last executing test programs: 5.1599528s ago: executing program 1 (id=6854): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x800c4153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000000)="aa5f82a979394f99b17709c64dddd2acc4317defb0a0303586039580080ba2360730ddcfd700e74d8f32005b79a7a918fea474e988535d18d0964eaf4bd6e26501ba6ac9f896c5bda2851f1662ae42cfcb903739152a2605faf3518acfca20a87c84673d4e0f721494fdfab92e65a90c519310b3957bf2c2788051", 0x0, &(0x7f0000000180)="dc9719259e823a65ff39298a265b3a5bc85cd31dba240c23ce48153762f6fc3163edcadde9083ed635b64b71d9a4767a26ea20a31b08c2ddd66878e7bff3986bcb06dca6b84d5bc9207256d590df3489ea0dff914887b07f01f64e436420a1ab95cbe7a0ed10c6b400892d0f4916405371a4c09e74086687d200f9854d6d4edc223466422487d8510a64c186ce8e8581472dca67cc28503516a16b486de6938be92d66a2e7375a31a3cce7b0ec318e0a5c5067e2823e09a7509b56adc805a2e050add1ec54e0474d266d31ad82ece8a69d09ec009323f29fab07eb6826d5973f73239ea31d9ea1c10dfb0524f579392f47500955d03c65f77086499262323dcf0150309dc56d0022a3b05802a6aa3950a032a5bc4d5761824320d34d6cd04352f13b1c80db3b204e7ce147b1512f940bed80337a94993d7452df16cd1a52ddc613d7622a6a69e6958a9b9af5d66f93c9a051097127c058fdff27a334a567e01bd67940ffecc12e5a98009bc22dec74fec36562365039e7a91a014497d941ac0611132adfb4d7b7a9569e9130bf639875e21c27b8ccf351f8fa86e928c31c9df895dc2bc521fb8dfa4167347bfc0261854d62adb74f17ddd2f47b41f57719de7bc7bdb15a281eed2c9627842808615547c0fb2b98306caa54548049838a80430f3a3e646a5ca67c2afc223097953a0c737ce57cf7ee4a5d69d47486694a829dd526dddbc5f33e9b9cbad0dea3b419fedb6f6bd611fad7829fb298875eba41fb74bb86b60e726d70c1a1effb68e940ff66fb1383bdfec630980f4c0245aa5b81137ba831a9df3ab4a8b060d41d20a7bb0ddb850f9d014d9e708a3ee70c8bb66c7060b977a8f46125583629b2c98fdfc3a878a996fa24f9e4fda2ad38fdb8291dd8eb8e434b3e8e0f1d6065721d3b50bbd3f032b745e877b58e12ce85512457ce637bbfc3df0627bc726b505b7907f8a68806946d734dd17b8ff08fab989c9daef65134039bc816ccdd5b228b8a0cb86c4f20875b26638fa5bf2c8facd296563d777b263d4f2008bdb4b91506171110018a3c04a53192addb92cb686a9d7d28c5f6a0e288642f487c0036bb25739bd88df9258ebf5d04fde5ec38117da6a857fa4f8941572af14224a80ce446094aa2e8987da8864932640c1bc98c58213d817f738999b6a15c9f873d931471f8bfe38bc96384fd01e54532252efaf237505d76bc5e0c23d50a02704221e2418db6c4060da20576c40056e469780a771e9ad331b4e494297136454761deea5f892c4d350b581f08d8e47c0361fc76328c701916cfaa525c21afce0c3f29acc45cc1b7206fb48531eaa05e25bc990e8500e1e7137c02469459347c2c138f8c52d885109b715cb36a53d4b0c0e7dea0b965cbb8be7e624a6710fd1a38fb5ebec06c352ecb2094a2df09437200b83ba23eca34af08966668cac62c20a71cf900e366a0deae12584d9ad77c0c1b717b77b19d8c795454b7d7e8e77bf1297b13bc3a8608fd9eba4ab4da88979c9779295567d0898db222d7e213e3f0ae8f093df923ed5c4af4fc580591a5ecb9095cb21a7ebb7a5cb9b1a63e4af14080e2ecf50c9da7514f39e527341d1eac8da122dba941fbcfb239c2945813e831701886597473615e99392dc76852283866dd56aee13009e5ae60b0b389c8e8129924b4c2d19453332b27f255baf05d6f4e3f977d10b84f122d2880292c2e254cc6b65ce54cd814e0a4908c269840b8521979cec0c7890b02a3e887009ffea9e1e4cd204c50bdf5b5878bafb01a905087b2a94acae40fe4c3049247df5782e53100e46c09971c46c2da370e2bd3db1798a7b098aca49980034ed4ff475be862ee48e976930701bd56f9c874dc13fd4b7721b1560bc08ed0dc467519e18804fa905450508f306d78e08a18ef277c13a691cb405b71a896a116214095dee06ac0ed69ba3f17d88e19940756df3f659c4eef256d1afd73b346fe4b9ec3277f5f0f61d136ad0621b28b9db74bb76b1aa2464c3d8ce112b196b1e3de0dc2c67e0aafc7bfa4716b1fd9efed7077c335b18bae2d44bf52aeb508e4b0aae785fe788ffb5fdf90607abe9d6f13193bca869ff02e7c302f2f665d6a72e8125875204f0a76fe9a7b57b81f51b65837ae41a70877e325e446ca967fdd2e0ecc5636010d3c3f1e93f2d2f78e40d09ce47447cd1042224457bc7e7a8e97fd2ed6573954bf2d1093c4bb3f24ff7d1e919fc031b3b2afbd12ae2fc8174d6ccd7615772bbf4423fb66af1c0f14cb2cc4ffa8660abcc091486d910c8cf3cdfaa127e8217e57f14340c638e83a5c550e367fc43498e278b8e6cc09da35b6c9751a92e85c0eb6274d183f18a180d737f9bb439d06e9780107f6abf84a5f026ef13c194fda22997efd92f4dc46cada369ff2fbd8da66c85823f669d11b578ce9da534ba6221d027fa2cb2f0f30b45f4c5d5933ea900eba1c973c8800026b0abbb96c214ddccf239988229e94b688a4dabec80c223f1fdd737843dddbf12938e8293764b9e761ca70f08a7d4999089b2ad2115935bfacf1f26aab8d5e2a70e2b0de52fec4649d73fb368ee9fbb3a2ca53a378a2be627dd29578802a0d937c07ae0b7fc17a27c0d1b15b91a2dfce7c18d442225402c428455094abae0ffae7f324b0efc991f046623fa5c34852fd15231013bd7c5ff74c523209dbe876d195dff5d5128554c47bf4cbdba62fb67f6d3db886cc145b5d3821b473c439f16fad406608d601b9b6e8717cfc974bfc49da8f70e6d1c6313f019fad248e5e3537b87271d7b5143b6db9473218115f2310332f1a036f5aa28561839ecd92f19c2a2e2812925ca5d1adb78e192bf90dbfae098cbc4657246d0447eac6dfd4602b75c93a3a8ba1a719e5069ee7234003824c5c4811d816a7dc7d1d12561e1ece3c9c47bea40f83bb40bbbd2581edca8b1ebfa42e801ff26c398fea3c6329b2bf182a1aff35c58b8afa3383cddd0b761aa5644b9b596464b770bbcec949958176e8a965fcf60351efab38c635828fb33ea0e1f27534f44cd43dd8bd57a462ea1a04d078a4ba0e4193d3994b0c7f439ca0a3b6f6945d1466b24585772da389ed555f7e96baa985fde18c861d7d45afd974560084786d2b077f68c372a803c5692958883da78a110ebae8b096f2e2edebc74670940d81a8577a48d44f31ff19e51a3a59c7fda5359657b7b03c89d0b60daa921c016521ced6f9acbb25b99510d7f2581eb1777ef860a7fe8f9dc5e759d4b1a7f55000da2d86798180ad5ec1de8c111fd9d946236524bdc9f97f9cb5224d2efef0fc941bfe426e4b4f75dabcbe76cb8e89c960e8ed413f4809b384c586c84776a1cff4bdfed2adca1a11f64520e9520bce9d34c590c91d9fd1863eb9d312ca0ff1458fce075c87ae582ab8a02d1d116910c4a25486f31038da4bb88d334be5cea79bcb4733b000f5506be084ff6da9331fbea49fdcd6e1d906562989352bcd23db976bfdcbdaffa5b4cc6d11f05de86f3df4a8295df4986fae25b24ec60dbc266eac4dbb478e6eb13402c9fbbed66298db4f89e2942dab3ec4c81b0ca6489b9aa8967f847149f1b5f0d2f0fc95f0fe1a3f5d686df8cf8faf942ca2b62c5bd43b32ae215e4fbf92e6ff2e4aea76b70ae95f68c1d88f41c1e63ac7e077d33eaf225209f34a93c0c6432b7d1e694713e9582d190f2678a3141c03dd8f06b5cb3579971685a74011ae438ff3796499e6f3bd40db0a7f5fa5ec93d0b8f81985236b9e6817af0ddb37a59abce4dc5dd8a14e6757afe99f52c29d426c7daca56ab93bd00e3f44c146f32da02317aee240f36310e8a7d091d3bdaa34781e49ecfa1a120e7fbb17090394469ca8cf9fbe0aab147788d78d6f4fbb86376bea4efdc52ffeca61b2289c753131702c05ca1438e1128c9f12675bfdda6107fc40820c985e79198e70ad9e49467330b6f16ca5fafba71a31623f058152d578d26d17a0d60a46fe9eb8ca9375773852223d2f671f55b35d79da38336d0aa7427cf21038d63efe7a7d6ce9692f0a8995366cc7fa5ced7809e950ae29e0ea77777fb44ed476f2a6065a923bddfc7150cf41bc729fdea724542b0f947e07e8103ee055dbd3394b8de90d40b53705d8276c412f7ad7a697424578af3b143199019f19589afeaa06a03f63ebcbe8e1c00eecb8463a6a1b3548c59a6e283103853b3653a7dc35ab886904dfdc65ce648188c5456f636ad64c26e0abb481a7d221331822e78873d0d5ba05bc18a695cbd669de62238a7c1ad7990f8e0307af8f86690cbbe593fd5f1dafba286b5a9a0cfdcfb273ddc58279429299d7331089742a207987df7ba1d0c71f83b29d600bdf80f88a45407f08febe7983f346e227870de6e678d48bf675dc7c2109c6957fc1dbbbdc4545eecf0e39d7daca074f7e97db494d5e52786d43f888209f69d42072d2a0674970b1e3c4740de663c20033ad8b21e4fce4729ffab2e356024c6de43d99ce106c2b40528b4334ed51cf194579c7bf623421a74e1556b9954e6cfaced4f7dc2d1c37c2e212945fcd587211438cf6dc11ca474def3650afe0db1f156943b2c8cb2acd0c761b9e45aae0e95bc4745014597e3e89e98d42eb8ff85ac15ddf77bbeffcff4461141f3d11b5a6b8f8576819d65c0fc9f43655a8a74fd3c54da2bc268d246ac8d4f0c32d9761f8fd2d58b73248d0bccabf9c8b501255ee3c141ebbc7c948279d854ce53ea85b3f0cb0c666b86474933d4537fc89da361be35858b97e13ec42e8c4d887681c347022925a23e3b81cc852872d8752664a77a598c40a0cff3fcbf77369ea13b983df6e5573484a73d5601087ed0b73ab9f2e5576aae5de43212b4c92f5ae0f5c303a7fdbeee5dc4b027d6316908abeb2593b39494f035df6cefb1c033b8d5fa3e5fd95dab94c6f5ce16a0c38d5b89ab96093500db5dcc51ecd3de72b975aa5daef6f9e1d5153f0a92005a045c2a98853ea9521619d9bbd5588f9152f81d087643f336ef2f6e117d54897fdef67b55fa0fc818e99b96655d21c9679e52a7e1a42167805c9d2def37934019f735c5ac70d74c6c761aee07c78b83427a00cc36cfcc7d6960e3551d3eab0d19a6e5b07eafbc101d4d78730451a88fe10571cd10c18de3dcb73dec2c639f9804048e1874190878e0a2f902ad55696e14acbc9c02129995b011ac3e48393dfbb6cc83a896ec556e4ea4ed56bd28fb354690f46678e66f18156dd8391cc5618ad22c16e72d01823c6ba41b6aac12191f14c7150676488b9a8b9d0249951bb4847695ffcc3aefe0dba1d07ad59b3b8cc924ed1ade29ffe7c61c7fe99d6c1c10240dde2dd7bb1a7265d54dcb620635dd561572b88f696d92204db9a285cfdf2772f472b863b66d6d0390143ead20e330d0a791083c682b7130d"]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r3) sendmmsg$alg(r3, 0x0, 0x0, 0x4040810) fcntl$dupfd(r2, 0x406, r3) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 3.880661781s ago: executing program 0 (id=6855): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x24004010}, 0x10000016) (fail_nth: 1) 3.751146669s ago: executing program 0 (id=6856): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$selinux_status(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r1, r1, 0x0) r2 = memfd_create(&(0x7f0000000000)=':\b', 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) dup3(r2, r3, 0x0) write$input_event(r3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$UHID_CREATE(r1, &(0x7f0000000440)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x434, 0x4, 0x2, 0x2, 0xfff}}, 0x11c) close(r0) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$UI_ABS_SETUP(r5, 0x401c5504, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0x894c, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r8, 0x0) connect$unix(r7, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r9 = dup3(r8, r7, 0x0) r10 = accept4$inet6(r9, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r10, 0x5450, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x40045568, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRES64=r4], 0x28}, 0x1, 0x0, 0x0, 0x24004010}, 0x10000816) 3.560554539s ago: executing program 0 (id=6857): socket(0x11, 0x83d9ae39d0b7f719, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/diskstats\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4008084}, 0x48010) 3.500203523s ago: executing program 0 (id=6858): r0 = socket(0x2, 0x2, 0x3) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x24040800}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x5409, 0x20000000) timer_create(0x2, &(0x7f0000000080)={0x0, 0x3f, 0x1, @thr={&(0x7f0000002400)="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", &(0x7f0000000400)="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"}}, &(0x7f0000000100)) r2 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = syz_open_dev$vcsn(&(0x7f0000000100), 0x2, 0x20041) ioctl$TIOCOUTQ(r4, 0x5452, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x101480, 0x0) r6 = dup(r5) ioctl$SNDRV_PCM_IOCTL_START(r6, 0x4142, 0x0) ioctl$MON_IOCX_GETX(r6, 0x400c920a, &(0x7f0000000180)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000001400)=""/4096, 0x1000}) 3.230319608s ago: executing program 0 (id=6859): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r2, &(0x7f0000000000)={0x2, 0x0, @local, 0x1}, 0x10) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) ioctl$TIOCCBRK(r2, 0x5428) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0186405, &(0x7f0000000040)={0x80000001, 0x5, {0xffffffffffffffff}, {0xee01}, 0x2, 0x18}) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000000c0)=0xd) 1.980508169s ago: executing program 1 (id=6860): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000480)={'dvmrp0\x00', {0x2, 0x4e25, @empty=0xcf050000}}) openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f00000007c0)=ANY=[@ANYBLOB="008452c07466000000000000000000000400000000993fde97f4d8d2842769ff618490340c46df5a4e51654b612ab5a90ba64f2b52c0ec79bf80630c67d94905838685a380677f8eaec070f84656b47c09f702b718c0f1ca084d7b777d1b0abb12d974e718c707febb6ba648fcedf0d5f376463610d4a74944"], 0x10}}, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$can_j1939(r0, &(0x7f0000000000), 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r2) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000980)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r4, @ANYBLOB="000425bd7000fddbdf2512000000340009800800010000000080080002000200000008000100ff7fffff0800020000000000080002000600000008000200050000001c000380080001000500000008000100050000000800020009000000d00001804c0002800800010014000000080002008000000008000100180000000800040000000e0008000200faffffff0800020007000000080001001e0000000800010019000000080003000100008008000300ff00000014000280080002000400000008000400080000000d0001007564703a73797a31000000002c000280080001001900000008000400f4ffffff0800010019000000080003000d0b00000800020005000000140002800800030001040000080001001800000014000280080001001d0000000800040005000000100005800c00028008000400050000006800028008000200050000000c000380080002000500000008000100050000000400040008000100070000000800020006000000340003800800020001000000080002003601000008000200340c0000080001000a000000080001009700000008000100faffffff1c0007800c005aa999538a64859a030009000000000000000c0003000700000000000000"], 0x1c8}, 0x1, 0x0, 0x0, 0x2048000}, 0x4024000) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x26}, 0x1}, 0x1c) r5 = socket$inet(0x2, 0x2, 0x0) ioctl$TUNSETDEBUG(r5, 0x5450, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r7, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r8) sendmsg$IPVS_CMD_GET_DAEMON(r8, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="568c6ef51c3930f8f94b270adde3b14a47ac2de3bf82598326582bb622e92f4aca79549ee3ee79e9eeb483fd15ad09c4413e9fd24d5ca77b235042aeba4e22ef577b3843805dcc7bd2b1ffd13f810872d6addaaf881f5bad117930766047425ee63a395e1a311bd53d0c33ee801c8547bf144afbedd61e30545b550d69c6c23013544b14e1685452163e9e0b8e8fb01b4cbfba383365f64e5c510766663095ee1cd60143390000acd03295114e", @ANYRES16=r9, @ANYBLOB="000828bd7000fbdbdf250b0000000800060000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40805) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="000829bd7000ffdbdf25030000000800060001000000140003800800010001000000060007004e20000008000400050000002c00018008000800e7fdffff06000100020000000600020016000000060001000a00000008000b007369700008000600ff0f000008000400e30000003400038014000600ff020000000000000000000000000001060007004e23000014000600fe8000000000000000000000000000bb3c000280080007000000802c0800040007000000080006000f0000000800080002000000080009000700000008000700bc00000006000f00000000003000018006000200110000000c000700020000000000000008000b0073697000080009006a000000060004004e2000000800040010000000"], 0x11c}, 0x1, 0x0, 0x0, 0x8010}, 0x4000020) sendto$inet_nvme_of_msg(r0, &(0x7f0000000000)={@data_c2h={{0x7, 0x0, 0x18, 0xf7, 0x3}, 0x1fb, 0x1, 0x8, 0x3}, @void}, 0x80, 0x0, 0x0, 0x0) 620.350895ms ago: executing program 1 (id=6861): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/firmware/fdt', 0x0, 0x91) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[], 0x64}, 0x1, 0x0, 0x0, 0x8090}, 0x20000000) (fail_nth: 6) 510.147982ms ago: executing program 1 (id=6862): socket(0x11, 0x83d9ae39d0b7f719, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/diskstats\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4008084}, 0x48010) 409.933157ms ago: executing program 1 (id=6863): r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='^\x00', r0) keyctl$setperm(0x5, r0, 0x20053000) (async, rerun: 64) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) (rerun: 64) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x5, @remote, 0x7}, 0x1c) keyctl$search(0xa, r0, &(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x3}, r1) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@o_path={&(0x7f0000000200)='./file0\x00', 0x0, 0x10, r2}, 0x18) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x43, 0x20}, 0xc) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000440)={'tunl0\x00', 0x0, 0x1, 0x1, 0x3, 0x6, {{0x38, 0x4, 0x2, 0x8, 0xe0, 0x65, 0x0, 0xb, 0x4, 0x0, @empty, @private=0xa010101, {[@generic={0x94, 0x10, "58bde33fa9697c131409bb5d13d9"}, @rr={0x7, 0x23, 0x4b, [@multicast1, @local, @remote, @dev={0xac, 0x14, 0x14, 0x1e}, @empty, @dev={0xac, 0x14, 0x14, 0x22}, @loopback, @multicast1]}, @cipso={0x86, 0x31, 0xffffffffffffffff, [{0x2, 0x9, "78590bec3f407f"}, {0x0, 0x9, "be9ad862f0556e"}, {0x6, 0xa, "d5eed0e8e0125d37"}, {0x2, 0x3, "c2"}, {0x2, 0xc, "0aa93d46a8579037b9d3"}]}, @cipso={0x86, 0x2d, 0xffffffffffffffff, [{0x7, 0x6, "e0cd52ef"}, {0x6, 0x12, "0d00609ec24e0434cc83b282da5715f8"}, {0x5, 0x6, "ae40f7c2"}, {0x7, 0x9, "eac71d9caefacc"}]}, @cipso={0x86, 0x24, 0x3, [{0x7, 0x4, "e29e"}, {0x1, 0x8, "960be46592be"}, {0x1, 0xe, "273fcbda99ebed162bb7a24b"}, {0x5, 0x4, "c21c"}]}, @timestamp={0x44, 0x14, 0x6a, 0x0, 0x4, [0x3, 0x6, 0x84cd, 0x5]}]}}}}}) (async, rerun: 64) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='net/fib_trie\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000640)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0, 0x24, &(0x7f0000000700)=[{}, {}], 0x10, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0xa, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa48, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x5, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x3, 0x3, 0x6, 0x2, 0x40, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x1, 0x1, 0x0, 0x2, 0x14}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000340)='syzkaller\x00', 0xffff, 0x8b, &(0x7f0000000380)=""/139, 0x41100, 0x4c, '\x00', r5, @fallback=0x22, r6, 0x8, &(0x7f00000005c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xb, 0x8d0, 0xf46b}, 0x10, r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) (async) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000a00)='\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r8, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000a80)=[0x0], &(0x7f0000000ac0)=[0x0, 0x0], 0x0, 0x59, &(0x7f0000000b00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000b40), &(0x7f0000000b80), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) (async) r9 = request_key(&(0x7f0000000d40)='rxrpc_s\x00', &(0x7f0000000d80)={'syz', 0x0}, &(0x7f0000000dc0)='^\x00', r0) (async) r10 = add_key(&(0x7f0000000e80)='.request_key_auth\x00', &(0x7f0000000ec0)={'syz', 0x0}, &(0x7f0000000f00)="85a0b43cf2bbc90cda327063a9d2db44b6ddccc96c45a5809e041ccad86236afd8a85b5a85a73c69a64f4400e6d9489b8aaeb4ecfe3725b0bad01bc599a7444a6459e137f6eefd7511c87e14f7f5", 0x4e, r1) keyctl$search(0xa, r9, &(0x7f0000000e00)='id_legacy\x00', &(0x7f0000000e40)={'syz', 0x0}, r10) (async, rerun: 32) ioctl$GIO_CMAP(r6, 0x4b70, &(0x7f0000000f80)) (async, rerun: 32) keyctl$instantiate(0xc, r10, &(0x7f0000000fc0)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', 'keyring\x00', 0x20, 0x3}, 0x30, 0xfffffffffffffffb) (async) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001000)={{{@in6=@loopback, @in=@dev}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000001100)=0xe8) (async) ioctl$TUNDETACHFILTER(r6, 0x400854d6, 0x0) (async, rerun: 64) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) sendmsg$IPSET_CMD_GET_BYNAME(r12, &(0x7f0000001200)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x28, 0xe, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x20000801) (async) add_key$fscrypt_provisioning(&(0x7f0000001240), &(0x7f0000001280)={'syz', 0x3}, &(0x7f00000012c0)={0x1, 0x0, @d}, 0x18, r1) (async) r13 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r14 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r13, &(0x7f0000001440)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001400)={&(0x7f0000001380)={0x54, r14, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x28, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "e1dca7b99d75cc2c8b949f043215f26b31610dc548c1538614bb7274cde9ac53"}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40890}, 0x80) add_key$fscrypt_v1(&(0x7f0000001480), &(0x7f00000014c0)={'fscrypt:', @desc4}, &(0x7f0000001500)={0x0, "1f6aafb1462cbfa723f923d3ba3228cc147102556013b58ecdf53a6dd9c2437181fe6ada4be6971040fd8efb7dc0167fc580867e2cfe0598b376b8a332f165de", 0x21}, 0x48, r9) (async, rerun: 32) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000001580)) (rerun: 32) 10.24612ms ago: executing program 1 (id=6864): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x800c4153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000000)="aa5f82a979394f99b17709c64dddd2acc4317defb0a0303586039580080ba2360730ddcfd700e74d8f32005b79a7a918fea474e988535d18d0964eaf4bd6e26501ba6ac9f896c5bda2851f1662ae42cfcb903739152a2605faf3518acfca20a87c84673d4e0f721494fdfab92e65a90c519310b3957bf2c2788051", 0x0, &(0x7f0000000180)="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"]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r3) sendmmsg$alg(r3, 0x0, 0x0, 0x4040810) fcntl$dupfd(r2, 0x406, r3) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 0s ago: executing program 0 (id=6865): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000480)={'dvmrp0\x00', {0x2, 0x4e25, @empty=0xcf050000}}) openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f00000007c0)=ANY=[@ANYBLOB="008452c07466000000000000000000000400000000993fde97f4d8d2842769ff618490340c46df5a4e51654b612ab5a90ba64f2b52c0ec79bf80630c67d94905838685a380677f8eaec070f84656b47c09f702b718c0f1ca084d7b777d1b0abb12d974e718c707febb6ba648fcedf0d5f376463610d4a74944"], 0x10}}, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$can_j1939(r0, &(0x7f0000000000), 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r2) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000980)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1c8}, 0x1, 0x0, 0x0, 0x2048000}, 0x4024000) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x26}, 0x1}, 0x1c) r5 = socket$inet(0x2, 0x2, 0x0) ioctl$TUNSETDEBUG(r5, 0x5450, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r7, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r8) sendmsg$IPVS_CMD_GET_DAEMON(r8, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="568c6ef51c3930f8f94b270adde3b14a47ac2de3bf82598326582bb622e92f4aca79549ee3ee79e9eeb483fd15ad09c4413e9fd24d5ca77b235042aeba4e22ef577b3843805dcc7bd2b1ffd13f810872d6addaaf881f5bad117930766047425ee63a395e1a311bd53d0c33ee801c8547bf144afbedd61e30545b550d69c6c23013544b14e1685452163e9e0b8e8fb01b4cbfba383365f64e5c510766663095ee1cd60143390000acd03295114e", @ANYRES16=r9, @ANYBLOB="000828bd7000fbdbdf250b0000000800060000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40805) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x8010}, 0x4000020) sendto$inet_nvme_of_msg(r0, &(0x7f0000000000)={@data_c2h={{0x7, 0x0, 0x18, 0xf7, 0x3}, 0x1fb, 0x1, 0x8, 0x3}, @void}, 0x80, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): system_u:object_r:nsfs_t tclass=file permissive=1 [ 3402.144162][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 3402.144451][ T31] audit: type=1400 audit(3402.080:47019): avc: denied { read } for pid=3739 comm="syz.1.6379" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3402.144557][ T31] audit: type=1400 audit(3402.080:47020): avc: denied { open } for pid=3739 comm="syz.1.6379" path="/dev/random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3402.149228][ T31] audit: type=1400 audit(3402.080:47021): avc: denied { ioctl } for pid=3739 comm="syz.1.6379" path="/dev/random" dev="devtmpfs" ino=7 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3402.149415][ T31] audit: type=1400 audit(3402.080:47022): avc: denied { ioctl } for pid=3739 comm="syz.1.6379" path="socket:[72340]" dev="sockfs" ino=72340 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3402.149553][ T31] audit: type=1400 audit(3402.080:47023): avc: denied { create } for pid=3739 comm="syz.1.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3402.149608][ T31] audit: type=1400 audit(3402.080:47024): avc: denied { write } for pid=3739 comm="syz.1.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3402.155934][ T31] audit: type=1400 audit(3402.090:47025): avc: denied { connect } for pid=3739 comm="syz.1.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3402.159981][ T31] audit: type=1400 audit(3402.090:47026): avc: denied { write } for pid=3739 comm="syz.1.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3402.164154][ T31] audit: type=1400 audit(3402.100:47027): avc: denied { create } for pid=3739 comm="syz.1.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3402.167660][ T31] audit: type=1400 audit(3402.100:47028): avc: denied { connect } for pid=3739 comm="syz.1.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3405.966112][ T3767] FAULT_INJECTION: forcing a failure. [ 3405.966112][ T3767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3405.967057][ T3767] CPU: 0 UID: 0 PID: 3767 Comm: syz.1.6386 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3405.967142][ T3767] Hardware name: ARM-Versatile Express [ 3405.967157][ T3767] Call trace: [ 3405.967216][ T3767] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3405.967283][ T3767] r7:00000000 r6:00000000 r5:60000013 r4:82257d44 [ 3405.967293][ T3767] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3405.967323][ T3767] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3405.967353][ T3767] r5:84f58000 r4:82951710 [ 3405.967361][ T3767] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3405.967391][ T3767] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3405.967424][ T3767] r8:76bfef30 r7:00000000 r6:00000000 r5:eb39df68 r4:00000002 [ 3405.967432][ T3767] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3405.967458][ T3767] [<8095f694>] (should_fail_usercopy) from [<8058cc58>] (simple_read_from_buffer+0x80/0x13c) [ 3405.967488][ T3767] [<8058cbd8>] (simple_read_from_buffer) from [<806041f0>] (proc_fail_nth_read+0xb8/0x100) [ 3405.967527][ T3767] r10:00000001 r9:80604138 r8:00000002 r7:eb39df68 r6:0000000f r5:76bfef30 [ 3405.967539][ T3767] r4:84f58000 r3:eb39de9f [ 3405.967547][ T3767] [<80604138>] (proc_fail_nth_read) from [<805517a0>] (vfs_read+0x98/0x320) [ 3405.967582][ T3767] r8:76bfef30 r7:eb39df68 r6:84f58000 r5:0000000f r4:87635cc0 [ 3405.967591][ T3767] [<80551708>] (vfs_read) from [<80552440>] (ksys_read+0x74/0xe4) [ 3405.967625][ T3767] r10:00000003 r9:84f58000 r8:8020029c r7:00000000 r6:00000000 r5:87635cc0 [ 3405.967634][ T3767] r4:87635cc3 [ 3405.967642][ T3767] [<805523cc>] (ksys_read) from [<805524c0>] (sys_read+0x10/0x14) [ 3405.967672][ T3767] r7:00000003 r6:00000005 r5:76bfef30 r4:0000000f [ 3405.967681][ T3767] [<805524b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3405.967705][ T3767] Exception stack(0xeb39dfa8 to 0xeb39dff0) [ 3405.967725][ T3767] dfa0: 0000000f 76bfef30 00000005 76bfef30 0000000f 00000000 [ 3405.967743][ T3767] dfc0: 0000000f 76bfef30 00000005 00000003 002d0000 00000000 00006364 76bff0bc [ 3405.967757][ T3767] dfe0: 00000158 76bfeed0 000d7d68 0012fe04 [ 3407.219754][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 3407.220272][ T31] audit: type=1400 audit(3407.150:47101): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3407.220527][ T31] audit: type=1400 audit(3407.150:47102): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3407.220651][ T31] audit: type=1400 audit(3407.150:47103): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3407.311208][ T31] audit: type=1400 audit(3407.240:47104): avc: denied { create } for pid=3777 comm="syz.1.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3407.317285][ T31] audit: type=1400 audit(3407.250:47105): avc: denied { shutdown } for pid=3777 comm="syz.1.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3407.320973][ T31] audit: type=1400 audit(3407.250:47106): avc: denied { ioctl } for pid=3777 comm="syz.1.6389" path="socket:[71482]" dev="sockfs" ino=71482 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3407.335272][ T31] audit: type=1400 audit(3407.270:47107): avc: denied { write } for pid=3777 comm="syz.1.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3407.349340][ T31] audit: type=1400 audit(3407.280:47108): avc: denied { getopt } for pid=3777 comm="syz.1.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3407.359605][ T31] audit: type=1400 audit(3407.290:47109): avc: denied { read } for pid=3777 comm="syz.1.6389" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3407.362523][ T31] audit: type=1400 audit(3407.300:47110): avc: denied { read open } for pid=3777 comm="syz.1.6389" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3412.490226][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 3412.498119][ T31] audit: type=1400 audit(3412.420:47182): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.498364][ T31] audit: type=1400 audit(3412.420:47183): avc: denied { read write open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.498511][ T31] audit: type=1400 audit(3412.430:47184): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3412.538795][ T31] audit: type=1400 audit(3412.470:47185): avc: denied { create } for pid=3806 comm="syz.1.6397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3412.543259][ T31] audit: type=1400 audit(3412.480:47186): avc: denied { ioctl } for pid=3806 comm="syz.1.6397" path="socket:[72429]" dev="sockfs" ino=72429 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3412.545600][ T31] audit: type=1400 audit(3412.480:47187): avc: denied { bind } for pid=3806 comm="syz.1.6397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3412.547614][ T31] audit: type=1400 audit(3412.480:47188): avc: denied { write } for pid=3806 comm="syz.1.6397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3412.550300][ T31] audit: type=1400 audit(3412.480:47189): avc: denied { create } for pid=3806 comm="syz.1.6397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3412.553321][ T31] audit: type=1400 audit(3412.490:47190): avc: denied { connect } for pid=3806 comm="syz.1.6397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3413.234137][ T31] audit: type=1400 audit(3413.170:47191): avc: denied { create } for pid=3809 comm="syz.0.6398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3417.749439][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 3417.749672][ T31] audit: type=1400 audit(3417.680:47278): avc: denied { ioctl } for pid=3836 comm="syz.1.6406" path="socket:[71603]" dev="sockfs" ino=71603 ioctlcmd=0x4153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3418.436178][ T31] audit: type=1400 audit(3418.370:47279): avc: denied { read } for pid=3840 comm="syz.0.6407" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3418.437426][ T31] audit: type=1400 audit(3418.370:47280): avc: denied { read open } for pid=3840 comm="syz.0.6407" path="net:[4026532700]" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3418.439441][ T31] audit: type=1400 audit(3418.370:47281): avc: denied { create } for pid=3840 comm="syz.0.6407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3418.444389][ T31] audit: type=1400 audit(3418.380:47282): avc: denied { ioctl } for pid=3840 comm="syz.0.6407" path="socket:[71609]" dev="sockfs" ino=71609 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3418.494724][ T31] audit: type=1400 audit(3418.430:47283): avc: denied { read } for pid=3842 comm="syz.0.6408" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3418.503139][ T31] audit: type=1400 audit(3418.430:47284): avc: denied { open } for pid=3842 comm="syz.0.6408" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3418.503555][ T31] audit: type=1400 audit(3418.430:47285): avc: denied { ioctl } for pid=3842 comm="syz.0.6408" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3418.503832][ T31] audit: type=1400 audit(3418.430:47286): avc: denied { setattr } for pid=3842 comm="syz.0.6408" name="" dev="pipefs" ino=63770 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3418.544649][ T31] audit: type=1400 audit(3418.470:47287): avc: denied { create } for pid=3844 comm="syz.0.6409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3421.026595][ T3867] fuse: Bad value for 'fd' [ 3423.030336][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 3423.030921][ T31] audit: type=1400 audit(3422.960:47380): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3423.032968][ T31] audit: type=1400 audit(3422.970:47381): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3423.034441][ T31] audit: type=1400 audit(3422.970:47382): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3423.092776][ T31] audit: type=1400 audit(3423.030:47383): avc: denied { create } for pid=3872 comm="syz.1.6416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3423.096264][ T31] audit: type=1400 audit(3423.030:47384): avc: denied { ioctl } for pid=3872 comm="syz.1.6416" path="socket:[71676]" dev="sockfs" ino=71676 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3423.098230][ T31] audit: type=1400 audit(3423.030:47385): avc: denied { create } for pid=3872 comm="syz.1.6416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3423.099718][ T31] audit: type=1400 audit(3423.030:47386): avc: denied { setopt } for pid=3872 comm="syz.1.6416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3423.102352][ T31] audit: type=1400 audit(3423.040:47387): avc: denied { setopt } for pid=3872 comm="syz.1.6416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3423.104829][ T31] audit: type=1400 audit(3423.040:47388): avc: denied { read } for pid=3872 comm="syz.1.6416" name="sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3423.105838][ T31] audit: type=1400 audit(3423.040:47389): avc: denied { read open } for pid=3872 comm="syz.1.6416" path="/dev/sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3426.943550][ T3911] FAULT_INJECTION: forcing a failure. [ 3426.943550][ T3911] name failslab, interval 1, probability 0, space 0, times 0 [ 3426.943850][ T3911] CPU: 1 UID: 0 PID: 3911 Comm: syz.1.6431 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3426.943899][ T3911] Hardware name: ARM-Versatile Express [ 3426.943913][ T3911] Call trace: [ 3426.943934][ T3911] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3426.944005][ T3911] r7:00000d40 r6:00000000 r5:60000013 r4:82257d44 [ 3426.944015][ T3911] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3426.944156][ T3911] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3426.944271][ T3911] r5:876dec00 r4:8291bcc0 [ 3426.944294][ T3911] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3426.944363][ T3911] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3426.944418][ T3911] r8:876dec00 r7:00000d40 r6:87635ce8 r5:00000019 r4:83001240 [ 3426.944428][ T3911] [<80525620>] (should_failslab) from [<8050a480>] (__kmalloc_noprof+0x9c/0x458) [ 3426.944500][ T3911] [<8050a3e4>] (__kmalloc_noprof) from [<807bc1b4>] (tomoyo_encode2+0x64/0xf0) [ 3426.944553][ T3911] r10:00000fff r9:83319000 r8:00000000 r7:836a0e58 r6:87635ce8 r5:842b8ffd [ 3426.944637][ T3911] r4:842b8fef [ 3426.944673][ T3911] [<807bc150>] (tomoyo_encode2) from [<807bc264>] (tomoyo_encode+0x24/0x30) [ 3426.944714][ T3911] r9:83319000 r8:00000000 r7:836a0e58 r6:87635ce8 r5:00001000 r4:842b8ff0 [ 3426.944750][ T3911] [<807bc240>] (tomoyo_encode) from [<807bc2f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3426.944801][ T3911] r5:00001000 r4:842b8000 [ 3426.944887][ T3911] [<807bc270>] (tomoyo_realpath_from_path) from [<807b83f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3426.944985][ T3911] r10:876dec00 r9:00000000 r8:87635cc0 r7:00005421 r6:00000004 r5:81cd56c4 [ 3426.945037][ T3911] r4:87635ce8 r3:826c0240 [ 3426.945059][ T3911] [<807b8324>] (tomoyo_path_number_perm) from [<807bccd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3426.945175][ T3911] r9:00000003 r8:87635cc0 r7:20000040 r6:20000040 r5:00005421 r4:87635cc0 [ 3426.945212][ T3911] [<807bccb4>] (tomoyo_file_ioctl) from [<8076a70c>] (security_file_ioctl+0x64/0x1e4) [ 3426.945282][ T3911] [<8076a6a8>] (security_file_ioctl) from [<8056b32c>] (sys_ioctl+0x4c/0xd84) [ 3426.945377][ T3911] r7:20000040 r6:87635cc1 r5:00000000 r4:00005421 [ 3426.945447][ T3911] [<8056b2e0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3426.945515][ T3911] Exception stack(0xeba51fa8 to 0xeba51ff0) [ 3426.945612][ T3911] 1fa0: 00000000 00000000 00000003 00005421 20000040 00000000 [ 3426.945758][ T3911] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76bff0bc [ 3426.945790][ T3911] 1fe0: 76bfeec0 76bfeeb0 0001939c 00131f30 [ 3426.945867][ T3911] r10:00000036 r9:876dec00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3426.945912][ T3911] r4:00000000 [ 3426.946720][ T3911] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3428.344534][ T31] kauditd_printk_skb: 116 callbacks suppressed [ 3428.344759][ T31] audit: type=1400 audit(3428.280:47506): avc: denied { read write } for pid=3923 comm="syz.0.6435" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3428.346578][ T31] audit: type=1400 audit(3428.280:47507): avc: denied { open } for pid=3923 comm="syz.0.6435" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3428.348627][ T31] audit: type=1400 audit(3428.280:47508): avc: denied { ioctl } for pid=3923 comm="syz.0.6435" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf07 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3428.422413][ T31] audit: type=1400 audit(3428.360:47509): avc: denied { create } for pid=3925 comm="syz.0.6436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3428.424640][ T31] audit: type=1400 audit(3428.360:47510): avc: denied { write } for pid=3925 comm="syz.0.6436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3428.427111][ T3926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3926 comm=syz.0.6436 [ 3428.471020][ T31] audit: type=1400 audit(3428.400:47511): avc: denied { read } for pid=3927 comm="syz.0.6437" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3428.474434][ T31] audit: type=1400 audit(3428.410:47512): avc: denied { read open } for pid=3927 comm="syz.0.6437" path="net:[4026532700]" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3428.476251][ T31] audit: type=1400 audit(3428.410:47513): avc: denied { create } for pid=3927 comm="syz.0.6437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3428.477385][ T31] audit: type=1400 audit(3428.410:47514): avc: denied { create } for pid=3927 comm="syz.0.6437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3428.481077][ T31] audit: type=1400 audit(3428.410:47515): avc: denied { write } for pid=3927 comm="syz.0.6437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3429.914788][ T3972] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3972 comm=syz.0.6451 [ 3433.776507][ T31] kauditd_printk_skb: 163 callbacks suppressed [ 3433.777533][ T31] audit: type=1400 audit(3433.710:47679): avc: denied { unmount } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3433.860046][ T31] audit: type=1400 audit(3433.790:47680): avc: denied { create } for pid=4002 comm="syz.0.6460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3434.102176][ T31] audit: type=1400 audit(3434.030:47681): avc: denied { write } for pid=3995 comm="syz.1.6459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3434.104001][ T31] audit: type=1400 audit(3434.040:47682): avc: denied { write } for pid=3995 comm="syz.1.6459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3434.179736][ T31] audit: type=1400 audit(3434.110:47683): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3434.184492][ T31] audit: type=1400 audit(3434.120:47684): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3434.186001][ T31] audit: type=1400 audit(3434.120:47685): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3434.222677][ T31] audit: type=1400 audit(3434.150:47686): avc: denied { read } for pid=4004 comm="syz.1.6461" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3434.224115][ T31] audit: type=1400 audit(3434.150:47687): avc: denied { open } for pid=4004 comm="syz.1.6461" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3434.228742][ T31] audit: type=1400 audit(3434.160:47688): avc: denied { ioctl } for pid=4004 comm="syz.1.6461" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3436.442404][ T4026] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3436.488037][ T4026] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3436.554157][ T4026] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3436.617561][ T4026] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3436.695016][ T4026] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3436.705750][ T4026] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3436.715336][ T4026] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3436.721494][ T4026] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3437.197401][ T4059] FAULT_INJECTION: forcing a failure. [ 3437.197401][ T4059] name failslab, interval 1, probability 0, space 0, times 0 [ 3437.197642][ T4059] CPU: 1 UID: 0 PID: 4059 Comm: syz.0.6471 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3437.197688][ T4059] Hardware name: ARM-Versatile Express [ 3437.197702][ T4059] Call trace: [ 3437.197723][ T4059] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3437.197860][ T4059] r7:00000dc0 r6:00000000 r5:60000013 r4:82257d44 [ 3437.197882][ T4059] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3437.197933][ T4059] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3437.198033][ T4059] r5:85520c00 r4:8291bcc0 [ 3437.198052][ T4059] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3437.198116][ T4059] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3437.198191][ T4059] r8:85520c00 r7:00000dc0 r6:8567f594 r5:00000064 r4:83001300 [ 3437.198218][ T4059] [<80525620>] (should_failslab) from [<8050a480>] (__kmalloc_noprof+0x9c/0x458) [ 3437.198260][ T4059] [<8050a3e4>] (__kmalloc_noprof) from [<814251cc>] (constrain_params_by_rules+0x88/0x500) [ 3437.198302][ T4059] r10:f2fc9ce0 r9:8567f400 r8:0000000c r7:8567d800 r6:8567f594 r5:00000014 [ 3437.198384][ T4059] r4:00000000 [ 3437.198412][ T4059] [<81425144>] (constrain_params_by_rules) from [<8142582c>] (snd_pcm_hw_refine+0x1e8/0x41c) [ 3437.198489][ T4059] r10:f2fc9ce0 r9:00000001 r8:0000000c r7:8567da30 r6:8567f594 r5:00000014 [ 3437.198623][ T4059] r4:8567f400 [ 3437.198664][ T4059] [<81425644>] (snd_pcm_hw_refine) from [<8142cfa0>] (snd_pcm_hw_param_first+0x178/0x1ec) [ 3437.198767][ T4059] r10:00000001 r9:00000004 r8:8567f440 r7:84310700 r6:00000000 r5:00000002 [ 3437.198789][ T4059] r4:8567f400 [ 3437.198797][ T4059] [<8142ce28>] (snd_pcm_hw_param_first) from [<81427274>] (snd_pcm_hw_params+0x190/0x77c) [ 3437.198863][ T4059] r10:84310700 r9:85520c00 r8:00000002 r7:81e188a0 r6:8567f400 r5:00000000 [ 3437.198917][ T4059] r4:00000001 r3:00000000 [ 3437.198936][ T4059] [<814270e4>] (snd_pcm_hw_params) from [<814278f0>] (snd_pcm_kernel_ioctl+0x90/0x130) [ 3437.199019][ T4059] r10:00000010 r9:00040000 r8:8567d800 r7:00000018 r6:00000002 r5:84310700 [ 3437.199030][ T4059] r4:8567f400 [ 3437.199038][ T4059] [<81427860>] (snd_pcm_kernel_ioctl) from [<8143ee3c>] (snd_pcm_oss_change_params_locked+0x6ec/0xca8) [ 3437.199191][ T4059] [<8143e750>] (snd_pcm_oss_change_params_locked) from [<8143f668>] (snd_pcm_oss_get_active_substream+0x94/0xc0) [ 3437.199282][ T4059] r10:85520c00 r9:f2fc9ed4 r8:8567dab8 r7:84d0fc40 r6:84d0fc44 r5:84310700 [ 3437.199338][ T4059] r4:84310700 [ 3437.199409][ T4059] [<8143f5d4>] (snd_pcm_oss_get_active_substream) from [<81440bc4>] (snd_pcm_oss_ioctl+0x6b4/0x1004) [ 3437.199579][ T4059] r9:8567dab8 r8:84d0fc40 r7:84d0fc40 r6:20000640 r5:8567d800 r4:00000010 [ 3437.199657][ T4059] [<81440510>] (snd_pcm_oss_ioctl) from [<8056b418>] (sys_ioctl+0x138/0xd84) [ 3437.199805][ T4059] r10:85520c00 r9:00000003 r8:875f9300 r7:20000640 r6:875f9301 r5:00000000 [ 3437.199817][ T4059] r4:c0045005 [ 3437.199825][ T4059] [<8056b2e0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3437.200046][ T4059] Exception stack(0xf2fc9fa8 to 0xf2fc9ff0) [ 3437.200170][ T4059] 9fa0: 00000000 00000000 00000003 c0045005 20000640 00000000 [ 3437.200298][ T4059] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76baf0bc [ 3437.200478][ T4059] 9fe0: 76baeec0 76baeeb0 0001939c 00131f30 [ 3437.200595][ T4059] r10:00000036 r9:85520c00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3437.200800][ T4059] r4:00000000 [ 3439.005420][ T31] kauditd_printk_skb: 172 callbacks suppressed [ 3439.005671][ T31] audit: type=1400 audit(3438.940:47861): avc: denied { write } for pid=4062 comm="syz.0.6473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3439.009709][ T31] audit: type=1400 audit(3438.940:47862): avc: denied { write } for pid=4062 comm="syz.0.6473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3439.115593][ T31] audit: type=1400 audit(3439.050:47863): avc: denied { create } for pid=4083 comm="syz.0.6478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3439.119201][ T31] audit: type=1400 audit(3439.050:47864): avc: denied { write } for pid=4083 comm="syz.0.6478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3439.128806][ T31] audit: type=1400 audit(3439.060:47865): avc: denied { read write } for pid=4083 comm="syz.0.6478" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3439.131927][ T31] audit: type=1400 audit(3439.060:47866): avc: denied { open } for pid=4083 comm="syz.0.6478" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3439.137375][ T31] audit: type=1400 audit(3439.070:47867): avc: denied { mounton } for pid=4083 comm="syz.0.6478" path="/412/file0" dev="tmpfs" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3439.146001][ T31] audit: type=1400 audit(3439.080:47868): avc: denied { mount } for pid=4083 comm="syz.0.6478" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3439.181018][ T31] audit: type=1400 audit(3439.110:47869): avc: denied { setopt } for pid=4079 comm="syz.1.6477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3439.687844][ T31] audit: type=1400 audit(3439.620:47870): avc: denied { unmount } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3441.182708][ C0] vcan0: j1939_tp_rxtimer: 0x85313300: rx timeout, send abort [ 3441.683118][ C0] vcan0: j1939_tp_rxtimer: 0x85313300: abort rx timeout. Force session deactivation [ 3442.508410][ T4107] binder: 4100:4107 ioctl 6612 0 returned -22 [ 3444.147686][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 3444.147945][ T31] audit: type=1400 audit(3444.080:47931): avc: denied { write } for pid=4104 comm="syz.0.6483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3444.172184][ T31] audit: type=1400 audit(3444.110:47932): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3444.172450][ T31] audit: type=1400 audit(3444.110:47933): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3444.175320][ T31] audit: type=1400 audit(3444.110:47934): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3444.244568][ T31] audit: type=1400 audit(3444.180:47935): avc: denied { create } for pid=4114 comm="syz.1.6485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3444.254975][ T31] audit: type=1400 audit(3444.190:47936): avc: denied { bind } for pid=4114 comm="syz.1.6485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3444.273712][ T31] audit: type=1400 audit(3444.210:47937): avc: denied { read write } for pid=4114 comm="syz.1.6485" name="userio" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3444.273995][ T31] audit: type=1400 audit(3444.210:47938): avc: denied { open } for pid=4114 comm="syz.1.6485" path="/dev/userio" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3444.806647][ T31] audit: type=1400 audit(3444.740:47939): avc: denied { setopt } for pid=4114 comm="syz.1.6485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3444.811548][ T31] audit: type=1400 audit(3444.740:47940): avc: denied { read append } for pid=4114 comm="syz.1.6485" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3445.886584][ T4127] syz_tun: entered promiscuous mode [ 3446.435844][ T4125] syz_tun: left promiscuous mode [ 3449.202783][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 3449.203034][ T31] audit: type=1400 audit(3449.140:47986): avc: denied { read } for pid=4140 comm="syz.0.6493" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3449.203668][ T31] audit: type=1400 audit(3449.140:47987): avc: denied { open } for pid=4140 comm="syz.0.6493" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3449.207474][ T31] audit: type=1400 audit(3449.140:47988): avc: denied { ioctl } for pid=4140 comm="syz.0.6493" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3449.272238][ T31] audit: type=1400 audit(3449.210:47989): avc: denied { create } for pid=4142 comm="syz.0.6494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3449.277314][ T31] audit: type=1400 audit(3449.210:47990): avc: denied { setopt } for pid=4142 comm="syz.0.6494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3449.279413][ T31] audit: type=1400 audit(3449.210:47991): avc: denied { ioctl } for pid=4142 comm="syz.0.6494" path="socket:[73793]" dev="sockfs" ino=73793 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3449.319431][ T31] audit: type=1400 audit(3449.250:47992): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.332465][ T31] audit: type=1400 audit(3449.270:47993): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.335003][ T31] audit: type=1400 audit(3449.270:47994): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.382418][ T31] audit: type=1400 audit(3449.310:47995): avc: denied { read write } for pid=4144 comm="syz.0.6495" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3452.127379][ T4157] FAULT_INJECTION: forcing a failure. [ 3452.127379][ T4157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3452.131603][ T4157] CPU: 1 UID: 0 PID: 4157 Comm: syz.0.6498 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3452.131673][ T4157] Hardware name: ARM-Versatile Express [ 3452.131688][ T4157] Call trace: [ 3452.131715][ T4157] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3452.131777][ T4157] r7:00000000 r6:00000000 r5:60000113 r4:82257d44 [ 3452.131786][ T4157] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3452.131815][ T4157] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3452.131845][ T4157] r5:83a70000 r4:82951710 [ 3452.131854][ T4157] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3452.131884][ T4157] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3452.131925][ T4157] r8:76baef30 r7:00000000 r6:00000000 r5:df925f68 r4:00000002 [ 3452.131936][ T4157] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3452.131963][ T4157] [<8095f694>] (should_fail_usercopy) from [<8058cc58>] (simple_read_from_buffer+0x80/0x13c) [ 3452.131994][ T4157] [<8058cbd8>] (simple_read_from_buffer) from [<806041f0>] (proc_fail_nth_read+0xb8/0x100) [ 3452.132032][ T4157] r10:00000001 r9:80604138 r8:00000002 r7:df925f68 r6:0000000f r5:76baef30 [ 3452.132044][ T4157] r4:83a70000 r3:df925e9f [ 3452.132052][ T4157] [<80604138>] (proc_fail_nth_read) from [<805517a0>] (vfs_read+0x98/0x320) [ 3452.132132][ T4157] r8:76baef30 r7:df925f68 r6:83a70000 r5:0000000f r4:875f9300 [ 3452.132145][ T4157] [<80551708>] (vfs_read) from [<80552440>] (ksys_read+0x74/0xe4) [ 3452.132180][ T4157] r10:00000003 r9:83a70000 r8:8020029c r7:00000000 r6:00000000 r5:875f9300 [ 3452.132195][ T4157] r4:875f9303 [ 3452.132214][ T4157] [<805523cc>] (ksys_read) from [<805524c0>] (sys_read+0x10/0x14) [ 3452.132258][ T4157] r7:00000003 r6:00000006 r5:76baef30 r4:0000000f [ 3452.132268][ T4157] [<805524b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3452.132294][ T4157] Exception stack(0xdf925fa8 to 0xdf925ff0) [ 3452.132314][ T4157] 5fa0: 0000000f 76baef30 00000006 76baef30 0000000f 00000000 [ 3452.132333][ T4157] 5fc0: 0000000f 76baef30 00000006 00000003 002d0000 00000000 00006364 76baf0bc [ 3452.132347][ T4157] 5fe0: 00000158 76baeed0 000d7d68 0012fe04 [ 3452.300538][ T4163] fuse: Bad value for 'fd' [ 3452.764112][ T4178] fuse: Bad value for 'fd' [ 3453.035942][ T4191] fuse: Bad value for 'fd' [ 3453.159303][ T4195] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4195 comm=syz.1.6513 [ 3453.498477][ T4204] binder: 4179:4204 ioctl 6612 0 returned -22 [ 3454.516263][ T31] kauditd_printk_skb: 152 callbacks suppressed [ 3454.516542][ T31] audit: type=1400 audit(3454.450:48148): avc: denied { write } for pid=4179 comm="syz.0.6507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3454.519325][ T31] audit: type=1400 audit(3454.450:48149): avc: denied { write } for pid=4179 comm="syz.0.6507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3454.668850][ T31] audit: type=1400 audit(3454.600:48150): avc: denied { create } for pid=4215 comm="syz.0.6519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3454.692690][ T31] audit: type=1400 audit(3454.630:48151): avc: denied { create } for pid=4215 comm="syz.0.6519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3454.850181][ T31] audit: type=1400 audit(3454.780:48152): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3454.852655][ T31] audit: type=1400 audit(3454.790:48153): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3454.854103][ T31] audit: type=1400 audit(3454.790:48154): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3454.887556][ T31] audit: type=1400 audit(3454.820:48155): avc: denied { create } for pid=4218 comm="syz.1.6520" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3454.890821][ T31] audit: type=1400 audit(3454.820:48156): avc: denied { ioctl } for pid=4218 comm="syz.1.6520" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=73420 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3454.905269][ T31] audit: type=1400 audit(3454.840:48157): avc: denied { append } for pid=4218 comm="syz.1.6520" name="pfkey" dev="proc" ino=4026532953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3455.108873][ T4223] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4223 comm=syz.1.6522 [ 3455.949749][ T4230] binder: 4224:4230 ioctl 6612 0 returned -22 [ 3457.799387][ T4250] binder: 4232:4250 ioctl 6612 0 returned -22 [ 3459.839924][ T31] kauditd_printk_skb: 156 callbacks suppressed [ 3459.841107][ T31] audit: type=1400 audit(3459.770:48314): avc: denied { read } for pid=4265 comm="syz.0.6534" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3459.846458][ T31] audit: type=1400 audit(3459.780:48315): avc: denied { open } for pid=4265 comm="syz.0.6534" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3459.849400][ T31] audit: type=1400 audit(3459.780:48316): avc: denied { ioctl } for pid=4265 comm="syz.0.6534" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3459.854381][ T4275] binder: 4265:4275 ioctl 6612 0 returned -22 [ 3459.997478][ T31] audit: type=1400 audit(3459.920:48317): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3460.003113][ T31] audit: type=1400 audit(3459.940:48318): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3460.013513][ T31] audit: type=1400 audit(3459.940:48319): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3460.078297][ T31] audit: type=1400 audit(3460.010:48320): avc: denied { read write } for pid=4276 comm="syz.1.6538" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3460.082720][ T31] audit: type=1400 audit(3460.010:48321): avc: denied { open } for pid=4276 comm="syz.1.6538" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3460.093758][ T31] audit: type=1400 audit(3460.030:48322): avc: denied { module_request } for pid=4276 comm="syz.1.6538" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3460.214511][ T31] audit: type=1400 audit(3460.150:48323): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3465.282879][ T31] kauditd_printk_skb: 189 callbacks suppressed [ 3465.283897][ T31] audit: type=1400 audit(3465.220:48511): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3465.287046][ T31] audit: type=1400 audit(3465.220:48512): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3465.289306][ T31] audit: type=1400 audit(3465.220:48513): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3465.336586][ T31] audit: type=1400 audit(3465.270:48514): avc: denied { read } for pid=4352 comm="syz.0.6566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3465.367583][ T31] audit: type=1400 audit(3465.300:48515): avc: denied { create } for pid=4355 comm="syz.1.6567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3465.370728][ T31] audit: type=1400 audit(3465.300:48516): avc: denied { write } for pid=4355 comm="syz.1.6567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3465.372242][ T31] audit: type=1400 audit(3465.300:48517): avc: denied { module_request } for pid=4355 comm="syz.1.6567" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3465.415282][ T31] audit: type=1400 audit(3465.350:48518): avc: denied { read } for pid=4355 comm="syz.1.6567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3465.417444][ T31] audit: type=1400 audit(3465.350:48519): avc: denied { write } for pid=4355 comm="syz.1.6567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3465.426554][ T31] audit: type=1400 audit(3465.360:48520): avc: denied { read write } for pid=4355 comm="syz.1.6567" name="uhid" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3468.912519][ T4392] sctp: [Deprecated]: syz.1.6576 (pid 4392) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3468.912519][ T4392] Use struct sctp_sack_info instead [ 3469.676270][ T4399] fuse: Bad value for 'group_id' [ 3469.681702][ T4399] fuse: Bad value for 'group_id' [ 3469.895977][ T4403] binder: 4402:4403 ioctl 6612 0 returned -22 [ 3470.515989][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 3470.516759][ T31] audit: type=1400 audit(3470.450:48603): avc: denied { create } for pid=4390 comm="syz.1.6576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3470.528808][ T31] audit: type=1400 audit(3470.460:48604): avc: denied { setopt } for pid=4390 comm="syz.1.6576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3470.539071][ T31] audit: type=1400 audit(3470.470:48605): avc: denied { read } for pid=4390 comm="syz.1.6576" dev="nsfs" ino=4026532808 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3470.540170][ T31] audit: type=1400 audit(3470.470:48606): avc: denied { open } for pid=4390 comm="syz.1.6576" path="net:[4026532808]" dev="nsfs" ino=4026532808 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3470.543781][ T31] audit: type=1400 audit(3470.480:48607): avc: denied { read write } for pid=4390 comm="syz.1.6576" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3470.545153][ T31] audit: type=1400 audit(3470.480:48608): avc: denied { ioctl open } for pid=4390 comm="syz.1.6576" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3470.735681][ T31] audit: type=1400 audit(3470.670:48609): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3470.737029][ T31] audit: type=1400 audit(3470.670:48610): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3470.737889][ T31] audit: type=1400 audit(3470.670:48611): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3470.908348][ T31] audit: type=1400 audit(3470.840:48612): avc: denied { write } for pid=4402 comm="syz.0.6581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3471.063873][ T4412] fuse: Unknown parameter './file0' [ 3471.512355][ T4422] binder: 4421:4422 ioctl 6612 0 returned -22 [ 3476.115154][ T31] kauditd_printk_skb: 102 callbacks suppressed [ 3476.117304][ T31] audit: type=1400 audit(3476.050:48715): avc: denied { create } for pid=4457 comm="syz.0.6597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3476.175803][ T31] audit: type=1400 audit(3476.110:48716): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3476.177389][ T31] audit: type=1400 audit(3476.110:48717): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3476.178788][ T31] audit: type=1400 audit(3476.110:48718): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3476.236524][ T31] audit: type=1400 audit(3476.170:48719): avc: denied { read write } for pid=4460 comm="syz.1.6599" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3476.239112][ T31] audit: type=1400 audit(3476.170:48720): avc: denied { open } for pid=4460 comm="syz.1.6599" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3476.242477][ T31] audit: type=1400 audit(3476.180:48721): avc: denied { setattr } for pid=4459 comm="syz.0.6598" name="" dev="pipefs" ino=74260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3476.244387][ T31] audit: type=1400 audit(3476.180:48722): avc: denied { mounton } for pid=4460 comm="syz.1.6599" path="/342/file0" dev="tmpfs" ino=1844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3476.270268][ T31] audit: type=1400 audit(3476.200:48723): avc: denied { ioctl } for pid=4459 comm="syz.0.6598" path="/dev/nvme-fabrics" dev="devtmpfs" ino=663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3476.288021][ T31] audit: type=1400 audit(3476.220:48724): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3479.622765][ T4481] FAULT_INJECTION: forcing a failure. [ 3479.622765][ T4481] name failslab, interval 1, probability 0, space 0, times 0 [ 3479.624357][ T4481] CPU: 1 UID: 0 PID: 4481 Comm: syz.0.6606 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3479.624432][ T4481] Hardware name: ARM-Versatile Express [ 3479.624447][ T4481] Call trace: [ 3479.624476][ T4481] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3479.624537][ T4481] r7:83a70000 r6:00000000 r5:60000013 r4:82257d44 [ 3479.624547][ T4481] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3479.624577][ T4481] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3479.624608][ T4481] r5:83a70000 r4:8291bcc0 [ 3479.624616][ T4481] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3479.624646][ T4481] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3479.624684][ T4481] r8:00000000 r7:83a70000 r6:00000cc0 r5:20000080 r4:830a8a80 [ 3479.624693][ T4481] [<80525620>] (should_failslab) from [<8050a0fc>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3479.624722][ T4481] [<8050a0b0>] (kmem_cache_alloc_noprof) from [<80560b4c>] (getname_flags.part.0+0x28/0x18c) [ 3479.624759][ T4481] r10:000000e2 r9:83a70000 r8:00000000 r7:00000000 r6:8245d848 r5:20000080 [ 3479.624770][ T4481] r4:20000080 [ 3479.624778][ T4481] [<80560b24>] (getname_flags.part.0) from [<80565c34>] (getname_flags+0x3c/0x50) [ 3479.624814][ T4481] r9:83a70000 r8:00000000 r7:ffffff9c r6:00000000 r5:00000000 r4:20000080 [ 3479.624823][ T4481] [<80565bf8>] (getname_flags) from [<8058aa14>] (path_setxattrat+0x158/0x17c) [ 3479.624875][ T4481] r5:20000080 r4:00000000 [ 3479.624884][ T4481] [<8058a8bc>] (path_setxattrat) from [<8058abc4>] (sys_setxattr+0x34/0x3c) [ 3479.624918][ T4481] r8:8020029c r7:000000e2 r6:0012fee0 r5:00000000 r4:20000140 [ 3479.624926][ T4481] [<8058ab90>] (sys_setxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3479.624951][ T4481] Exception stack(0xeaf01fa8 to 0xeaf01ff0) [ 3479.624971][ T4481] 1fa0: 00000001 00000000 20000080 20000140 00000000 00000000 [ 3479.624990][ T4481] 1fc0: 00000001 00000000 0012fee0 000000e2 002d0000 00000000 00006364 76baf0bc [ 3479.625004][ T4481] 1fe0: 76baeec0 76baeeb0 0001939c 00131f30 [ 3479.625015][ T4481] r4:00000001 [ 3481.859263][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 3481.861013][ T31] audit: type=1400 audit(3481.790:48771): avc: denied { read } for pid=4492 comm="syz.0.6610" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3481.866153][ T31] audit: type=1400 audit(3481.800:48772): avc: denied { open } for pid=4492 comm="syz.0.6610" path="net:[4026532700]" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3481.870659][ T31] audit: type=1400 audit(3481.800:48773): avc: denied { create } for pid=4492 comm="syz.0.6610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3482.807954][ T31] audit: type=1400 audit(3482.740:48774): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3482.809253][ T31] audit: type=1400 audit(3482.740:48775): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3482.810437][ T31] audit: type=1400 audit(3482.740:48776): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3482.873258][ T31] audit: type=1400 audit(3482.810:48777): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3482.875356][ T31] audit: type=1400 audit(3482.810:48778): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3482.878405][ T31] audit: type=1400 audit(3482.810:48779): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3482.931067][ T31] audit: type=1400 audit(3482.860:48780): avc: denied { create } for pid=4503 comm="syz.1.6612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3484.575587][ T4541] fuse: Unknown parameter 'grou00000000000000000000' [ 3484.925016][ T4548] binder: 4547:4548 ioctl 6612 0 returned -22 [ 3486.115107][ T4556] fuse: Unknown parameter 'grou00000000000000000000' [ 3486.177795][ T4558] random: crng reseeded on system resumption [ 3486.441736][ T8621] usb 2-1: new high-speed USB device number 85 using dummy_hcd [ 3486.601061][ T8621] usb 2-1: unable to get BOS descriptor or descriptor too short [ 3486.604365][ T8621] usb 2-1: config 1 interface 0 altsetting 5 bulk endpoint 0x1 has invalid maxpacket 8 [ 3486.604983][ T8621] usb 2-1: config 1 interface 0 altsetting 5 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 3486.605712][ T8621] usb 2-1: config 1 interface 0 has no altsetting 0 [ 3486.618400][ T8621] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 3486.619635][ T8621] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3486.620727][ T8621] usb 2-1: Product: syz [ 3486.622267][ T8621] usb 2-1: Manufacturer: syz [ 3486.623056][ T8621] usb 2-1: SerialNumber: syz [ 3486.664324][ T4558] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3486.665499][ T4558] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3486.690573][ T4573] binder: 4572:4573 ioctl 6612 0 returned -22 [ 3486.875063][ T31] kauditd_printk_skb: 189 callbacks suppressed [ 3486.875450][ T31] audit: type=1400 audit(3486.810:48970): avc: denied { read write } for pid=4557 comm="syz.1.6634" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3486.878231][ T31] audit: type=1400 audit(3486.810:48971): avc: denied { open } for pid=4557 comm="syz.1.6634" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3486.882650][ T31] audit: type=1400 audit(3486.810:48972): avc: denied { ioctl } for pid=4557 comm="syz.1.6634" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3486.890913][ T4558] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3486.899625][ T4558] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3486.911459][ T31] audit: type=1400 audit(3486.840:48973): avc: denied { ioctl } for pid=4557 comm="syz.1.6634" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3487.427645][ T31] audit: type=1400 audit(3487.360:48974): avc: denied { read write } for pid=4557 comm="syz.1.6634" name="udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3487.431904][ T31] audit: type=1400 audit(3487.360:48975): avc: denied { open } for pid=4557 comm="syz.1.6634" path="/dev/udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3487.448137][ T31] audit: type=1400 audit(3487.380:48976): avc: denied { ioctl } for pid=4557 comm="syz.1.6634" path="/dev/udmabuf" dev="devtmpfs" ino=662 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3487.705369][ T31] audit: type=1400 audit(3487.640:48977): avc: denied { write } for pid=4572 comm="syz.0.6636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3488.222554][ T31] audit: type=1400 audit(3488.140:48978): avc: denied { read write } for pid=4584 comm="syz.0.6638" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3488.223071][ T31] audit: type=1400 audit(3488.140:48979): avc: denied { open } for pid=4584 comm="syz.0.6638" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3488.226441][ T4585] fuse: Unknown parameter 'group_i00000000000000000000' [ 3491.777423][ T777] usb 2-1: USB disconnect, device number 85 [ 3491.799466][ T4595] FAULT_INJECTION: forcing a failure. [ 3491.799466][ T4595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3491.799748][ T4595] CPU: 0 UID: 0 PID: 4595 Comm: syz.0.6640 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3491.799795][ T4595] Hardware name: ARM-Versatile Express [ 3491.799809][ T4595] Call trace: [ 3491.799829][ T4595] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3491.799922][ T4595] r7:00000003 r6:00000000 r5:60000013 r4:82257d44 [ 3491.799932][ T4595] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3491.799967][ T4595] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3491.799997][ T4595] r5:844cec00 r4:82951710 [ 3491.800006][ T4595] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3491.800037][ T4595] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3491.800071][ T4595] r8:00000000 r7:00000003 r6:00001000 r5:00000000 r4:20001200 [ 3491.800132][ T4595] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3491.800166][ T4595] [<8095f694>] (should_fail_usercopy) from [<80965748>] (strncpy_from_user+0x20/0x1a0) [ 3491.800196][ T4595] [<80965728>] (strncpy_from_user) from [<8058a700>] (setxattr_copy+0x2c/0x90) [ 3491.800336][ T4595] r10:000000e4 r9:844cec00 r8:00000000 r7:00000003 r6:00001000 r5:00000000 [ 3491.800623][ T4595] r4:eb6dde48 [ 3491.800847][ T4595] [<8058a6d4>] (setxattr_copy) from [<8058a938>] (path_setxattrat+0x7c/0x17c) [ 3491.800916][ T4595] r5:00000000 r4:20001200 [ 3491.800928][ T4595] [<8058a8bc>] (path_setxattrat) from [<8058ac38>] (sys_fsetxattr+0x30/0x38) [ 3491.801161][ T4595] r8:8020029c r7:000000e4 r6:0012fee0 r5:00000000 r4:00000000 [ 3491.801326][ T4595] [<8058ac08>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3491.801418][ T4595] Exception stack(0xeb6ddfa8 to 0xeb6ddff0) [ 3491.801441][ T4595] dfa0: 00000000 00000000 00000003 20001200 00000000 00000000 [ 3491.801662][ T4595] dfc0: 00000000 00000000 0012fee0 000000e4 002d0000 00000000 00006364 76baf0bc [ 3491.802004][ T4595] dfe0: 76baeec0 76baeeb0 0001939c 00131f30 [ 3491.979047][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 3491.979311][ T31] audit: type=1400 audit(3491.910:48996): avc: denied { create } for pid=4604 comm="syz.0.6641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3491.997165][ T31] audit: type=1400 audit(3491.930:48997): avc: denied { read } for pid=4604 comm="syz.0.6641" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3491.997422][ T31] audit: type=1400 audit(3491.930:48998): avc: denied { open } for pid=4604 comm="syz.0.6641" path="/dev/ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3492.004628][ T31] audit: type=1400 audit(3491.940:48999): avc: denied { create } for pid=4604 comm="syz.0.6641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3492.007386][ T31] audit: type=1400 audit(3491.940:49000): avc: denied { setopt } for pid=4604 comm="syz.0.6641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3492.013840][ T31] audit: type=1400 audit(3491.950:49001): avc: denied { setattr } for pid=4604 comm="syz.0.6641" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3492.022064][ T31] audit: type=1400 audit(3491.960:49002): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3492.022689][ T31] audit: type=1400 audit(3491.960:49003): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3492.023309][ T31] audit: type=1400 audit(3491.960:49004): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3492.103361][ T31] audit: type=1400 audit(3492.040:49005): avc: denied { create } for pid=4606 comm="syz.1.6642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3492.165235][ T4609] fuse: Unknown parameter 'group_i00000000000000000000' [ 3492.312762][ T4613] FAULT_INJECTION: forcing a failure. [ 3492.312762][ T4613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3492.313055][ T4613] CPU: 0 UID: 0 PID: 4613 Comm: syz.0.6645 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3492.313095][ T4613] Hardware name: ARM-Versatile Express [ 3492.313107][ T4613] Call trace: [ 3492.313128][ T4613] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3492.313213][ T4613] r7:20000040 r6:00000000 r5:60000013 r4:82257d44 [ 3492.313227][ T4613] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3492.313259][ T4613] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3492.313322][ T4613] r5:83a76000 r4:82951710 [ 3492.313333][ T4613] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3492.313367][ T4613] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3492.313409][ T4613] r8:000000c0 r7:20000040 r6:eb721e54 r5:00000000 r4:00000000 [ 3492.313419][ T4613] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3492.313456][ T4613] [<8095f694>] (should_fail_usercopy) from [<808aeb9c>] (_copy_from_iter+0x6c/0x7c8) [ 3492.313496][ T4613] [<808aeb30>] (_copy_from_iter) from [<80a6d7e8>] (write_pool_user+0x64/0x11c) [ 3492.313534][ T4613] r10:eb721ef0 r9:8295b5e0 r8:8295b658 r7:eb721e54 r6:000000c0 r5:40000013 [ 3492.313545][ T4613] r4:00000000 [ 3492.313553][ T4613] [<80a6d784>] (write_pool_user) from [<80a6d8b4>] (random_write_iter+0x14/0x18) [ 3492.313585][ T4613] r10:81d2b6e4 r9:20000040 r8:eb721f68 r7:83a76000 r6:000000c1 r5:87635e40 [ 3492.313595][ T4613] r4:80a6d8a0 [ 3492.313617][ T4613] [<80a6d8a0>] (random_write_iter) from [<805521f8>] (vfs_write+0x274/0x448) [ 3492.313657][ T4613] [<80551f84>] (vfs_write) from [<80552538>] (ksys_write+0x74/0xe4) [ 3492.313693][ T4613] r10:00000004 r9:83a76000 r8:8020029c r7:00000000 r6:00000000 r5:87635e40 [ 3492.313711][ T4613] r4:87635e41 [ 3492.313720][ T4613] [<805524c4>] (ksys_write) from [<805525b8>] (sys_write+0x10/0x14) [ 3492.313763][ T4613] r7:00000004 r6:0012fee0 r5:00000000 r4:00000000 [ 3492.313773][ T4613] [<805525a8>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3492.313800][ T4613] Exception stack(0xeb721fa8 to 0xeb721ff0) [ 3492.313820][ T4613] 1fa0: 00000000 00000000 00000003 20000040 000000c1 00000000 [ 3492.313838][ T4613] 1fc0: 00000000 00000000 0012fee0 00000004 002d0000 00000000 00006364 76baf0bc [ 3492.313852][ T4613] 1fe0: 76baeec0 76baeeb0 0001939c 00131f30 [ 3492.932528][ T4623] fuse: Unknown parameter 'group_i00000000000000000000' [ 3493.336165][ T4629] FAULT_INJECTION: forcing a failure. [ 3493.336165][ T4629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3493.341885][ T4629] CPU: 1 UID: 0 PID: 4629 Comm: syz.0.6651 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3493.341956][ T4629] Hardware name: ARM-Versatile Express [ 3493.341972][ T4629] Call trace: [ 3493.342005][ T4629] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3493.342062][ T4629] r7:8320f800 r6:00000000 r5:60000113 r4:82257d44 [ 3493.342072][ T4629] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3493.342100][ T4629] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3493.342130][ T4629] r5:842c6c00 r4:82951710 [ 3493.342138][ T4629] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3493.342168][ T4629] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3493.342201][ T4629] r8:81d35c20 r7:8320f800 r6:c06864a1 r5:00000068 r4:00000068 [ 3493.342209][ T4629] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3493.342235][ T4629] [<8095f694>] (should_fail_usercopy) from [<80ab7880>] (drm_ioctl+0x1c8/0x5b0) [ 3493.342263][ T4629] [<80ab76b8>] (drm_ioctl) from [<8056b418>] (sys_ioctl+0x138/0xd84) [ 3493.342300][ T4629] r10:842c6c00 r9:00000003 r8:85492d80 r7:20000080 r6:85492d81 r5:00000000 [ 3493.342311][ T4629] r4:c06864a1 [ 3493.342319][ T4629] [<8056b2e0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3493.342343][ T4629] Exception stack(0xeb7e1fa8 to 0xeb7e1ff0) [ 3493.342363][ T4629] 1fa0: 00000000 00000000 00000003 c06864a1 20000080 00000000 [ 3493.342381][ T4629] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76baf0bc [ 3493.342394][ T4629] 1fe0: 76baeec0 76baeeb0 0001939c 00131f30 [ 3493.342414][ T4629] r10:00000036 r9:842c6c00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3493.342424][ T4629] r4:00000000 [ 3493.677173][ T4635] fuse: Unknown parameter 'group_id00000000000000000000' [ 3494.153224][ T4643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4643 comm=syz.0.6656 [ 3496.922306][ T4654] fuse: Unknown parameter 'group_id00000000000000000000' [ 3497.199326][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 3497.199715][ T31] audit: type=1400 audit(3497.130:49096): avc: denied { create } for pid=4655 comm="syz.0.6660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3497.204264][ T31] audit: type=1400 audit(3497.140:49097): avc: denied { setopt } for pid=4655 comm="syz.0.6660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3497.209663][ T31] audit: type=1400 audit(3497.140:49098): avc: denied { create } for pid=4655 comm="syz.0.6660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3497.219815][ T4656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4656 comm=syz.0.6660 [ 3497.221735][ T31] audit: type=1400 audit(3497.150:49099): avc: denied { write } for pid=4655 comm="syz.0.6660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3497.223671][ T31] audit: type=1400 audit(3497.160:49100): avc: denied { ioctl } for pid=4655 comm="syz.0.6660" path="socket:[74564]" dev="sockfs" ino=74564 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3497.275057][ T31] audit: type=1400 audit(3497.210:49101): avc: denied { create } for pid=4657 comm="syz.0.6661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3497.277656][ T31] audit: type=1400 audit(3497.210:49102): avc: denied { create } for pid=4657 comm="syz.0.6661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3497.280390][ T31] audit: type=1400 audit(3497.210:49103): avc: denied { setopt } for pid=4657 comm="syz.0.6661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3497.282751][ T31] audit: type=1400 audit(3497.220:49104): avc: denied { connect } for pid=4657 comm="syz.0.6661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3497.792464][ T31] audit: type=1400 audit(3497.730:49105): avc: denied { ioctl } for pid=4657 comm="syz.0.6661" path="socket:[74577]" dev="sockfs" ino=74577 ioctlcmd=0x4153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3498.053552][ T4661] FAULT_INJECTION: forcing a failure. [ 3498.053552][ T4661] name failslab, interval 1, probability 0, space 0, times 0 [ 3498.055884][ T4661] CPU: 0 UID: 0 PID: 4661 Comm: syz.1.6662 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3498.056034][ T4661] Hardware name: ARM-Versatile Express [ 3498.056061][ T4661] Call trace: [ 3498.056149][ T4661] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3498.056268][ T4661] r7:84f5b000 r6:00000000 r5:60000013 r4:82257d44 [ 3498.056290][ T4661] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3498.056351][ T4661] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3498.056409][ T4661] r5:84f5b000 r4:8291bcc0 [ 3498.056427][ T4661] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3498.056485][ T4661] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3498.056557][ T4661] r8:00000000 r7:84f5b000 r6:00400cc0 r5:ffffffff r4:832ca240 [ 3498.056577][ T4661] [<80525620>] (should_failslab) from [<80509a90>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 3498.056634][ T4661] [<80509a40>] (kmem_cache_alloc_node_noprof) from [<81526ff8>] (__alloc_skb+0x138/0x160) [ 3498.056706][ T4661] r10:eb831d1c r9:00000000 r8:00400cc0 r7:00000000 r6:832ca240 r5:ffffffff [ 3498.056728][ T4661] r4:82806040 [ 3498.056745][ T4661] [<81526ec0>] (__alloc_skb) from [<8152f400>] (alloc_skb_with_frags+0x44/0x1ec) [ 3498.056808][ T4661] r8:802ce320 r7:eb831cbc r6:00000000 r5:00001000 r4:00000003 [ 3498.056828][ T4661] [<8152f3bc>] (alloc_skb_with_frags) from [<8151fdec>] (sock_alloc_send_pskb+0x1f4/0x228) [ 3498.056906][ T4661] r10:eb831d1c r9:00000000 r8:802ce320 r7:eb831cbc r6:84f5b000 r5:7fffffff [ 3498.056932][ T4661] r4:852cf000 [ 3498.056963][ T4661] [<8151fbf8>] (sock_alloc_send_pskb) from [<817f0bfc>] (unix_dgram_sendmsg+0x134/0x774) [ 3498.057050][ T4661] r10:00000000 r9:84f5b000 r8:852cf000 r7:00000000 r6:00000000 r5:836ba500 [ 3498.057078][ T4661] r4:eb831f20 [ 3498.057101][ T4661] [<817f0ac8>] (unix_dgram_sendmsg) from [<817f1280>] (unix_seqpacket_sendmsg+0x44/0x84) [ 3498.057182][ T4661] r10:00000000 r9:eb831dc4 r8:eb831dc4 r7:00000000 r6:836ba500 r5:eb831f20 [ 3498.057207][ T4661] r4:00000000 [ 3498.057227][ T4661] [<817f123c>] (unix_seqpacket_sendmsg) from [<81519cbc>] (__sock_sendmsg+0x44/0x78) [ 3498.057294][ T4661] r5:eb831f20 r4:00000000 [ 3498.057318][ T4661] [<81519c78>] (__sock_sendmsg) from [<8151a52c>] (____sys_sendmsg+0x298/0x2cc) [ 3498.057386][ T4661] r7:00000000 r6:836ba500 r5:24004090 r4:eb831f20 [ 3498.057407][ T4661] [<8151a294>] (____sys_sendmsg) from [<8151c2cc>] (___sys_sendmsg+0x9c/0xd0) [ 3498.057482][ T4661] r10:eb831e24 r9:20000700 r8:24004090 r7:00000000 r6:836ba500 r5:eb831f20 [ 3498.057506][ T4661] r4:00000000 [ 3498.057525][ T4661] [<8151c230>] (___sys_sendmsg) from [<8151c75c>] (__sys_sendmsg+0x8c/0xd8) [ 3498.057599][ T4661] r10:00000128 r9:84f5b000 r8:87635c00 r7:24004090 r6:20000700 r5:87635c01 [ 3498.057623][ T4661] r4:00000003 [ 3498.057641][ T4661] [<8151c6d0>] (__sys_sendmsg) from [<8151c7bc>] (sys_sendmsg+0x14/0x18) [ 3498.057709][ T4661] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 3498.057727][ T4661] [<8151c7a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3498.057779][ T4661] Exception stack(0xeb831fa8 to 0xeb831ff0) [ 3498.057820][ T4661] 1fa0: 00000000 00000000 00000003 20000700 24004090 00000000 [ 3498.057857][ T4661] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76bff0bc [ 3498.057886][ T4661] 1fe0: 76bfeec0 76bfeeb0 0001939c 00131f30 [ 3498.332178][ T4666] fuse: Unknown parameter 'group_id00000000000000000000' [ 3499.706671][ T4680] fuse: Bad value for 'user_id' [ 3499.707269][ T4680] fuse: Bad value for 'user_id' [ 3500.548421][ T4696] fuse: Bad value for 'user_id' [ 3500.548663][ T4696] fuse: Bad value for 'user_id' [ 3502.565888][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 3502.566213][ T31] audit: type=1400 audit(3502.500:49237): avc: denied { ioctl } for pid=4699 comm="syz.1.6677" path="socket:[74714]" dev="sockfs" ino=74714 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3502.735258][ T31] audit: type=1400 audit(3502.670:49238): avc: denied { read write } for pid=4715 comm="syz.0.6681" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3502.737233][ T31] audit: type=1400 audit(3502.670:49239): avc: denied { read write open } for pid=4715 comm="syz.0.6681" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3502.761805][ T31] audit: type=1400 audit(3502.680:49240): avc: denied { mounton } for pid=4715 comm="syz.0.6681" path="/516/file0" dev="tmpfs" ino=2748 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3502.778718][ T4716] fuse: Bad value for 'user_id' [ 3502.781882][ T4716] fuse: Bad value for 'user_id' [ 3503.010816][ T31] audit: type=1400 audit(3502.940:49241): avc: denied { create } for pid=4717 comm="syz.0.6682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3503.053917][ T31] audit: type=1400 audit(3502.990:49242): avc: denied { create } for pid=4717 comm="syz.0.6682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3503.055486][ T31] audit: type=1400 audit(3502.990:49243): avc: denied { write } for pid=4717 comm="syz.0.6682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3503.057095][ T31] audit: type=1400 audit(3502.990:49244): avc: denied { module_request } for pid=4717 comm="syz.0.6682" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3503.148170][ T31] audit: type=1400 audit(3503.080:49245): avc: denied { read } for pid=4717 comm="syz.0.6682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3503.150587][ T31] audit: type=1400 audit(3503.080:49246): avc: denied { ioctl } for pid=4717 comm="syz.0.6682" path="socket:[75497]" dev="sockfs" ino=75497 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3507.275843][ T4754] binder: 4753:4754 ioctl 6612 0 returned -22 [ 3508.311623][ T31] kauditd_printk_skb: 122 callbacks suppressed [ 3508.315079][ T31] audit: type=1400 audit(3508.240:49369): avc: denied { write } for pid=4753 comm="syz.0.6695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3508.533438][ T31] audit: type=1400 audit(3508.470:49370): avc: denied { create } for pid=4763 comm="syz.0.6698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3508.564366][ T31] audit: type=1400 audit(3508.500:49371): avc: denied { read } for pid=4763 comm="syz.0.6698" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.564826][ T31] audit: type=1400 audit(3508.500:49372): avc: denied { open } for pid=4763 comm="syz.0.6698" path="/dev/ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.686969][ T31] audit: type=1400 audit(3508.620:49373): avc: denied { read write } for pid=4766 comm="syz.0.6699" name="sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.687235][ T31] audit: type=1400 audit(3508.620:49374): avc: denied { ioctl open } for pid=4766 comm="syz.0.6699" path="/dev/sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.715495][ T4767] FAULT_INJECTION: forcing a failure. [ 3508.715495][ T4767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3508.718968][ T4767] CPU: 1 UID: 0 PID: 4767 Comm: syz.0.6699 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3508.719041][ T4767] Hardware name: ARM-Versatile Express [ 3508.719056][ T4767] Call trace: [ 3508.719077][ T4767] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3508.719134][ T4767] r7:00000000 r6:00000000 r5:60000013 r4:82257d44 [ 3508.719144][ T4767] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3508.719173][ T4767] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3508.719204][ T4767] r5:83ad1800 r4:82951710 [ 3508.719215][ T4767] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3508.719245][ T4767] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3508.719279][ T4767] r8:76baef30 r7:00000000 r6:00000000 r5:dfab5f68 r4:00000002 [ 3508.719287][ T4767] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3508.719313][ T4767] [<8095f694>] (should_fail_usercopy) from [<8058cc58>] (simple_read_from_buffer+0x80/0x13c) [ 3508.719344][ T4767] [<8058cbd8>] (simple_read_from_buffer) from [<806041f0>] (proc_fail_nth_read+0xb8/0x100) [ 3508.719382][ T4767] r10:00000001 r9:80604138 r8:00000002 r7:dfab5f68 r6:0000000f r5:76baef30 [ 3508.719393][ T4767] r4:83ad1800 r3:dfab5e9f [ 3508.719402][ T4767] [<80604138>] (proc_fail_nth_read) from [<805517a0>] (vfs_read+0x98/0x320) [ 3508.719436][ T4767] r8:76baef30 r7:dfab5f68 r6:83ad1800 r5:0000000f r4:87635d80 [ 3508.719445][ T4767] [<80551708>] (vfs_read) from [<80552440>] (ksys_read+0x74/0xe4) [ 3508.719479][ T4767] r10:00000003 r9:83ad1800 r8:8020029c r7:00000000 r6:00000000 r5:87635d80 [ 3508.719489][ T4767] r4:87635d83 [ 3508.719497][ T4767] [<805523cc>] (ksys_read) from [<805524c0>] (sys_read+0x10/0x14) [ 3508.719527][ T4767] r7:00000003 r6:00000005 r5:76baef30 r4:0000000f [ 3508.719536][ T4767] [<805524b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3508.719561][ T4767] Exception stack(0xdfab5fa8 to 0xdfab5ff0) [ 3508.719581][ T4767] 5fa0: 0000000f 76baef30 00000005 76baef30 0000000f 00000000 [ 3508.719599][ T4767] 5fc0: 0000000f 76baef30 00000005 00000003 002d0000 00000000 00006364 76baf0bc [ 3508.719617][ T4767] 5fe0: 00000158 76baeed0 000d7d68 0012fe04 [ 3508.916013][ T31] audit: type=1400 audit(3508.850:49375): avc: denied { read write } for pid=4768 comm="syz.0.6700" name="rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.916336][ T31] audit: type=1400 audit(3508.850:49376): avc: denied { open } for pid=4768 comm="syz.0.6700" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.940971][ T31] audit: type=1400 audit(3508.870:49377): avc: denied { ioctl } for pid=4768 comm="syz.0.6700" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf30 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3508.947305][ T31] audit: type=1400 audit(3508.880:49378): avc: denied { module_request } for pid=4768 comm="syz.0.6700" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3509.804900][ T4775] binder: 4774:4775 ioctl 6612 0 returned -22 [ 3510.503339][ T4780] fuse: Bad value for 'fd' [ 3510.758893][ T4784] FAULT_INJECTION: forcing a failure. [ 3510.758893][ T4784] name failslab, interval 1, probability 0, space 0, times 0 [ 3510.759163][ T4784] CPU: 0 UID: 0 PID: 4784 Comm: syz.1.6705 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3510.759212][ T4784] Hardware name: ARM-Versatile Express [ 3510.759233][ T4784] Call trace: [ 3510.759253][ T4784] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3510.759322][ T4784] r7:00000c40 r6:00000000 r5:60000013 r4:82257d44 [ 3510.759388][ T4784] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3510.759456][ T4784] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3510.759517][ T4784] r5:83a63000 r4:8291bcc0 [ 3510.759553][ T4784] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3510.759611][ T4784] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3510.759723][ T4784] r8:83a63000 r7:00000c40 r6:8530e3e8 r5:00001000 r4:830016c0 [ 3510.759773][ T4784] [<80525620>] (should_failslab) from [<8050a480>] (__kmalloc_noprof+0x9c/0x458) [ 3510.759805][ T4784] [<8050a3e4>] (__kmalloc_noprof) from [<807bc2ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3510.759846][ T4784] r10:83a63000 r9:83319000 r8:00000000 r7:83648000 r6:8530e3e8 r5:00001000 [ 3510.759859][ T4784] r4:00000000 [ 3510.759884][ T4784] [<807bc270>] (tomoyo_realpath_from_path) from [<807b83f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3510.759940][ T4784] r10:83a63000 r9:00000000 r8:8530e3c0 r7:0000890b r6:00000004 r5:81cd56c4 [ 3510.760001][ T4784] r4:8530e3e8 r3:826c0240 [ 3510.760115][ T4784] [<807b8324>] (tomoyo_path_number_perm) from [<807bccd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3510.760196][ T4784] r9:00000004 r8:8530e3c0 r7:00000000 r6:00000000 r5:0000890b r4:8530e3c0 [ 3510.760231][ T4784] [<807bccb4>] (tomoyo_file_ioctl) from [<8076a70c>] (security_file_ioctl+0x64/0x1e4) [ 3510.760319][ T4784] [<8076a6a8>] (security_file_ioctl) from [<8056b32c>] (sys_ioctl+0x4c/0xd84) [ 3510.760356][ T4784] r7:00000000 r6:8530e3c1 r5:00000000 r4:0000890b [ 3510.760367][ T4784] [<8056b2e0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3510.760423][ T4784] Exception stack(0xdfb59fa8 to 0xdfb59ff0) [ 3510.760493][ T4784] 9fa0: 00000000 00000000 00000004 0000890b 00000000 00000000 [ 3510.760561][ T4784] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76bff0bc [ 3510.760602][ T4784] 9fe0: 76bfeec0 76bfeeb0 0001939c 00131f30 [ 3510.760622][ T4784] r10:00000036 r9:83a63000 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3510.760679][ T4784] r4:00000000 [ 3510.761087][ T4784] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3511.066051][ T4792] FAULT_INJECTION: forcing a failure. [ 3511.066051][ T4792] name failslab, interval 1, probability 0, space 0, times 0 [ 3511.067038][ T4792] CPU: 1 UID: 0 PID: 4792 Comm: syz.1.6708 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3511.067119][ T4792] Hardware name: ARM-Versatile Express [ 3511.067135][ T4792] Call trace: [ 3511.067156][ T4792] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3511.067227][ T4792] r7:00000c40 r6:00000000 r5:60000013 r4:82257d44 [ 3511.067237][ T4792] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3511.067267][ T4792] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3511.067297][ T4792] r5:83a68c00 r4:8291bcc0 [ 3511.067305][ T4792] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3511.067335][ T4792] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3511.067373][ T4792] r8:83a68c00 r7:00000c40 r6:87635868 r5:00001000 r4:830016c0 [ 3511.067382][ T4792] [<80525620>] (should_failslab) from [<8050a480>] (__kmalloc_noprof+0x9c/0x458) [ 3511.067411][ T4792] [<8050a3e4>] (__kmalloc_noprof) from [<807bc2ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3511.067450][ T4792] r10:83a68c00 r9:83319000 r8:00000000 r7:836a07f8 r6:87635868 r5:00001000 [ 3511.067461][ T4792] r4:00000000 [ 3511.067470][ T4792] [<807bc270>] (tomoyo_realpath_from_path) from [<807b83f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3511.067507][ T4792] r10:83a68c00 r9:00000000 r8:87635840 r7:00005452 r6:00000004 r5:81cd56c4 [ 3511.067519][ T4792] r4:87635868 r3:826c0240 [ 3511.067527][ T4792] [<807b8324>] (tomoyo_path_number_perm) from [<807bccd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3511.067563][ T4792] r9:00000003 r8:87635840 r7:200002c0 r6:200002c0 r5:00005452 r4:87635840 [ 3511.067571][ T4792] [<807bccb4>] (tomoyo_file_ioctl) from [<8076a70c>] (security_file_ioctl+0x64/0x1e4) [ 3511.067602][ T4792] [<8076a6a8>] (security_file_ioctl) from [<8056b32c>] (sys_ioctl+0x4c/0xd84) [ 3511.067634][ T4792] r7:200002c0 r6:87635841 r5:00000000 r4:00005452 [ 3511.067642][ T4792] [<8056b2e0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3511.067666][ T4792] Exception stack(0xebb81fa8 to 0xebb81ff0) [ 3511.067686][ T4792] 1fa0: 00000000 00000000 00000003 00005452 200002c0 00000000 [ 3511.067705][ T4792] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76bff0bc [ 3511.067720][ T4792] 1fe0: 76bfeec0 76bfeeb0 0001939c 00131f30 [ 3511.067739][ T4792] r10:00000036 r9:83a68c00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3511.067750][ T4792] r4:00000000 [ 3511.075208][ T4792] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3511.713395][ T4806] fuse: Bad value for 'fd' [ 3512.178078][ T4817] fuse: Invalid rootmode [ 3513.341096][ T31] kauditd_printk_skb: 295 callbacks suppressed [ 3513.342422][ T31] audit: type=1400 audit(3513.270:49674): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.345103][ T31] audit: type=1400 audit(3513.280:49675): avc: denied { read write open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.347596][ T31] audit: type=1400 audit(3513.280:49676): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.442833][ T31] audit: type=1400 audit(3513.380:49677): avc: denied { read write } for pid=4830 comm="syz.1.6721" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3513.444945][ T31] audit: type=1400 audit(3513.380:49678): avc: denied { open } for pid=4830 comm="syz.1.6721" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3513.447949][ T31] audit: type=1400 audit(3513.380:49679): avc: denied { mounton } for pid=4830 comm="syz.1.6721" path="/407/file0" dev="tmpfs" ino=2194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3513.449610][ T4831] fuse: Invalid rootmode [ 3513.468015][ T31] audit: type=1400 audit(3513.400:49680): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.481865][ T31] audit: type=1400 audit(3513.420:49681): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.483112][ T31] audit: type=1400 audit(3513.420:49682): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.526068][ T31] audit: type=1400 audit(3513.460:49683): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3513.709727][ T4842] fuse: Invalid rootmode [ 3513.913184][ T4846] fuse: Unknown parameter '000000000000000000000030x0000000000000007' [ 3514.281777][ T777] usb 2-1: new high-speed USB device number 86 using dummy_hcd [ 3514.431614][ T777] usb 2-1: Using ep0 maxpacket: 32 [ 3514.442585][ T777] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 3514.442782][ T777] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 3514.454933][ T777] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 3514.455141][ T777] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3514.455275][ T777] usb 2-1: Manufacturer: 䰊 [ 3514.455314][ T777] usb 2-1: SerialNumber: ᠊ [ 3515.073991][ T777] cdc_ncm 2-1:1.0: bind() failure [ 3515.082108][ T777] cdc_ncm 2-1:1.1: CDC Union missing and no IAD found [ 3515.082330][ T777] cdc_ncm 2-1:1.1: bind() failure [ 3515.093768][ T777] usb 2-1: USB disconnect, device number 86 [ 3515.778465][ T4870] fuse: Bad value for 'rootmode' [ 3516.210939][ T4877] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6734'. [ 3516.450314][ T4886] fuse: Bad value for 'rootmode' [ 3517.153037][ T4892] binder: 4890:4892 ioctl 6612 0 returned -22 [ 3518.658126][ T31] kauditd_printk_skb: 137 callbacks suppressed [ 3518.658388][ T31] audit: type=1400 audit(3518.590:49821): avc: denied { create } for pid=4910 comm="syz.0.6745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3518.660344][ T31] audit: type=1400 audit(3518.590:49822): avc: denied { setopt } for pid=4910 comm="syz.0.6745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3518.674527][ T31] audit: type=1400 audit(3518.610:49823): avc: denied { create } for pid=4910 comm="syz.0.6745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3518.677090][ T31] audit: type=1400 audit(3518.610:49824): avc: denied { write } for pid=4910 comm="syz.0.6745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3518.766869][ T31] audit: type=1400 audit(3518.700:49825): avc: denied { create } for pid=4912 comm="syz.0.6746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3518.776118][ T31] audit: type=1400 audit(3518.710:49826): avc: denied { read } for pid=4912 comm="syz.0.6746" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3518.777263][ T31] audit: type=1400 audit(3518.710:49827): avc: denied { open } for pid=4912 comm="syz.0.6746" path="/dev/ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3518.780598][ T31] audit: type=1400 audit(3518.710:49828): avc: denied { write } for pid=4901 comm="syz.1.6742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3518.856373][ T31] audit: type=1400 audit(3518.790:49829): avc: denied { create } for pid=4914 comm="syz.0.6747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3518.860642][ T31] audit: type=1400 audit(3518.790:49830): avc: denied { ioctl } for pid=4914 comm="syz.0.6747" path="socket:[76866]" dev="sockfs" ino=76866 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3519.120625][ T4915] binder: 4914:4915 ioctl 6612 0 returned -22 [ 3521.258002][ T4957] fuse: Unknown parameter 'use00000000000000000000' [ 3521.702323][ T4970] fuse: Unknown parameter 'user_i00000000000000000000' [ 3522.255734][ T4986] fuse: Unknown parameter 'user_i00000000000000000000' [ 3523.333145][ T4997] fuse: Unknown parameter 'user_i00000000000000000000' [ 3523.686949][ T31] kauditd_printk_skb: 190 callbacks suppressed [ 3523.687155][ T31] audit: type=1400 audit(3523.620:50021): avc: denied { create } for pid=5002 comm="syz.1.6785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3523.709195][ T31] audit: type=1400 audit(3523.640:50022): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3523.717578][ T31] audit: type=1400 audit(3523.650:50023): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3523.718992][ T31] audit: type=1400 audit(3523.650:50024): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3523.783676][ T31] audit: type=1400 audit(3523.720:50025): avc: denied { create } for pid=5004 comm="syz.1.6786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3523.788415][ T31] audit: type=1400 audit(3523.720:50026): avc: denied { create } for pid=5004 comm="syz.1.6786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3523.790027][ T31] audit: type=1400 audit(3523.720:50027): avc: denied { write } for pid=5004 comm="syz.1.6786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3523.792959][ T31] audit: type=1400 audit(3523.730:50028): avc: denied { module_request } for pid=5004 comm="syz.1.6786" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3523.846133][ T31] audit: type=1400 audit(3523.770:50029): avc: denied { read } for pid=5004 comm="syz.1.6786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3523.847116][ T31] audit: type=1400 audit(3523.780:50030): avc: denied { ioctl } for pid=5004 comm="syz.1.6786" path="socket:[77033]" dev="sockfs" ino=77033 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3523.902791][ T5008] fuse: Unknown parameter 'user_id00000000000000000000' [ 3524.500639][ T5019] fuse: Unknown parameter 'user_id00000000000000000000' [ 3525.157666][ T5030] fuse: Unknown parameter 'user_id00000000000000000000' [ 3530.294463][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 3530.295263][ T31] audit: type=1400 audit(3530.230:50123): avc: denied { create } for pid=5055 comm="syz.0.6805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3530.303464][ T31] audit: type=1400 audit(3530.240:50124): avc: denied { ioctl } for pid=5055 comm="syz.0.6805" path="socket:[76301]" dev="sockfs" ino=76301 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3530.304824][ T31] audit: type=1400 audit(3530.240:50125): avc: denied { module_request } for pid=5055 comm="syz.0.6805" kmod="netdev-dvmrp0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3530.352152][ T31] audit: type=1400 audit(3530.280:50126): avc: denied { sys_module } for pid=5055 comm="syz.0.6805" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3530.353030][ T31] audit: type=1400 audit(3530.290:50127): avc: denied { module_request } for pid=5055 comm="syz.0.6805" kmod="dvmrp0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3530.439964][ T31] audit: type=1400 audit(3530.370:50128): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3530.442292][ T31] audit: type=1400 audit(3530.370:50129): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3530.444396][ T31] audit: type=1400 audit(3530.370:50130): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3530.508477][ T31] audit: type=1400 audit(3530.440:50131): avc: denied { read } for pid=5055 comm="syz.0.6805" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3530.510201][ T31] audit: type=1400 audit(3530.440:50132): avc: denied { open } for pid=5055 comm="syz.0.6805" path="/dev/random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3530.700465][ T5056] binder: 5055:5056 ioctl 6612 0 returned -22 [ 3535.309063][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 3535.309277][ T31] audit: type=1400 audit(3535.240:50173): avc: denied { read } for pid=5079 comm="syz.0.6811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3535.318501][ T31] audit: type=1400 audit(3535.250:50174): avc: denied { ioctl } for pid=5079 comm="syz.0.6811" path="socket:[77170]" dev="sockfs" ino=77170 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3535.454328][ T31] audit: type=1400 audit(3535.390:50175): avc: denied { write } for pid=5082 comm="syz.0.6812" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3535.485165][ T31] audit: type=1400 audit(3535.390:50176): avc: denied { open } for pid=5082 comm="syz.0.6812" path="/dev/snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3535.492546][ C0] vkms_vblank_simulate: vblank timer overrun [ 3535.493907][ T5083] random: crng reseeded on system resumption [ 3535.534627][ T31] audit: type=1400 audit(3535.470:50177): avc: denied { read } for pid=5082 comm="syz.0.6812" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3535.534889][ T31] audit: type=1400 audit(3535.470:50178): avc: denied { ioctl } for pid=5082 comm="syz.0.6812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3535.643072][ T31] audit: type=1400 audit(3535.580:50179): avc: denied { ioctl } for pid=5082 comm="syz.0.6812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3535.771587][ T777] usb 1-1: new high-speed USB device number 77 using dummy_hcd [ 3535.932898][ T777] usb 1-1: unable to get BOS descriptor or descriptor too short [ 3535.937372][ T777] usb 1-1: config 1 interface 0 altsetting 5 bulk endpoint 0x1 has invalid maxpacket 8 [ 3535.937634][ T777] usb 1-1: config 1 interface 0 altsetting 5 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 3535.937762][ T777] usb 1-1: config 1 interface 0 has no altsetting 0 [ 3535.951632][ T777] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 3535.951824][ T777] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3535.951948][ T777] usb 1-1: Product: syz [ 3535.952013][ T777] usb 1-1: Manufacturer: syz [ 3535.952056][ T777] usb 1-1: SerialNumber: syz [ 3535.962304][ T31] audit: type=1400 audit(3535.900:50180): avc: denied { ioctl } for pid=5082 comm="syz.0.6812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3535.965463][ T5083] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3535.965908][ T5083] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3536.180785][ T31] audit: type=1400 audit(3536.110:50181): avc: denied { read write } for pid=5082 comm="syz.0.6812" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3536.184848][ T31] audit: type=1400 audit(3536.120:50182): avc: denied { open } for pid=5082 comm="syz.0.6812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3536.196309][ T5083] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3536.198606][ T5083] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3540.349063][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 3540.349354][ T31] audit: type=1400 audit(3540.280:50200): avc: denied { ioctl } for pid=5094 comm="syz.1.6815" path="socket:[76330]" dev="sockfs" ino=76330 ioctlcmd=0x4141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3541.035267][ T777] usb 1-1: USB disconnect, device number 77 [ 3541.157887][ T31] audit: type=1400 audit(3541.090:50201): avc: denied { read } for pid=5107 comm="syz.0.6816" name="audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3541.162232][ T31] audit: type=1400 audit(3541.100:50202): avc: denied { open } for pid=5107 comm="syz.0.6816" path="/dev/audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3541.174842][ T31] audit: type=1400 audit(3541.110:50203): avc: denied { ioctl } for pid=5107 comm="syz.0.6816" path="/dev/audio" dev="devtmpfs" ino=717 ioctlcmd=0x6607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3541.177940][ T31] audit: type=1400 audit(3541.110:50204): avc: denied { write } for pid=5107 comm="syz.0.6816" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3541.190890][ T31] audit: type=1400 audit(3541.120:50205): avc: denied { setattr } for pid=5107 comm="syz.0.6816" name="audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3541.217976][ T31] audit: type=1400 audit(3541.140:50206): avc: denied { create } for pid=5107 comm="syz.0.6816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3541.218217][ T31] audit: type=1400 audit(3541.140:50207): avc: denied { write } for pid=5107 comm="syz.0.6816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3541.218352][ T31] audit: type=1400 audit(3541.150:50208): avc: denied { create } for pid=5107 comm="syz.0.6816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3541.218402][ T31] audit: type=1400 audit(3541.150:50209): avc: denied { read } for pid=5107 comm="syz.0.6816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3542.595537][ T5126] random: crng reseeded on system resumption [ 3542.851660][T24767] usb 2-1: new high-speed USB device number 87 using dummy_hcd [ 3543.006223][T24767] usb 2-1: unable to get BOS descriptor or descriptor too short [ 3543.014178][T24767] usb 2-1: config 1 interface 0 altsetting 5 bulk endpoint 0x1 has invalid maxpacket 8 [ 3543.014358][T24767] usb 2-1: config 1 interface 0 altsetting 5 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 3543.014482][T24767] usb 2-1: config 1 interface 0 has no altsetting 0 [ 3543.024647][T24767] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 3543.024827][T24767] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3543.025008][T24767] usb 2-1: Product: syz [ 3543.025080][T24767] usb 2-1: Manufacturer: syz [ 3543.025120][T24767] usb 2-1: SerialNumber: syz [ 3543.042493][ T5126] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3543.044441][ T5126] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3545.413160][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 3545.413469][ T31] audit: type=1400 audit(3545.350:50250): avc: denied { ioctl } for pid=5135 comm="syz.0.6824" path="socket:[76362]" dev="sockfs" ino=76362 ioctlcmd=0x4153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3548.059737][ T31] audit: type=1400 audit(3547.990:50251): avc: denied { create } for pid=5140 comm="syz.0.6825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3548.087771][T24767] usb 2-1: USB disconnect, device number 87 [ 3548.109152][ T31] audit: type=1400 audit(3548.040:50252): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.142339][ T31] audit: type=1400 audit(3548.070:50253): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.142607][ T31] audit: type=1400 audit(3548.070:50254): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.219149][ T31] audit: type=1400 audit(3548.150:50255): avc: denied { read write } for pid=5152 comm="syz.1.6827" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3548.222855][ T31] audit: type=1400 audit(3548.160:50256): avc: denied { open } for pid=5152 comm="syz.1.6827" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3548.264384][ T5153] FAULT_INJECTION: forcing a failure. [ 3548.264384][ T5153] name failslab, interval 1, probability 0, space 0, times 0 [ 3548.264686][ T5153] CPU: 0 UID: 0 PID: 5153 Comm: syz.1.6827 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3548.264729][ T5153] Hardware name: ARM-Versatile Express [ 3548.264742][ T5153] Call trace: [ 3548.264762][ T5153] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3548.264827][ T5153] r7:00000d40 r6:00000000 r5:60000013 r4:82257d44 [ 3548.264837][ T5153] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3548.264867][ T5153] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3548.264934][ T5153] r5:876da400 r4:8291bcc0 [ 3548.264974][ T5153] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3548.265021][ T5153] [<8095f454>] (should_fail_ex) from [<8052568c>] (should_failslab+0x6c/0x94) [ 3548.265063][ T5153] r8:876da400 r7:00000d40 r6:8530e9e8 r5:00000024 r4:83001240 [ 3548.265072][ T5153] [<80525620>] (should_failslab) from [<8050a480>] (__kmalloc_noprof+0x9c/0x458) [ 3548.265101][ T5153] [<8050a3e4>] (__kmalloc_noprof) from [<807bc1b4>] (tomoyo_encode2+0x64/0xf0) [ 3548.265167][ T5153] r10:00000fff r9:8309e800 r8:00000000 r7:83436440 r6:8530e9e8 r5:87503ffc [ 3548.265183][ T5153] r4:87503fe3 [ 3548.265197][ T5153] [<807bc150>] (tomoyo_encode2) from [<807bc264>] (tomoyo_encode+0x24/0x30) [ 3548.265236][ T5153] r9:8309e800 r8:00000000 r7:83436440 r6:8530e9e8 r5:00001000 r4:87503fe4 [ 3548.265244][ T5153] [<807bc240>] (tomoyo_encode) from [<807bc2f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3548.265275][ T5153] r5:00001000 r4:87503000 [ 3548.265282][ T5153] [<807bc270>] (tomoyo_realpath_from_path) from [<807b83f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3548.265319][ T5153] r10:876da400 r9:00000000 r8:8530e9c0 r7:80284504 r6:00000004 r5:81cd56c4 [ 3548.265331][ T5153] r4:8530e9e8 r3:826c0240 [ 3548.265339][ T5153] [<807b8324>] (tomoyo_path_number_perm) from [<807bccd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3548.265402][ T5153] r9:00000003 r8:8530e9c0 r7:200000c0 r6:200000c0 r5:80284504 r4:8530e9c0 [ 3548.265414][ T5153] [<807bccb4>] (tomoyo_file_ioctl) from [<8076a70c>] (security_file_ioctl+0x64/0x1e4) [ 3548.265446][ T5153] [<8076a6a8>] (security_file_ioctl) from [<8056b32c>] (sys_ioctl+0x4c/0xd84) [ 3548.265479][ T5153] r7:200000c0 r6:8530e9c1 r5:00000000 r4:80284504 [ 3548.265488][ T5153] [<8056b2e0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3548.265527][ T5153] Exception stack(0xe4879fa8 to 0xe4879ff0) [ 3548.265550][ T5153] 9fa0: 00000000 00000000 00000003 80284504 200000c0 00000000 [ 3548.265568][ T5153] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76bff0bc [ 3548.265583][ T5153] 9fe0: 76bfeec0 76bfeeb0 0001939c 00131f30 [ 3548.265603][ T5153] r10:00000036 r9:876da400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 3548.265613][ T5153] r4:00000000 [ 3548.265655][ T5153] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3548.267124][ T31] audit: type=1400 audit(3548.200:50257): avc: denied { ioctl } for pid=5152 comm="syz.1.6827" path="/dev/input/event0" dev="devtmpfs" ino=703 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3548.288201][ T31] audit: type=1400 audit(3548.220:50258): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3548.301863][ T31] audit: type=1400 audit(3548.230:50259): avc: denied { read write open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3550.775641][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 3550.775958][ T31] audit: type=1400 audit(3550.710:50272): avc: denied { create } for pid=5161 comm="syz.0.6830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3550.903497][ T31] audit: type=1400 audit(3550.840:50273): avc: denied { create } for pid=5163 comm="syz.0.6831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3550.932214][ T31] audit: type=1400 audit(3550.860:50274): avc: denied { read } for pid=5163 comm="syz.0.6831" name="usbmon0" dev="devtmpfs" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3550.932567][ T31] audit: type=1400 audit(3550.870:50275): avc: denied { read } for pid=5163 comm="syz.0.6831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3550.933419][ T31] audit: type=1400 audit(3550.870:50276): avc: denied { open } for pid=5163 comm="syz.0.6831" path="/dev/usbmon0" dev="devtmpfs" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3550.936254][ T31] audit: type=1400 audit(3550.870:50277): avc: denied { ioctl } for pid=5163 comm="syz.0.6831" path="/dev/usbmon0" dev="devtmpfs" ino=682 ioctlcmd=0x940d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3550.995263][ T31] audit: type=1400 audit(3550.930:50278): avc: denied { module_request } for pid=5163 comm="syz.0.6831" kmod="netdev-vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3551.005162][ T31] audit: type=1400 audit(3550.940:50279): avc: denied { create } for pid=5163 comm="syz.0.6831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3551.042378][ T31] audit: type=1400 audit(3550.980:50280): avc: denied { create } for pid=5163 comm="syz.0.6831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3551.043503][ T31] audit: type=1400 audit(3550.980:50281): avc: denied { module_request } for pid=5163 comm="syz.0.6831" kmod="net-pf-33" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3552.177534][ T5173] binder: 5172:5173 ioctl 6612 0 returned -22 [ 3555.894043][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 3555.894285][ T31] audit: type=1400 audit(3555.830:50318): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.895703][ T31] audit: type=1400 audit(3555.830:50319): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3555.902181][ T31] audit: type=1400 audit(3555.840:50320): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3556.033432][ T31] audit: type=1400 audit(3555.970:50321): avc: denied { read write } for pid=1529 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3556.034085][ T31] audit: type=1400 audit(3555.970:50322): avc: denied { open } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3556.034631][ T31] audit: type=1400 audit(3555.970:50323): avc: denied { ioctl } for pid=1529 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3556.099771][ T31] audit: type=1400 audit(3556.030:50324): avc: denied { create } for pid=5189 comm="syz.1.6838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3556.114650][ T31] audit: type=1400 audit(3556.050:50325): avc: denied { ioctl } for pid=5189 comm="syz.1.6838" path="socket:[76515]" dev="sockfs" ino=76515 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3556.115692][ T31] audit: type=1400 audit(3556.050:50326): avc: denied { module_request } for pid=5189 comm="syz.1.6838" kmod="netdev-dvmrp0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3556.198765][ T31] audit: type=1400 audit(3556.130:50327): avc: denied { sys_module } for pid=5189 comm="syz.1.6838" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3556.332193][ T5190] binder: 5189:5190 ioctl 6612 0 returned -22 [ 3559.190127][ T5217] binder: 5216:5217 ioctl 6612 0 returned -22 [ 3560.852215][ T5232] binder: 5230:5232 ioctl 6612 0 returned -22 [ 3561.287460][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 3561.287658][ T31] audit: type=1400 audit(3561.220:50425): avc: denied { ioctl } for pid=5231 comm="syz.1.6854" path="socket:[77390]" dev="sockfs" ino=77390 ioctlcmd=0x4153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3561.875103][ T31] audit: type=1400 audit(3561.810:50426): avc: denied { write } for pid=5230 comm="syz.0.6853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3562.015375][ T31] audit: type=1400 audit(3561.950:50427): avc: denied { create } for pid=5240 comm="syz.0.6855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3562.023774][ T5241] FAULT_INJECTION: forcing a failure. [ 3562.023774][ T5241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3562.032308][ T5241] CPU: 1 UID: 0 PID: 5241 Comm: syz.0.6855 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3562.032378][ T5241] Hardware name: ARM-Versatile Express [ 3562.032392][ T5241] Call trace: [ 3562.032422][ T5241] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 3562.032496][ T5241] r7:eb33de20 r6:00000000 r5:60000113 r4:82257d44 [ 3562.032506][ T5241] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 3562.032536][ T5241] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 3562.032566][ T5241] r5:842c3c00 r4:82951710 [ 3562.032575][ T5241] [<80220048>] (dump_stack) from [<8095f618>] (should_fail_ex+0x1c4/0x228) [ 3562.032605][ T5241] [<8095f454>] (should_fail_ex) from [<8095f690>] (should_fail+0x14/0x18) [ 3562.032638][ T5241] r8:10000016 r7:eb33de20 r6:20000180 r5:00000000 r4:eb33df20 [ 3562.032646][ T5241] [<8095f67c>] (should_fail) from [<8095f6b0>] (should_fail_usercopy+0x1c/0x20) [ 3562.032672][ T5241] [<8095f694>] (should_fail_usercopy) from [<8151c150>] (copy_msghdr_from_user+0x50/0x130) [ 3562.032702][ T5241] [<8151c100>] (copy_msghdr_from_user) from [<8151c2a8>] (___sys_sendmsg+0x78/0xd0) [ 3562.032734][ T5241] r8:10000016 r7:00000000 r6:83621b80 r5:eb33df20 r4:eb33de64 [ 3562.032743][ T5241] [<8151c230>] (___sys_sendmsg) from [<8151c75c>] (__sys_sendmsg+0x8c/0xd8) [ 3562.032777][ T5241] r10:00000128 r9:842c3c00 r8:854923c0 r7:10000016 r6:20000180 r5:854923c1 [ 3562.032795][ T5241] r4:00000003 [ 3562.032803][ T5241] [<8151c6d0>] (__sys_sendmsg) from [<8151c7bc>] (sys_sendmsg+0x14/0x18) [ 3562.032836][ T5241] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 3562.032845][ T5241] [<8151c7a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3562.032870][ T5241] Exception stack(0xeb33dfa8 to 0xeb33dff0) [ 3562.032891][ T5241] dfa0: 00000000 00000000 00000003 20000180 10000016 00000000 [ 3562.032910][ T5241] dfc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76baf0bc [ 3562.032924][ T5241] dfe0: 76baeec0 76baeeb0 0001939c 00131f30 [ 3562.171848][ T31] audit: type=1400 audit(3562.100:50428): avc: denied { create } for pid=5242 comm="syz.0.6856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3562.178910][ T31] audit: type=1400 audit(3562.110:50429): avc: denied { read } for pid=5242 comm="syz.0.6856" name="uinput" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.179568][ T31] audit: type=1400 audit(3562.110:50430): avc: denied { open } for pid=5242 comm="syz.0.6856" path="/dev/uinput" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.180927][ T31] audit: type=1400 audit(3562.110:50431): avc: denied { ioctl } for pid=5242 comm="syz.0.6856" path="/dev/uinput" dev="devtmpfs" ino=696 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.194390][ T31] audit: type=1400 audit(3562.130:50432): avc: denied { read open } for pid=5242 comm="syz.0.6856" path="net:[4026532700]" dev="nsfs" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3562.215309][ T31] audit: type=1400 audit(3562.150:50433): avc: denied { ioctl } for pid=5242 comm="syz.0.6856" path="/dev/uinput" dev="devtmpfs" ino=696 ioctlcmd=0x5568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3562.217834][ T31] audit: type=1400 audit(3562.150:50434): avc: denied { write } for pid=5242 comm="syz.0.6856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3564.123911][ T5256] binder: 5255:5256 ioctl 6612 0 returned -22 [ 3566.068480][ T5280] binder: 5279:5280 ioctl 6612 0 returned -22 [ 3566.441011][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 3566.442242][ T31] audit: type=1400 audit(3566.370:50519): avc: denied { ioctl } for pid=5277 comm="syz.1.6864" path="socket:[76649]" dev="sockfs" ino=76649 ioctlcmd=0x4153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3567.103900][ T31] audit: type=1400 audit(3567.040:50520): avc: denied { write } for pid=5279 comm="syz.0.6865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3567.195695][ T31] audit: type=1400 audit(3567.130:50521): avc: denied { execute } for pid=5287 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3567.228770][ T31] audit: type=1400 audit(3567.160:50522): avc: denied { execute_no_trans } for pid=5287 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3567.250205][ T31] audit: type=1400 audit(3567.180:50523): avc: denied { execmem } for pid=5287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3567.283243][ T31] audit: type=1400 audit(3567.220:50524): avc: denied { read } for pid=5290 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3567.285397][ T31] audit: type=1400 audit(3567.220:50525): avc: denied { open } for pid=5290 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3567.292825][ T31] audit: type=1400 audit(3567.230:50526): avc: denied { mounton } for pid=5290 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3567.313089][ T31] audit: type=1400 audit(3567.250:50527): avc: denied { module_request } for pid=5290 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3567.368668][ T347] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3567.375559][ T31] audit: type=1400 audit(3567.310:50528): avc: denied { sys_module } for pid=5290 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3567.415312][ T347] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3567.456683][ T347] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3567.495515][ T347] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3567.714860][ T347] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3567.718705][ T347] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3567.733416][ T347] bond0 (unregistering): Released all slaves [ 3567.796786][ T347] hsr_slave_0: left promiscuous mode [ 3567.798071][ T347] hsr_slave_1: left promiscuous mode [ 3567.823895][ T347] veth1_macvtap: left promiscuous mode [ 3567.824189][ T347] veth0_macvtap: left promiscuous mode [ 3567.824427][ T347] veth1_vlan: left promiscuous mode [ 3567.824521][ T347] veth0_vlan: left promiscuous mode [ 3568.099142][ T347] 8<--- cut here --- [ 3568.099409][ T347] Unable to handle kernel paging request at virtual address 6576616c when write [ 3568.099570][ T347] [6576616c] *pgd=80000080005003, *pmd=00000000 [ 3568.100302][ T347] Internal error: Oops: a06 [#1] SMP ARM [ 3568.100893][ T347] Modules linked in: [ 3568.101242][ T347] CPU: 0 UID: 0 PID: 347 Comm: kworker/u8:0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3568.101745][ T347] Hardware name: ARM-Versatile Express [ 3568.102027][ T347] Workqueue: netns cleanup_net [ 3568.102261][ T347] PC is at rb_erase+0x2f4/0x394 [ 3568.102417][ T347] LR is at 0x0 [ 3568.103103][ T347] pc : [<81a3fdfc>] lr : [<00000000>] psr: 60000113 [ 3568.103836][ T347] sp : eb121b10 ip : eb121b28 fp : eb121b24 [ 3568.104026][ T347] r10: 00000000 r9 : 8534b600 r8 : 00000004 [ 3568.104530][ T347] r7 : 850aec80 r6 : 00000001 r5 : 851e6848 r4 : 851e6800 [ 3568.104779][ T347] r3 : 64697262 r2 : 6576616c r1 : 850aecb4 r0 : 851e6868 [ 3568.105191][ T347] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 3568.105458][ T347] Control: 30c5387d Table: 875fffc0 DAC: fffffffd [ 3568.105683][ T347] Register r0 information: slab kmalloc-128 start 851e6800 pointer offset 104 size 128 [ 3568.106392][ T347] Register r1 information: slab kmalloc-128 start 850aec80 pointer offset 52 size 128 [ 3568.106704][ T347] Register r2 information: non-paged memory [ 3568.107078][ T347] Register r3 information: non-paged memory [ 3568.107236][ T347] Register r4 information: slab kmalloc-128 start 851e6800 pointer offset 0 size 128 [ 3568.107541][ T347] Register r5 information: slab kmalloc-128 start 851e6800 pointer offset 72 size 128 [ 3568.107891][ T347] Register r6 information: non-paged memory [ 3568.108117][ T347] Register r7 information: slab kmalloc-128 start 850aec80 pointer offset 0 size 128 [ 3568.108420][ T347] Register r8 information: non-paged memory [ 3568.108593][ T347] Register r9 information: slab net_namespace start 8534b600 pointer offset 0 size 3456 [ 3568.108947][ T347] Register r10 information: NULL pointer [ 3568.109119][ T347] Register r11 information: 2-page vmalloc region starting at 0xeb120000 allocated at kernel_clone+0xac/0x3e4 [ 3568.109496][ T347] Register r12 information: 2-page vmalloc region starting at 0xeb120000 allocated at kernel_clone+0xac/0x3e4 [ 3568.109767][ T347] Process kworker/u8:0 (pid: 347, stack limit = 0xeb120000) [ 3568.109975][ T347] Stack: (0xeb121b10 to 0xeb122000) [ 3568.110140][ T347] 1b00: 851e6800 851e6848 eb121b64 eb121b28 [ 3568.110458][ T347] 1b20: 80610e64 81a3fb14 0000000c 60000113 dddcc99c 60000113 00000000 d9a94c6d [ 3568.110666][ T347] 1b40: 854f5804 84e9a200 854f5804 00000001 851e6800 00000011 eb121ba4 eb121b68 [ 3568.110853][ T347] 1b60: 80610e98 80610da0 eb121bac 84750400 85144000 82aca2a8 00000000 d9a94c6d [ 3568.111085][ T347] 1b80: eb121ba4 84e9a200 00000000 8534b600 00000019 84fbf000 eb121bbc eb121ba8 [ 3568.111481][ T347] 1ba0: 80610f68 80610da0 854f5800 00000000 eb121bcc eb121bc0 81980d2c 80610f4c [ 3568.111680][ T347] 1bc0: eb121be4 eb121bd0 8155c728 81980d28 854f6c00 00000000 eb121c14 eb121be8 [ 3568.111930][ T347] 1be0: 818041e0 8155c70c 00000000 81a554b0 854f6c00 854f6c00 854f6b84 00000000 [ 3568.112197][ T347] 1c00: 00000000 854f6c00 eb121c7c eb121c18 8180514c 81804188 8022ced4 8022be3c [ 3568.112391][ T347] 1c20: 8534b600 84e16000 00000001 854f6d48 eb121c30 eb121c30 815e342c 00000000 [ 3568.112608][ T347] 1c40: 00000000 d9a94c6d 81a5bf34 d9a94c6d eb121c84 84e16000 854f6c00 8534b600 [ 3568.112839][ T347] 1c60: 00000006 8180b2c8 85144000 eb121d90 eb121ccc eb121c80 8180b360 81804abc [ 3568.113081][ T347] 1c80: eb121c9c eb121c90 eb121ccc eb121c98 eb121ccc eb121ca0 816e9670 d9a94c6d [ 3568.113316][ T347] 1ca0: 81c00000 829e5764 829e490c ffffffd1 00000000 8180b2c8 85144000 eb121d90 [ 3568.113506][ T347] 1cc0: eb121d04 eb121cd0 802926d4 8180b2d4 838b5400 00000006 eb121d04 eb121d90 [ 3568.113806][ T347] 1ce0: 00000006 8534b600 00000000 851f4340 85144000 00000000 eb121d1c eb121d08 [ 3568.114019][ T347] 1d00: 8029290c 80292680 00000000 802da2e4 eb121d44 eb121d20 8154bde4 802928f8 [ 3568.114231][ T347] 1d20: 8043a2b0 d9a94c6d eb121d44 000000c0 84e16000 00000001 eb121ddc eb121d48 [ 3568.114415][ T347] 1d40: 81557318 8154bd9c 00000000 00000000 00000000 00000000 00000000 80505530 [ 3568.114617][ T347] 1d60: 82c1f94c 82c20734 829d251c 00000000 00000000 00000000 838b5400 eb121e08 [ 3568.114844][ T347] 1d80: 81557a1c 00000000 eb121d88 eb121d88 84e16000 00000000 eb121ddc eb121da8 [ 3568.115107][ T347] 1da0: 81557a1c 808c888c 00000000 d9a94c6d eb121ddc 8534b5fc 8534b6f8 eb121e70 [ 3568.115320][ T347] 1dc0: 82c1f980 eb121e90 829d1ec4 eb121e70 eb121e54 eb121de0 815586f4 81556dd8 [ 3568.115751][ T347] 1de0: eb121dfc eb121df0 81a5be40 eb121e90 8534b600 8241ea90 81a4e914 81a5be20 [ 3568.116148][ T347] 1e00: 8534b5fc 61c88647 8388b10c 84cbe10c 8122b044 00000000 00000000 00000000 [ 3568.116365][ T347] 1e20: 00000000 d9a94c6d eb121e54 829d2584 eb121e90 829d2584 eb121e90 829d1ec4 [ 3568.116579][ T347] 1e40: 829d1ec4 844b6c00 eb121e74 eb121e58 81539f10 815583fc 829d2584 82c1f940 [ 3568.116790][ T347] 1e60: 829d1e80 eb121e90 eb121ed4 eb121e78 8153c370 81539eb8 81a5bf34 8029ce24 [ 3568.117086][ T347] 1e80: 82c1f940 829d1e80 808c9ab0 81539f14 8534b620 8534b620 00000100 00000122 [ 3568.117316][ T347] 1ea0: 00000000 d9a94c6d 81c01f84 84ed6780 829d1e98 8301bc00 8300e600 838b5400 [ 3568.117596][ T347] 1ec0: 8301bc15 8300f070 eb121f2c eb121ed8 802873bc 8153c0cc 81c01a44 838b5400 [ 3568.117816][ T347] 1ee0: eb121f14 eb121ef0 829d1e9c 829d1e98 829d1e9c 829d1e98 eb121f2c 00000000 [ 3568.118027][ T347] 1f00: 80282cf8 84ed6780 8300e620 8300e600 82804d40 84ed67ac 838b5400 61c88647 [ 3568.118324][ T347] 1f20: eb121f6c eb121f30 80288004 80287214 81a5bf34 8029ce24 eb121f6c eb121f48 [ 3568.118598][ T347] 1f40: 8028eb98 00000001 838b5400 84ed6180 f3139e60 80287e08 84ed6780 00000000 [ 3568.119019][ T347] 1f60: eb121fac eb121f70 8028f07c 80287e14 80274ea8 81a5bebc 838b5400 d9a94c6d [ 3568.119242][ T347] 1f80: eb121fac 8458ec80 8028ef50 00000000 00000000 00000000 00000000 00000000 [ 3568.119497][ T347] 1fa0: 00000000 eb121fb0 80200114 8028ef5c 00000000 00000000 00000000 00000000 [ 3568.119801][ T347] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3568.120169][ T347] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000 [ 3568.120430][ T347] Call trace: [ 3568.120594][ T347] [<81a3fb08>] (rb_erase) from [<80610e64>] (drop_sysctl_table+0xd0/0x1ac) [ 3568.120890][ T347] r5:851e6848 r4:851e6800 [ 3568.121039][ T347] [<80610d94>] (drop_sysctl_table) from [<80610e98>] (drop_sysctl_table+0x104/0x1ac) [ 3568.121412][ T347] r8:00000011 r7:851e6800 r6:00000001 r5:854f5804 r4:84e9a200 [ 3568.121719][ T347] [<80610d94>] (drop_sysctl_table) from [<80610f68>] (unregister_sysctl_table+0x28/0x38) [ 3568.121980][ T347] r8:84fbf000 r7:00000019 r6:8534b600 r5:00000000 r4:84e9a200 [ 3568.122196][ T347] [<80610f40>] (unregister_sysctl_table) from [<81980d2c>] (unregister_net_sysctl_table+0x10/0x14) [ 3568.122585][ T347] r5:00000000 r4:854f5800 [ 3568.122718][ T347] [<81980d1c>] (unregister_net_sysctl_table) from [<8155c728>] (neigh_sysctl_unregister+0x28/0x34) [ 3568.123033][ T347] [<8155c700>] (neigh_sysctl_unregister) from [<818041e0>] (addrconf_sysctl_unregister+0x64/0x6c) [ 3568.123326][ T347] r5:00000000 r4:854f6c00 [ 3568.123464][ T347] [<8180417c>] (addrconf_sysctl_unregister) from [<8180514c>] (addrconf_ifdown+0x69c/0x764) [ 3568.123862][ T347] r8:854f6c00 r7:00000000 r6:00000000 r5:854f6b84 r4:854f6c00 [ 3568.124151][ T347] [<81804ab0>] (addrconf_ifdown) from [<8180b360>] (addrconf_notify+0x98/0x770) [ 3568.124417][ T347] r10:eb121d90 r9:85144000 r8:8180b2c8 r7:00000006 r6:8534b600 r5:854f6c00 [ 3568.124734][ T347] r4:84e16000 [ 3568.124873][ T347] [<8180b2c8>] (addrconf_notify) from [<802926d4>] (notifier_call_chain+0x60/0x1b4) [ 3568.125171][ T347] r10:eb121d90 r9:85144000 r8:8180b2c8 r7:00000000 r6:ffffffd1 r5:829e490c [ 3568.125399][ T347] r4:829e5764 [ 3568.125518][ T347] [<80292674>] (notifier_call_chain) from [<8029290c>] (raw_notifier_call_chain+0x20/0x28) [ 3568.125917][ T347] r10:00000000 r9:85144000 r8:851f4340 r7:00000000 r6:8534b600 r5:00000006 [ 3568.126168][ T347] r4:eb121d90 [ 3568.126302][ T347] [<802928ec>] (raw_notifier_call_chain) from [<8154bde4>] (call_netdevice_notifiers_info+0x54/0xa0) [ 3568.126910][ T347] [<8154bd90>] (call_netdevice_notifiers_info) from [<81557318>] (unregister_netdevice_many_notify+0x54c/0xbc4) [ 3568.127353][ T347] r6:00000001 r5:84e16000 r4:000000c0 [ 3568.127501][ T347] [<81556dcc>] (unregister_netdevice_many_notify) from [<815586f4>] (default_device_exit_batch+0x304/0x384) [ 3568.127933][ T347] r10:eb121e70 r9:829d1ec4 r8:eb121e90 r7:82c1f980 r6:eb121e70 r5:8534b6f8 [ 3568.128175][ T347] r4:8534b5fc [ 3568.128282][ T347] [<815583f0>] (default_device_exit_batch) from [<81539f10>] (ops_exit_list+0x64/0x68) [ 3568.128543][ T347] r10:844b6c00 r9:829d1ec4 r8:829d1ec4 r7:eb121e90 r6:829d2584 r5:eb121e90 [ 3568.128826][ T347] r4:829d2584 [ 3568.129019][ T347] [<81539eac>] (ops_exit_list) from [<8153c370>] (cleanup_net+0x2b0/0x49c) [ 3568.129307][ T347] r7:eb121e90 r6:829d1e80 r5:82c1f940 r4:829d2584 [ 3568.129549][ T347] [<8153c0c0>] (cleanup_net) from [<802873bc>] (process_one_work+0x1b4/0x4f4) [ 3568.129882][ T347] r10:8300f070 r9:8301bc15 r8:838b5400 r7:8300e600 r6:8301bc00 r5:829d1e98 [ 3568.130118][ T347] r4:84ed6780 [ 3568.130237][ T347] [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8) [ 3568.130540][ T347] r10:61c88647 r9:838b5400 r8:84ed67ac r7:82804d40 r6:8300e600 r5:8300e620 [ 3568.130797][ T347] r4:84ed6780 [ 3568.130923][ T347] [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280) [ 3568.131248][ T347] r10:00000000 r9:84ed6780 r8:80287e08 r7:f3139e60 r6:84ed6180 r5:838b5400 [ 3568.131660][ T347] r4:00000001 [ 3568.131771][ T347] [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3568.131995][ T347] Exception stack(0xeb121fb0 to 0xeb121ff8) [ 3568.132418][ T347] 1fa0: 00000000 00000000 00000000 00000000 [ 3568.132639][ T347] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3568.132869][ T347] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3568.133138][ T347] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [ 3568.133353][ T347] r4:8458ec80 [ 3568.133612][ T347] Code: 089da830 e58e3000 e89da830 e5903000 (e5823000) [ 3568.135095][ T347] ---[ end trace 0000000000000000 ]--- [ 3568.135592][ T347] Kernel panic - not syncing: Fatal exception [ 3568.137072][ T347] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:51:19 Registers: info registers vcpu 0 CPU#0 R00=84488040 R01=00000030 R02=eb2c5000 R03=00000000 R04=842b9048 R05=84488040 R06=80a62868 R07=842b904e R08=8282a2b8 R09=00000000 R10=00004532 R11=eb12174c R12=00000002 R13=eb121740 R14=8295b2ec R15=80a628c0 PSR=80000193 N--- A S svc32 s00=62696c2f s01=646f6d2f d00=646f6d2f62696c2f s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=76ca7000 R01=00000000 R02=76caae08 R03=00003e08 R04=76f0cbd0 R05=7efd6f48 R06=00000002 R07=7efd6f10 R08=00000002 R09=76cab028 R10=00000010 R11=7efd709c R12=00000000 R13=eb801ff8 R14=76f147a4 R15=76f147a4 PSR=40010193 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000