last executing test programs: 15.663585114s ago: executing program 0 (id=3378): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) close(r0) 13.796524352s ago: executing program 0 (id=3381): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 12.380370305s ago: executing program 0 (id=3382): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) 11.551306729s ago: executing program 0 (id=3383): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000800100000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x3ffff, 0x0, 0x0, 0x0) 9.488695066s ago: executing program 1 (id=3385): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000380)=""/75}, 0x20) 8.476756148s ago: executing program 1 (id=3386): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=@newtaction={0x48, 0x30, 0xb, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc}, {0x4}, {0x4}, {0xc, 0xa}, {0xc, 0x9, {0xf5}}}}]}]}, 0x48}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xfeffff, 0x0, 0x0, 0x0, 0x0, 0xf0}, 0x50) 7.326296698s ago: executing program 1 (id=3387): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b\x00\x00\x00'], 0x48) flistxattr(r0, 0x0, 0x0) 6.466473523s ago: executing program 0 (id=3388): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x68001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 6.014568287s ago: executing program 1 (id=3389): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 4.390974931s ago: executing program 1 (id=3390): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/21], 0x50) 2.183076416s ago: executing program 0 (id=3391): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xf555, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x50) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000480)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 0s ago: executing program 1 (id=3392): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=@newtaction={0x48, 0x30, 0xb, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc}, {0x4}, {0x4}, {0xc, 0xa}, {0xc, 0x9, {0xf5}}}}]}]}, 0x48}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xfeffff, 0x0, 0x0, 0x0, 0x0, 0xf0}, 0x50) kernel console output (not intermixed with test programs): re. [ 1374.910460][ T8157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1374.911278][ T8157] CPU: 1 UID: 0 PID: 8157 Comm: syz.0.1960 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1374.911408][ T8157] Hardware name: linux,dummy-virt (DT) [ 1374.911476][ T8157] Call trace: [ 1374.911537][ T8157] show_stack+0x18/0x24 (C) [ 1374.911705][ T8157] dump_stack_lvl+0xdc/0xf4 [ 1374.911810][ T8157] dump_stack+0x1c/0x28 [ 1374.911903][ T8157] should_fail_ex+0x5a0/0x6ac [ 1374.912062][ T8157] should_fail+0x14/0x20 [ 1374.912161][ T8157] should_fail_usercopy+0x1c/0x28 [ 1374.912287][ T8157] _inline_copy_from_user+0x38/0x130 [ 1374.912601][ T8157] copy_msghdr_from_user+0xa0/0x130 [ 1374.912861][ T8157] ___sys_sendmsg+0xfc/0x19c [ 1374.913261][ T8157] __sys_sendmsg+0x114/0x19c [ 1374.913594][ T8157] __arm64_sys_sendmsg+0x70/0xa0 [ 1374.913730][ T8157] invoke_syscall+0x6c/0x258 [ 1374.913840][ T8157] el0_svc_common.constprop.0+0xac/0x230 [ 1374.913932][ T8157] do_el0_svc+0x40/0x58 [ 1374.914019][ T8157] el0_svc+0x50/0x1a0 [ 1374.914110][ T8157] el0t_64_sync_handler+0xa0/0xe4 [ 1374.914198][ T8157] el0t_64_sync+0x198/0x19c [ 1381.406266][ T8176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=8176 comm=syz.0.1964 [ 1381.427233][ T30] audit: type=1400 audit(1380.870:391): avc: denied { lock } for pid=8173 comm="syz.0.1964" path="socket:[20390]" dev="sockfs" ino=20390 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1385.140591][ T8189] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8189 comm=syz.0.1969 [ 1401.662181][ T8235] team_slave_1: entered promiscuous mode [ 1401.949344][ T30] audit: type=1400 audit(1401.390:392): avc: denied { write } for pid=8234 comm="syz.1.1986" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1422.247483][ T8288] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8288 comm=syz.1.2006 [ 1422.777229][ T8297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=8297 comm=syz.0.2008 [ 1428.680482][ T8316] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8316 comm=syz.0.2013 [ 1429.386616][ T8321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=8321 comm=syz.0.2014 [ 1435.137805][ T8330] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8330 comm=syz.1.2018 [ 1442.967163][ T8352] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8352 comm=syz.1.2024 [ 1448.112258][ T8375] FAULT_INJECTION: forcing a failure. [ 1448.112258][ T8375] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.118242][ T8375] CPU: 0 UID: 0 PID: 8375 Comm: syz.1.2034 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1448.118399][ T8375] Hardware name: linux,dummy-virt (DT) [ 1448.118435][ T8375] Call trace: [ 1448.118462][ T8375] show_stack+0x18/0x24 (C) [ 1448.118552][ T8375] dump_stack_lvl+0xdc/0xf4 [ 1448.118605][ T8375] dump_stack+0x1c/0x28 [ 1448.118656][ T8375] should_fail_ex+0x5a0/0x6ac [ 1448.118703][ T8375] should_failslab+0xbc/0x11c [ 1448.118752][ T8375] __kmalloc_noprof+0xd0/0x4d0 [ 1448.118797][ T8375] create_ruleset+0x28/0x128 [ 1448.118841][ T8375] landlock_merge_ruleset+0x80/0x674 [ 1448.118890][ T8375] __arm64_sys_landlock_restrict_self+0x1d8/0x6ac [ 1448.118935][ T8375] invoke_syscall+0x6c/0x258 [ 1448.118979][ T8375] el0_svc_common.constprop.0+0xac/0x230 [ 1448.119022][ T8375] do_el0_svc+0x40/0x58 [ 1448.119063][ T8375] el0_svc+0x50/0x1a0 [ 1448.119106][ T8375] el0t_64_sync_handler+0xa0/0xe4 [ 1448.119147][ T8375] el0t_64_sync+0x198/0x19c [ 1469.518086][ T8437] FAULT_INJECTION: forcing a failure. [ 1469.518086][ T8437] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.519049][ T8437] CPU: 1 UID: 0 PID: 8437 Comm: syz.1.2057 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1469.519126][ T8437] Hardware name: linux,dummy-virt (DT) [ 1469.519158][ T8437] Call trace: [ 1469.519183][ T8437] show_stack+0x18/0x24 (C) [ 1469.519271][ T8437] dump_stack_lvl+0xdc/0xf4 [ 1469.519351][ T8437] dump_stack+0x1c/0x28 [ 1469.519420][ T8437] should_fail_ex+0x5a0/0x6ac [ 1469.519642][ T8437] should_failslab+0xbc/0x11c [ 1469.519887][ T8437] __kmalloc_noprof+0xd0/0x4d0 [ 1469.520097][ T8437] tomoyo_realpath_from_path+0x90/0x534 [ 1469.520694][ T8437] tomoyo_path_number_perm+0x200/0x438 [ 1469.520916][ T8437] tomoyo_file_ioctl+0x1c/0x28 [ 1469.521021][ T8437] security_file_ioctl+0x8c/0x19c [ 1469.521076][ T8437] __arm64_sys_ioctl+0x90/0x1a4 [ 1469.521154][ T8437] invoke_syscall+0x6c/0x258 [ 1469.522097][ T8437] el0_svc_common.constprop.0+0xac/0x230 [ 1469.522474][ T8437] do_el0_svc+0x40/0x58 [ 1469.522707][ T8437] el0_svc+0x50/0x1a0 [ 1469.523043][ T8437] el0t_64_sync_handler+0xa0/0xe4 [ 1469.523148][ T8437] el0t_64_sync+0x198/0x19c [ 1469.544504][ T8437] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1472.627933][ T30] audit: type=1400 audit(1472.070:393): avc: denied { read } for pid=8449 comm="syz.0.2062" name="rfkill" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 1477.162001][ T8478] FAULT_INJECTION: forcing a failure. [ 1477.162001][ T8478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1477.167993][ T8478] CPU: 0 UID: 0 PID: 8478 Comm: syz.1.2071 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1477.168154][ T8478] Hardware name: linux,dummy-virt (DT) [ 1477.168207][ T8478] Call trace: [ 1477.168247][ T8478] show_stack+0x18/0x24 (C) [ 1477.168377][ T8478] dump_stack_lvl+0xdc/0xf4 [ 1477.168459][ T8478] dump_stack+0x1c/0x28 [ 1477.168529][ T8478] should_fail_ex+0x5a0/0x6ac [ 1477.168611][ T8478] should_fail_alloc_page+0x70/0xb8 [ 1477.168689][ T8478] prepare_alloc_pages+0x1a8/0x560 [ 1477.168758][ T8478] __alloc_frozen_pages_noprof+0x144/0x1f20 [ 1477.168829][ T8478] alloc_pages_mpol+0xfc/0x400 [ 1477.168898][ T8478] folio_alloc_mpol_noprof+0x18/0x190 [ 1477.168965][ T8478] vma_alloc_folio_noprof+0x104/0x1bc [ 1477.169031][ T8478] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 1477.169107][ T8478] __handle_mm_fault+0x2034/0x358c [ 1477.169178][ T8478] handle_mm_fault+0x3b8/0x910 [ 1477.169246][ T8478] do_page_fault+0x1d8/0xcbc [ 1477.169311][ T8478] do_translation_fault+0xb0/0xec [ 1477.169424][ T8478] do_mem_abort+0x68/0x1a4 [ 1477.169499][ T8478] el0_da+0x5c/0x17c [ 1477.169575][ T8478] el0t_64_sync_handler+0xd0/0xe4 [ 1477.169682][ T8478] el0t_64_sync+0x198/0x19c [ 1477.191795][ T8478] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1478.560546][ T8487] FAULT_INJECTION: forcing a failure. [ 1478.560546][ T8487] name failslab, interval 1, probability 0, space 0, times 0 [ 1478.560999][ T8487] CPU: 1 UID: 0 PID: 8487 Comm: syz.1.2074 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1478.561069][ T8487] Hardware name: linux,dummy-virt (DT) [ 1478.561101][ T8487] Call trace: [ 1478.561126][ T8487] show_stack+0x18/0x24 (C) [ 1478.561271][ T8487] dump_stack_lvl+0xdc/0xf4 [ 1478.561330][ T8487] dump_stack+0x1c/0x28 [ 1478.561372][ T8487] should_fail_ex+0x5a0/0x6ac [ 1478.561415][ T8487] should_failslab+0xbc/0x11c [ 1478.561459][ T8487] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 1478.561503][ T8487] __alloc_skb+0x208/0x2f0 [ 1478.561634][ T8487] netlink_alloc_large_skb+0xac/0xd8 [ 1478.561692][ T8487] netlink_sendmsg+0x4ac/0xa54 [ 1478.561771][ T8487] __sock_sendmsg+0xc8/0x168 [ 1478.561851][ T8487] ____sys_sendmsg+0x500/0x764 [ 1478.561982][ T8487] ___sys_sendmsg+0x11c/0x19c [ 1478.562078][ T8487] __sys_sendmsg+0x114/0x19c [ 1478.562159][ T8487] __arm64_sys_sendmsg+0x70/0xa0 [ 1478.562228][ T8487] invoke_syscall+0x6c/0x258 [ 1478.562286][ T8487] el0_svc_common.constprop.0+0xac/0x230 [ 1478.562413][ T8487] do_el0_svc+0x40/0x58 [ 1478.562485][ T8487] el0_svc+0x50/0x1a0 [ 1478.562598][ T8487] el0t_64_sync_handler+0xa0/0xe4 [ 1478.562753][ T8487] el0t_64_sync+0x198/0x19c [ 1482.710523][ T8506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=8506 comm=syz.1.2079 [ 1483.204935][ T8508] FAULT_INJECTION: forcing a failure. [ 1483.204935][ T8508] name failslab, interval 1, probability 0, space 0, times 0 [ 1483.205328][ T8508] CPU: 1 UID: 0 PID: 8508 Comm: syz.1.2080 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1483.205399][ T8508] Hardware name: linux,dummy-virt (DT) [ 1483.205430][ T8508] Call trace: [ 1483.205457][ T8508] show_stack+0x18/0x24 (C) [ 1483.205545][ T8508] dump_stack_lvl+0xdc/0xf4 [ 1483.205606][ T8508] dump_stack+0x1c/0x28 [ 1483.205651][ T8508] should_fail_ex+0x5a0/0x6ac [ 1483.205696][ T8508] should_failslab+0xbc/0x11c [ 1483.205741][ T8508] __kmalloc_noprof+0xd0/0x4d0 [ 1483.205783][ T8508] tomoyo_encode2+0xa8/0x2c0 [ 1483.205839][ T8508] tomoyo_encode+0x28/0x40 [ 1483.205883][ T8508] tomoyo_realpath_from_path+0x114/0x534 [ 1483.205926][ T8508] tomoyo_mount_acl+0x128/0x5b8 [ 1483.205968][ T8508] tomoyo_mount_permission+0x13c/0x2c0 [ 1483.206011][ T8508] tomoyo_sb_mount+0x10/0x1c [ 1483.206053][ T8508] security_sb_mount+0xa8/0x1f4 [ 1483.206097][ T8508] path_mount+0xf8/0x1668 [ 1483.206142][ T8508] __arm64_sys_mount+0x304/0x3dc [ 1483.206185][ T8508] invoke_syscall+0x6c/0x258 [ 1483.206228][ T8508] el0_svc_common.constprop.0+0xac/0x230 [ 1483.206394][ T8508] do_el0_svc+0x40/0x58 [ 1483.206636][ T8508] el0_svc+0x50/0x1a0 [ 1483.206769][ T8508] el0t_64_sync_handler+0xa0/0xe4 [ 1483.206815][ T8508] el0t_64_sync+0x198/0x19c [ 1483.210392][ T8508] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1487.619492][ T8537] FAULT_INJECTION: forcing a failure. [ 1487.619492][ T8537] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.625446][ T8537] CPU: 0 UID: 0 PID: 8537 Comm: syz.1.2089 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1487.625651][ T8537] Hardware name: linux,dummy-virt (DT) [ 1487.625720][ T8537] Call trace: [ 1487.625775][ T8537] show_stack+0x18/0x24 (C) [ 1487.625946][ T8537] dump_stack_lvl+0xdc/0xf4 [ 1487.626054][ T8537] dump_stack+0x1c/0x28 [ 1487.626146][ T8537] should_fail_ex+0x5a0/0x6ac [ 1487.626239][ T8537] should_failslab+0xbc/0x11c [ 1487.626369][ T8537] __kmalloc_noprof+0xd0/0x4d0 [ 1487.626466][ T8537] tomoyo_realpath_from_path+0x90/0x534 [ 1487.626564][ T8537] tomoyo_check_open_permission+0x230/0x2b0 [ 1487.626657][ T8537] tomoyo_file_open+0x90/0xc4 [ 1487.626751][ T8537] security_file_open+0x74/0x148 [ 1487.626868][ T8537] do_dentry_open+0x2d8/0x103c [ 1487.626971][ T8537] vfs_open+0x5c/0x2fc [ 1487.627060][ T8537] dentry_open+0x58/0xa8 [ 1487.627145][ T8537] open_namespace+0xc0/0x130 [ 1487.627238][ T8537] open_related_ns+0x1c/0x28 [ 1487.627326][ T8537] sock_ioctl+0x310/0x5d4 [ 1487.627424][ T8537] __arm64_sys_ioctl+0x124/0x1a4 [ 1487.627516][ T8537] invoke_syscall+0x6c/0x258 [ 1487.627602][ T8537] el0_svc_common.constprop.0+0xac/0x230 [ 1487.627691][ T8537] do_el0_svc+0x40/0x58 [ 1487.627773][ T8537] el0_svc+0x50/0x1a0 [ 1487.627868][ T8537] el0t_64_sync_handler+0xa0/0xe4 [ 1487.627955][ T8537] el0t_64_sync+0x198/0x19c [ 1487.653787][ T8537] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1490.777041][ T8557] FAULT_INJECTION: forcing a failure. [ 1490.777041][ T8557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1490.778056][ T8557] CPU: 1 UID: 0 PID: 8557 Comm: syz.1.2095 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1490.778178][ T8557] Hardware name: linux,dummy-virt (DT) [ 1490.778235][ T8557] Call trace: [ 1490.778284][ T8557] show_stack+0x18/0x24 (C) [ 1490.778558][ T8557] dump_stack_lvl+0xdc/0xf4 [ 1490.778717][ T8557] dump_stack+0x1c/0x28 [ 1490.778846][ T8557] should_fail_ex+0x5a0/0x6ac [ 1490.778994][ T8557] should_fail+0x14/0x20 [ 1490.779131][ T8557] should_fail_usercopy+0x1c/0x28 [ 1490.779272][ T8557] simple_read_from_buffer+0x84/0x214 [ 1490.779400][ T8557] proc_fail_nth_read+0x160/0x21c [ 1490.779501][ T8557] vfs_read+0x18c/0x97c [ 1490.779675][ T8557] ksys_read+0xec/0x1d8 [ 1490.779763][ T8557] __arm64_sys_read+0x6c/0x9c [ 1490.779852][ T8557] invoke_syscall+0x6c/0x258 [ 1490.779944][ T8557] el0_svc_common.constprop.0+0xac/0x230 [ 1490.780111][ T8557] do_el0_svc+0x40/0x58 [ 1490.780309][ T8557] el0_svc+0x50/0x1a0 [ 1490.780578][ T8557] el0t_64_sync_handler+0xa0/0xe4 [ 1490.780684][ T8557] el0t_64_sync+0x198/0x19c [ 1491.742139][ T30] audit: type=1400 audit(1491.180:394): avc: denied { setattr } for pid=8560 comm="syz.1.2097" path="socket:[21991]" dev="sockfs" ino=21991 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1494.342280][ T8578] FAULT_INJECTION: forcing a failure. [ 1494.342280][ T8578] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.364640][ T8578] CPU: 1 UID: 0 PID: 8578 Comm: syz.0.2104 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1494.364909][ T8578] Hardware name: linux,dummy-virt (DT) [ 1494.364976][ T8578] Call trace: [ 1494.365030][ T8578] show_stack+0x18/0x24 (C) [ 1494.365206][ T8578] dump_stack_lvl+0xdc/0xf4 [ 1494.365308][ T8578] dump_stack+0x1c/0x28 [ 1494.365395][ T8578] should_fail_ex+0x5a0/0x6ac [ 1494.365489][ T8578] should_failslab+0xbc/0x11c [ 1494.365591][ T8578] __kmalloc_cache_noprof+0x74/0x3d0 [ 1494.365677][ T8578] file_f_owner_allocate+0x80/0x13c [ 1494.365772][ T8578] do_fcntl+0x868/0x11a4 [ 1494.365881][ T8578] __arm64_sys_fcntl+0xf8/0x190 [ 1494.365972][ T8578] invoke_syscall+0x6c/0x258 [ 1494.366063][ T8578] el0_svc_common.constprop.0+0xac/0x230 [ 1494.366152][ T8578] do_el0_svc+0x40/0x58 [ 1494.366295][ T8578] el0_svc+0x50/0x1a0 [ 1494.366444][ T8578] el0t_64_sync_handler+0xa0/0xe4 [ 1494.366549][ T8578] el0t_64_sync+0x198/0x19c [ 1496.821667][ T8591] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1496.837783][ T8591] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1496.876352][ T30] audit: type=1400 audit(1496.310:395): avc: denied { accept } for pid=8590 comm="syz.1.2110" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1510.320337][ T8655] FAULT_INJECTION: forcing a failure. [ 1510.320337][ T8655] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.329477][ T8655] CPU: 1 UID: 0 PID: 8655 Comm: syz.1.2130 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1510.329628][ T8655] Hardware name: linux,dummy-virt (DT) [ 1510.329691][ T8655] Call trace: [ 1510.329720][ T8655] show_stack+0x18/0x24 (C) [ 1510.329811][ T8655] dump_stack_lvl+0xdc/0xf4 [ 1510.329866][ T8655] dump_stack+0x1c/0x28 [ 1510.329908][ T8655] should_fail_ex+0x5a0/0x6ac [ 1510.329952][ T8655] should_failslab+0xbc/0x11c [ 1510.329996][ T8655] __kmalloc_noprof+0xd0/0x4d0 [ 1510.330038][ T8655] tomoyo_encode2+0xa8/0x2c0 [ 1510.330085][ T8655] tomoyo_encode+0x28/0x40 [ 1510.330128][ T8655] tomoyo_realpath_from_path+0x114/0x534 [ 1510.330185][ T8655] tomoyo_path_number_perm+0x200/0x438 [ 1510.330261][ T8655] tomoyo_file_ioctl+0x1c/0x28 [ 1510.330345][ T8655] security_file_ioctl+0x8c/0x19c [ 1510.330432][ T8655] __arm64_sys_ioctl+0x90/0x1a4 [ 1510.330485][ T8655] invoke_syscall+0x6c/0x258 [ 1510.330528][ T8655] el0_svc_common.constprop.0+0xac/0x230 [ 1510.330569][ T8655] do_el0_svc+0x40/0x58 [ 1510.330616][ T8655] el0_svc+0x50/0x1a0 [ 1510.330659][ T8655] el0t_64_sync_handler+0xa0/0xe4 [ 1510.330700][ T8655] el0t_64_sync+0x198/0x19c [ 1510.354905][ T8655] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1518.620772][ T8661] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1518.646939][ T8661] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1518.843292][ T8661] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1518.860812][ T8661] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1521.651023][ T8676] FAULT_INJECTION: forcing a failure. [ 1521.651023][ T8676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1521.651890][ T8676] CPU: 0 UID: 0 PID: 8676 Comm: syz.1.2138 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1521.652008][ T8676] Hardware name: linux,dummy-virt (DT) [ 1521.652071][ T8676] Call trace: [ 1521.652128][ T8676] show_stack+0x18/0x24 (C) [ 1521.652280][ T8676] dump_stack_lvl+0xdc/0xf4 [ 1521.652386][ T8676] dump_stack+0x1c/0x28 [ 1521.652615][ T8676] should_fail_ex+0x5a0/0x6ac [ 1521.652746][ T8676] should_fail+0x14/0x20 [ 1521.652973][ T8676] should_fail_usercopy+0x1c/0x28 [ 1521.653333][ T8676] simple_read_from_buffer+0x84/0x214 [ 1521.653569][ T8676] proc_fail_nth_read+0x160/0x21c [ 1521.653768][ T8676] vfs_read+0x18c/0x97c [ 1521.654165][ T8676] ksys_read+0xec/0x1d8 [ 1521.654415][ T8676] __arm64_sys_read+0x6c/0x9c [ 1521.654554][ T8676] invoke_syscall+0x6c/0x258 [ 1521.654655][ T8676] el0_svc_common.constprop.0+0xac/0x230 [ 1521.654746][ T8676] do_el0_svc+0x40/0x58 [ 1521.654834][ T8676] el0_svc+0x50/0x1a0 [ 1521.654935][ T8676] el0t_64_sync_handler+0xa0/0xe4 [ 1521.655023][ T8676] el0t_64_sync+0x198/0x19c [ 1524.056945][ T8690] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1533.872322][ T8721] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8721 comm=syz.0.2154 [ 1539.192335][ T8738] FAULT_INJECTION: forcing a failure. [ 1539.192335][ T8738] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1539.205526][ T8738] CPU: 0 UID: 0 PID: 8738 Comm: syz.1.2160 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1539.205810][ T8738] Hardware name: linux,dummy-virt (DT) [ 1539.205903][ T8738] Call trace: [ 1539.206048][ T8738] show_stack+0x18/0x24 (C) [ 1539.206275][ T8738] dump_stack_lvl+0xdc/0xf4 [ 1539.206420][ T8738] dump_stack+0x1c/0x28 [ 1539.206512][ T8738] should_fail_ex+0x5a0/0x6ac [ 1539.206607][ T8738] should_fail+0x14/0x20 [ 1539.206692][ T8738] should_fail_usercopy+0x1c/0x28 [ 1539.206778][ T8738] simple_read_from_buffer+0x84/0x214 [ 1539.206882][ T8738] proc_fail_nth_read+0x160/0x21c [ 1539.206980][ T8738] vfs_read+0x18c/0x97c [ 1539.207077][ T8738] ksys_read+0xec/0x1d8 [ 1539.207162][ T8738] __arm64_sys_read+0x6c/0x9c [ 1539.207246][ T8738] invoke_syscall+0x6c/0x258 [ 1539.207337][ T8738] el0_svc_common.constprop.0+0xac/0x230 [ 1539.207421][ T8738] do_el0_svc+0x40/0x58 [ 1539.207500][ T8738] el0_svc+0x50/0x1a0 [ 1539.207585][ T8738] el0t_64_sync_handler+0xa0/0xe4 [ 1539.207670][ T8738] el0t_64_sync+0x198/0x19c [ 1548.968335][ T8763] SELinux: Context system_u:object_r:crack_exec_t:s0 is not valid (left unmapped). [ 1548.979500][ T30] audit: type=1400 audit(1548.420:396): avc: denied { relabelto } for pid=8762 comm="syz.0.2170" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crack_exec_t:s0" [ 1549.010108][ T30] audit: type=1400 audit(1548.430:397): avc: denied { associate } for pid=8762 comm="syz.0.2170" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:crack_exec_t:s0" [ 1555.205339][ T8778] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8778 comm=syz.0.2175 [ 1558.150634][ T8787] FAULT_INJECTION: forcing a failure. [ 1558.150634][ T8787] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.151141][ T8787] CPU: 0 UID: 0 PID: 8787 Comm: syz.1.2178 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1558.151206][ T8787] Hardware name: linux,dummy-virt (DT) [ 1558.151237][ T8787] Call trace: [ 1558.151269][ T8787] show_stack+0x18/0x24 (C) [ 1558.151350][ T8787] dump_stack_lvl+0xdc/0xf4 [ 1558.151403][ T8787] dump_stack+0x1c/0x28 [ 1558.151447][ T8787] should_fail_ex+0x5a0/0x6ac [ 1558.151490][ T8787] should_failslab+0xbc/0x11c [ 1558.151608][ T8787] __kmalloc_noprof+0xd0/0x4d0 [ 1558.151706][ T8787] tomoyo_realpath_from_path+0x90/0x534 [ 1558.151954][ T8787] tomoyo_path_number_perm+0x200/0x438 [ 1558.152076][ T8787] tomoyo_file_ioctl+0x1c/0x28 [ 1558.152190][ T8787] security_file_ioctl+0x8c/0x19c [ 1558.152286][ T8787] __arm64_sys_ioctl+0x90/0x1a4 [ 1558.152421][ T8787] invoke_syscall+0x6c/0x258 [ 1558.152583][ T8787] el0_svc_common.constprop.0+0xac/0x230 [ 1558.152890][ T8787] do_el0_svc+0x40/0x58 [ 1558.152960][ T8787] el0_svc+0x50/0x1a0 [ 1558.153007][ T8787] el0t_64_sync_handler+0xa0/0xe4 [ 1558.153048][ T8787] el0t_64_sync+0x198/0x19c [ 1558.165012][ T8787] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1581.347368][ T8842] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=34 sclass=netlink_tcpdiag_socket pid=8842 comm=syz.1.2197 [ 1582.097109][ T8846] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1582.127560][ T8846] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1592.066302][ T30] audit: type=1400 audit(1591.500:398): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1592.067525][ T30] audit: type=1400 audit(1591.510:399): avc: denied { open } for pid=3320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1592.080111][ T30] audit: type=1400 audit(1591.510:400): avc: denied { ioctl } for pid=3320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1592.195669][ T30] audit: type=1400 audit(1591.630:401): avc: denied { read write } for pid=8866 comm="syz.1.2207" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1592.229727][ T30] audit: type=1400 audit(1591.640:402): avc: denied { open } for pid=8866 comm="syz.1.2207" path="/dev/nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1592.316000][ T30] audit: type=1400 audit(1591.750:403): avc: denied { read } for pid=8866 comm="syz.1.2207" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1592.323802][ T30] audit: type=1400 audit(1591.760:404): avc: denied { open } for pid=8866 comm="syz.1.2207" path="net:[4026532690]" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1592.364735][ T30] audit: type=1400 audit(1591.790:405): avc: denied { create } for pid=8866 comm="syz.1.2207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1592.368905][ T30] audit: type=1400 audit(1591.810:406): avc: denied { ioctl } for pid=8866 comm="syz.1.2207" path="/dev/nvme-fabrics" dev="devtmpfs" ino=680 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1592.859011][ T30] audit: type=1400 audit(1592.300:407): avc: denied { read write } for pid=8870 comm="syz.0.2208" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1593.531782][ T8877] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8877 comm=syz.1.2210 [ 1603.440764][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1603.441633][ T30] audit: type=1400 audit(1602.880:415): avc: denied { ioctl } for pid=8904 comm="syz.0.2221" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x942d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1605.098886][ T30] audit: type=1400 audit(1604.510:416): avc: denied { open } for pid=8912 comm="syz.0.2224" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1612.167632][ T30] audit: type=1400 audit(1611.610:417): avc: denied { create } for pid=8928 comm="syz.1.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1612.204929][ T30] audit: type=1400 audit(1611.640:418): avc: denied { ioctl } for pid=8928 comm="syz.1.2231" path="socket:[23754]" dev="sockfs" ino=23754 ioctlcmd=0x9360 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1612.330078][ T30] audit: type=1400 audit(1611.730:419): avc: denied { create } for pid=8928 comm="syz.1.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1612.364117][ T30] audit: type=1400 audit(1611.800:420): avc: denied { ioctl } for pid=8928 comm="syz.1.2231" path="socket:[23757]" dev="sockfs" ino=23757 ioctlcmd=0x541c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1612.384791][ T30] audit: type=1400 audit(1611.820:421): avc: denied { bind } for pid=8928 comm="syz.1.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1621.526532][ T30] audit: type=1400 audit(1620.960:422): avc: denied { ioctl } for pid=8949 comm="syz.1.2238" path="socket:[23445]" dev="sockfs" ino=23445 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1622.376236][ T30] audit: type=1400 audit(1621.810:423): avc: denied { sys_module } for pid=8949 comm="syz.1.2238" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1624.907032][ T30] audit: type=1400 audit(1624.350:424): avc: denied { connect } for pid=8961 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1632.786365][ T30] audit: type=1400 audit(1632.230:425): avc: denied { getopt } for pid=9007 comm="syz.1.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1634.149713][ T30] audit: type=1400 audit(1633.590:426): avc: denied { create } for pid=9007 comm="syz.1.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1637.067162][ T30] audit: type=1400 audit(1636.480:427): avc: denied { read } for pid=9020 comm="syz.0.2259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1637.114767][ T30] audit: type=1400 audit(1636.550:428): avc: denied { read write } for pid=9029 comm="syz.1.2260" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1637.115801][ T30] audit: type=1400 audit(1636.550:429): avc: denied { open } for pid=9029 comm="syz.1.2260" path="/dev/nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1637.315716][ T30] audit: type=1400 audit(1636.760:430): avc: denied { read } for pid=9029 comm="syz.1.2260" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1637.329383][ T30] audit: type=1400 audit(1636.770:431): avc: denied { open } for pid=9029 comm="syz.1.2260" path="net:[4026532690]" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1637.341459][ T30] audit: type=1400 audit(1636.780:432): avc: denied { create } for pid=9029 comm="syz.1.2260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1637.735276][ T30] audit: type=1400 audit(1637.170:433): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1637.790416][ T30] audit: type=1400 audit(1637.230:434): avc: denied { open } for pid=3321 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1637.795888][ T30] audit: type=1400 audit(1637.230:435): avc: denied { ioctl } for pid=3321 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1638.455022][ T30] audit: type=1400 audit(1637.890:436): avc: denied { create } for pid=9034 comm="syz.0.2262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1644.989189][ T30] audit: type=1400 audit(1644.430:437): avc: denied { write } for pid=9039 comm="syz.1.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1645.746946][ T30] audit: type=1400 audit(1645.190:438): avc: denied { module_request } for pid=9043 comm="syz.1.2266" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1664.567428][ T30] audit: type=1400 audit(1664.010:439): avc: denied { create } for pid=9084 comm="syz.0.2279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1664.590993][ T30] audit: type=1400 audit(1664.030:440): avc: denied { ioctl } for pid=9084 comm="syz.0.2279" path="socket:[24697]" dev="sockfs" ino=24697 ioctlcmd=0x5351 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1674.066037][ T30] audit: type=1400 audit(1673.490:441): avc: denied { ioctl } for pid=9092 comm="syz.0.2283" path="/dev/virtual_nci" dev="devtmpfs" ino=672 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1674.196193][ T30] audit: type=1400 audit(1673.630:442): avc: denied { create } for pid=9092 comm="syz.0.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1674.256414][ T30] audit: type=1400 audit(1673.690:443): avc: denied { connect } for pid=9092 comm="syz.0.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1675.891836][ T30] audit: type=1400 audit(1675.330:444): avc: denied { ioctl } for pid=9102 comm="syz.1.2285" path="socket:[23975]" dev="sockfs" ino=23975 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1678.460158][ T30] audit: type=1400 audit(1677.900:445): avc: denied { sys_module } for pid=9107 comm="syz.1.2287" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1685.764305][ T9135] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=9135 comm=syz.1.2293 [ 1700.263818][ T30] audit: type=1400 audit(1699.700:446): avc: denied { create } for pid=9190 comm="syz.0.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1700.574036][ T30] audit: type=1400 audit(1699.990:447): avc: denied { setopt } for pid=9190 comm="syz.0.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1700.575217][ T30] audit: type=1400 audit(1700.010:448): avc: denied { allowed } for pid=9190 comm="syz.0.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1700.685394][ T30] audit: type=1400 audit(1700.120:449): avc: denied { create } for pid=9190 comm="syz.0.2310" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1700.750621][ T30] audit: type=1400 audit(1700.190:450): avc: denied { read write } for pid=9190 comm="syz.0.2310" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1700.799374][ T30] audit: type=1400 audit(1700.230:451): avc: denied { open } for pid=9190 comm="syz.0.2310" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1700.825462][ T30] audit: type=1400 audit(1700.260:452): avc: denied { mounton } for pid=9190 comm="syz.0.2310" path="/1089/file0" dev="tmpfs" ino=5612 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1701.036424][ T30] audit: type=1400 audit(1700.470:453): avc: denied { mount } for pid=9190 comm="syz.0.2310" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1701.426907][ T30] audit: type=1400 audit(1700.870:454): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1705.801875][ T30] audit: type=1400 audit(1705.240:455): avc: denied { read write } for pid=9202 comm="syz.0.2314" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1705.839626][ T30] audit: type=1400 audit(1705.250:456): avc: denied { open } for pid=9202 comm="syz.0.2314" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1706.541373][ T30] audit: type=1400 audit(1705.980:457): avc: denied { search } for pid=9201 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1706.578995][ T30] audit: type=1400 audit(1705.980:458): avc: denied { search } for pid=9201 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=589 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1706.580333][ T30] audit: type=1400 audit(1706.000:459): avc: denied { search } for pid=9201 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=749 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1706.580779][ T30] audit: type=1400 audit(1706.020:460): avc: denied { search } for pid=9201 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1706.975479][ T30] audit: type=1400 audit(1706.400:461): avc: denied { read open } for pid=9206 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1706.976447][ T30] audit: type=1400 audit(1706.400:462): avc: denied { getattr } for pid=9206 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1707.501331][ T30] audit: type=1400 audit(1706.940:463): avc: denied { add_name } for pid=9201 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1707.521954][ T30] audit: type=1400 audit(1706.960:464): avc: denied { create } for pid=9201 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1710.862584][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1710.864082][ T30] audit: type=1400 audit(1710.300:469): avc: denied { remove_name } for pid=9220 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6156 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1710.918184][ T30] audit: type=1400 audit(1710.300:470): avc: denied { unlink } for pid=9220 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6156 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1723.813715][ T30] audit: type=1400 audit(1723.250:471): avc: denied { map } for pid=9276 comm="syz.0.2336" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24972 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1723.830465][ T30] audit: type=1400 audit(1723.270:472): avc: denied { read write } for pid=9276 comm="syz.0.2336" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24972 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1745.688579][ T30] audit: type=1400 audit(1745.130:473): avc: denied { mounton } for pid=9332 comm="syz.0.2352" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1745.735071][ T30] audit: type=1400 audit(1745.170:474): avc: denied { mount } for pid=9332 comm="syz.0.2352" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1748.297518][ T30] audit: type=1400 audit(1747.730:475): avc: denied { setopt } for pid=9338 comm="syz.1.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1748.912405][ T30] audit: type=1400 audit(1748.350:476): avc: denied { bind } for pid=9338 comm="syz.1.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1748.937458][ T30] audit: type=1400 audit(1748.370:477): avc: denied { create } for pid=9338 comm="syz.1.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1748.987467][ T30] audit: type=1400 audit(1748.430:478): avc: denied { bind } for pid=9338 comm="syz.1.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1757.500271][ T9358] serio: Serial port pts0 [ 1778.190535][ T30] audit: type=1400 audit(1777.630:479): avc: denied { read } for pid=9392 comm="syz.1.2370" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crack_exec_t:s0" [ 1778.227886][ T30] audit: type=1400 audit(1777.670:480): avc: denied { open } for pid=9392 comm="syz.1.2370" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crack_exec_t:s0" [ 1790.499769][ T30] audit: type=1400 audit(1789.930:481): avc: denied { create } for pid=9417 comm="syz.0.2379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1790.544732][ T30] audit: type=1400 audit(1789.970:482): avc: denied { ioctl } for pid=9417 comm="syz.0.2379" path="socket:[25172]" dev="sockfs" ino=25172 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1790.567930][ T30] audit: type=1400 audit(1789.970:483): avc: denied { write } for pid=9417 comm="syz.0.2379" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1793.807836][ T30] audit: type=1400 audit(1793.250:484): avc: denied { mac_admin } for pid=9427 comm="syz.0.2381" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1804.336803][ T30] audit: type=1400 audit(1803.770:485): avc: denied { create } for pid=9448 comm="syz.1.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1804.522513][ T30] audit: type=1400 audit(1803.950:486): avc: denied { prog_load } for pid=9448 comm="syz.1.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1804.529120][ T30] audit: type=1400 audit(1803.970:487): avc: denied { bpf } for pid=9448 comm="syz.1.2389" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1804.548795][ T30] audit: type=1400 audit(1803.990:488): avc: denied { perfmon } for pid=9448 comm="syz.1.2389" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1812.324859][ T30] audit: type=1400 audit(1811.760:489): avc: denied { create } for pid=9472 comm="syz.0.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1812.387817][ T30] audit: type=1400 audit(1811.830:490): avc: denied { write } for pid=9472 comm="syz.0.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1812.429860][ T30] audit: type=1400 audit(1811.870:491): avc: denied { write } for pid=9472 comm="syz.0.2397" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1812.438956][ T30] audit: type=1400 audit(1811.870:492): avc: denied { open } for pid=9472 comm="syz.0.2397" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1812.501025][ T30] audit: type=1400 audit(1811.930:493): avc: denied { ioctl } for pid=9472 comm="syz.0.2397" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 ioctlcmd=0x64cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1823.668885][ T30] audit: type=1400 audit(1823.110:494): avc: denied { read append } for pid=9506 comm="syz.1.2407" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1828.638763][ T9522] FAULT_INJECTION: forcing a failure. [ 1828.638763][ T9522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1828.650412][ T9522] CPU: 1 UID: 0 PID: 9522 Comm: syz.0.2413 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1828.650707][ T9522] Hardware name: linux,dummy-virt (DT) [ 1828.650775][ T9522] Call trace: [ 1828.650856][ T9522] show_stack+0x18/0x24 (C) [ 1828.651053][ T9522] dump_stack_lvl+0xdc/0xf4 [ 1828.651208][ T9522] dump_stack+0x1c/0x28 [ 1828.651301][ T9522] should_fail_ex+0x5a0/0x6ac [ 1828.651403][ T9522] should_fail+0x14/0x20 [ 1828.651489][ T9522] should_fail_usercopy+0x1c/0x28 [ 1828.651586][ T9522] _inline_copy_from_user+0x38/0x130 [ 1828.651700][ T9522] copy_msghdr_from_user+0xa0/0x130 [ 1828.651801][ T9522] ___sys_sendmsg+0xfc/0x19c [ 1828.651917][ T9522] __sys_sendmsg+0x114/0x19c [ 1828.652019][ T9522] __arm64_sys_sendmsg+0x70/0xa0 [ 1828.652116][ T9522] invoke_syscall+0x6c/0x258 [ 1828.652214][ T9522] el0_svc_common.constprop.0+0xac/0x230 [ 1828.652314][ T9522] do_el0_svc+0x40/0x58 [ 1828.652410][ T9522] el0_svc+0x50/0x1a0 [ 1828.652509][ T9522] el0t_64_sync_handler+0xa0/0xe4 [ 1828.652775][ T9522] el0t_64_sync+0x198/0x19c [ 1860.729751][ T30] audit: type=1400 audit(1860.170:495): avc: denied { read } for pid=9593 comm="syz.0.2435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1866.098998][ T30] audit: type=1400 audit(1865.510:496): avc: granted { setsecparam } for pid=9600 comm="syz.1.2437" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1866.160925][ T30] audit: type=1400 audit(1865.600:497): avc: granted { setsecparam } for pid=9600 comm="syz.1.2437" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1870.594764][ T30] audit: type=1400 audit(1870.030:498): avc: denied { execute } for pid=9613 comm="syz.0.2441" path=2F6D656D66643A292B202864656C6574656429 dev="tmpfs" ino=1056 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1874.898209][ T9628] FAULT_INJECTION: forcing a failure. [ 1874.898209][ T9628] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.915230][ T9628] CPU: 1 UID: 0 PID: 9628 Comm: syz.1.2445 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1874.915506][ T9628] Hardware name: linux,dummy-virt (DT) [ 1874.915596][ T9628] Call trace: [ 1874.915653][ T9628] show_stack+0x18/0x24 (C) [ 1874.915828][ T9628] dump_stack_lvl+0xdc/0xf4 [ 1874.915943][ T9628] dump_stack+0x1c/0x28 [ 1874.916033][ T9628] should_fail_ex+0x5a0/0x6ac [ 1874.916130][ T9628] should_failslab+0xbc/0x11c [ 1874.916215][ T9628] __kmalloc_noprof+0xd0/0x4d0 [ 1874.916306][ T9628] tomoyo_encode2+0xa8/0x2c0 [ 1874.916409][ T9628] tomoyo_encode+0x28/0x40 [ 1874.916504][ T9628] tomoyo_realpath_from_path+0x114/0x534 [ 1874.916612][ T9628] tomoyo_check_open_permission+0x230/0x2b0 [ 1874.916712][ T9628] tomoyo_file_open+0x90/0xc4 [ 1874.916803][ T9628] security_file_open+0x74/0x148 [ 1874.916906][ T9628] do_dentry_open+0x2d8/0x103c [ 1874.917011][ T9628] vfs_open+0x5c/0x2fc [ 1874.917100][ T9628] dentry_open+0x58/0xa8 [ 1874.917187][ T9628] open_namespace+0xc0/0x130 [ 1874.917280][ T9628] open_related_ns+0x1c/0x28 [ 1874.917377][ T9628] sock_ioctl+0x310/0x5d4 [ 1874.917662][ T9628] __arm64_sys_ioctl+0x124/0x1a4 [ 1874.917771][ T9628] invoke_syscall+0x6c/0x258 [ 1874.917872][ T9628] el0_svc_common.constprop.0+0xac/0x230 [ 1874.917972][ T9628] do_el0_svc+0x40/0x58 [ 1874.918058][ T9628] el0_svc+0x50/0x1a0 [ 1874.918151][ T9628] el0t_64_sync_handler+0xa0/0xe4 [ 1874.918240][ T9628] el0t_64_sync+0x198/0x19c [ 1874.948302][ T9628] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1875.975910][ T30] audit: type=1400 audit(1875.400:499): avc: denied { read } for pid=9631 comm="syz.1.2447" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1875.980183][ T30] audit: type=1400 audit(1875.420:500): avc: denied { open } for pid=9631 comm="syz.1.2447" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1877.031872][ T30] audit: type=1400 audit(1876.470:501): avc: denied { setopt } for pid=9631 comm="syz.1.2447" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1890.230262][ T30] audit: type=1400 audit(1889.670:502): avc: denied { setattr } for pid=9656 comm="syz.0.2451" name="CAN_RAW" dev="sockfs" ino=25719 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1891.851600][ T30] audit: type=1400 audit(1891.280:503): avc: denied { write } for pid=9659 comm="syz.1.2452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1892.595503][ T30] audit: type=1400 audit(1892.030:504): avc: denied { create } for pid=9667 comm="syz.0.2454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1894.680176][ T30] audit: type=1400 audit(1894.120:505): avc: denied { ioctl } for pid=9675 comm="syz.0.2457" path="socket:[25752]" dev="sockfs" ino=25752 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1894.789203][ T30] audit: type=1400 audit(1894.230:506): avc: denied { ioctl } for pid=9675 comm="syz.0.2457" path="socket:[25756]" dev="sockfs" ino=25756 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1900.664952][ T9683] FAULT_INJECTION: forcing a failure. [ 1900.664952][ T9683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1900.665787][ T9683] CPU: 0 UID: 0 PID: 9683 Comm: syz.1.2460 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 1900.665930][ T9683] Hardware name: linux,dummy-virt (DT) [ 1900.665996][ T9683] Call trace: [ 1900.666054][ T9683] show_stack+0x18/0x24 (C) [ 1900.666219][ T9683] dump_stack_lvl+0xdc/0xf4 [ 1900.666368][ T9683] dump_stack+0x1c/0x28 [ 1900.666464][ T9683] should_fail_ex+0x5a0/0x6ac [ 1900.666566][ T9683] should_fail+0x14/0x20 [ 1900.666667][ T9683] should_fail_usercopy+0x1c/0x28 [ 1900.666758][ T9683] simple_read_from_buffer+0x84/0x214 [ 1900.666865][ T9683] proc_fail_nth_read+0x160/0x21c [ 1900.666970][ T9683] vfs_read+0x18c/0x97c [ 1900.667097][ T9683] ksys_read+0xec/0x1d8 [ 1900.667202][ T9683] __arm64_sys_read+0x6c/0x9c [ 1900.667287][ T9683] invoke_syscall+0x6c/0x258 [ 1900.667360][ T9683] el0_svc_common.constprop.0+0xac/0x230 [ 1900.667436][ T9683] do_el0_svc+0x40/0x58 [ 1900.667507][ T9683] el0_svc+0x50/0x1a0 [ 1900.667615][ T9683] el0t_64_sync_handler+0xa0/0xe4 [ 1900.667801][ T9683] el0t_64_sync+0x198/0x19c [ 1904.970473][ T30] audit: type=1400 audit(1904.410:507): avc: denied { create } for pid=9695 comm="syz.0.2464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1905.592596][ T30] audit: type=1400 audit(1905.030:508): avc: denied { ioctl } for pid=9695 comm="syz.0.2464" path="socket:[25786]" dev="sockfs" ino=25786 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1905.685552][ T30] audit: type=1400 audit(1905.120:509): avc: denied { read write } for pid=9695 comm="syz.0.2464" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1905.719877][ T30] audit: type=1400 audit(1905.160:510): avc: denied { open } for pid=9695 comm="syz.0.2464" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1906.216401][ T9700] netlink: 184 bytes leftover after parsing attributes in process `syz.1.2465'. [ 1909.638280][ T30] audit: type=1400 audit(1909.080:511): avc: denied { setattr } for pid=9712 comm="syz.0.2469" name="loop8" dev="devtmpfs" ino=645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1914.016701][ T9718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9718 comm=syz.1.2471 [ 1914.041865][ T30] audit: type=1400 audit(1913.470:512): avc: denied { ioctl } for pid=9716 comm="syz.1.2471" path="socket:[26745]" dev="sockfs" ino=26745 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1914.043838][ T30] audit: type=1400 audit(1913.480:513): avc: denied { create } for pid=9716 comm="syz.1.2471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1914.594167][ T30] audit: type=1400 audit(1914.030:514): avc: denied { write } for pid=9716 comm="syz.1.2471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1914.668154][ T30] audit: type=1400 audit(1914.110:515): avc: denied { setattr } for pid=9716 comm="syz.1.2471" name="dsp1" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1932.708938][ T9751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=9751 comm=syz.1.2480 [ 1941.009902][ T30] audit: type=1400 audit(1940.450:516): avc: denied { read } for pid=9773 comm="syz.0.2485" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1941.027483][ T30] audit: type=1400 audit(1940.470:517): avc: denied { open } for pid=9773 comm="syz.0.2485" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1946.050549][ T30] audit: type=1400 audit(1945.490:518): avc: granted { setsecparam } for pid=9784 comm="syz.0.2487" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1946.086654][ T30] audit: type=1400 audit(1945.530:519): avc: granted { setsecparam } for pid=9784 comm="syz.0.2487" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1954.547404][ T9810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9810 comm=syz.1.2492 [ 1962.975949][ T9832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9832 comm=syz.0.2498 [ 1971.224629][ T9857] netlink: 184 bytes leftover after parsing attributes in process `syz.1.2506'. [ 1985.841933][ T9895] netlink: 184 bytes leftover after parsing attributes in process `syz.1.2521'. [ 2000.644884][ T9948] netlink: 184 bytes leftover after parsing attributes in process `syz.1.2544'. [ 2005.878054][ T9968] netlink: 184 bytes leftover after parsing attributes in process `syz.1.2553'. [ 2012.720461][ T9982] netlink: 184 bytes leftover after parsing attributes in process `syz.1.2559'. [ 2038.763885][ T30] audit: type=1400 audit(2038.200:520): avc: denied { create } for pid=10029 comm="syz.1.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2038.770607][ T30] audit: type=1400 audit(2038.210:521): avc: denied { bind } for pid=10029 comm="syz.1.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2038.786170][ T30] audit: type=1400 audit(2038.230:522): avc: denied { accept } for pid=10029 comm="syz.1.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2038.805124][ T30] audit: type=1400 audit(2038.240:523): avc: denied { setopt } for pid=10029 comm="syz.1.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2038.831774][ T30] audit: type=1400 audit(2038.270:524): avc: denied { write } for pid=10029 comm="syz.1.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2054.431678][T10067] netlink: 184 bytes leftover after parsing attributes in process `syz.0.2594'. [ 2085.471744][T10134] FAULT_INJECTION: forcing a failure. [ 2085.471744][T10134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2085.472507][T10134] CPU: 1 UID: 0 PID: 10134 Comm: syz.0.2608 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2085.472745][T10134] Hardware name: linux,dummy-virt (DT) [ 2085.472814][T10134] Call trace: [ 2085.472869][T10134] show_stack+0x18/0x24 (C) [ 2085.473037][T10134] dump_stack_lvl+0xdc/0xf4 [ 2085.473216][T10134] dump_stack+0x1c/0x28 [ 2085.473318][T10134] should_fail_ex+0x5a0/0x6ac [ 2085.473416][T10134] should_fail+0x14/0x20 [ 2085.473581][T10134] should_fail_usercopy+0x1c/0x28 [ 2085.473737][T10134] _inline_copy_from_user+0x38/0x138 [ 2085.473976][T10134] vmemdup_user+0x58/0xb8 [ 2085.474235][T10134] setxattr_copy+0xc4/0x174 [ 2085.474410][T10134] path_setxattrat+0xe4/0x204 [ 2085.477883][T10134] __arm64_sys_fsetxattr+0xac/0x108 [ 2085.477974][T10134] invoke_syscall+0x6c/0x258 [ 2085.482678][T10134] el0_svc_common.constprop.0+0xac/0x230 [ 2085.482807][T10134] do_el0_svc+0x40/0x58 [ 2085.482902][T10134] el0_svc+0x50/0x1a0 [ 2085.482991][T10134] el0t_64_sync_handler+0xa0/0xe4 [ 2085.483079][T10134] el0t_64_sync+0x198/0x19c [ 2097.807016][T10157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=10157 comm=syz.0.2613 [ 2102.403802][ T30] audit: type=1400 audit(2101.840:525): avc: denied { read write } for pid=10167 comm="syz.1.2616" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2102.407812][ T30] audit: type=1400 audit(2101.850:526): avc: denied { open } for pid=10167 comm="syz.1.2616" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2106.862115][T10179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=10179 comm=syz.1.2618 [ 2115.360860][T10202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=10202 comm=syz.0.2623 [ 2123.350645][T10225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=10225 comm=syz.1.2628 [ 2131.369177][ T30] audit: type=1400 audit(2130.810:527): avc: denied { create } for pid=10253 comm="syz.1.2635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2131.563754][ T30] audit: type=1400 audit(2131.000:528): avc: denied { ioctl } for pid=10253 comm="syz.1.2635" path="socket:[27675]" dev="sockfs" ino=27675 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2135.667823][ T30] audit: type=1400 audit(2135.100:529): avc: denied { mounton } for pid=10264 comm="syz.1.2637" path="/1391/file0" dev="tmpfs" ino=7142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2145.633829][ T30] audit: type=1400 audit(2145.070:530): avc: denied { setopt } for pid=10303 comm="syz.0.2647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2151.358340][ T30] audit: type=1400 audit(2150.790:531): avc: denied { write } for pid=10321 comm="syz.0.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2153.216223][ T30] audit: type=1400 audit(2152.650:532): avc: denied { connect } for pid=10321 comm="syz.0.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2153.240132][ T30] audit: type=1400 audit(2152.680:533): avc: denied { ioctl } for pid=10321 comm="syz.0.2652" path="socket:[27776]" dev="sockfs" ino=27776 ioctlcmd=0x940c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2164.487921][ T30] audit: type=1400 audit(2163.920:534): avc: denied { write } for pid=10360 comm="syz.0.2658" name="arp" dev="proc" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2164.565632][T10361] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10361 comm=syz.0.2658 [ 2172.219741][ T30] audit: type=1400 audit(2171.650:535): avc: denied { map_create } for pid=10380 comm="syz.1.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2180.379793][ T30] audit: type=1400 audit(2179.820:536): avc: denied { read } for pid=10421 comm="syz.0.2668" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2180.395937][ T30] audit: type=1400 audit(2179.820:537): avc: denied { open } for pid=10421 comm="syz.0.2668" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2180.518822][ T30] audit: type=1400 audit(2179.960:538): avc: denied { ioctl } for pid=10421 comm="syz.0.2668" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3302 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2180.645966][T10422] 8021q: VLANs not supported on vcan0 [ 2187.767369][T10432] FAULT_INJECTION: forcing a failure. [ 2187.767369][T10432] name failslab, interval 1, probability 0, space 0, times 0 [ 2187.768276][T10432] CPU: 1 UID: 0 PID: 10432 Comm: syz.1.2671 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2187.768422][T10432] Hardware name: linux,dummy-virt (DT) [ 2187.768488][T10432] Call trace: [ 2187.768549][T10432] show_stack+0x18/0x24 (C) [ 2187.768728][T10432] dump_stack_lvl+0xdc/0xf4 [ 2187.768847][T10432] dump_stack+0x1c/0x28 [ 2187.768985][T10432] should_fail_ex+0x5a0/0x6ac [ 2187.769281][T10432] should_failslab+0xbc/0x11c [ 2187.769515][T10432] __kmalloc_noprof+0xd0/0x4d0 [ 2187.769627][T10432] tomoyo_encode2+0xa8/0x2c0 [ 2187.769752][T10432] tomoyo_encode+0x28/0x40 [ 2187.769932][T10432] tomoyo_realpath_from_path+0x114/0x534 [ 2187.770190][T10432] tomoyo_path_number_perm+0x200/0x438 [ 2187.770367][T10432] tomoyo_file_ioctl+0x1c/0x28 [ 2187.770477][T10432] security_file_ioctl+0x8c/0x19c [ 2187.770578][T10432] __arm64_sys_ioctl+0x90/0x1a4 [ 2187.770744][T10432] invoke_syscall+0x6c/0x258 [ 2187.770988][T10432] el0_svc_common.constprop.0+0xac/0x230 [ 2187.771359][T10432] do_el0_svc+0x40/0x58 [ 2187.771653][T10432] el0_svc+0x50/0x1a0 [ 2187.772127][T10432] el0t_64_sync_handler+0xa0/0xe4 [ 2187.772472][T10432] el0t_64_sync+0x198/0x19c [ 2187.797671][T10432] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2218.631805][ T30] audit: type=1400 audit(2218.070:539): avc: denied { connect } for pid=10489 comm="syz.0.2689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2220.308643][ T30] audit: type=1400 audit(2219.750:540): avc: denied { create } for pid=10497 comm="syz.1.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 2235.242268][ T30] audit: type=1400 audit(2234.680:541): avc: denied { mount } for pid=10535 comm="syz.1.2706" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2235.391748][ T30] audit: type=1400 audit(2234.830:542): avc: denied { read append } for pid=10535 comm="syz.1.2706" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2235.432055][ T30] audit: type=1400 audit(2234.870:543): avc: denied { open } for pid=10535 comm="syz.1.2706" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2235.461590][ T30] audit: type=1400 audit(2234.890:544): avc: denied { ioctl } for pid=10535 comm="syz.1.2706" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2235.630683][ T30] audit: type=1400 audit(2235.060:545): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2242.688640][T10563] FAULT_INJECTION: forcing a failure. [ 2242.688640][T10563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2242.689433][T10563] CPU: 1 UID: 0 PID: 10563 Comm: syz.1.2711 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2242.689572][T10563] Hardware name: linux,dummy-virt (DT) [ 2242.689642][T10563] Call trace: [ 2242.689698][T10563] show_stack+0x18/0x24 (C) [ 2242.689871][T10563] dump_stack_lvl+0xdc/0xf4 [ 2242.690085][T10563] dump_stack+0x1c/0x28 [ 2242.690366][T10563] should_fail_ex+0x5a0/0x6ac [ 2242.690601][T10563] should_fail+0x14/0x20 [ 2242.690880][T10563] should_fail_usercopy+0x1c/0x28 [ 2242.691072][T10563] _inline_copy_from_user+0x38/0x130 [ 2242.691343][T10563] move_addr_to_kernel+0x44/0x10c [ 2242.691449][T10563] __sys_connect+0xa8/0x130 [ 2242.691585][T10563] __arm64_sys_connect+0x6c/0xa0 [ 2242.691766][T10563] invoke_syscall+0x6c/0x258 [ 2242.692038][T10563] el0_svc_common.constprop.0+0xac/0x230 [ 2242.692265][T10563] do_el0_svc+0x40/0x58 [ 2242.692363][T10563] el0_svc+0x50/0x1a0 [ 2242.692532][T10563] el0t_64_sync_handler+0xa0/0xe4 [ 2242.692757][T10563] el0t_64_sync+0x198/0x19c [ 2294.561277][T10689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=10689 comm=syz.0.2744 [ 2299.717313][T10707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=10707 comm=syz.0.2749 [ 2308.748286][ T30] audit: type=1400 audit(2308.190:546): avc: denied { getopt } for pid=10723 comm="syz.1.2754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2308.788074][T10724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=10724 comm=syz.1.2754 [ 2309.668174][T10729] fuse: Bad value for 'fd' [ 2309.686014][ T30] audit: type=1400 audit(2309.130:547): avc: denied { remount } for pid=10728 comm="syz.1.2756" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2310.460126][ T30] audit: type=1400 audit(2309.900:548): avc: denied { setattr } for pid=10731 comm="syz.0.2757" name="NETLINK" dev="sockfs" ino=29134 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2319.204217][T10770] serio: Serial port pts0 [ 2320.354561][T10773] serio: Serial port pts1 [ 2321.458681][T10777] FAULT_INJECTION: forcing a failure. [ 2321.458681][T10777] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.459080][T10777] CPU: 1 UID: 0 PID: 10777 Comm: syz.1.2770 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2321.459203][T10777] Hardware name: linux,dummy-virt (DT) [ 2321.459275][T10777] Call trace: [ 2321.459328][T10777] show_stack+0x18/0x24 (C) [ 2321.459488][T10777] dump_stack_lvl+0xdc/0xf4 [ 2321.459588][T10777] dump_stack+0x1c/0x28 [ 2321.459675][T10777] should_fail_ex+0x5a0/0x6ac [ 2321.459878][T10777] should_failslab+0xbc/0x11c [ 2321.460024][T10777] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 2321.460188][T10777] __alloc_skb+0x208/0x2f0 [ 2321.460297][T10777] alloc_skb_with_frags+0xb4/0x6b8 [ 2321.460419][T10777] sock_alloc_send_pskb+0x5e8/0x708 [ 2321.460614][T10777] unix_dgram_sendmsg+0x290/0x11b0 [ 2321.460723][T10777] unix_seqpacket_sendmsg+0xd4/0x174 [ 2321.460879][T10777] __sock_sendmsg+0xc8/0x168 [ 2321.461002][T10777] ____sys_sendmsg+0x500/0x764 [ 2321.461095][T10777] ___sys_sendmsg+0x11c/0x19c [ 2321.461192][T10777] __sys_sendmsg+0x114/0x19c [ 2321.461356][T10777] __arm64_sys_sendmsg+0x70/0xa0 [ 2321.461489][T10777] invoke_syscall+0x6c/0x258 [ 2321.461709][T10777] el0_svc_common.constprop.0+0xac/0x230 [ 2321.461874][T10777] do_el0_svc+0x40/0x58 [ 2321.462029][T10777] el0_svc+0x50/0x1a0 [ 2321.462144][T10777] el0t_64_sync_handler+0xa0/0xe4 [ 2321.462301][T10777] el0t_64_sync+0x198/0x19c [ 2332.061823][ T30] audit: type=1400 audit(2331.500:549): avc: denied { create } for pid=10814 comm="syz.1.2783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2332.069056][ T30] audit: type=1400 audit(2331.510:550): avc: denied { setopt } for pid=10814 comm="syz.1.2783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2333.724596][ T30] audit: type=1400 audit(2333.160:551): avc: denied { create } for pid=10822 comm="syz.1.2786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 2334.337644][ T30] audit: type=1400 audit(2333.780:552): avc: denied { relabelto } for pid=10822 comm="syz.1.2786" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crack_exec_t:s0" [ 2334.340009][ T30] audit: type=1400 audit(2333.780:553): avc: denied { associate } for pid=10822 comm="syz.1.2786" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:crack_exec_t:s0" [ 2341.835138][ T30] audit: type=1400 audit(2341.270:554): avc: denied { create } for pid=10863 comm="syz.1.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2341.841066][ T30] audit: type=1400 audit(2341.280:555): avc: denied { ioctl } for pid=10863 comm="syz.1.2797" path="socket:[29314]" dev="sockfs" ino=29314 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2343.551691][T10873] FAULT_INJECTION: forcing a failure. [ 2343.551691][T10873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2343.568273][T10873] CPU: 0 UID: 0 PID: 10873 Comm: syz.0.2799 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2343.568533][T10873] Hardware name: linux,dummy-virt (DT) [ 2343.568616][T10873] Call trace: [ 2343.568674][T10873] show_stack+0x18/0x24 (C) [ 2343.568843][T10873] dump_stack_lvl+0xdc/0xf4 [ 2343.568956][T10873] dump_stack+0x1c/0x28 [ 2343.569050][T10873] should_fail_ex+0x5a0/0x6ac [ 2343.569149][T10873] should_fail+0x14/0x20 [ 2343.569236][T10873] should_fail_usercopy+0x1c/0x28 [ 2343.569325][T10873] _copy_from_iter+0x178/0xfec [ 2343.569425][T10873] netlink_sendmsg+0x5e8/0xa54 [ 2343.569518][T10873] __sock_sendmsg+0xc8/0x168 [ 2343.569630][T10873] ____sys_sendmsg+0x500/0x764 [ 2343.569725][T10873] ___sys_sendmsg+0x11c/0x19c [ 2343.569825][T10873] __sys_sendmsg+0x114/0x19c [ 2343.569923][T10873] __arm64_sys_sendmsg+0x70/0xa0 [ 2343.570025][T10873] invoke_syscall+0x6c/0x258 [ 2343.570122][T10873] el0_svc_common.constprop.0+0xac/0x230 [ 2343.570224][T10873] do_el0_svc+0x40/0x58 [ 2343.570339][T10873] el0_svc+0x50/0x1a0 [ 2343.570434][T10873] el0t_64_sync_handler+0xa0/0xe4 [ 2343.570520][T10873] el0t_64_sync+0x198/0x19c [ 2346.577115][T10884] FAULT_INJECTION: forcing a failure. [ 2346.577115][T10884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2346.604311][T10884] CPU: 1 UID: 0 PID: 10884 Comm: syz.1.2804 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2346.604593][T10884] Hardware name: linux,dummy-virt (DT) [ 2346.604670][T10884] Call trace: [ 2346.604745][T10884] show_stack+0x18/0x24 (C) [ 2346.604939][T10884] dump_stack_lvl+0xdc/0xf4 [ 2346.605060][T10884] dump_stack+0x1c/0x28 [ 2346.605155][T10884] should_fail_ex+0x5a0/0x6ac [ 2346.605258][T10884] should_fail+0x14/0x20 [ 2346.605346][T10884] should_fail_usercopy+0x1c/0x28 [ 2346.605437][T10884] simple_read_from_buffer+0x84/0x214 [ 2346.605535][T10884] proc_fail_nth_read+0x160/0x21c [ 2346.605638][T10884] vfs_read+0x18c/0x97c [ 2346.605729][T10884] ksys_read+0xec/0x1d8 [ 2346.605821][T10884] __arm64_sys_read+0x6c/0x9c [ 2346.605923][T10884] invoke_syscall+0x6c/0x258 [ 2346.606023][T10884] el0_svc_common.constprop.0+0xac/0x230 [ 2346.606120][T10884] do_el0_svc+0x40/0x58 [ 2346.606215][T10884] el0_svc+0x50/0x1a0 [ 2346.606348][T10884] el0t_64_sync_handler+0xa0/0xe4 [ 2346.606458][T10884] el0t_64_sync+0x198/0x19c [ 2367.097699][T10952] FAULT_INJECTION: forcing a failure. [ 2367.097699][T10952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2367.098116][T10952] CPU: 0 UID: 0 PID: 10952 Comm: syz.1.2822 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2367.098185][T10952] Hardware name: linux,dummy-virt (DT) [ 2367.098218][T10952] Call trace: [ 2367.098244][T10952] show_stack+0x18/0x24 (C) [ 2367.098381][T10952] dump_stack_lvl+0xdc/0xf4 [ 2367.098444][T10952] dump_stack+0x1c/0x28 [ 2367.098489][T10952] should_fail_ex+0x5a0/0x6ac [ 2367.098535][T10952] should_fail+0x14/0x20 [ 2367.098573][T10952] should_fail_usercopy+0x1c/0x28 [ 2367.098622][T10952] _inline_copy_from_user+0x38/0x130 [ 2367.098673][T10952] copy_msghdr_from_user+0xa0/0x130 [ 2367.098742][T10952] ___sys_sendmsg+0xfc/0x19c [ 2367.098840][T10952] __sys_sendmsg+0x114/0x19c [ 2367.098951][T10952] __arm64_sys_sendmsg+0x70/0xa0 [ 2367.099030][T10952] invoke_syscall+0x6c/0x258 [ 2367.099109][T10952] el0_svc_common.constprop.0+0xac/0x230 [ 2367.099217][T10952] do_el0_svc+0x40/0x58 [ 2367.099294][T10952] el0_svc+0x50/0x1a0 [ 2367.099407][T10952] el0t_64_sync_handler+0xa0/0xe4 [ 2367.099473][T10952] el0t_64_sync+0x198/0x19c [ 2369.648167][ T30] audit: type=1400 audit(2369.080:556): avc: denied { create } for pid=10962 comm="syz.1.2825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2369.660942][ T30] audit: type=1400 audit(2369.100:557): avc: denied { ioctl } for pid=10962 comm="syz.1.2825" path="socket:[29473]" dev="sockfs" ino=29473 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2372.831446][ T30] audit: type=1400 audit(2372.270:558): avc: denied { create } for pid=10974 comm="syz.1.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2373.799907][T10983] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 2373.800644][T10983] audit: out of memory in audit_log_start [ 2377.521218][T10998] FAULT_INJECTION: forcing a failure. [ 2377.521218][T10998] name failslab, interval 1, probability 0, space 0, times 0 [ 2377.522207][T10998] CPU: 0 UID: 0 PID: 10998 Comm: syz.0.2838 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2377.522376][T10998] Hardware name: linux,dummy-virt (DT) [ 2377.522452][T10998] Call trace: [ 2377.522526][T10998] show_stack+0x18/0x24 (C) [ 2377.522754][T10998] dump_stack_lvl+0xdc/0xf4 [ 2377.522900][T10998] dump_stack+0x1c/0x28 [ 2377.523001][T10998] should_fail_ex+0x5a0/0x6ac [ 2377.523138][T10998] should_failslab+0xbc/0x11c [ 2377.523249][T10998] __kmalloc_cache_noprof+0x74/0x3d0 [ 2377.523352][T10998] snd_mixer_oss_open+0xd4/0x234 [ 2377.523497][T10998] soundcore_open+0x2a8/0x400 [ 2377.523617][T10998] chrdev_open+0x1a4/0x4e8 [ 2377.523722][T10998] do_dentry_open+0x6a4/0x103c [ 2377.523825][T10998] vfs_open+0x5c/0x2fc [ 2377.523933][T10998] path_openat+0x1490/0x24b4 [ 2377.524032][T10998] do_filp_open+0x184/0x360 [ 2377.524264][T10998] do_sys_openat2+0xe0/0x160 [ 2377.524384][T10998] __arm64_sys_openat+0x12c/0x1bc [ 2377.524492][T10998] invoke_syscall+0x6c/0x258 [ 2377.524593][T10998] el0_svc_common.constprop.0+0xac/0x230 [ 2377.524694][T10998] do_el0_svc+0x40/0x58 [ 2377.524788][T10998] el0_svc+0x50/0x1a0 [ 2377.524930][T10998] el0t_64_sync_handler+0xa0/0xe4 [ 2377.525031][T10998] el0t_64_sync+0x198/0x19c [ 2382.645968][ T30] audit: type=1400 audit(2382.090:559): avc: denied { open } for pid=11014 comm="syz.1.2844" path="/dev/ttyq6" dev="devtmpfs" ino=373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2384.717653][T11025] FAULT_INJECTION: forcing a failure. [ 2384.717653][T11025] name failslab, interval 1, probability 0, space 0, times 0 [ 2384.719008][T11025] CPU: 1 UID: 0 PID: 11025 Comm: syz.0.2847 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2384.719085][T11025] Hardware name: linux,dummy-virt (DT) [ 2384.719118][T11025] Call trace: [ 2384.719143][T11025] show_stack+0x18/0x24 (C) [ 2384.719221][T11025] dump_stack_lvl+0xdc/0xf4 [ 2384.719272][T11025] dump_stack+0x1c/0x28 [ 2384.719316][T11025] should_fail_ex+0x5a0/0x6ac [ 2384.719362][T11025] should_failslab+0xbc/0x11c [ 2384.719407][T11025] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 2384.719452][T11025] __alloc_skb+0x208/0x2f0 [ 2384.719502][T11025] netlink_alloc_large_skb+0xac/0xd8 [ 2384.719548][T11025] netlink_sendmsg+0x4ac/0xa54 [ 2384.719591][T11025] __sock_sendmsg+0xc8/0x168 [ 2384.719649][T11025] __sys_sendto+0x1d8/0x270 [ 2384.719693][T11025] __arm64_sys_sendto+0xc0/0x134 [ 2384.719738][T11025] invoke_syscall+0x6c/0x258 [ 2384.719782][T11025] el0_svc_common.constprop.0+0xac/0x230 [ 2384.719825][T11025] do_el0_svc+0x40/0x58 [ 2384.719866][T11025] el0_svc+0x50/0x1a0 [ 2384.719909][T11025] el0t_64_sync_handler+0xa0/0xe4 [ 2384.719950][T11025] el0t_64_sync+0x198/0x19c [ 2392.256746][T11051] FAULT_INJECTION: forcing a failure. [ 2392.256746][T11051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2392.257396][T11051] CPU: 0 UID: 0 PID: 11051 Comm: syz.1.2856 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2392.257520][T11051] Hardware name: linux,dummy-virt (DT) [ 2392.257584][T11051] Call trace: [ 2392.257660][T11051] show_stack+0x18/0x24 (C) [ 2392.257821][T11051] dump_stack_lvl+0xdc/0xf4 [ 2392.258019][T11051] dump_stack+0x1c/0x28 [ 2392.258129][T11051] should_fail_ex+0x5a0/0x6ac [ 2392.258307][T11051] should_fail+0x14/0x20 [ 2392.258438][T11051] should_fail_usercopy+0x1c/0x28 [ 2392.258567][T11051] _inline_copy_from_user+0x38/0x130 [ 2392.258690][T11051] copy_msghdr_from_user+0xa0/0x130 [ 2392.258787][T11051] ___sys_sendmsg+0xfc/0x19c [ 2392.258893][T11051] __sys_sendmsg+0x114/0x19c [ 2392.259075][T11051] __arm64_sys_sendmsg+0x70/0xa0 [ 2392.259354][T11051] invoke_syscall+0x6c/0x258 [ 2392.259639][T11051] el0_svc_common.constprop.0+0xac/0x230 [ 2392.259774][T11051] do_el0_svc+0x40/0x58 [ 2392.259884][T11051] el0_svc+0x50/0x1a0 [ 2392.260001][T11051] el0t_64_sync_handler+0xa0/0xe4 [ 2392.260112][T11051] el0t_64_sync+0x198/0x19c [ 2404.337924][ T30] audit: type=1400 audit(2403.780:560): avc: denied { read write } for pid=11089 comm="syz.1.2872" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2404.348349][ T30] audit: type=1400 audit(2403.780:561): avc: denied { open } for pid=11089 comm="syz.1.2872" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2405.141911][ T30] audit: type=1400 audit(2404.580:562): avc: denied { ioctl } for pid=11096 comm="syz.0.2875" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf74 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2432.178103][ T30] audit: type=1400 audit(2431.590:563): avc: denied { read } for pid=11155 comm="syz.1.2898" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2432.204965][ T30] audit: type=1400 audit(2431.640:564): avc: denied { open } for pid=11155 comm="syz.1.2898" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2432.205426][ T30] audit: type=1400 audit(2431.640:565): avc: denied { execmem } for pid=11155 comm="syz.1.2898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2435.501833][T11176] FAULT_INJECTION: forcing a failure. [ 2435.501833][T11176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2435.511820][T11176] CPU: 0 UID: 0 PID: 11176 Comm: syz.1.2903 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2435.511962][T11176] Hardware name: linux,dummy-virt (DT) [ 2435.511995][T11176] Call trace: [ 2435.512027][T11176] show_stack+0x18/0x24 (C) [ 2435.512116][T11176] dump_stack_lvl+0xdc/0xf4 [ 2435.512169][T11176] dump_stack+0x1c/0x28 [ 2435.512213][T11176] should_fail_ex+0x5a0/0x6ac [ 2435.512258][T11176] should_fail+0x14/0x20 [ 2435.512299][T11176] should_fail_usercopy+0x1c/0x28 [ 2435.512339][T11176] setup_rt_frame+0xe54/0x2814 [ 2435.512381][T11176] do_signal+0x4a8/0x6a8 [ 2435.512423][T11176] do_notify_resume+0x194/0x260 [ 2435.512467][T11176] el0_svc+0x120/0x1a0 [ 2435.512510][T11176] el0t_64_sync_handler+0xa0/0xe4 [ 2435.512567][T11176] el0t_64_sync+0x198/0x19c [ 2448.007642][T11216] FAULT_INJECTION: forcing a failure. [ 2448.007642][T11216] name failslab, interval 1, probability 0, space 0, times 0 [ 2448.008716][T11216] CPU: 0 UID: 0 PID: 11216 Comm: syz.1.2918 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2448.008954][T11216] Hardware name: linux,dummy-virt (DT) [ 2448.009050][T11216] Call trace: [ 2448.009136][T11216] show_stack+0x18/0x24 (C) [ 2448.009368][T11216] dump_stack_lvl+0xdc/0xf4 [ 2448.009577][T11216] dump_stack+0x1c/0x28 [ 2448.009762][T11216] should_fail_ex+0x5a0/0x6ac [ 2448.009961][T11216] should_failslab+0xbc/0x11c [ 2448.010141][T11216] __kvmalloc_node_noprof+0x148/0x634 [ 2448.010345][T11216] simple_xattr_alloc+0x38/0x94 [ 2448.010533][T11216] simple_xattr_set+0x3c/0x2e8 [ 2448.010722][T11216] shmem_xattr_handler_set+0x264/0x2f8 [ 2448.010908][T11216] __vfs_setxattr+0x11c/0x174 [ 2448.011089][T11216] __vfs_setxattr_noperm+0xf8/0x4b4 [ 2448.011262][T11216] __vfs_setxattr_locked+0x174/0x1d0 [ 2448.011475][T11216] vfs_setxattr+0x114/0x288 [ 2448.011671][T11216] do_setxattr+0x11c/0x160 [ 2448.011850][T11216] file_setxattr+0xf0/0x14c [ 2448.012019][T11216] path_setxattrat+0x184/0x204 [ 2448.012190][T11216] __arm64_sys_fsetxattr+0xac/0x108 [ 2448.012364][T11216] invoke_syscall+0x6c/0x258 [ 2448.012536][T11216] el0_svc_common.constprop.0+0xac/0x230 [ 2448.012772][T11216] do_el0_svc+0x40/0x58 [ 2448.012955][T11216] el0_svc+0x50/0x1a0 [ 2448.013128][T11216] el0t_64_sync_handler+0xa0/0xe4 [ 2448.013346][T11216] el0t_64_sync+0x198/0x19c [ 2449.050833][ T30] audit: type=1400 audit(2448.490:566): avc: denied { relabelfrom } for pid=11217 comm="syz.1.2919" name="" dev="pipefs" ino=30941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2449.062401][T11218] SELinux: Context system_u:object_r:user_cron_spool_t:s0 is not valid (left unmapped). [ 2449.068486][ T30] audit: type=1400 audit(2448.510:567): avc: denied { relabelto } for pid=11217 comm="syz.1.2919" name="" dev="pipefs" ino=30941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 2452.104463][T11231] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=11231 comm=syz.1.2923 [ 2452.550132][T11235] FAULT_INJECTION: forcing a failure. [ 2452.550132][T11235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2452.550782][T11235] CPU: 0 UID: 0 PID: 11235 Comm: syz.1.2925 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2452.550937][T11235] Hardware name: linux,dummy-virt (DT) [ 2452.550976][T11235] Call trace: [ 2452.551002][T11235] show_stack+0x18/0x24 (C) [ 2452.551081][T11235] dump_stack_lvl+0xdc/0xf4 [ 2452.551133][T11235] dump_stack+0x1c/0x28 [ 2452.551175][T11235] should_fail_ex+0x5a0/0x6ac [ 2452.551222][T11235] should_fail+0x14/0x20 [ 2452.551261][T11235] should_fail_usercopy+0x1c/0x28 [ 2452.551304][T11235] simple_read_from_buffer+0x84/0x214 [ 2452.551403][T11235] proc_fail_nth_read+0x160/0x21c [ 2452.551520][T11235] vfs_read+0x18c/0x97c [ 2452.551689][T11235] ksys_read+0xec/0x1d8 [ 2452.551829][T11235] __arm64_sys_read+0x6c/0x9c [ 2452.551880][T11235] invoke_syscall+0x6c/0x258 [ 2452.551997][T11235] el0_svc_common.constprop.0+0xac/0x230 [ 2452.552047][T11235] do_el0_svc+0x40/0x58 [ 2452.552087][T11235] el0_svc+0x50/0x1a0 [ 2452.552132][T11235] el0t_64_sync_handler+0xa0/0xe4 [ 2452.552231][T11235] el0t_64_sync+0x198/0x19c [ 2452.769560][T11237] FAULT_INJECTION: forcing a failure. [ 2452.769560][T11237] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2452.771459][T11237] CPU: 1 UID: 0 PID: 11237 Comm: syz.1.2926 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2452.771540][T11237] Hardware name: linux,dummy-virt (DT) [ 2452.771574][T11237] Call trace: [ 2452.771606][T11237] show_stack+0x18/0x24 (C) [ 2452.771685][T11237] dump_stack_lvl+0xdc/0xf4 [ 2452.771739][T11237] dump_stack+0x1c/0x28 [ 2452.771820][T11237] should_fail_ex+0x5a0/0x6ac [ 2452.771924][T11237] should_fail+0x14/0x20 [ 2452.772007][T11237] should_fail_usercopy+0x1c/0x28 [ 2452.772093][T11237] _inline_copy_from_user+0x38/0x130 [ 2452.772202][T11237] copy_msghdr_from_user+0xa0/0x130 [ 2452.772301][T11237] ___sys_sendmsg+0xfc/0x19c [ 2452.772398][T11237] __sys_sendmsg+0x114/0x19c [ 2452.772496][T11237] __arm64_sys_sendmsg+0x70/0xa0 [ 2452.772633][T11237] invoke_syscall+0x6c/0x258 [ 2452.772763][T11237] el0_svc_common.constprop.0+0xac/0x230 [ 2452.772867][T11237] do_el0_svc+0x40/0x58 [ 2452.772960][T11237] el0_svc+0x50/0x1a0 [ 2452.773083][T11237] el0t_64_sync_handler+0xa0/0xe4 [ 2452.773188][T11237] el0t_64_sync+0x198/0x19c [ 2454.891558][ T30] audit: type=1400 audit(2454.330:568): avc: denied { accept } for pid=11241 comm="syz.1.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2455.066557][ T30] audit: type=1400 audit(2454.500:569): avc: denied { nlmsg_write } for pid=11241 comm="syz.1.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2455.096586][T11242] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2456.088566][T11260] FAULT_INJECTION: forcing a failure. [ 2456.088566][T11260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2456.089026][T11260] CPU: 0 UID: 0 PID: 11260 Comm: syz.1.2931 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2456.089096][T11260] Hardware name: linux,dummy-virt (DT) [ 2456.089127][T11260] Call trace: [ 2456.089153][T11260] show_stack+0x18/0x24 (C) [ 2456.089234][T11260] dump_stack_lvl+0xdc/0xf4 [ 2456.089288][T11260] dump_stack+0x1c/0x28 [ 2456.089332][T11260] should_fail_ex+0x5a0/0x6ac [ 2456.089376][T11260] should_fail+0x14/0x20 [ 2456.089416][T11260] should_fail_usercopy+0x1c/0x28 [ 2456.089456][T11260] simple_read_from_buffer+0x84/0x214 [ 2456.089504][T11260] proc_fail_nth_read+0x160/0x21c [ 2456.089553][T11260] vfs_read+0x18c/0x97c [ 2456.089599][T11260] ksys_read+0xec/0x1d8 [ 2456.089640][T11260] __arm64_sys_read+0x6c/0x9c [ 2456.089682][T11260] invoke_syscall+0x6c/0x258 [ 2456.089724][T11260] el0_svc_common.constprop.0+0xac/0x230 [ 2456.089766][T11260] do_el0_svc+0x40/0x58 [ 2456.089914][T11260] el0_svc+0x50/0x1a0 [ 2456.089980][T11260] el0t_64_sync_handler+0xa0/0xe4 [ 2456.090067][T11260] el0t_64_sync+0x198/0x19c [ 2460.028420][T10488] hid (null): unknown global tag 0xc [ 2460.029070][T10488] hid (null): report_id 0 is invalid [ 2460.055835][T10488] hid-generic 0FFF:0008:000C.0003: unknown global tag 0xc [ 2460.059686][T10488] hid-generic 0FFF:0008:000C.0003: item 0 0 1 12 parsing failed [ 2460.079767][T10488] hid-generic 0FFF:0008:000C.0003: probe with driver hid-generic failed with error -22 [ 2461.725420][T11274] FAULT_INJECTION: forcing a failure. [ 2461.725420][T11274] name failslab, interval 1, probability 0, space 0, times 0 [ 2461.725944][T11274] CPU: 0 UID: 0 PID: 11274 Comm: syz.1.2935 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2461.726021][T11274] Hardware name: linux,dummy-virt (DT) [ 2461.726066][T11274] Call trace: [ 2461.726124][T11274] show_stack+0x18/0x24 (C) [ 2461.726221][T11274] dump_stack_lvl+0xdc/0xf4 [ 2461.726276][T11274] dump_stack+0x1c/0x28 [ 2461.726611][T11274] should_fail_ex+0x5a0/0x6ac [ 2461.726855][T11274] should_failslab+0xbc/0x11c [ 2461.727003][T11274] __kvmalloc_node_noprof+0x148/0x634 [ 2461.727163][T11274] simple_xattr_alloc+0x38/0x94 [ 2461.727348][T11274] simple_xattr_set+0x3c/0x2e8 [ 2461.727495][T11274] shmem_xattr_handler_set+0x264/0x2f8 [ 2461.727649][T11274] __vfs_setxattr+0x11c/0x174 [ 2461.727856][T11274] __vfs_setxattr_noperm+0xf8/0x4b4 [ 2461.727981][T11274] __vfs_setxattr_locked+0x174/0x1d0 [ 2461.728070][T11274] vfs_setxattr+0x114/0x288 [ 2461.728178][T11274] do_setxattr+0x11c/0x160 [ 2461.728312][T11274] file_setxattr+0xf0/0x14c [ 2461.728507][T11274] path_setxattrat+0x184/0x204 [ 2461.728624][T11274] __arm64_sys_fsetxattr+0xac/0x108 [ 2461.728747][T11274] invoke_syscall+0x6c/0x258 [ 2461.728917][T11274] el0_svc_common.constprop.0+0xac/0x230 [ 2461.729132][T11274] do_el0_svc+0x40/0x58 [ 2461.729262][T11274] el0_svc+0x50/0x1a0 [ 2461.729407][T11274] el0t_64_sync_handler+0xa0/0xe4 [ 2461.729501][T11274] el0t_64_sync+0x198/0x19c [ 2462.889387][ T30] audit: type=1400 audit(2462.320:570): avc: denied { getattr } for pid=11275 comm="syz.0.2936" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=30340 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2467.699331][ T30] audit: type=1400 audit(2467.140:571): avc: denied { read } for pid=11296 comm="syz.1.2942" path="socket:[31048]" dev="sockfs" ino=31048 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2471.063516][ T30] audit: type=1400 audit(2470.500:572): avc: denied { append } for pid=11318 comm="syz.1.2947" name="ubi_ctrl" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2471.067260][T11319] capability: warning: `syz.1.2947' uses 32-bit capabilities (legacy support in use) [ 2471.082456][T11319] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2471.580031][ T30] audit: type=1400 audit(2471.020:573): avc: denied { create } for pid=11322 comm="syz.1.2948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 2476.348298][T11337] FAULT_INJECTION: forcing a failure. [ 2476.348298][T11337] name failslab, interval 1, probability 0, space 0, times 0 [ 2476.385206][T11337] CPU: 0 UID: 0 PID: 11337 Comm: syz.1.2952 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2476.385487][T11337] Hardware name: linux,dummy-virt (DT) [ 2476.385556][T11337] Call trace: [ 2476.385633][T11337] show_stack+0x18/0x24 (C) [ 2476.385781][T11337] dump_stack_lvl+0xdc/0xf4 [ 2476.385894][T11337] dump_stack+0x1c/0x28 [ 2476.385989][T11337] should_fail_ex+0x5a0/0x6ac [ 2476.386086][T11337] should_failslab+0xbc/0x11c [ 2476.386177][T11337] __kmalloc_noprof+0xd0/0x4d0 [ 2476.386267][T11337] tomoyo_realpath_from_path+0x90/0x534 [ 2476.386422][T11337] tomoyo_path_number_perm+0x200/0x438 [ 2476.386515][T11337] tomoyo_file_ioctl+0x1c/0x28 [ 2476.386627][T11337] security_file_ioctl+0x8c/0x19c [ 2476.386731][T11337] __arm64_sys_ioctl+0x90/0x1a4 [ 2476.386834][T11337] invoke_syscall+0x6c/0x258 [ 2476.386924][T11337] el0_svc_common.constprop.0+0xac/0x230 [ 2476.387018][T11337] do_el0_svc+0x40/0x58 [ 2476.387103][T11337] el0_svc+0x50/0x1a0 [ 2476.387193][T11337] el0t_64_sync_handler+0xa0/0xe4 [ 2476.387284][T11337] el0t_64_sync+0x198/0x19c [ 2476.390288][T11337] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2489.430172][T11364] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11364 comm=syz.0.2962 [ 2497.452256][ T30] audit: type=1400 audit(2496.890:574): avc: denied { ioctl } for pid=11392 comm="syz.0.2970" path="socket:[30506]" dev="sockfs" ino=30506 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2504.075963][T11421] 8021q: VLANs not supported on vcan0 [ 2521.464032][ T30] audit: type=1400 audit(2520.900:575): avc: denied { write } for pid=11485 comm="syz.0.3004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2522.945599][T11499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=11499 comm=syz.1.3009 [ 2524.594037][T11511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=11511 comm=syz.1.3015 [ 2525.322003][ T30] audit: type=1400 audit(2524.760:576): avc: denied { connect } for pid=11512 comm="syz.1.3016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2526.144654][T11516] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11516 comm=syz.1.3017 [ 2526.158977][ T30] audit: type=1400 audit(2525.600:577): avc: denied { ioctl } for pid=11515 comm="syz.1.3017" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2527.855739][T11523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=11523 comm=syz.1.3020 [ 2528.219279][ T30] audit: type=1400 audit(2527.660:578): avc: denied { create } for pid=11524 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2537.259541][ T30] audit: type=1400 audit(2536.700:579): avc: denied { listen } for pid=11542 comm="syz.0.3029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 2540.237319][ T30] audit: type=1400 audit(2539.680:580): avc: denied { execute } for pid=11556 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2540.246440][ T30] audit: type=1400 audit(2539.690:581): avc: denied { execute_no_trans } for pid=11556 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2540.453666][ T30] audit: type=1400 audit(2539.890:582): avc: denied { mounton } for pid=11557 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2542.854677][ T30] audit: type=1400 audit(2542.290:583): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2545.606771][ T9662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2545.662396][ T9662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2545.709673][ T9662] bond0 (unregistering): Released all slaves [ 2546.323791][ T9662] hsr_slave_0: left promiscuous mode [ 2546.334920][ T9662] hsr_slave_1: left promiscuous mode [ 2562.012209][T11557] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2562.089530][T11557] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2565.317421][ T30] audit: type=1400 audit(2564.760:584): avc: denied { map_read map_write } for pid=11618 comm="syz.1.3040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2565.634530][ T30] audit: type=1400 audit(2565.080:585): avc: denied { write } for pid=11621 comm="syz.1.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2565.636527][ T30] audit: type=1400 audit(2565.080:586): avc: denied { nlmsg_write } for pid=11621 comm="syz.1.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2565.637189][T11622] netlink: 104 bytes leftover after parsing attributes in process `syz.1.3041'. [ 2566.477842][ T30] audit: type=1326 audit(2565.920:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11631 comm="syz.1.3044" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2566.488195][ T30] audit: type=1326 audit(2565.930:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11631 comm="syz.1.3044" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2566.497676][ T30] audit: type=1326 audit(2565.940:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11631 comm="syz.1.3044" exe="/syz-executor" sig=0 arch=c00000b7 syscall=104 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2566.521902][ T30] audit: type=1400 audit(2565.940:590): avc: denied { kexec_image_load } for pid=11631 comm="syz.1.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 2566.522466][ T30] audit: type=1326 audit(2565.960:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11631 comm="syz.1.3044" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2566.526941][ T30] audit: type=1326 audit(2565.960:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11631 comm="syz.1.3044" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2566.527193][ T30] audit: type=1326 audit(2565.960:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11631 comm="syz.1.3044" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2567.758075][T11557] hsr_slave_0: entered promiscuous mode [ 2567.768400][T11557] hsr_slave_1: entered promiscuous mode [ 2571.535507][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 2571.536682][ T30] audit: type=1400 audit(2570.970:606): avc: denied { setopt } for pid=11655 comm="syz.1.3052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2572.084196][ T30] audit: type=1400 audit(2571.520:607): avc: denied { prog_run } for pid=11658 comm="syz.1.3053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2573.377153][T11557] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2573.482273][T11557] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2573.734091][T11557] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2573.827456][T11557] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2574.562268][T11677] binfmt_misc: register: failed to install interpreter file ./file0 [ 2577.455108][ T30] audit: type=1400 audit(2576.880:608): avc: denied { mount } for pid=11696 comm="syz.1.3063" name="/" dev="hugetlbfs" ino=32822 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2577.714763][ T30] audit: type=1400 audit(2577.160:609): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2578.801081][T11557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2581.758998][ T30] audit: type=1400 audit(2581.200:610): avc: denied { bind } for pid=11725 comm="syz.1.3071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2581.766107][ T30] audit: type=1400 audit(2581.200:611): avc: denied { name_bind } for pid=11725 comm="syz.1.3071" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2581.769483][ T30] audit: type=1400 audit(2581.200:612): avc: denied { node_bind } for pid=11725 comm="syz.1.3071" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2584.934536][ T30] audit: type=1326 audit(2584.360:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11744 comm="syz.1.3077" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2584.956138][ T30] audit: type=1326 audit(2584.380:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11744 comm="syz.1.3077" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2584.957414][ T30] audit: type=1326 audit(2584.390:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11744 comm="syz.1.3077" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2584.967429][ T30] audit: type=1326 audit(2584.410:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11744 comm="syz.1.3077" exe="/syz-executor" sig=0 arch=c00000b7 syscall=165 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2584.976622][ T30] audit: type=1326 audit(2584.410:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11744 comm="syz.1.3077" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2584.977669][ T30] audit: type=1326 audit(2584.420:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11744 comm="syz.1.3077" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2586.232618][ T30] audit: type=1400 audit(2585.660:619): avc: denied { name_bind } for pid=11752 comm="syz.1.3079" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2586.234754][ T30] audit: type=1400 audit(2585.670:620): avc: denied { node_bind } for pid=11752 comm="syz.1.3079" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2587.192459][ T30] audit: type=1326 audit(2586.630:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11762 comm="syz.1.3081" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2587.204184][ T30] audit: type=1326 audit(2586.640:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11762 comm="syz.1.3081" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e95ce28 code=0x7ffc0000 [ 2595.199274][T11557] veth0_vlan: entered promiscuous mode [ 2595.307499][T11557] veth1_vlan: entered promiscuous mode [ 2595.769284][T11557] veth0_macvtap: entered promiscuous mode [ 2595.827485][T11557] veth1_macvtap: entered promiscuous mode [ 2596.319560][ T744] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2596.322130][ T744] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2596.376806][ T744] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2596.379127][ T744] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2597.062566][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 2597.068035][ T30] audit: type=1400 audit(2596.500:627): avc: denied { mounton } for pid=11557 comm="syz-executor" path="/syzkaller.cR9U4H/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2597.111343][ T30] audit: type=1400 audit(2596.550:628): avc: denied { mount } for pid=11557 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2597.139866][ T30] audit: type=1400 audit(2596.580:629): avc: denied { mounton } for pid=11557 comm="syz-executor" path="/syzkaller.cR9U4H/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2597.156434][ T30] audit: type=1400 audit(2596.590:630): avc: denied { mounton } for pid=11557 comm="syz-executor" path="/syzkaller.cR9U4H/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=33034 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2597.207350][ T30] audit: type=1400 audit(2596.640:631): avc: denied { unmount } for pid=11557 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2597.238966][ T30] audit: type=1400 audit(2596.680:632): avc: denied { mounton } for pid=11557 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2597.255222][ T30] audit: type=1400 audit(2596.690:633): avc: denied { mount } for pid=11557 comm="syz-executor" name="/" dev="gadgetfs" ino=3719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2597.303971][ T30] audit: type=1400 audit(2596.740:634): avc: denied { mounton } for pid=11557 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2598.254739][ T30] audit: type=1400 audit(2597.690:635): avc: denied { relabelfrom } for pid=11808 comm="syz.0.3091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2598.270491][ T30] audit: type=1400 audit(2597.710:636): avc: denied { relabelto } for pid=11808 comm="syz.0.3091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2599.877942][ T744] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2600.226106][ T744] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2600.658827][ T744] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2601.136964][ T744] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2605.307781][ T744] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2605.401176][ T744] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2605.448317][ T744] bond0 (unregistering): Released all slaves [ 2605.965237][ T744] hsr_slave_0: left promiscuous mode [ 2606.004613][ T744] hsr_slave_1: left promiscuous mode [ 2606.188312][ T744] veth1_macvtap: left promiscuous mode [ 2606.189829][ T744] veth0_macvtap: left promiscuous mode [ 2606.191477][ T744] veth1_vlan: left promiscuous mode [ 2606.204132][ T744] veth0_vlan: left promiscuous mode [ 2607.645866][T11841] mmap: syz.0.3100 (11841) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2613.491517][T11855] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3105'. [ 2613.619893][T11855] veth1_to_team: entered promiscuous mode [ 2613.620557][T11855] veth1_to_team: entered allmulticast mode [ 2613.645806][T11855] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3105'. [ 2617.448497][T11887] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3113'. [ 2620.169519][T11813] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2620.284991][T11813] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2622.776490][T11925] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3123'. [ 2622.782086][T11925] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3123'. [ 2623.890450][ T30] kauditd_printk_skb: 53 callbacks suppressed [ 2623.903686][ T30] audit: type=1400 audit(2623.330:690): avc: denied { mount } for pid=11927 comm="syz.0.3124" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2623.927090][ T30] audit: type=1400 audit(2623.360:691): avc: denied { mounton } for pid=11927 comm="syz.0.3124" path="/34/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 2624.132257][ T30] audit: type=1400 audit(2623.570:692): avc: denied { unmount } for pid=11557 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2624.554964][ T30] audit: type=1400 audit(2623.990:693): avc: denied { getopt } for pid=11930 comm="syz.0.3125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2626.802472][T11813] hsr_slave_0: entered promiscuous mode [ 2626.817944][T11813] hsr_slave_1: entered promiscuous mode [ 2626.826696][T11813] debugfs: 'hsr0' already exists in 'hsr' [ 2626.829192][T11813] Cannot create hsr debugfs directory [ 2630.654736][T11813] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2630.701619][T11813] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2630.761649][T11813] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2630.886909][T11813] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2636.744883][T11813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2643.066948][ T30] audit: type=1400 audit(2642.510:694): avc: denied { setopt } for pid=12023 comm="syz.0.3141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2649.376920][ T30] audit: type=1400 audit(2648.820:695): avc: denied { bind } for pid=12062 comm="syz.0.3150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2649.425426][ T30] audit: type=1400 audit(2648.870:696): avc: denied { setopt } for pid=12062 comm="syz.0.3150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2649.827089][T12064] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2650.278753][T12064] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2650.602429][T12064] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2651.357627][T12064] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2652.319207][ T744] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2652.380525][ T744] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2652.430555][ T744] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2652.485090][T10106] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2652.982511][T11813] veth0_vlan: entered promiscuous mode [ 2653.086913][T11813] veth1_vlan: entered promiscuous mode [ 2653.516938][T11813] veth0_macvtap: entered promiscuous mode [ 2653.571023][T11813] veth1_macvtap: entered promiscuous mode [ 2653.797688][ T30] audit: type=1326 audit(2653.230:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.799486][ T30] audit: type=1326 audit(2653.240:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.817318][ T30] audit: type=1326 audit(2653.260:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=134 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.826480][ T30] audit: type=1326 audit(2653.260:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.830138][ T30] audit: type=1326 audit(2653.270:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.858021][ T30] audit: type=1326 audit(2653.300:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=279 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.863865][ T30] audit: type=1326 audit(2653.300:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2653.866638][ T30] audit: type=1326 audit(2653.300:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12085 comm="syz.0.3153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2654.058703][T11827] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2654.060270][T11827] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2654.061835][T11827] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2654.064976][T11827] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2655.577062][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 2655.585800][ T30] audit: type=1326 audit(2655.020:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12098 comm="syz.1.3157" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2655.586288][ T30] audit: type=1326 audit(2655.020:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12098 comm="syz.1.3157" exe="/syz-executor" sig=0 arch=c00000b7 syscall=461 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2655.586584][ T30] audit: type=1326 audit(2655.020:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12098 comm="syz.1.3157" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2659.315252][ T30] audit: type=1400 audit(2658.750:711): avc: denied { listen } for pid=12114 comm="syz.0.3164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2660.137109][T12118] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2660.659966][T12118] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2661.470694][T12118] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2661.838801][T12118] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2662.354918][T10106] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2662.445223][ T54] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2662.568473][ T54] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2662.675902][T10106] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2667.477038][ T30] audit: type=1400 audit(2666.920:712): avc: denied { setopt } for pid=12164 comm="syz.1.3183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2670.288046][ T30] audit: type=1400 audit(2669.730:713): avc: denied { ioctl } for pid=12189 comm="syz.1.3196" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2680.457186][ T30] audit: type=1326 audit(2679.900:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.470389][ T30] audit: type=1326 audit(2679.910:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.472208][ T30] audit: type=1326 audit(2679.910:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.489920][ T30] audit: type=1326 audit(2679.930:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.490459][ T30] audit: type=1326 audit(2679.930:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.499979][ T30] audit: type=1326 audit(2679.940:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.581710][ T30] audit: type=1326 audit(2680.020:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.607519][ T30] audit: type=1326 audit(2680.030:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.813663][ T30] audit: type=1326 audit(2680.240:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2680.841669][ T30] audit: type=1326 audit(2680.280:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12238 comm="syz.0.3218" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2687.675640][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 2687.676436][ T30] audit: type=1400 audit(2687.100:728): avc: denied { execute } for pid=12248 comm="syz.0.3222" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=34333 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 2689.184582][ T30] audit: type=1400 audit(2688.600:729): avc: denied { unlink } for pid=11813 comm="syz-executor" name="file0" dev="tmpfs" ino=187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2690.443784][T12261] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3228'. [ 2691.818174][ T30] audit: type=1326 audit(2691.260:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.848068][ T30] audit: type=1326 audit(2691.290:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.855689][ T30] audit: type=1326 audit(2691.290:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.865638][ T30] audit: type=1326 audit(2691.300:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.885157][ T30] audit: type=1326 audit(2691.320:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.890607][ T30] audit: type=1326 audit(2691.320:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.920361][ T30] audit: type=1326 audit(2691.360:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2691.928105][ T30] audit: type=1326 audit(2691.370:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12266 comm="syz.0.3231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2693.356162][ T30] kauditd_printk_skb: 67 callbacks suppressed [ 2693.359332][ T30] audit: type=1400 audit(2692.800:805): avc: denied { getopt } for pid=12279 comm="syz.1.3236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2694.021501][ T30] audit: type=1400 audit(2693.460:806): avc: denied { write } for pid=12281 comm="syz.1.3237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2694.905116][ T30] audit: type=1326 audit(2694.340:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.926520][ T30] audit: type=1326 audit(2694.360:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.930166][ T30] audit: type=1326 audit(2694.360:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.946026][ T30] audit: type=1326 audit(2694.360:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.946655][ T30] audit: type=1326 audit(2694.370:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.946948][ T30] audit: type=1326 audit(2694.370:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.947120][ T30] audit: type=1326 audit(2694.380:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=273 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2694.947324][ T30] audit: type=1326 audit(2694.380:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12288 comm="syz.0.3239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2700.455066][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 2700.455501][ T30] audit: type=1400 audit(2699.880:817): avc: denied { connect } for pid=12319 comm="syz.1.3254" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2705.926801][ T30] audit: type=1400 audit(2705.370:818): avc: denied { block_suspend } for pid=12345 comm="syz.1.3267" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2708.986668][ T30] audit: type=1400 audit(2708.420:819): avc: denied { load_policy } for pid=12361 comm="syz.1.3274" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2708.990214][T12362] SELinux: failed to load policy [ 2719.151724][T12400] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2719.166011][T12400] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2719.206883][ T30] audit: type=1326 audit(2718.640:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12399 comm="syz.1.3292" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2719.212065][ T30] audit: type=1326 audit(2718.650:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12399 comm="syz.1.3292" exe="/syz-executor" sig=0 arch=c00000b7 syscall=89 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2719.216877][ T30] audit: type=1326 audit(2718.650:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12399 comm="syz.1.3292" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2719.217287][ T30] audit: type=1326 audit(2718.660:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12399 comm="syz.1.3292" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9e75ce28 code=0x7ffc0000 [ 2722.784997][T12418] netlink: 52 bytes leftover after parsing attributes in process `syz.0.3298'. [ 2724.651856][ T30] audit: type=1326 audit(2724.090:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.680823][ T30] audit: type=1326 audit(2724.120:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.758731][ T30] audit: type=1326 audit(2724.200:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.793972][ T30] audit: type=1326 audit(2724.230:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.807749][ T30] audit: type=1326 audit(2724.250:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.838630][ T30] audit: type=1326 audit(2724.280:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.886564][ T30] audit: type=1326 audit(2724.310:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.893645][ T30] audit: type=1326 audit(2724.330:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.918118][ T30] audit: type=1326 audit(2724.360:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=113 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2724.921378][ T30] audit: type=1326 audit(2724.360:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12425 comm="syz.0.3302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5ce28 code=0x7ffc0000 [ 2727.057954][T12412] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3295'. [ 2730.311816][T12446] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3309'. [ 2731.268436][T12451] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3311'. [ 2731.809963][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 2731.810672][ T30] audit: type=1400 audit(2731.250:843): avc: denied { setopt } for pid=12445 comm="syz.1.3310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2732.192549][T12447] netlink: 'syz.1.3310': attribute type 4 has an invalid length. [ 2742.656015][ T30] audit: type=1400 audit(2742.100:844): avc: denied { create } for pid=12463 comm="syz.0.3315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2746.153517][T12089] page_pool_release_retry() stalled pool shutdown: id 31, 1 inflight 60 sec [ 2746.368570][ T30] audit: type=1400 audit(2745.810:845): avc: denied { getopt } for pid=12480 comm="syz.0.3321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2750.847894][T12495] pim6reg: entered allmulticast mode [ 2750.860562][T12495] pim6reg: left allmulticast mode [ 2802.356905][T12606] wg2: entered promiscuous mode [ 2802.391653][T12606] wg2: entered allmulticast mode [ 2803.180244][T12609] pim6reg1: entered promiscuous mode [ 2803.181139][T12609] pim6reg1: entered allmulticast mode [ 2820.908424][T10488] ------------[ cut here ]------------ [ 2820.908881][T10488] WARNING: CPU: 0 PID: 10488 at kernel/cgroup/rstat.c:488 css_rstat_exit+0x240/0x398 [ 2820.910485][T10488] Modules linked in: [ 2820.911241][T10488] CPU: 0 UID: 0 PID: 10488 Comm: kworker/0:2 Not tainted 6.16.0-syzkaller-11129-geacf91b0c78a #0 PREEMPT [ 2820.911759][T10488] Hardware name: linux,dummy-virt (DT) [ 2820.912296][T10488] Workqueue: cgroup_destroy css_free_rwork_fn [ 2820.913390][T10488] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2820.914569][T10488] pc : css_rstat_exit+0x240/0x398 [ 2820.915231][T10488] lr : css_rstat_exit+0x84/0x398 [ 2820.915628][T10488] sp : ffff8000a1437a20 [ 2820.915963][T10488] x29: ffff8000a1437a20 x28: dfff800000000000 x27: ffff7fffe2f82000 [ 2820.916647][T10488] x26: ffff8000871615e8 x25: 0000000000000003 x24: 0000000000000000 [ 2820.917160][T10488] x23: 1fffe00001c49681 x22: 1fffe00001c49680 x21: 0000000000000000 [ 2820.917671][T10488] x20: ffff00000e24b408 x19: ffff00000e24b400 x18: 0000000000000000 [ 2820.918175][T10488] x17: 0000000087653d76 x16: ffff00000e24b420 x15: 0000000000000002 [ 2820.918731][T10488] x14: 00000000000280f7 x13: 0000000000008000 x12: ffff700014286eff [ 2820.919233][T10488] x11: 1ffff00014286efe x10: ffff700014286efe x9 : dfff800000000000 [ 2820.919840][T10488] x8 : 0000000041b58ab3 x7 : ffff700014286f1e x6 : dfff800000000000 [ 2820.920334][T10488] x5 : 00000000f1f1f1f1 x4 : ffff80008024a554 x3 : ffffffffffffffff [ 2820.920834][T10488] x2 : ffff00000e24b420 x1 : ffff7fffe2f82000 x0 : 0000000000000000 [ 2820.921392][T10488] Call trace: [ 2820.921696][T10488] css_rstat_exit+0x240/0x398 (P) [ 2820.922056][T10488] css_free_rwork_fn+0x68/0xb5c [ 2820.922375][T10488] process_one_work+0x7cc/0x18d4 [ 2820.922805][T10488] worker_thread+0x734/0xb84 [ 2820.923090][T10488] kthread+0x348/0x5fc [ 2820.923357][T10488] ret_from_fork+0x10/0x20 [ 2820.923902][T10488] irq event stamp: 101132 [ 2820.924176][T10488] hardirqs last enabled at (101131): [] _raw_spin_unlock_irq+0x30/0x8c [ 2820.924622][T10488] hardirqs last disabled at (101132): [] el1_brk64+0x1c/0x48 [ 2820.925030][T10488] softirqs last enabled at (101000): [] wg_packet_encrypt_worker+0x81c/0xcb8 [ 2820.925473][T10488] softirqs last disabled at (100998): [] wg_packet_encrypt_worker+0xd4/0xcb8 [ 2820.926023][T10488] ---[ end trace 0000000000000000 ]--- [ 2820.944366][ T30] audit: type=1400 audit(2820.380:846): avc: denied { write } for pid=3315 comm="syz-executor" path="pipe:[3209]" dev="pipefs" ino=3209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2823.859237][T11827] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2824.365035][T11827] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2824.597816][T11827] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2824.838433][T11827] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2829.172564][T11827] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2829.304928][T11827] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2829.365529][T11827] bond0 (unregistering): Released all slaves [ 2829.891618][T11827] hsr_slave_0: left promiscuous mode [ 2829.909157][T11827] hsr_slave_1: left promiscuous mode [ 2830.016877][T11827] veth1_macvtap: left promiscuous mode [ 2830.019520][T11827] veth0_macvtap: left promiscuous mode [ 2830.025705][T11827] veth1_vlan: left promiscuous mode [ 2830.028542][T11827] veth0_vlan: left promiscuous mode [ 2838.201733][T11827] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2838.625756][T11827] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2838.915163][T11827] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2839.146918][T11827] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2844.655232][T11827] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2844.738808][T11827] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2844.846125][T11827] bond0 (unregistering): Released all slaves [ 2845.358783][T11827] hsr_slave_0: left promiscuous mode [ 2845.378417][T11827] hsr_slave_1: left promiscuous mode [ 2845.498436][T11827] veth1_macvtap: left promiscuous mode [ 2845.501407][T11827] veth0_macvtap: left promiscuous mode [ 2845.506606][T11827] veth1_vlan: left promiscuous mode [ 2845.509511][T11827] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 06:48:47 Registers: info registers vcpu 0 CPU#0 PC=ffff800081be3304 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001ddc22f X04=0000000000000000 X05=ffff800087b11700 X06=ffff700010f622e0 X07=0000000000000001 X08=ffff800087b11700 X09=dfff800000000000 X10=ffff700010f622e0 X11=1ffff00010f622e0 X12=ffff700010f622e1 X13=0000000000008000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00000eee1080 X20=ffff800087b8d480 X21=ffff80008d54b000 X22=0000000000000042 X23=dfff800000000000 X24=ffff00000eeec057 X25=0000000000000005 X26=ffff00000eee12d8 X27=ffff00000eee1080 X28=dfff800000000000 X29=ffff8000a1437010 X30=ffff800081be3268 SP=ffff8000a1437010 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=0000000000000000:ffffffff00000000 Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd2d0f630:0000ffffd2d0f630 Q17=ffffff80ffffffd0:0000ffffd2d0f600 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085480f64 X00=ffff800085480f60 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002610791 X04=1ffff00011aaafbe X05=ffff80008d557da8 X06=ffff80008d557dc0 X07=ffff80008d557ea0 X08=ffff80008d557d48 X09=dfff800000000000 X10=ffff700011aaafa8 X11=1ffff00011aaafa8 X12=ffff700011aaafa9 X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff80008d550000 X17=ffff7fffe2fa5000 X18=ffff8000a01479d4 X19=ffff8000873a3430 X20=ffff000013083c80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873a3400 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873a3430 X28=ffff800085520720 X29=ffff80008d557de0 X30=ffff800080439ed4 SP=ffff80008d557de0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000aaaabe4ba564:0000aaaabe4ba560 Q02=0000aaaabe4cac34:0000aaaabe4ca370 Q03=0000ffffe59677c0:0000ffffe5967528 Q04=0000000000000000:0000000000000000 Q05=0000ffffe5967480:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe5967890:0000ffffe5967890 Q17=ffffff80ffffffd0:0000ffffe5967860 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000