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 243.359597][ T28] audit: type=1400 audit(243.290:1475): avc: denied { create } for pid=4782 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 243.367089][ T28] audit: type=1400 audit(243.300:1476): avc: denied { create } for pid=4789 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 243.456624][ T28] audit: type=1400 audit(243.390:1477): avc: denied { read } for pid=4789 comm="syz.1.419" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 243.606512][ T28] audit: type=1400 audit(243.540:1478): avc: denied { create } for pid=4789 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 243.732854][ T28] audit: type=1400 audit(243.660:1479): avc: denied { read write } for pid=4789 comm="syz.1.419" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 243.779821][ T28] audit: type=1400 audit(243.710:1480): avc: denied { read } for pid=4782 comm="syz.0.417" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 247.335696][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 247.336250][ T28] audit: type=1400 audit(247.260:1490): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 247.603900][ T28] audit: type=1400 audit(247.530:1491): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 247.738741][ T28] audit: type=1400 audit(247.660:1492): avc: denied { read write } for pid=4797 comm="syz.1.423" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 247.770277][ T28] audit: type=1400 audit(247.700:1493): avc: denied { read } for pid=4797 comm="syz.1.423" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 247.805758][ T28] audit: type=1400 audit(247.730:1494): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 247.818340][ T28] audit: type=1400 audit(247.750:1495): avc: denied { create } for pid=4795 comm="syz.0.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 247.839236][ T28] audit: type=1400 audit(247.770:1496): avc: denied { read } for pid=4795 comm="syz.0.422" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 247.849024][ T28] audit: type=1400 audit(247.780:1497): avc: denied { create } for pid=4795 comm="syz.0.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 247.929408][ T28] audit: type=1400 audit(247.860:1498): avc: denied { create } for pid=4795 comm="syz.0.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 248.049905][ T28] audit: type=1400 audit(247.980:1499): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 248.639102][ T4805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4805 comm=syz.1.426 [ 252.427380][ T28] kauditd_printk_skb: 72 callbacks suppressed [ 252.427881][ T28] audit: type=1400 audit(252.360:1572): avc: denied { read } for pid=4832 comm="syz.0.439" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 252.509681][ T28] audit: type=1400 audit(252.440:1573): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 252.515653][ T28] audit: type=1400 audit(252.450:1574): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 252.596895][ T28] audit: type=1400 audit(252.530:1575): avc: denied { create } for pid=4837 comm="syz.1.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 252.604174][ T28] audit: type=1400 audit(252.530:1576): avc: denied { read } for pid=4837 comm="syz.1.441" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 252.618705][ T28] audit: type=1400 audit(252.550:1577): avc: denied { create } for pid=4837 comm="syz.1.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 252.684170][ T28] audit: type=1400 audit(252.610:1578): avc: granted { setsecparam } for pid=4839 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 252.717850][ T28] audit: type=1400 audit(252.650:1579): avc: denied { read } for pid=4839 comm="syz.0.442" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 252.748972][ T28] audit: type=1400 audit(252.680:1580): avc: denied { create } for pid=4837 comm="syz.1.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 252.794661][ T28] audit: type=1400 audit(252.720:1581): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 256.656196][ T4869] SELinux: syz.0.454 (4869) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 257.485750][ T4876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4876 comm=syz.1.456 [ 257.489806][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 257.490162][ T28] audit: type=1400 audit(257.420:1631): avc: denied { read write } for pid=4875 comm="syz.1.456" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 257.495787][ T28] audit: type=1400 audit(257.430:1632): avc: denied { create } for pid=4875 comm="syz.1.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=0 [ 257.500301][ T28] audit: type=1400 audit(257.430:1633): avc: denied { create } for pid=4875 comm="syz.1.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 257.939565][ T28] audit: type=1400 audit(257.870:1634): avc: denied { create } for pid=4875 comm="syz.1.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 258.154057][ T28] audit: type=1400 audit(258.080:1635): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 258.267079][ T28] audit: type=1400 audit(258.200:1636): avc: denied { create } for pid=4877 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 258.347336][ T28] audit: type=1400 audit(258.280:1637): avc: denied { read } for pid=4877 comm="syz.1.457" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 258.377395][ T28] audit: type=1400 audit(258.310:1638): avc: denied { create } for pid=4877 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 258.469661][ T28] audit: type=1400 audit(258.400:1639): avc: denied { read } for pid=4877 comm="syz.1.457" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 258.667734][ T28] audit: type=1400 audit(258.600:1640): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.667355][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 262.667828][ T28] audit: type=1400 audit(262.600:1664): avc: denied { create } for pid=4892 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.679632][ T28] audit: type=1400 audit(262.610:1665): avc: denied { create } for pid=4892 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.749774][ T28] audit: type=1400 audit(262.680:1666): avc: denied { create } for pid=4892 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.768284][ T28] audit: type=1400 audit(262.700:1667): avc: denied { create } for pid=4892 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.804182][ T28] audit: type=1400 audit(262.730:1668): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.896708][ T28] audit: type=1400 audit(262.830:1669): avc: denied { create } for pid=4892 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.982998][ T28] audit: type=1400 audit(262.910:1670): avc: denied { create } for pid=4892 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 263.115739][ T28] audit: type=1400 audit(263.040:1671): avc: denied { mounton } for pid=4894 comm="syz.1.464" path="/233/file1" dev="tmpfs" ino=1250 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 263.145359][ T28] audit: type=1400 audit(263.070:1672): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 263.325876][ T4895] capability: warning: `syz.1.464' uses deprecated v2 capabilities in a way that may be insecure [ 263.535738][ T28] audit: type=1400 audit(263.460:1673): avc: denied { read write } for pid=4896 comm="syz.0.465" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 267.686627][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 267.686956][ T28] audit: type=1400 audit(267.620:1700): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 267.778782][ T28] audit: type=1400 audit(267.710:1701): avc: denied { create } for pid=4916 comm="syz.0.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.936358][ T28] audit: type=1400 audit(267.870:1702): avc: denied { read } for pid=4916 comm="syz.0.472" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 268.000912][ T28] audit: type=1400 audit(267.930:1703): avc: denied { read write } for pid=4918 comm="syz.1.473" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 268.011104][ T28] audit: type=1400 audit(267.940:1704): avc: denied { mounton } for pid=4918 comm="syz.1.473" path="/237/file0" dev="tmpfs" ino=1274 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 268.205464][ T28] audit: type=1400 audit(268.130:1705): avc: denied { create } for pid=4916 comm="syz.0.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 268.240854][ T28] audit: type=1400 audit(268.170:1706): avc: denied { create } for pid=4918 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 268.350131][ T28] audit: type=1400 audit(268.280:1707): avc: denied { read } for pid=4916 comm="syz.0.472" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 268.409931][ T28] audit: type=1400 audit(268.340:1708): avc: denied { read write } for pid=4916 comm="syz.0.472" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 268.562146][ T28] audit: type=1400 audit(268.490:1709): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 268.807667][ T4921] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4921 comm=syz.0.474 [ 271.768024][ T4930] FAULT_INJECTION: forcing a failure. [ 271.768024][ T4930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 271.769814][ T4930] CPU: 0 UID: 0 PID: 4930 Comm: syz.0.477 Not tainted syzkaller #0 PREEMPT [ 271.769915][ T4930] Hardware name: ARM-Versatile Express [ 271.769941][ T4930] Call trace: [ 271.769980][ T4930] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 271.770079][ T4930] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 271.770097][ T4930] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 271.770146][ T4930] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 271.770232][ T4930] r7:00000000 r6:00000000 r5:847b4980 r4:82b4ee88 [ 271.770248][ T4930] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 271.770314][ T4930] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 271.770380][ T4930] r8:76f7ff08 r7:00000000 r6:00000000 r5:df9d9f68 r4:00000002 [ 271.770396][ T4930] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 271.770449][ T4930] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 271.770503][ T4930] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 271.770568][ T4930] r10:80643b14 r9:00000001 r8:00000002 r7:df9d9f68 r6:0000000f r5:76f7ff08 [ 271.770590][ T4930] r4:847b4980 r3:df9d9e9f [ 271.770608][ T4930] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 271.770675][ T4930] r8:847b4980 r7:df9d9f68 r6:76f7ff08 r5:861b1880 r4:0000000f [ 271.770693][ T4930] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 271.770753][ T4930] r10:00000003 r9:847b4980 r8:8020029c r7:00000000 r6:00000000 r5:861b1880 [ 271.770770][ T4930] r4:861b1883 [ 271.770785][ T4930] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 271.770845][ T4930] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 271.770861][ T4930] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 271.770909][ T4930] Exception stack(0xdf9d9fa8 to 0xdf9d9ff0) [ 271.770948][ T4930] 9fa0: 00000000 00000000 00000005 76f7ff08 0000000f 00000000 [ 271.770982][ T4930] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f800dc [ 271.771009][ T4930] 9fe0: 76f7fe58 76f7fe44 0010b9c4 001125a8 [ 272.915311][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 272.915648][ T28] audit: type=1400 audit(272.830:1735): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.027457][ T28] audit: type=1400 audit(272.960:1736): avc: denied { read write } for pid=4935 comm="syz.0.481" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.117338][ T28] audit: type=1400 audit(273.050:1737): avc: denied { create } for pid=4937 comm="syz.1.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 273.134584][ T28] audit: type=1400 audit(273.060:1738): avc: denied { read write } for pid=4937 comm="syz.1.482" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.156846][ T28] audit: type=1400 audit(273.090:1739): avc: denied { setattr } for pid=4937 comm="syz.1.482" name="" dev="pipefs" ino=6622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 273.160589][ T28] audit: type=1400 audit(273.090:1740): avc: denied { read } for pid=4937 comm="syz.1.482" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 273.467478][ T28] audit: type=1400 audit(273.400:1741): avc: denied { read } for pid=4935 comm="syz.0.481" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 273.597695][ T28] audit: type=1400 audit(273.530:1743): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.676790][ T28] audit: type=1400 audit(273.500:1742): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 274.089713][ T28] audit: type=1400 audit(274.020:1744): avc: denied { read } for pid=4940 comm="syz.0.484" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 277.402510][ T4955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=30768 sclass=netlink_route_socket pid=4955 comm=syz.0.489 [ 278.072649][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 278.073012][ T28] audit: type=1400 audit(278.000:1772): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 278.585924][ T28] audit: type=1400 audit(278.490:1773): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 278.738520][ T28] audit: type=1400 audit(278.670:1774): avc: denied { create } for pid=4946 comm="syz.1.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 278.826430][ T28] audit: type=1400 audit(278.760:1775): avc: denied { read } for pid=4961 comm="syz.0.492" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 278.942572][ T28] audit: type=1400 audit(278.870:1776): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 279.307285][ T28] audit: type=1400 audit(279.240:1777): avc: denied { read write } for pid=4963 comm="syz.0.493" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 279.438599][ T28] audit: type=1400 audit(279.370:1778): avc: denied { read } for pid=4963 comm="syz.0.493" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 279.541961][ T28] audit: type=1400 audit(279.470:1779): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 279.740955][ T28] audit: type=1400 audit(279.670:1780): avc: denied { create } for pid=4966 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 279.765002][ T28] audit: type=1400 audit(279.690:1781): avc: denied { create } for pid=4966 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 283.126670][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 283.127077][ T28] audit: type=1400 audit(283.060:1801): avc: denied { create } for pid=4977 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 283.136112][ T28] audit: type=1400 audit(283.070:1802): avc: denied { read write } for pid=4977 comm="syz.0.499" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.488711][ T28] audit: type=1400 audit(283.420:1803): avc: denied { read append } for pid=4946 comm="syz.1.486" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.536363][ T28] audit: type=1400 audit(283.470:1804): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 283.708243][ T28] audit: type=1400 audit(283.640:1805): avc: denied { create } for pid=4979 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 283.738154][ T28] audit: type=1400 audit(283.670:1806): avc: denied { read } for pid=4979 comm="syz.0.500" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.975401][ T28] audit: type=1400 audit(283.900:1807): avc: denied { create } for pid=4979 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 283.990065][ T28] audit: type=1400 audit(283.920:1808): avc: denied { read } for pid=4979 comm="syz.0.500" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.996331][ T28] audit: type=1400 audit(283.930:1809): avc: denied { read write } for pid=4979 comm="syz.0.500" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 284.195928][ T28] audit: type=1400 audit(284.110:1810): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 285.498953][ T4993] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4993 comm=syz.0.506 [ 288.516882][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 288.517343][ T28] audit: type=1400 audit(288.450:1854): avc: denied { read write } for pid=5005 comm="syz.1.512" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 288.747097][ T28] audit: type=1400 audit(288.680:1855): avc: denied { read } for pid=5005 comm="syz.1.512" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 288.831729][ T28] audit: type=1400 audit(288.760:1856): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 288.988876][ T28] audit: type=1400 audit(288.920:1857): avc: denied { read append } for pid=4994 comm="syz.0.507" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 289.236531][ T28] audit: type=1400 audit(289.170:1858): avc: denied { create } for pid=5009 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 289.409761][ T28] audit: type=1400 audit(289.340:1859): avc: denied { execute } for pid=5009 comm="syz.1.513" path="/selinux/mls" dev="selinuxfs" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=0 [ 289.496472][ T28] audit: type=1400 audit(289.430:1860): avc: denied { create } for pid=5009 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 289.578623][ T28] audit: type=1400 audit(289.510:1861): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.837604][ T28] audit: type=1400 audit(289.770:1862): avc: denied { create } for pid=5011 comm="syz.1.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 289.850159][ T28] audit: type=1400 audit(289.780:1863): avc: denied { read } for pid=5011 comm="syz.1.514" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 293.621357][ T5027] netlink: 40 bytes leftover after parsing attributes in process `syz.0.524'. [ 293.637922][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 293.638349][ T28] audit: type=1400 audit(293.570:1881): avc: denied { module_request } for pid=5025 comm="syz.0.524" kmod="netdev-syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 293.638607][ T28] audit: type=1400 audit(293.570:1882): avc: denied { sys_module } for pid=5025 comm="syz.0.524" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 293.699110][ T5027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5027 comm=syz.0.524 [ 293.707562][ T28] audit: type=1400 audit(293.640:1883): avc: denied { create } for pid=5025 comm="syz.0.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 293.713129][ T28] audit: type=1400 audit(293.640:1884): avc: denied { create } for pid=5026 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 293.747959][ T28] audit: type=1400 audit(293.680:1885): avc: denied { create } for pid=5025 comm="syz.0.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 293.836857][ T5027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5027 comm=syz.0.524 [ 293.907539][ T28] audit: type=1400 audit(293.840:1886): avc: denied { read } for pid=5026 comm="syz.1.520" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 294.220588][ T28] audit: type=1400 audit(294.150:1887): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 294.675342][ T28] audit: type=1400 audit(294.600:1888): avc: denied { create } for pid=5029 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 294.687055][ T28] audit: type=1400 audit(294.620:1889): avc: denied { read append } for pid=5029 comm="syz.0.521" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 294.817327][ T28] audit: type=1400 audit(294.750:1890): avc: denied { create } for pid=5029 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 299.945838][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 299.946312][ T28] audit: type=1400 audit(299.870:1903): avc: denied { create } for pid=5026 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 308.465205][ T28] audit: type=1400 audit(308.390:1904): avc: denied { create } for pid=5034 comm="syz.0.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 308.645447][ T28] audit: type=1400 audit(308.570:1905): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 309.288303][ T28] audit: type=1400 audit(309.220:1906): avc: denied { execute } for pid=5039 comm="syz.1.525" name="file0" dev="tmpfs" ino=1383 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 309.292361][ T28] audit: type=1400 audit(309.220:1907): avc: denied { execute } for pid=5039 comm="syz.1.525" name="file0" dev="tmpfs" ino=1383 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 309.315436][ T28] audit: type=1400 audit(309.240:1908): avc: denied { read append } for pid=5039 comm="syz.1.525" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 309.395283][ T28] audit: type=1400 audit(309.320:1909): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 309.548284][ T28] audit: type=1400 audit(309.480:1910): avc: denied { read } for pid=5042 comm="syz.1.526" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 309.568039][ T28] audit: type=1400 audit(309.500:1911): avc: denied { read write } for pid=5042 comm="syz.1.526" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 309.616177][ T28] audit: type=1400 audit(309.550:1912): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 309.896948][ T28] audit: type=1400 audit(309.820:1913): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 318.925348][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 318.925965][ T28] audit: type=1400 audit(318.850:1939): avc: denied { create } for pid=5048 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 318.926096][ T28] audit: type=1400 audit(318.850:1940): avc: denied { read } for pid=5048 comm="syz.1.529" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 322.378439][ T28] audit: type=1400 audit(322.310:1941): avc: denied { create } for pid=5048 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 323.270149][ T28] audit: type=1400 audit(323.200:1942): avc: denied { read } for pid=5048 comm="syz.1.529" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 325.839000][ T28] audit: type=1400 audit(325.770:1943): avc: denied { create } for pid=5055 comm="syz.0.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 325.847418][ T28] audit: type=1400 audit(325.770:1944): avc: denied { create } for pid=5055 comm="syz.0.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 325.851897][ T28] audit: type=1400 audit(325.780:1945): avc: denied { create } for pid=5055 comm="syz.0.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 325.898192][ T28] audit: type=1400 audit(325.830:1946): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 326.142562][ T28] audit: type=1400 audit(326.070:1947): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 326.197366][ T28] audit: type=1400 audit(326.130:1948): avc: denied { create } for pid=5057 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 326.367304][ T28] audit: type=1400 audit(326.300:1949): avc: denied { read write } for pid=5059 comm="syz.0.533" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 326.469875][ T28] audit: type=1400 audit(326.400:1950): avc: granted { setsecparam } for pid=5059 comm="syz.0.533" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 326.479144][ T28] audit: type=1400 audit(326.410:1951): avc: denied { read } for pid=5059 comm="syz.0.533" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 326.575974][ T28] audit: type=1400 audit(326.510:1952): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.423223][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 331.423597][ T28] audit: type=1400 audit(331.350:1960): avc: denied { read append } for pid=5061 comm="syz.0.534" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.823219][ T28] audit: type=1400 audit(331.750:1961): avc: denied { read } for pid=5064 comm="syz.1.535" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 332.792172][ T28] audit: type=1400 audit(332.720:1962): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 333.155623][ T28] audit: type=1400 audit(333.080:1963): avc: denied { module_request } for pid=5068 comm="syz.1.537" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 333.156126][ T28] audit: type=1400 audit(333.080:1964): avc: denied { sys_module } for pid=5068 comm="syz.1.537" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 333.229793][ T28] audit: type=1400 audit(333.160:1965): avc: denied { create } for pid=5068 comm="syz.1.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 333.347806][ T28] audit: type=1400 audit(333.280:1966): avc: denied { module_request } for pid=5068 comm="syz.1.537" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 333.349618][ T28] audit: type=1400 audit(333.280:1967): avc: denied { sys_module } for pid=5068 comm="syz.1.537" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 333.461671][ T28] audit: type=1400 audit(333.390:1968): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 333.897557][ T28] audit: type=1400 audit(333.830:1969): avc: denied { create } for pid=5070 comm="syz.1.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 336.482750][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 336.489979][ T28] audit: type=1400 audit(336.410:1977): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 336.997424][ T28] audit: type=1400 audit(336.930:1978): avc: denied { relabelfrom } for pid=5075 comm="syz.0.540" name="" dev="pipefs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 337.145665][ T28] audit: type=1400 audit(337.070:1979): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 337.211699][ T28] audit: type=1400 audit(337.140:1980): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 337.335510][ T28] audit: type=1400 audit(337.260:1981): avc: denied { create } for pid=5077 comm="syz.1.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 337.356390][ T28] audit: type=1400 audit(337.280:1982): avc: denied { read } for pid=5077 comm="syz.1.541" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 337.770459][ T28] audit: type=1400 audit(337.700:1983): avc: denied { create } for pid=5079 comm="syz.0.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=0 [ 337.966917][ T28] audit: type=1400 audit(337.900:1984): avc: denied { read } for pid=5079 comm="syz.0.542" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 337.982808][ T28] audit: type=1400 audit(337.910:1985): avc: denied { read } for pid=5079 comm="syz.0.542" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 338.120838][ T28] audit: type=1400 audit(338.050:1986): avc: denied { read } for pid=5079 comm="syz.0.542" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 341.522849][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 341.523237][ T28] audit: type=1400 audit(341.450:1993): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 342.587775][ T28] audit: type=1400 audit(342.520:1994): avc: denied { create } for pid=5091 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 342.648498][ T28] audit: type=1400 audit(342.580:1995): avc: denied { create } for pid=5091 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 342.711254][ T28] audit: type=1400 audit(342.640:1996): avc: denied { read } for pid=5091 comm="syz.1.545" name="controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 342.768127][ T28] audit: type=1400 audit(342.700:1997): avc: denied { create } for pid=5091 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 343.950784][ T28] audit: type=1400 audit(343.880:1998): avc: denied { create } for pid=5088 comm="syz.0.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 344.906834][ T28] audit: type=1400 audit(344.840:1999): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 345.788025][ T28] audit: type=1400 audit(345.720:2000): avc: denied { relabelfrom } for pid=5094 comm="syz.1.546" name="" dev="pipefs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 346.121476][ T28] audit: type=1400 audit(346.050:2001): avc: denied { create } for pid=5088 comm="syz.0.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 346.142152][ T28] audit: type=1400 audit(346.070:2002): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 346.799718][ T28] audit: type=1400 audit(346.730:2003): avc: denied { read write } for pid=5096 comm="syz.1.547" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 346.837620][ T28] audit: type=1400 audit(346.770:2004): avc: denied { read write } for pid=5096 comm="syz.1.547" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 347.008500][ T28] audit: type=1400 audit(346.940:2005): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 347.679347][ T28] audit: type=1400 audit(347.610:2006): avc: denied { read append } for pid=5088 comm="syz.0.544" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 347.784215][ T28] audit: type=1400 audit(347.710:2007): avc: denied { create } for pid=5098 comm="syz.1.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 347.809218][ T28] audit: type=1400 audit(347.740:2008): avc: denied { create } for pid=5098 comm="syz.1.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 347.832735][ T28] audit: type=1400 audit(347.760:2009): avc: denied { create } for pid=5098 comm="syz.1.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 348.047066][ T28] audit: type=1400 audit(347.980:2010): avc: denied { nlmsg_write } for pid=5098 comm="syz.1.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 348.402826][ T28] audit: type=1400 audit(348.330:2011): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 349.045749][ T28] audit: type=1400 audit(348.970:2012): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 352.412420][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 352.415415][ T28] audit: type=1400 audit(352.340:2018): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 352.845476][ T28] audit: type=1400 audit(352.750:2019): avc: denied { relabelfrom } for pid=5106 comm="syz.1.551" name="" dev="pipefs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 353.193276][ T28] audit: type=1400 audit(353.120:2020): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.381410][ T28] audit: type=1400 audit(353.310:2021): avc: denied { create } for pid=5110 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 353.540567][ T28] audit: type=1400 audit(353.470:2022): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.965651][ T28] audit: type=1400 audit(353.880:2023): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 354.261082][ T28] audit: type=1400 audit(354.190:2024): avc: denied { create } for pid=5113 comm="syz.0.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 354.444091][ T28] audit: type=1400 audit(354.370:2025): avc: denied { read write } for pid=5113 comm="syz.0.554" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 354.991440][ T28] audit: type=1400 audit(354.920:2026): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 355.927567][ T28] audit: type=1400 audit(355.860:2027): avc: denied { create } for pid=5118 comm="syz.0.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 357.631608][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 357.632013][ T28] audit: type=1400 audit(357.560:2032): avc: denied { relabelfrom } for pid=5121 comm="syz.1.557" name="" dev="pipefs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 357.994454][ T28] audit: type=1400 audit(357.920:2033): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 358.013866][ T28] audit: type=1400 audit(357.940:2034): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 358.329528][ T28] audit: type=1400 audit(358.260:2035): avc: denied { read write } for pid=5123 comm="syz.0.559" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 358.737918][ T28] audit: type=1400 audit(358.670:2036): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 359.035406][ T28] audit: type=1400 audit(358.960:2037): avc: denied { read } for pid=5125 comm="syz.1.558" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 359.448932][ T28] audit: type=1400 audit(359.380:2038): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 359.705969][ T28] audit: type=1400 audit(359.620:2039): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 360.195500][ T28] audit: type=1400 audit(360.120:2040): avc: denied { read } for pid=5132 comm="syz.0.562" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 360.439667][ T28] audit: type=1400 audit(360.370:2041): avc: denied { write } for pid=5132 comm="syz.0.562" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 362.670052][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 362.671268][ T28] audit: type=1400 audit(362.600:2047): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 363.221424][ T28] audit: type=1400 audit(363.150:2048): avc: denied { read write } for pid=5138 comm="syz.1.564" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 363.525146][ T28] audit: type=1400 audit(363.450:2049): avc: denied { write } for pid=5138 comm="syz.1.564" name="event0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 363.765378][ T28] audit: type=1400 audit(363.690:2050): avc: denied { read write } for pid=5138 comm="syz.1.564" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 364.115190][ T28] audit: type=1400 audit(364.030:2051): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 364.396861][ T28] audit: type=1400 audit(364.330:2052): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 364.633950][ T28] audit: type=1400 audit(364.560:2053): avc: denied { read append } for pid=5140 comm="syz.0.565" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 364.885348][ T28] audit: type=1400 audit(364.810:2054): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 365.242254][ T28] audit: type=1400 audit(365.170:2055): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 365.391818][ T28] audit: type=1400 audit(365.320:2056): avc: denied { write } for pid=5144 comm="syz.0.571" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 368.349446][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 368.349814][ T28] audit: type=1400 audit(368.280:2067): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 369.003439][ T28] audit: type=1400 audit(368.930:2068): avc: denied { read } for pid=5154 comm="syz.0.570" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 369.127234][ T5155] syz.0.570(5155): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 369.265440][ T28] audit: type=1400 audit(369.170:2069): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 369.451833][ T28] audit: type=1400 audit(369.380:2070): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 369.637660][ T28] audit: type=1400 audit(369.570:2071): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 370.139087][ T28] audit: type=1400 audit(370.070:2072): avc: denied { read } for pid=5158 comm="syz.1.573" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 370.167817][ T28] audit: type=1400 audit(370.100:2073): avc: denied { read append } for pid=5158 comm="syz.1.573" name="controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 370.198655][ T28] audit: type=1400 audit(370.130:2074): avc: denied { create } for pid=5159 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 370.239206][ T28] audit: type=1400 audit(370.170:2075): avc: denied { create } for pid=5158 comm="syz.1.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 370.297996][ T28] audit: type=1400 audit(370.230:2076): avc: denied { create } for pid=5159 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 373.385499][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 373.385829][ T28] audit: type=1400 audit(373.290:2099): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 373.701089][ T28] audit: type=1400 audit(373.630:2100): avc: denied { create } for pid=5170 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=0 [ 373.905236][ T28] audit: type=1400 audit(373.830:2101): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 374.019262][ T28] audit: type=1400 audit(373.950:2102): avc: denied { create } for pid=5172 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 374.060668][ T28] audit: type=1400 audit(373.990:2103): avc: denied { create } for pid=5172 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 374.319322][ T28] audit: type=1400 audit(374.250:2104): avc: denied { create } for pid=5174 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 374.352310][ T28] audit: type=1400 audit(374.280:2105): avc: denied { read } for pid=5174 comm="syz.0.581" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 374.375528][ T28] audit: type=1400 audit(374.300:2106): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 375.086178][ T28] audit: type=1400 audit(375.020:2107): avc: denied { create } for pid=5176 comm="syz.1.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 375.120545][ T28] audit: type=1400 audit(375.050:2108): avc: denied { create } for pid=5176 comm="syz.1.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 377.313691][ T5184] FAULT_INJECTION: forcing a failure. [ 377.313691][ T5184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 377.313974][ T5184] CPU: 1 UID: 0 PID: 5184 Comm: syz.1.585 Not tainted syzkaller #0 PREEMPT [ 377.314022][ T5184] Hardware name: ARM-Versatile Express [ 377.314035][ T5184] Call trace: [ 377.314056][ T5184] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 377.314113][ T5184] r7:60000013 r6:60000013 r5:8231c340 r4:00000000 [ 377.314122][ T5184] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 377.314149][ T5184] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 377.314179][ T5184] r7:00000000 r6:00000000 r5:83be0c40 r4:82b4ee88 [ 377.314186][ T5184] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 377.314216][ T5184] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 377.314248][ T5184] r8:76ffdf08 r7:00000000 r6:00000000 r5:ea935f68 r4:00000002 [ 377.314256][ T5184] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 377.314283][ T5184] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 377.314310][ T5184] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 377.314343][ T5184] r10:80643b14 r9:00000001 r8:00000002 r7:ea935f68 r6:0000000f r5:76ffdf08 [ 377.314871][ T5184] r4:83be0c40 r3:ea935e9f [ 377.314882][ T5184] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 377.315769][ T5184] r8:83be0c40 r7:ea935f68 r6:76ffdf08 r5:861baa80 r4:0000000f [ 377.315810][ T5184] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 377.315929][ T5184] r10:00000003 r9:83be0c40 r8:8020029c r7:00000000 r6:00000000 r5:861baa80 [ 377.316099][ T5184] r4:861baa83 [ 377.316207][ T5184] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 377.316325][ T5184] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 377.316375][ T5184] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 377.316415][ T5184] Exception stack(0xea935fa8 to 0xea935ff0) [ 377.316440][ T5184] 5fa0: 00000000 00000000 00000008 76ffdf08 0000000f 00000000 [ 377.316457][ T5184] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76ffe0dc [ 377.316470][ T5184] 5fe0: 76ffde58 76ffde44 0010b9c4 001125a8 [ 378.434370][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 378.434636][ T28] audit: type=1400 audit(378.360:2149): avc: denied { search } for pid=5188 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 378.622916][ T28] audit: type=1400 audit(378.550:2150): avc: denied { search } for pid=5190 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 378.685104][ T28] audit: type=1400 audit(378.610:2151): avc: denied { search } for pid=5181 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 378.893384][ T28] audit: type=1400 audit(378.820:2152): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 379.872033][ T28] audit: type=1400 audit(379.800:2153): avc: denied { read } for pid=5194 comm="syz.0.587" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 380.659943][ T28] audit: type=1400 audit(380.590:2154): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 381.229573][ T28] audit: type=1400 audit(381.160:2155): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 381.331028][ T28] audit: type=1400 audit(381.260:2156): avc: denied { create } for pid=5196 comm="syz.0.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 381.390781][ T28] audit: type=1400 audit(381.320:2157): avc: denied { read } for pid=5196 comm="syz.0.588" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 383.795447][ T28] audit: type=1400 audit(383.720:2158): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 383.959983][ T28] audit: type=1400 audit(383.890:2159): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 385.256288][ T28] audit: type=1400 audit(385.180:2160): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 385.789148][ T28] audit: type=1400 audit(385.720:2161): avc: denied { create } for pid=5213 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.832639][ T28] audit: type=1400 audit(385.760:2162): avc: denied { create } for pid=5213 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.887464][ T28] audit: type=1400 audit(385.820:2163): avc: denied { create } for pid=5213 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 385.976220][ T28] audit: type=1400 audit(385.900:2164): avc: denied { create } for pid=5213 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 386.161251][ T28] audit: type=1400 audit(386.090:2165): avc: denied { read } for pid=5213 comm="syz.0.592" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 386.302246][ T28] audit: type=1400 audit(386.230:2166): avc: denied { create } for pid=5213 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 386.538986][ T28] audit: type=1400 audit(386.470:2167): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 389.100909][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 389.105884][ T28] audit: type=1400 audit(389.030:2179): avc: denied { mount } for pid=5225 comm="syz.0.597" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=0 [ 389.140166][ T28] audit: type=1400 audit(389.070:2180): avc: denied { create } for pid=5225 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=0 [ 389.298165][ T28] audit: type=1400 audit(389.230:2181): avc: denied { create } for pid=5225 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 389.710915][ T28] audit: type=1400 audit(389.640:2182): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 390.141938][ T28] audit: type=1400 audit(390.070:2183): avc: denied { read write } for pid=5227 comm="syz.0.598" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 390.537140][ T28] audit: type=1400 audit(390.470:2184): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 391.332820][ T28] audit: type=1400 audit(391.260:2185): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 391.346775][ T28] audit: type=1400 audit(391.280:2186): avc: denied { create } for pid=5229 comm="syz.0.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 391.361637][ T28] audit: type=1400 audit(391.290:2187): avc: denied { create } for pid=5229 comm="syz.0.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 391.707481][ T28] audit: type=1400 audit(391.640:2188): avc: denied { create } for pid=5229 comm="syz.0.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 394.166942][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 394.167186][ T28] audit: type=1400 audit(394.100:2197): avc: denied { create } for pid=5236 comm="syz.1.602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 394.272562][ T28] audit: type=1400 audit(394.200:2198): avc: denied { read } for pid=5236 comm="syz.1.602" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 394.337938][ T28] audit: type=1400 audit(394.270:2199): avc: denied { create } for pid=5236 comm="syz.1.602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 394.490979][ T28] audit: type=1400 audit(394.420:2200): avc: denied { read } for pid=5236 comm="syz.1.602" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 394.585470][ T28] audit: type=1400 audit(394.510:2201): avc: denied { read write } for pid=5236 comm="syz.1.602" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 395.105805][ T28] audit: type=1400 audit(395.030:2202): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.885505][ T28] audit: type=1400 audit(395.810:2203): avc: denied { create } for pid=5241 comm="syz.1.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 395.889666][ T28] audit: type=1400 audit(395.820:2204): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.901468][ T28] audit: type=1400 audit(395.830:2205): avc: denied { read } for pid=5241 comm="syz.1.604" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 397.260297][ T28] audit: type=1400 audit(397.190:2206): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 399.180464][ T28] kauditd_printk_skb: 71 callbacks suppressed [ 399.183695][ T28] audit: type=1400 audit(399.110:2278): avc: denied { create } for pid=5254 comm="syz.0.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 399.202237][ T28] audit: type=1400 audit(399.130:2279): avc: denied { create } for pid=5254 comm="syz.0.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 399.371327][ T28] audit: type=1400 audit(399.300:2280): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 399.382777][ T28] audit: type=1400 audit(399.310:2281): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 400.049184][ T28] audit: type=1400 audit(399.980:2282): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 400.363664][ T28] audit: type=1400 audit(400.290:2283): avc: denied { create } for pid=5257 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 400.516021][ T28] audit: type=1400 audit(400.440:2284): avc: denied { create } for pid=5260 comm="syz.0.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 400.531245][ T28] audit: type=1400 audit(400.460:2285): avc: denied { read } for pid=5260 comm="syz.0.611" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.696430][ T28] audit: type=1400 audit(400.630:2286): avc: denied { read } for pid=5257 comm="syz.1.609" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.454338][ T28] audit: type=1400 audit(401.380:2287): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 404.221086][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 404.223342][ T28] audit: type=1400 audit(404.150:2303): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 404.395017][ T28] audit: type=1400 audit(404.320:2304): avc: denied { create } for pid=5277 comm="syz.1.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 404.411346][ T28] audit: type=1400 audit(404.340:2305): avc: denied { read write } for pid=5277 comm="syz.1.618" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 404.781739][ T28] audit: type=1400 audit(404.710:2306): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.620099][ T28] audit: type=1400 audit(405.550:2307): avc: denied { read write } for pid=5279 comm="syz.1.619" name="mouse0" dev="devtmpfs" ino=741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.739941][ T28] audit: type=1400 audit(405.670:2308): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.850336][ T28] audit: type=1400 audit(405.780:2309): avc: denied { read } for pid=5279 comm="syz.1.619" dev="nsfs" ino=4026532749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 405.888622][ T28] audit: type=1400 audit(405.820:2310): avc: denied { execmem } for pid=5279 comm="syz.1.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 406.100592][ T5282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=269 sclass=netlink_route_socket pid=5282 comm=syz.0.620 [ 406.111177][ T28] audit: type=1400 audit(406.040:2311): avc: denied { create } for pid=5281 comm="syz.0.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 406.111695][ T28] audit: type=1400 audit(406.040:2312): avc: denied { create } for pid=5281 comm="syz.0.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 409.345193][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 409.345552][ T28] audit: type=1400 audit(409.270:2333): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.455459][ T28] audit: type=1400 audit(409.380:2334): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.474086][ T28] audit: type=1400 audit(409.400:2335): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.908663][ T28] audit: type=1400 audit(409.840:2336): avc: denied { read } for pid=5294 comm="syz.0.626" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 409.910522][ T28] audit: type=1400 audit(409.840:2337): avc: denied { read open } for pid=5294 comm="syz.0.626" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 409.922864][ T28] audit: type=1400 audit(409.850:2338): avc: denied { ioctl } for pid=5294 comm="syz.0.626" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 ioctlcmd=0x940d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 410.246917][ T28] audit: type=1400 audit(410.180:2339): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 410.248652][ T28] audit: type=1400 audit(410.180:2340): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 410.255497][ T28] audit: type=1400 audit(410.180:2341): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 410.325487][ T28] audit: type=1400 audit(410.250:2342): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.380739][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 414.386022][ T28] audit: type=1400 audit(414.310:2374): avc: denied { module_request } for pid=5305 comm="syz.0.630" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 414.768832][ T28] audit: type=1400 audit(414.700:2375): avc: denied { sys_module } for pid=5305 comm="syz.0.630" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 414.774222][ T28] audit: type=1400 audit(414.700:2376): avc: denied { module_request } for pid=5305 comm="syz.0.630" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 414.865737][ T28] audit: type=1400 audit(414.790:2377): avc: denied { read } for pid=5305 comm="syz.0.630" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.868064][ T28] audit: type=1400 audit(414.790:2378): avc: denied { read open } for pid=5305 comm="syz.0.630" path="/dev/ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.881653][ T28] audit: type=1400 audit(414.810:2379): avc: denied { read write } for pid=5305 comm="syz.0.630" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.885890][ T28] audit: type=1400 audit(414.810:2380): avc: denied { read write open } for pid=5305 comm="syz.0.630" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.889293][ T28] audit: type=1400 audit(414.820:2381): avc: denied { ioctl } for pid=5305 comm="syz.0.630" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 415.085782][ T28] audit: type=1400 audit(415.010:2382): avc: denied { create } for pid=5313 comm="syz.1.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 415.087548][ T28] audit: type=1400 audit(415.020:2383): avc: denied { create } for pid=5313 comm="syz.1.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 419.903803][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 419.904150][ T28] audit: type=1400 audit(419.830:2398): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.938355][ T28] audit: type=1400 audit(419.870:2399): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.948735][ T28] audit: type=1400 audit(419.880:2400): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 420.099890][ T28] audit: type=1400 audit(420.030:2401): avc: denied { execmem } for pid=5313 comm="syz.1.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 420.711544][ T28] audit: type=1400 audit(420.640:2402): avc: denied { create } for pid=5320 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 420.889746][ T28] audit: type=1400 audit(420.820:2403): avc: denied { create } for pid=5320 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 420.981162][ T28] audit: type=1400 audit(420.910:2404): avc: denied { bind } for pid=5320 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 421.158618][ T28] audit: type=1400 audit(421.090:2405): avc: denied { prog_load } for pid=5320 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.179682][ T28] audit: type=1400 audit(421.110:2406): avc: denied { bpf } for pid=5320 comm="syz.0.634" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.219064][ T28] audit: type=1400 audit(421.150:2407): avc: denied { create } for pid=5320 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 421.985722][ T5319] ------------[ cut here ]------------ [ 421.986111][ T5319] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.1.631/5319 [ 421.987904][ T5319] Modules linked in: [ 421.988764][ T5319] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 421.989464][ T5319] CPU: 1 UID: 0 PID: 5319 Comm: syz.1.631 Not tainted syzkaller #0 PREEMPT [ 421.989809][ T5319] Hardware name: ARM-Versatile Express [ 421.990020][ T5319] Call trace: [ 421.990222][ T5319] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 421.990660][ T5319] r7:82a1e7b8 r6:00000000 r5:8231c340 r4:00000001 [ 421.990978][ T5319] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 421.991302][ T5319] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 421.991652][ T5319] r7:82a1e7b8 r6:00000000 r5:83a53d40 r4:82c7bd3c [ 421.991889][ T5319] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 421.992200][ T5319] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 421.992539][ T5319] r7:80265f80 [ 421.992692][ T5319] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 421.993006][ T5319] r3:82a0b544 r2:00000001 r1:82302e28 r0:8230a708 [ 421.993231][ T5319] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 421.993589][ T5319] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 421.993951][ T5319] r8:00000009 r7:8230b904 r6:eb1edebc r5:83a53d40 r4:00000000 [ 421.994212][ T5319] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 421.994599][ T5319] r10:83a54434 r9:00000000 r8:eb1edf68 r7:83a54610 r6:00000080 r5:83a53d40 [ 421.995085][ T5319] r4:83a53d40 [ 421.995328][ T5319] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 421.995721][ T5319] r8:eb1edf68 r7:83a54610 r6:833e5a40 r5:83a53d40 r4:83bc9880 [ 421.995960][ T5319] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 421.996233][ T5319] r7:00000001 [ 421.996367][ T5319] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 421.996702][ T5319] Exception stack(0xeb1edfa8 to 0xeb1edff0) [ 421.996916][ T5319] dfa0: 00000000 00000000 00000000 00000000 00000000 20000040 [ 421.997199][ T5319] dfc0: 00000000 00000000 00000000 00000001 003462d8 00000000 00000001 76ffe0dc [ 421.997503][ T5319] dfe0: 76ffde60 76ffde50 000193b4 001307a0 [ 421.999374][ T5319] Rebooting in 86400 seconds..