last executing test programs: 29.668863828s ago: executing program 0 (id=956): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20008844}, 0x8c55) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r1) r2 = openat$tcp_congestion(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$P9_RWSTAT(r2, 0x0, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x810}, 0x10040) r3 = openat$selinux_load(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5451, 0x5) r4 = openat$sndtimer(0xffffff9c, &(0x7f0000000100), 0x80000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000280)={{0x2, 0x2, 0x8, 0x1, 0x1b000}}) write$selinux_load(r3, &(0x7f0000000200)={0xf97cff8c, 0x8}, 0x10) r5 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r6, 0x200, 0x70bd2f, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x3004}, 0x20008080) 25.500011749s ago: executing program 0 (id=964): pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x40, 0x4}, 0x9}}, 0x18) r2 = openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x400, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@o_path={&(0x7f00000003c0)='./file0\x00', 0x0, 0x4010, r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r4}, &(0x7f0000000440), &(0x7f0000000480)='%pI4 \x00'}, 0x20) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x108, r5, 0x18d680f1badd5a23, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0xcc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd0e}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x225}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x3}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9}, @TIPC_NLA_NODE_ID={0x58, 0x3, "b5c1ba193021afd90cd88b0bff45073a405a2611e6b55e187f0c1d984b6d84c6a9bfa3f5756b8fb222c885688547a39475f1568deeb0427909dc6b491bacb4821f0cdf91e70e1fe23a9a4caa58c0181e7f7a23a0"}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "2d9d2b73e28c705b4aa0dabe6a609f13af792e9811c64699c0"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x24004014}, 0x4000000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r6, &(0x7f0000000d00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000780)={0x528, r5, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfa}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_BEARER={0xdc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'wlan1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xfffffe00, @loopback, 0xb}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xc, @private0={0xfc, 0x0, '\x00', 0x1}, 0xe}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xf1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfa0}]}]}, @TIPC_NLA_BEARER={0x114, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80000001, @empty, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @mcast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xec6, @local, 0x2925f3cc}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xfff, @mcast2, 0xffffffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}, 0xfffffeff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9a1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcf}]}, @TIPC_NLA_NODE={0x1a8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0xd0, 0x3, "ea27e6b87c6c02a59362f2a1a12d695baea81ffd8ee09455371d9e2f01373c19744377444b72b446dd878e63dee37a142eabe61738a2c0b5567e4d2390a5c659fa6ace37d2d5a4ee21ab4598c1d5646b7441a65d150a3408d598ff9a1c4729470380dcbd203e0b7f14ccaaa6630e9cdee8c59678e627b5727bf1849cf2e145ac94fb3641ac437bcd304b75aca379fb699b50e94b50e7daac12a913d68f55d2dcdfd9370e92b43410901b54987ca09bd352d8bf0e2751d06934eb124755e1f4951cc93ef631d6eace4adc2631"}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "da0ff4c87560b878b94281b54f5b53d0df644026a9ea8230a83a"}}, @TIPC_NLA_NODE_ID={0x79, 0x3, "ac4a47fc6c593d6c368bbe494929f9ade0357f0a050cc288f9ef8939e95c92c96c3d752a7f3bab04d49602088619c74d35778c3650104203331031158730a3b43ef7bf097b6058919b1f15b278aa6ce54ef503aae60dffaab00f27eaaa8671aa720a5dfd77fd247bbed188f7d7e9200fead07a203a"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NODE={0xe0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "9471e4257f6210ce9c31e09104d4f22268bd62622dcbb6ea4f54ee35c672d642538a"}}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "5eb0da144b16680016766fba2276673cf0b904450925dd52a6"}}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "1c5545138caf11ef4213fbd51f67d9a877513307ba21a8c0c2e73303352db6d3f91d"}}]}]}, 0x528}, 0x1, 0x0, 0x0, 0x4000004}, 0x8811) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000d80), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000f00)={&(0x7f0000000e40)={0x90, r7, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x826}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_BACKEND_IDENTIFIER={0x8, 0xa, '(-,-'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x28, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r8}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r6}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r10}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x24040001}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000f80)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000001180)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r11, 0x50009418, &(0x7f0000001580)={{}, r13, 0x18, @unused=[0x8, 0x6, 0x1, 0x8], @devid=r14}) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r9, 0x40049366, &(0x7f0000002580)) r15 = syz_genetlink_get_family_id$wireguard(&(0x7f0000002600), r6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r10, 0x8933, &(0x7f0000002640)={'wg1\x00', 0x0}) sendmsg$WG_CMD_GET_DEVICE(r6, &(0x7f0000002700)={&(0x7f00000025c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000026c0)={&(0x7f0000002680)={0x1c, r15, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r16}]}, 0x1c}}, 0x4000004) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000002740)=@base={0x2, 0x8001, 0x6, 0x5, 0xc004, r4, 0x4, '\x00', r16, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x50) ioctl$BTRFS_IOC_SNAP_DESTROY(r17, 0x5000940f, &(0x7f00000027c0)={{r10}, "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"}) r18 = openat$fb1(0xffffff9c, &(0x7f00000037c0), 0x191001, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r18, 0x50009418, &(0x7f0000003880)={{r6}, r12, 0x8, @inherit={0x70, &(0x7f0000003800)={0x1, 0x5, 0x8, 0xae70, {0x16, 0x9, 0x6, 0x0, 0x5}, [0x7, 0x9, 0x1, 0xfff, 0x5]}}, @subvolid=0x1}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000004880), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r6, &(0x7f0000004bc0)={&(0x7f00000048c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004b80)={&(0x7f0000004900)={0x24c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xbf, 0x2a, [@ssid={0x0, 0x6, @default_ibss_ssid}, @chsw_timing={0x68, 0x4, {0x9}}, @random={0x1, 0xab, "a892014ec188308edcb6dbbf0aa352e663715b62cf02039f504678ca7988ed0236ddcb7247f0b3ef79f0080ecf5b1ebc7f5e602e3edf29e9d502e3951a6d899df193b0151cf4547c093d33afe918ba5a811667f6766ad4a7a4d119f2a9ba8760eaaa4f8910c51499c6113541d087a432648f535b417447a6773148ea3b8c28628a34b4ee0ffb54eec1cbe793a44b217349e932894b929e3bf6bf1839724a7e20f6f38bc4dc84aa1b59a4b8"}]}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x8}, @NL80211_ATTR_IE={0x165, 0x2a, [@chsw_timing={0x68, 0x4, {0x5, 0x684}}, @dsss={0x3, 0x1, 0x38}, @mesh_chsw={0x76, 0x6, {0x6, 0x3d, 0x1a, 0x3}}, @ssid={0x0, 0x1a, @random="0ef70df95ade5792b078f9b9fb2b82bea8f2c4658b1bb29cddb3"}, @peer_mgmt={0x75, 0x16, {0x0, 0x1000, @void, @val=0xe, @val="0b9269fc2f52b9eac2545a17d828b369"}}, @random={0x5, 0xf4, "d14519c83979662315fd33206177db98b18ffb4d896b0536697ef0d806672cae67c6d76fdabc619f1af509062508d4ccf5af6c687f99064315523504a2f518d60c65e1f7bf4a97428c983b33d77340291ac05c0e28c8293647f5568882d18e05c0a6f14d990d57165bf790caa547d0410de709e6fb46c00fc348b8182d8874ad38b3bb4d11bf3209be25b3831ec3b708a280f77bf457a6113ddee58122bd53fcb43ff2b208091a3134bcb3845a1f4bedc7e2297206741e6a1744a20c5c3805ce90207cd55c129a8e632b586a6fb7b9d100743e42326227b378ba09285062a103d0bd3b13ee19115fb16f0fd367eaca8e172a90fc"}, @erp={0x2a, 0x1, {0x1, 0x1, 0x1}}, @mic={0x8c, 0x18, {0x84, "a115c148e455", @long="c523b6ddfc370fdc424a150c19dffc80"}}, @chsw_timing={0x68, 0x4, {0x7138, 0x40}}, @supported_rates={0x1, 0x1, [{0x2, 0x1}]}]}, @NL80211_ATTR_MDID={0x6, 0xb1, 0xff}]}, 0x24c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4004) bpf$OBJ_GET_PROG(0x7, &(0x7f0000004c40)=@generic={&(0x7f0000004c00)='./file0\x00', 0x0, 0x18}, 0x18) 18.149861155s ago: executing program 0 (id=973): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x440, 0x0) r4 = dup(r3) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r4, 0x800c4151, 0x0) bind$unix(r2, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$DRM_IOCTL_PANTHOR_TILER_HEAP_CREATE(0xffffffffffffffff, 0xc028644b, &(0x7f0000000000)={0x0, 0x4, 0x740000, 0x7db, 0x6, 0x0, 0x8, 0x5}) ioctl$DRM_IOCTL_PANTHOR_TILER_HEAP_DESTROY(0xffffffffffffffff, 0xc008644c, &(0x7f0000000080)={r5}) listen(r2, 0x0) connect$unix(r1, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$alg(0x26, 0x5, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$DRM_IOCTL_GEM_FLINK(r7, 0xc008640a, 0x0) r8 = dup3(r2, r1, 0x0) r9 = accept4$inet(r8, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r10, r11) write$FUSE_LSEEK(r12, 0x0, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r13) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x14, r14, 0x71d}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r12, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xb0, r14, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xff}, {0x6, 0x16, 0x6}, {0x5}, {0x6, 0x11, 0x401}, {0x8, 0xb, 0xffff}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x3}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x101}, {0x8, 0xb, 0x1}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x20008010) ioctl$BTRFS_IOC_BALANCE_CTL(r9, 0x5451, 0x0) timerfd_create(0x0, 0x0) r15 = dup2(r9, r0) sendmsg$can_j1939(r15, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)="b1f22d81f1", 0x5}, 0x1, 0x0, 0x0, 0x2000c0d0}, 0x4014891) 12.181112391s ago: executing program 0 (id=984): mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) r1 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5452, &(0x7f0000003040)={{}, "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"}) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10001021}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0xc, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20044001}, 0x4000000) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x34014c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003dc150f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000c6d90000000000001354c4b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a00", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20, 0x0, 0x0, {0x0, 0x1a}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x80101, 0x101) dup2(r3, r0) write$P9_RXATTRWALK(r3, 0x0, 0x0) 7.907688714s ago: executing program 0 (id=992): r0 = inotify_init1(0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5451, 0x0) (async) close(0xffffffffffffffff) (async) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$XFS_IOC_ATTRLIST_BY_HANDLE(r1, 0x4038587a, &(0x7f0000000500)={{0xffffffffffffffff, &(0x7f0000000240)='\x00', 0x141640, &(0x7f0000000280)={@_ha_fsid={[0xfffffff0, 0x2d6]}, {0x2, 0x30, 0x5, 0x2}}, 0x1, &(0x7f00000002c0)={@_ha_fsid}, &(0x7f0000000300)=0x80000000}, {[0xbae, 0xd, 0xff8a, 0x7ff]}, 0xffffffff, 0x47, &(0x7f0000000480)=""/71}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002340)={0x0}, 0x1, 0x0, 0x0, 0x200040c1}, 0x8005) (async) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r3, 0x8901, &(0x7f0000000040)) (async) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0xfffffffffffffe0f, 0x0}, 0x40010132) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) r5 = socket$netlink(0x10, 0x3, 0x12) sendmsg$nl_crypto(r5, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}, 0x1, 0x0, 0x0, 0x41}, 0x4804) (async) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r7 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) close_range(r7, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0x0, 0x6, 0x41, 0x14, @rand_addr=' \x01\x00', @private0={0xfc, 0x0, '\x00', 0x1}, 0x20, 0x80, 0x7f, 0xfffffffe}}) (async) getsockopt$IP_SET_OP_VERSION(r5, 0x1, 0x53, &(0x7f0000000140), &(0x7f0000000180)=0x8) (async) r9 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000200)={0x1d, r10, 0x4, {0x2, 0xf0, 0x2}}, 0x18) sendmsg$L2TP_CMD_SESSION_DELETE(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000c56bdc14d9215832538ec7a606d5b68dc37f6684dcf5a92c8b4006622b203d74c3fb09fa3795ce14ad4bd89358a589ae87c6d295da05c66f29ffd0cca67c3befa02a8db01f5bb4ec652e3db60f744f42a1af02da04779bd2b3a38a27aa594b126aade4d831c11a64344962fb90d760182d292521651314d75d37882dec6473ba7e905176c8231e03724b2ef984bcbf608b513d77e7db8e", @ANYRES16=0x0, @ANYBLOB="02002bbd7000fddbdf2506000000"], 0x14}, 0x1, 0x0, 0x0, 0x200c0030}, 0x200480c5) (async) getsockopt$inet_int(r6, 0x0, 0x7, &(0x7f0000000080), &(0x7f0000000040)=0x4) ioctl$TUNGETFILTER(r4, 0x5450, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r4, 0x80089419, &(0x7f0000000100)) 3.538472847s ago: executing program 0 (id=1000): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x100040, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000040)="38b543afcd3e43009c4533fbb469d66a4dd4") ioctl$XFS_IOC_START_COMMIT(r0, 0x80585882, &(0x7f0000000080)={0xffffffffffffffff}) openat$ttyprintk(0xffffff9c, &(0x7f0000000100), 0x100, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/200) flistxattr(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r1}, 0x4) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000380)={0x100, 0x7, 0x4, 0x40, 0x14, "915de91ed774401e"}) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f00000003c0)={0x0, 'bridge0\x00', {0x1}, 0x2e}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000400)) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000580)=0x4) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000005c0)="1b12001b00b556d8ab4cdd76b390a17518c11a98a23fe49dd42cd06605581356381db772847d7e07a656d35a341c09d33766ea5e2e0641b4d4df8cc04b4f39219261b026663990c6237f5b1a9bc356bcf69be238e98a9fb53b82fadc8da74503d99ecbef02b8956a2211cfcbeb8a4c3b20cf92", 0x73}, {&(0x7f0000000680)="1dc063f74469452fb5fc8278abf9a933c1b782f5f3a8266f98f7875df9cdf42fb898df2a99b5e9f658b5f3b3e116bd04085f399f2cbf01a1d65082945989ce1bc8bfae31fce5", 0x46}], 0x2) r2 = socket$nl_rdma(0x10, 0x3, 0x14) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r1, 0x1, &(0x7f0000000a40)={0x100, r2}, 0x0) 2.510098938s ago: executing program 1 (id=1001): r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) recvmmsg(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x40010000, &(0x7f0000007300)={0x0, 0x989680}) r2 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x220300) close(r2) close(0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x800) 2.129153419s ago: executing program 1 (id=1002): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, 0x2, 0x3, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x1, 0x2}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x5, 0x2}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x9}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x5}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x40841}, 0x40) r1 = gettid() r2 = openat$binder_debug(0xffffff9c, &(0x7f0000001000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) kcmp(r1, r1, 0x4, 0xffffffffffffffff, r2) 1.580605899s ago: executing program 1 (id=1003): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x28100, 0x0) r1 = dup2(r0, r0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000040)=0xf, 0x4) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x894c, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc0fc4110, 0x0) 599.782105ms ago: executing program 1 (id=1004): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x44885}, 0x8000) r1 = socket(0x1d, 0x2, 0x6) pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r2, 0xc00864c0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) read(r1, &(0x7f0000000080)=""/107, 0x6b) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="200027bd7000f9dbdf2517000000"], 0x14}, 0x1, 0x0, 0x0, 0x8840}, 0x800) syz_open_dev$usbmon(&(0x7f0000000900), 0x9, 0x0) 279.55918ms ago: executing program 1 (id=1005): r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000cab000)=0xc) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88540c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}}, 0x14}}, 0x800) 0s ago: executing program 1 (id=1006): r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) ioctl$BTRFS_IOC_SUBVOL_SYNC_WAIT(r0, 0x40109441, &(0x7f0000000040)={0xfcc7, 0x1, 0x1}) fcntl$notify(r0, 0x402, 0x80000000) r1 = syz_open_dev$audion(&(0x7f0000000280), 0x0, 0x30000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x88, r2, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe97}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_QUOTAOFF(r0, 0xffffffff80000301, r3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, r4, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xdb2}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x95}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004840) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x0, '\x00', 0x0, r1, 0x3, 0x3, 0x3}, 0x50) pidfd_getfd(r1, r5, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000800), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'syztnl2\x00', &(0x7f0000000840)={'syztnl0\x00', 0x0, 0x80, 0x8, 0x3, 0x9, {{0x5, 0x4, 0x2, 0x4, 0x14, 0x68, 0x0, 0x7, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x3c}}}}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={r5, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r6, &(0x7f0000000b00)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x6c, r7, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x6c}}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80), r1) sendmsg$NFT_MSG_GETSET(r6, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x20, 0xa, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x885}, 0x800) kernel console output (not intermixed with test programs): [ 45.294052][ T28] audit: type=1400 audit(45.220:91): avc: denied { read write } for pid=3086 comm="scp" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.301559][ T28] audit: type=1400 audit(45.220:92): avc: denied { open } for pid=3086 comm="scp" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:62261' (ED25519) to the list of known hosts. [ 61.411917][ T28] audit: type=1400 audit(61.330:93): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.257157][ T28] audit: type=1400 audit(63.160:94): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.341730][ T28] audit: type=1400 audit(63.250:95): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.722232][ T28] audit: type=1400 audit(66.640:96): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.727479][ T28] audit: type=1400 audit(66.650:97): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.746329][ T3090] cgroup: Unknown subsys name 'net' [ 66.756604][ T28] audit: type=1400 audit(66.680:98): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.900414][ T3090] cgroup: Unknown subsys name 'cpuset' [ 66.911978][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 66.913849][ T3090] cgroup: Unknown subsys name 'rlimit' [ 67.128203][ T28] audit: type=1400 audit(67.050:99): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.130355][ T28] audit: type=1400 audit(67.050:100): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.133597][ T28] audit: type=1400 audit(67.050:101): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.341392][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.345491][ T28] audit: type=1400 audit(67.270:102): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.353345][ T28] audit: type=1400 audit(67.270:103): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.387489][ T28] audit: type=1400 audit(67.310:104): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.389837][ T28] audit: type=1400 audit(67.310:105): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.232091][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.314250][ T28] audit: type=1400 audit(77.240:106): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.379416][ T28] audit: type=1400 audit(77.300:107): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.383119][ T28] audit: type=1400 audit(77.300:108): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.390591][ T28] audit: type=1400 audit(77.310:109): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.418699][ T28] audit: type=1400 audit(77.340:110): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.506903][ T28] audit: type=1400 audit(77.430:111): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.229269][ T28] audit: type=1400 audit(78.150:112): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.469584][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.480711][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.570138][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.583540][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.423455][ T3095] hsr_slave_0: entered promiscuous mode [ 80.426525][ T3095] hsr_slave_1: entered promiscuous mode [ 80.548637][ T3096] hsr_slave_0: entered promiscuous mode [ 80.550173][ T3096] hsr_slave_1: entered promiscuous mode [ 80.552413][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 80.552835][ T3096] Cannot create hsr debugfs directory [ 80.975099][ T28] audit: type=1400 audit(80.890:113): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.977773][ T28] audit: type=1400 audit(80.900:114): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.979746][ T28] audit: type=1400 audit(80.900:115): avc: denied { read } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.991565][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.004508][ T3095] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 81.011933][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.018923][ T3095] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 81.023809][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.034222][ T3095] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 81.050625][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.056722][ T3095] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 81.159967][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.169021][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 81.178591][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.189547][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 81.197920][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.210120][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 81.216023][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.228496][ T3096] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 81.802462][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.048184][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.910539][ T3095] veth0_vlan: entered promiscuous mode [ 84.945271][ T3096] veth0_vlan: entered promiscuous mode [ 84.949781][ T3095] veth1_vlan: entered promiscuous mode [ 84.993332][ T3096] veth1_vlan: entered promiscuous mode [ 85.056945][ T3095] veth0_macvtap: entered promiscuous mode [ 85.076251][ T3095] veth1_macvtap: entered promiscuous mode [ 85.128138][ T3096] veth0_macvtap: entered promiscuous mode [ 85.146027][ T3096] veth1_macvtap: entered promiscuous mode [ 85.242256][ T51] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.244220][ T51] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.244842][ T51] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.272143][ T51] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.304046][ T30] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.306103][ T30] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.306624][ T30] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.306969][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.405888][ T28] audit: type=1400 audit(85.330:116): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.434780][ T28] audit: type=1400 audit(85.350:117): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.K4XHiP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.435144][ T28] audit: type=1400 audit(85.350:118): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.464507][ T28] audit: type=1400 audit(85.390:119): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.K4XHiP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.482880][ T28] audit: type=1400 audit(85.410:120): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.K4XHiP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.497792][ T28] audit: type=1400 audit(85.420:121): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.505468][ T28] audit: type=1400 audit(85.430:122): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.507284][ T28] audit: type=1400 audit(85.430:123): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=3285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.517587][ T28] audit: type=1400 audit(85.440:124): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.519264][ T28] audit: type=1400 audit(85.440:125): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.595812][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.595836][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.720445][ T3753] FAULT_INJECTION: forcing a failure. [ 90.720445][ T3753] name failslab, interval 1, probability 0, space 0, times 1 [ 90.722939][ T3753] CPU: 1 UID: 0 PID: 3753 Comm: syz.1.17 Tainted: G L syzkaller #0 PREEMPT [ 90.723178][ T3753] Tainted: [L]=SOFTLOCKUP [ 90.723207][ T3753] Hardware name: ARM-Versatile Express [ 90.723374][ T3753] Call trace: [ 90.723586][ T3753] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 90.724387][ T3753] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 90.724444][ T3753] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 90.724479][ T3753] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 90.724513][ T3753] r7:00000dc0 r6:00000000 r5:8466be80 r4:82b18108 [ 90.724521][ T3753] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 90.724549][ T3753] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 90.724586][ T3753] r8:0000001c r7:00000dc0 r6:00000000 r5:00000000 r4:83001240 [ 90.724596][ T3753] [<80554020>] (should_failslab) from [<8052db5c>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 90.724628][ T3753] [<8052db08>] (__kmalloc_cache_noprof) from [<8059fae0>] (file_f_owner_allocate+0x3c/0x88) [ 90.724678][ T3753] r10:00000037 r9:84dfd100 r8:00000003 r7:00000003 r6:00000001 r5:00000000 [ 90.724693][ T3753] r4:84dfd100 [ 90.724702][ T3753] [<8059faa4>] (file_f_owner_allocate) from [<805a028c>] (do_fcntl+0x434/0x908) [ 90.724732][ T3753] r5:84dfd100 r4:0000000a [ 90.724741][ T3753] [<8059fe58>] (do_fcntl) from [<805a07d0>] (sys_fcntl+0x70/0xd0) [ 90.724820][ T3753] r8:00000003 r7:00000001 r6:0000000a r5:00000000 r4:84dfd101 [ 90.724840][ T3753] [<805a0760>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 90.724958][ T3753] Exception stack(0xe0355fa8 to 0xe0355ff0) [ 90.725059][ T3753] 5fa0: 00000000 00000000 00000003 0000000a 00000001 00000000 [ 90.725089][ T3753] 5fc0: 00000000 00000000 0012f214 00000037 003462d8 00000000 00000001 76fa00dc [ 90.725104][ T3753] 5fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 90.725170][ T3753] r9:8466be80 r8:8020029c r7:00000037 r6:0012f214 r5:00000000 r4:00000000 [ 90.870475][ T3755] FAULT_INJECTION: forcing a failure. [ 90.870475][ T3755] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 90.872088][ T3755] CPU: 0 UID: 0 PID: 3755 Comm: syz.1.18 Tainted: G L syzkaller #0 PREEMPT [ 90.872248][ T3755] Tainted: [L]=SOFTLOCKUP [ 90.872273][ T3755] Hardware name: ARM-Versatile Express [ 90.872321][ T3755] Call trace: [ 90.872396][ T3755] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 90.872509][ T3755] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 90.872529][ T3755] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 90.872584][ T3755] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 90.872646][ T3755] r7:00000000 r6:00000000 r5:839e2580 r4:82b4f188 [ 90.872664][ T3755] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 90.872738][ T3755] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 90.872806][ T3755] r8:76f9ff08 r7:00000000 r6:00000000 r5:e0395f68 r4:00000002 [ 90.872829][ T3755] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 90.872877][ T3755] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 90.872934][ T3755] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 90.873012][ T3755] r10:8064c488 r9:00000001 r8:00000002 r7:e0395f68 r6:0000000f r5:76f9ff08 [ 90.873041][ T3755] r4:839e2580 r3:e0395e9f [ 90.873089][ T3755] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 90.873176][ T3755] r8:839e2580 r7:e0395f68 r6:76f9ff08 r5:84dfd100 r4:0000000f [ 90.873199][ T3755] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 90.873275][ T3755] r10:00000003 r9:839e2580 r8:8020029c r7:00000000 r6:00000000 r5:84dfd100 [ 90.873299][ T3755] r4:84dfd103 [ 90.873326][ T3755] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 90.873520][ T3755] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 90.873546][ T3755] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 90.873683][ T3755] Exception stack(0xe0395fa8 to 0xe0395ff0) [ 90.873848][ T3755] 5fa0: 00000000 00000000 00000004 76f9ff08 0000000f 00000000 [ 90.873921][ T3755] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fa00dc [ 90.873969][ T3755] 5fe0: 76f9fe58 76f9fe44 0010ba34 00112618 [ 91.051992][ T3760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=3760 comm=syz.1.19 [ 91.053679][ T3761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=3761 comm=syz.1.19 [ 91.134546][ T3762] FAULT_INJECTION: forcing a failure. [ 91.134546][ T3762] name failslab, interval 1, probability 0, space 0, times 0 [ 91.139644][ T3762] CPU: 1 UID: 0 PID: 3762 Comm: syz.0.20 Tainted: G L syzkaller #0 PREEMPT [ 91.139798][ T3762] Tainted: [L]=SOFTLOCKUP [ 91.139813][ T3762] Hardware name: ARM-Versatile Express [ 91.139826][ T3762] Call trace: [ 91.139853][ T3762] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 91.139918][ T3762] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 91.139934][ T3762] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 91.139986][ T3762] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 91.140045][ T3762] r7:00000000 r6:00000000 r5:84658c80 r4:82b18108 [ 91.140063][ T3762] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 91.140104][ T3762] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 91.140136][ T3762] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 91.140145][ T3762] [<80554020>] (should_failslab) from [<80532680>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 91.140172][ T3762] [<805325d8>] (__kmalloc_node_track_caller_noprof) from [<804c1860>] (kmemdup_noprof+0x28/0x44) [ 91.140209][ T3762] r10:00000037 r9:84368a04 r8:e0415dd4 r7:83e9a000 r6:84f06098 r5:e0415dcc [ 91.140220][ T3762] r4:00000017 [ 91.140228][ T3762] [<804c1838>] (kmemdup_noprof) from [<807f3f54>] (sidtab_sid2str_get+0x54/0xa4) [ 91.140263][ T3762] r7:83e9a000 r6:e0415dd4 r5:e0415dcc r4:84fee0c0 [ 91.140271][ T3762] [<807f3f00>] (sidtab_sid2str_get) from [<807fb4e4>] (sidtab_entry_to_string+0x34/0x94) [ 91.140309][ T3762] r7:83e9a000 r6:84fee0c0 r5:e0415dcc r4:0000005f [ 91.140317][ T3762] [<807fb4b0>] (sidtab_entry_to_string) from [<807fb65c>] (security_sid_to_context_core+0x118/0x17c) [ 91.140351][ T3762] r9:e0415f14 r8:83e9a000 r7:84368a04 r6:e0415dd4 r5:e0415dcc r4:0000005f [ 91.140360][ T3762] [<807fb544>] (security_sid_to_context_core) from [<807fe5b0>] (security_sid_to_context+0x1c/0x24) [ 91.140390][ T3762] r8:807de388 r7:807df100 r6:84658c80 r5:85845d20 r4:e0415e60 [ 91.140398][ T3762] [<807fe594>] (security_sid_to_context) from [<807df14c>] (avc_audit_post_callback+0x4c/0x32c) [ 91.140423][ T3762] [<807df100>] (avc_audit_post_callback) from [<80806690>] (common_lsm_audit+0x108/0x14c) [ 91.140456][ T3762] r10:00000037 r9:e0415f14 r8:807de388 r7:807df100 r6:e0415f14 r5:85845d20 [ 91.140466][ T3762] r4:846594a8 [ 91.140473][ T3762] [<80806588>] (common_lsm_audit) from [<807df644>] (slow_avc_audit+0xbc/0x114) [ 91.140505][ T3762] r8:00000018 r7:00000000 r6:0000005f r5:0000005f r4:0000005f [ 91.140514][ T3762] [<807df588>] (slow_avc_audit) from [<807e0098>] (avc_has_perm+0xe4/0xf4) [ 91.140540][ T3762] r5:0000005f r4:00000040 [ 91.140548][ T3762] [<807dffb4>] (avc_has_perm) from [<807e05f4>] (inode_has_perm+0x60/0x74) [ 91.140580][ T3762] r9:84dfca00 r8:0000005f r7:854674c0 r6:00000040 r5:830fd180 r4:00000040 [ 91.140588][ T3762] [<807e0594>] (inode_has_perm) from [<807e1674>] (__file_has_perm+0x144/0x168) [ 91.140613][ T3762] r4:84dfca00 [ 91.140622][ T3762] [<807e1530>] (__file_has_perm) from [<807e16e4>] (selinux_file_fcntl+0x4c/0x8c) [ 91.140669][ T3762] r9:84dfca00 r8:00000005 r7:200000c0 r6:200000c0 r5:00000005 r4:84dfca00 [ 91.140733][ T3762] [<807e1698>] (selinux_file_fcntl) from [<807d1c68>] (security_file_fcntl+0x80/0x1d4) [ 91.140806][ T3762] [<807d1be8>] (security_file_fcntl) from [<805a07a4>] (sys_fcntl+0x44/0xd0) [ 91.140853][ T3762] r7:200000c0 r6:00000005 r5:00000000 r4:84dfca01 [ 91.140864][ T3762] [<805a0760>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 91.140888][ T3762] Exception stack(0xe0415fa8 to 0xe0415ff0) [ 91.140909][ T3762] 5fa0: 00000000 00000000 00000005 00000005 200000c0 00000000 [ 91.140930][ T3762] 5fc0: 00000000 00000000 0012f214 00000037 003462d8 00000000 00000001 76f120dc [ 91.140961][ T3762] 5fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 91.140999][ T3762] r9:84658c80 r8:8020029c r7:00000037 r6:0012f214 r5:00000000 r4:00000000 [ 91.204701][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 91.205943][ T28] audit: type=1400 audit(91.060:149): avc: denied { lock } for pid=3759 comm="syz.0.20" path="socket:[2269]" dev="sockfs" ino=2269 ssid=95 tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 91.249558][ T28] audit: type=1400 audit(91.170:150): avc: denied { create } for pid=3763 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 91.256623][ T28] audit: type=1400 audit(91.180:151): avc: denied { write } for pid=3763 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 91.538131][ T3769] FAULT_INJECTION: forcing a failure. [ 91.538131][ T3769] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.552609][ T3769] CPU: 1 UID: 0 PID: 3769 Comm: syz.0.23 Tainted: G L syzkaller #0 PREEMPT [ 91.552715][ T3769] Tainted: [L]=SOFTLOCKUP [ 91.552726][ T3769] Hardware name: ARM-Versatile Express [ 91.552739][ T3769] Call trace: [ 91.552768][ T3769] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 91.552893][ T3769] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 91.552905][ T3769] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 91.552935][ T3769] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 91.552967][ T3769] r7:20000140 r6:00000000 r5:840ea580 r4:82b4f188 [ 91.552976][ T3769] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 91.553031][ T3769] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 91.553086][ T3769] r8:00000000 r7:20000140 r6:00000028 r5:00000000 r4:e0415f30 [ 91.553097][ T3769] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 91.553125][ T3769] [<809d7488>] (should_fail_usercopy) from [<8090f1f0>] (_copy_from_iter+0x64/0x7c4) [ 91.553157][ T3769] [<8090f18c>] (_copy_from_iter) from [<817231c4>] (netlink_sendmsg+0x188/0x444) [ 91.553230][ T3769] r10:00000000 r9:00000000 r8:e0415f30 r7:85da3000 r6:00000028 r5:833000c0 [ 91.553253][ T3769] r4:e0415f20 [ 91.553268][ T3769] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 91.553319][ T3769] r10:00008010 r9:00000000 r8:e0415dcc r7:00000000 r6:854236c0 r5:e0415f20 [ 91.553329][ T3769] r4:00000000 [ 91.553338][ T3769] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 91.553372][ T3769] r7:00000000 r6:00000000 r5:854236c0 r4:e0415f20 [ 91.553381][ T3769] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 91.553422][ T3769] r10:00000128 r9:20000200 r8:00008010 r7:00000000 r6:854236c0 r5:e0415f20 [ 91.553434][ T3769] r4:00000000 [ 91.553442][ T3769] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 91.553479][ T3769] r9:840ea580 r8:83321880 r7:00008010 r6:20000200 r5:83321881 r4:00000003 [ 91.553488][ T3769] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 91.553536][ T3769] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 91.553558][ T3769] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 91.553602][ T3769] Exception stack(0xe0415fa8 to 0xe0415ff0) [ 91.553631][ T3769] 5fa0: 00000000 00000000 00000003 20000200 00008010 00000000 [ 91.553651][ T3769] 5fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f120dc [ 91.553674][ T3769] 5fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 91.797441][ T28] audit: type=1400 audit(91.720:152): avc: denied { create } for pid=3772 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 91.803523][ T28] audit: type=1400 audit(91.730:153): avc: denied { ioctl } for pid=3772 comm="syz.0.25" path="socket:[3422]" dev="sockfs" ino=3422 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 91.829472][ T28] audit: type=1400 audit(91.750:154): avc: denied { append } for pid=3772 comm="syz.0.25" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 91.986841][ T28] audit: type=1400 audit(91.910:155): avc: denied { setopt } for pid=3775 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.031528][ T28] audit: type=1400 audit(91.950:156): avc: denied { map } for pid=3775 comm="syz.0.26" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 92.033906][ T28] audit: type=1400 audit(91.960:157): avc: denied { read write } for pid=3775 comm="syz.0.26" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 92.095776][ T28] audit: type=1400 audit(92.020:158): avc: denied { ioctl } for pid=3775 comm="syz.0.26" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3435 ioctlcmd=0x5829 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 92.795273][ T3779] capability: warning: `syz.0.27' uses deprecated v2 capabilities in a way that may be insecure [ 93.004612][ T3781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3781 comm=syz.0.28 [ 94.074323][ T3791] SELinux: failed to load policy [ 94.357414][ T3797] FAULT_INJECTION: forcing a failure. [ 94.357414][ T3797] name failslab, interval 1, probability 0, space 0, times 0 [ 94.359733][ T3797] CPU: 1 UID: 0 PID: 3797 Comm: syz.0.34 Tainted: G L syzkaller #0 PREEMPT [ 94.359872][ T3797] Tainted: [L]=SOFTLOCKUP [ 94.359892][ T3797] Hardware name: ARM-Versatile Express [ 94.359917][ T3797] Call trace: [ 94.359961][ T3797] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 94.360194][ T3797] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 94.360220][ T3797] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 94.360282][ T3797] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 94.360344][ T3797] r7:00000000 r6:00000000 r5:840f7080 r4:82b18108 [ 94.360360][ T3797] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 94.360428][ T3797] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 94.360494][ T3797] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 94.360532][ T3797] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 94.360599][ T3797] [<8053223c>] (__kmalloc_noprof) from [<80815258>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 94.360697][ T3797] r10:00000000 r9:830c0000 r8:00000000 r7:8341fbb0 r6:83321428 r5:00001000 [ 94.360724][ T3797] r4:00000000 [ 94.360746][ T3797] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 94.360831][ T3797] r10:00000000 r9:00000003 r8:83321400 r7:4008af00 r6:81cda124 r5:00000004 [ 94.360858][ T3797] r4:83321428 r3:828d1400 [ 94.360877][ T3797] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 94.360956][ T3797] r10:840f7080 r9:00000003 r8:83321400 r7:00000000 r6:00000000 r5:4008af00 [ 94.360977][ T3797] r4:83321400 [ 94.360992][ T3797] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 94.361042][ T3797] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 94.361100][ T3797] r7:00000000 r6:4008af00 r5:83321401 r4:00000000 [ 94.361119][ T3797] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 94.361169][ T3797] Exception stack(0xe0415fa8 to 0xe0415ff0) [ 94.361207][ T3797] 5fa0: 00000000 00000000 00000003 4008af00 00000000 00000000 [ 94.361245][ T3797] 5fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76f120dc [ 94.361282][ T3797] 5fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 94.361315][ T3797] r10:00000036 r9:840f7080 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 94.361338][ T3797] r4:00000000 [ 94.406733][ T3797] ERROR: Out of memory at tomoyo_realpath_from_path. [ 97.534309][ T3811] FAULT_INJECTION: forcing a failure. [ 97.534309][ T3811] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.536163][ T3811] CPU: 1 UID: 0 PID: 3811 Comm: syz.0.39 Tainted: G L syzkaller #0 PREEMPT [ 97.536646][ T3811] Tainted: [L]=SOFTLOCKUP [ 97.536722][ T3811] Hardware name: ARM-Versatile Express [ 97.537017][ T3811] Call trace: [ 97.538128][ T3811] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 97.540012][ T3811] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 97.540120][ T3811] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 97.540208][ T3811] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 97.540277][ T3811] r7:20000200 r6:00000000 r5:83fff080 r4:82b4f188 [ 97.540310][ T3811] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 97.540386][ T3811] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 97.540450][ T3811] r8:83fff080 r7:20000200 r6:84dfc800 r5:82530804 r4:00000010 [ 97.540468][ T3811] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 97.540512][ T3811] [<809d7488>] (should_fail_usercopy) from [<807ef250>] (sel_write_load+0xdc/0xbdc) [ 97.540566][ T3811] [<807ef174>] (sel_write_load) from [<80586404>] (vfs_write+0xd4/0x450) [ 97.540690][ T3811] r10:81cd9140 r9:83fff080 r8:807ef174 r7:ea629f68 r6:20000200 r5:84dfc800 [ 97.540724][ T3811] r4:00000010 [ 97.540751][ T3811] [<80586330>] (vfs_write) from [<805868f4>] (ksys_write+0x74/0xec) [ 97.540818][ T3811] r10:00000004 r9:83fff080 r8:8020029c r7:00000000 r6:00000000 r5:84dfc800 [ 97.540838][ T3811] r4:84dfc803 [ 97.540853][ T3811] [<80586880>] (ksys_write) from [<8058697c>] (sys_write+0x10/0x14) [ 97.540935][ T3811] r7:00000004 r6:0012f214 r5:00000000 r4:00000000 [ 97.540953][ T3811] [<8058696c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 97.541076][ T3811] Exception stack(0xea629fa8 to 0xea629ff0) [ 97.541244][ T3811] 9fa0: 00000000 00000000 00000003 20000200 00000010 00000000 [ 97.541305][ T3811] 9fc0: 00000000 00000000 0012f214 00000004 003462d8 00000000 00000001 76f120dc [ 97.541336][ T3811] 9fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 97.680447][ T3813] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3813 comm=syz.0.40 [ 99.055930][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 99.056303][ T28] audit: type=1400 audit(98.980:164): avc: denied { lock } for pid=3833 comm="syz.0.43" path="socket:[3518]" dev="sockfs" ino=3518 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 99.404226][ T3838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=3838 comm=syz.0.44 [ 99.415495][ T28] audit: type=1400 audit(99.340:165): avc: denied { map } for pid=3837 comm="syz.0.44" path="/34" dev="tmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 99.550406][ T28] audit: type=1400 audit(99.470:166): avc: denied { ioctl } for pid=3839 comm="syz.0.45" path="socket:[2418]" dev="sockfs" ino=2418 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.552804][ T28] audit: type=1400 audit(99.480:167): avc: denied { setopt } for pid=3839 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.555879][ T28] audit: type=1400 audit(99.480:168): avc: denied { create } for pid=3839 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.561887][ T28] audit: type=1400 audit(99.490:169): avc: denied { setopt } for pid=3839 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.569814][ T28] audit: type=1400 audit(99.490:170): avc: denied { write } for pid=3839 comm="syz.0.45" path="socket:[2420]" dev="sockfs" ino=2420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.024540][ T3847] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3847 comm=syz.0.48 [ 100.025131][ T3847] FAULT_INJECTION: forcing a failure. [ 100.025131][ T3847] name failslab, interval 1, probability 0, space 0, times 0 [ 100.025348][ T3847] CPU: 1 UID: 0 PID: 3847 Comm: syz.0.48 Tainted: G L syzkaller #0 PREEMPT [ 100.025420][ T3847] Tainted: [L]=SOFTLOCKUP [ 100.025466][ T3847] Hardware name: ARM-Versatile Express [ 100.025495][ T3847] Call trace: [ 100.025545][ T3847] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 100.025674][ T3847] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 100.025707][ T3847] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 100.025804][ T3847] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 100.025878][ T3847] r7:00000820 r6:00000000 r5:840ea580 r4:82b18108 [ 100.025910][ T3847] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 100.025987][ T3847] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 100.026057][ T3847] r8:85d85000 r7:00000820 r6:00000000 r5:00000000 r4:830e4c00 [ 100.026074][ T3847] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 100.026131][ T3847] [<8053133c>] (kmem_cache_alloc_noprof) from [<815fe934>] (skb_clone+0x60/0x1c8) [ 100.026207][ T3847] r10:85eabd84 r9:84e60900 r8:85d85000 r7:8337d0c0 r6:85df2f00 r5:8337d0c0 [ 100.026241][ T3847] r4:00000820 [ 100.026292][ T3847] [<815fe8d4>] (skb_clone) from [<81720ff4>] (__netlink_deliver_tap+0x1e4/0x27c) [ 100.026366][ T3847] r7:8337d0c0 r6:85df2f00 r5:85d85064 r4:85df2800 [ 100.026397][ T3847] [<81720e10>] (__netlink_deliver_tap) from [<81723018>] (netlink_unicast+0x35c/0x380) [ 100.026475][ T3847] r10:85eabd84 r9:85d51000 r8:8337d0c0 r7:84e60900 r6:00000020 r5:85d85064 [ 100.026496][ T3847] r4:85d85000 [ 100.026513][ T3847] [<81722cbc>] (netlink_unicast) from [<81723204>] (netlink_sendmsg+0x1c8/0x444) [ 100.026588][ T3847] r10:00000000 r9:00000000 r8:00000000 r7:85eabc00 r6:00000020 r5:8337d0c0 [ 100.026624][ T3847] r4:ea721f20 [ 100.026643][ T3847] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 100.026722][ T3847] r10:20004000 r9:00000000 r8:ea721dcc r7:00000000 r6:8542acc0 r5:ea721f20 [ 100.026742][ T3847] r4:00000000 [ 100.027137][ T3847] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 100.027583][ T3847] r7:00000000 r6:00000000 r5:8542acc0 r4:ea721f20 [ 100.027615][ T3847] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 100.027820][ T3847] r10:00000128 r9:20004480 r8:20004000 r7:00000000 r6:8542acc0 r5:ea721f20 [ 100.027849][ T3847] r4:00000000 [ 100.028170][ T3847] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 100.028722][ T3847] r9:840ea580 r8:84dfc500 r7:20004000 r6:20004480 r5:84dfc501 r4:00000004 [ 100.028759][ T3847] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 100.028909][ T3847] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 100.029073][ T3847] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 100.029130][ T3847] Exception stack(0xea721fa8 to 0xea721ff0) [ 100.029195][ T3847] 1fa0: 00000000 00000000 00000004 20004480 20004000 00000000 [ 100.029237][ T3847] 1fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f120dc [ 100.029270][ T3847] 1fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 100.173369][ T3849] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=3849 comm=syz.0.49 [ 100.175590][ T3849] FAULT_INJECTION: forcing a failure. [ 100.175590][ T3849] name failslab, interval 1, probability 0, space 0, times 0 [ 100.182690][ T3849] CPU: 0 UID: 0 PID: 3849 Comm: syz.0.49 Tainted: G L syzkaller #0 PREEMPT [ 100.182866][ T3849] Tainted: [L]=SOFTLOCKUP [ 100.182896][ T3849] Hardware name: ARM-Versatile Express [ 100.182924][ T3849] Call trace: [ 100.183002][ T3849] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 100.183118][ T3849] r7:600d0013 r6:600d0013 r5:8231e214 r4:00000000 [ 100.183139][ T3849] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 100.183196][ T3849] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 100.183274][ T3849] r7:00000000 r6:00000000 r5:83fff080 r4:82b18108 [ 100.183293][ T3849] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 100.183377][ T3849] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 100.183446][ T3849] r8:00000cc0 r7:00000000 r6:00000cc0 r5:00000000 r4:830e4c00 [ 100.183465][ T3849] [<80554020>] (should_failslab) from [<80531b10>] (kmem_cache_alloc_node_noprof+0x58/0x3c8) [ 100.183518][ T3849] [<80531ab8>] (kmem_cache_alloc_node_noprof) from [<815fb7e8>] (__alloc_skb+0x74/0x2c0) [ 100.183585][ T3849] r10:00000000 r9:815fb998 r8:00000cc0 r7:00000000 r6:830e4c00 r5:ffffffff [ 100.183630][ T3849] r4:dddd0708 [ 100.183670][ T3849] [<815fb774>] (__alloc_skb) from [<817234f0>] (netlink_ack+0x70/0x220) [ 100.183779][ T3849] r9:00000000 r8:ffffffea r7:83303cc0 r6:847edd40 r5:83303cc0 r4:00000018 [ 100.183802][ T3849] [<81723480>] (netlink_ack) from [<8037f2a4>] (audit_receive+0xf8/0x194) [ 100.183888][ T3849] r10:85eabd84 r9:85d51000 r8:847edd40 r7:00000014 r6:83fff080 r5:83303cc0 [ 100.183911][ T3849] r4:82cc3790 [ 100.183929][ T3849] [<8037f1ac>] (audit_receive) from [<81722f2c>] (netlink_unicast+0x270/0x380) [ 100.183999][ T3849] r8:83303cc0 r7:84e60900 r6:00000014 r5:85d87464 r4:85d87400 [ 100.184051][ T3849] [<81722cbc>] (netlink_unicast) from [<81723204>] (netlink_sendmsg+0x1c8/0x444) [ 100.184127][ T3849] r10:00000000 r9:00000000 r8:00000000 r7:85eabc00 r6:00000014 r5:83303cc0 [ 100.184152][ T3849] r4:ea6d5f20 [ 100.184174][ T3849] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 100.184255][ T3849] r10:00000880 r9:00000000 r8:ea6d5dcc r7:00000000 r6:85423940 r5:ea6d5f20 [ 100.184274][ T3849] r4:00000000 [ 100.184292][ T3849] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 100.184421][ T3849] r7:00000000 r6:00000000 r5:85423940 r4:ea6d5f20 [ 100.184460][ T3849] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 100.184541][ T3849] r10:00000128 r9:200001c0 r8:00000880 r7:00000000 r6:85423940 r5:ea6d5f20 [ 100.184561][ T3849] r4:00000000 [ 100.184578][ T3849] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 100.184649][ T3849] r9:83fff080 r8:84dfc500 r7:00000880 r6:200001c0 r5:84dfc501 r4:00000005 [ 100.184671][ T3849] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 100.184765][ T3849] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 100.184817][ T3849] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 100.184870][ T3849] Exception stack(0xea6d5fa8 to 0xea6d5ff0) [ 100.184927][ T3849] 5fa0: 00000000 00000000 00000005 200001c0 00000880 00000000 [ 100.184964][ T3849] 5fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f120dc [ 100.184990][ T3849] 5fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 100.328705][ T28] audit: type=1400 audit(100.250:171): avc: denied { setopt } for pid=3850 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 100.344864][ T28] audit: type=1400 audit(100.270:172): avc: denied { write } for pid=3850 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 101.618303][ T28] audit: type=1400 audit(101.540:173): avc: denied { create } for pid=3861 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 103.324637][ T3879] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3879 comm=syz.0.55 [ 105.523569][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 105.523899][ T28] audit: type=1400 audit(105.450:180): avc: denied { getopt } for pid=3887 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 105.624808][ T28] audit: type=1400 audit(105.550:181): avc: denied { read } for pid=3887 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.212393][ T28] audit: type=1400 audit(106.140:182): avc: denied { setopt } for pid=3899 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 106.308163][ T28] audit: type=1400 audit(106.230:183): avc: denied { create } for pid=3901 comm="syz.0.62" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 106.315205][ T28] audit: type=1400 audit(106.240:184): avc: denied { mounton } for pid=3901 comm="syz.0.62" path="/50/file0" dev="tmpfs" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 107.651675][ T28] audit: type=1400 audit(107.570:185): avc: denied { map_create } for pid=3909 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.659843][ T28] audit: type=1400 audit(107.580:186): avc: denied { prog_load } for pid=3909 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.667621][ T28] audit: type=1400 audit(107.590:187): avc: denied { bpf } for pid=3909 comm="syz.1.65" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 107.683184][ T28] audit: type=1400 audit(107.610:188): avc: denied { create } for pid=3909 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 107.792650][ T28] audit: type=1400 audit(107.720:189): avc: denied { create } for pid=3909 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.450079][ T3918] can: request_module (can-proto-0) failed. [ 110.538465][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 110.539058][ T28] audit: type=1400 audit(110.460:194): avc: denied { ioctl } for pid=3929 comm="syz.0.71" path="socket:[3684]" dev="sockfs" ino=3684 ioctlcmd=0x9367 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.477173][ T3948] kernel profiling enabled (shift: 3) [ 111.898325][ T28] audit: type=1400 audit(111.820:195): avc: denied { ioctl } for pid=3954 comm="syz.1.79" path="socket:[3727]" dev="sockfs" ino=3727 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.298128][ T3612] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 112.306602][ T3612] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 112.525393][ T28] audit: type=1400 audit(112.450:196): avc: denied { map_read map_write } for pid=3971 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 112.538345][ T28] audit: type=1400 audit(112.460:197): avc: denied { create } for pid=3971 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 112.547687][ T3972] FAULT_INJECTION: forcing a failure. [ 112.547687][ T3972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.557605][ T3972] CPU: 0 UID: 0 PID: 3972 Comm: syz.1.84 Tainted: G L syzkaller #0 PREEMPT [ 112.557811][ T3972] Tainted: [L]=SOFTLOCKUP [ 112.557837][ T3972] Hardware name: ARM-Versatile Express [ 112.557918][ T3972] Call trace: [ 112.557976][ T3972] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 112.558096][ T3972] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 112.558119][ T3972] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 112.558228][ T3972] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 112.558304][ T3972] r7:00000000 r6:00000000 r5:83fb6400 r4:82b4f188 [ 112.558325][ T3972] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 112.558384][ T3972] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 112.558453][ T3972] r8:8387e400 r7:00000000 r6:84dfd181 r5:eaca5eb0 r4:8387e4b0 [ 112.558500][ T3972] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 112.558553][ T3972] [<809d7488>] (should_fail_usercopy) from [<803db130>] (map_update_elem+0x380/0x5a8) [ 112.558613][ T3972] [<803dadb0>] (map_update_elem) from [<803e2714>] (__sys_bpf+0x27c/0x203c) [ 112.558717][ T3972] r10:00000002 r9:00000000 r8:eaca5e50 r7:00000020 r6:83fb6400 r5:20000000 [ 112.558810][ T3972] r4:00000000 [ 112.558867][ T3972] [<803e2498>] (__sys_bpf) from [<803e4a70>] (sys_bpf+0x2c/0x48) [ 112.558945][ T3972] r10:00000182 r9:83fb6400 r8:8020029c r7:00000182 r6:0012f214 r5:00000000 [ 112.558968][ T3972] r4:00000000 [ 112.558986][ T3972] [<803e4a44>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 112.559040][ T3972] Exception stack(0xeaca5fa8 to 0xeaca5ff0) [ 112.559116][ T3972] 5fa0: 00000000 00000000 00000002 20000000 00000020 00000000 [ 112.559164][ T3972] 5fc0: 00000000 00000000 0012f214 00000182 003462d8 00000000 00000001 76fa00dc [ 112.559196][ T3972] 5fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 113.678217][ T28] audit: type=1400 audit(113.600:198): avc: denied { write } for pid=3991 comm="syz.1.93" path="socket:[3782]" dev="sockfs" ino=3782 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 114.373168][ T9] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 114.619298][ T9] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 114.619646][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 114.619955][ T9] usb 2-1: Product: syz [ 114.620147][ T9] usb 2-1: Manufacturer: syz [ 114.620325][ T9] usb 2-1: SerialNumber: syz [ 114.953383][ T9] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 114.954077][ T9] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 114.954420][ T9] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 114.962492][ T9] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 114.963789][ T4003] FAULT_INJECTION: forcing a failure. [ 114.963789][ T4003] name failslab, interval 1, probability 0, space 0, times 0 [ 114.964015][ T4003] CPU: 0 UID: 0 PID: 4003 Comm: syz.1.98 Tainted: G L syzkaller #0 PREEMPT [ 114.964071][ T4003] Tainted: [L]=SOFTLOCKUP [ 114.964082][ T4003] Hardware name: ARM-Versatile Express [ 114.964096][ T4003] Call trace: [ 114.964121][ T4003] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 114.964184][ T4003] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 114.964195][ T4003] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 114.964225][ T4003] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 114.964259][ T4003] r7:00000dc0 r6:00000000 r5:8501e400 r4:82b18108 [ 114.964268][ T4003] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 114.964306][ T4003] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 114.964340][ T4003] r8:00000914 r7:00000dc0 r6:00000000 r5:00000000 r4:830016c0 [ 114.964350][ T4003] [<80554020>] (should_failslab) from [<8052db5c>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 114.964378][ T4003] [<8052db08>] (__kmalloc_cache_noprof) from [<81aee200>] (kobject_uevent_env+0xd4/0x900) [ 114.964421][ T4003] r10:824408cc r9:82485260 r8:81d55aec r7:831d1680 r6:00000000 r5:00000002 [ 114.964432][ T4003] r4:844f4000 [ 114.964441][ T4003] [<81aee12c>] (kobject_uevent_env) from [<81aeea40>] (kobject_uevent+0x14/0x18) [ 114.964480][ T4003] r10:00000000 r9:8470c6b0 r8:844f4008 r7:8504c00c r6:844f421c r5:8470c6f8 [ 114.964491][ T4003] r4:844f4000 [ 114.964499][ T4003] [<81aeea2c>] (kobject_uevent) from [<810834a0>] (gadget_unbind_driver+0xf4/0x14c) [ 114.964531][ T4003] [<810833ac>] (gadget_unbind_driver) from [<80bb900c>] (device_remove+0x48/0x6c) [ 114.964570][ T4003] r10:00000006 r9:8501e400 r8:8504c030 r7:8470c744 r6:8504c030 r5:844f6010 [ 114.964583][ T4003] r4:8470c6f8 r3:810833ac [ 114.964592][ T4003] [<80bb8fc4>] (device_remove) from [<80bba70c>] (device_release_driver_internal+0x188/0x1fc) [ 114.964623][ T4003] r5:844f6010 r4:8470c6f8 [ 114.964632][ T4003] [<80bba584>] (device_release_driver_internal) from [<80bba804>] (driver_detach+0x4c/0x88) [ 114.964670][ T4003] r9:8501e400 r8:830ea9d0 r7:84194408 r6:00000001 r5:8504c030 r4:8470c6f8 [ 114.964680][ T4003] [<80bba7b8>] (driver_detach) from [<80bb8844>] (bus_remove_driver+0x64/0xe8) [ 114.964710][ T4003] r5:831fa60c r4:8504c030 [ 114.964718][ T4003] [<80bb87e0>] (bus_remove_driver) from [<80bbb274>] (driver_unregister+0x30/0x54) [ 114.964752][ T4003] r7:84194408 r6:00000001 r5:8504c004 r4:8504c030 [ 114.964761][ T4003] [<80bbb244>] (driver_unregister) from [<810809fc>] (usb_gadget_unregister_driver+0x28/0x38) [ 114.964799][ T4003] r5:8504c004 r4:8504c000 [ 114.964808][ T4003] [<810809d4>] (usb_gadget_unregister_driver) from [<810e88f0>] (raw_release+0xa4/0x130) [ 114.964841][ T4003] [<810e884c>] (raw_release) from [<805880b0>] (__fput+0xd8/0x2f4) [ 114.964913][ T4003] r7:84194408 r6:834f5c38 r5:0408001b r4:83321400 [ 114.964923][ T4003] [<80587fd8>] (__fput) from [<8058888c>] (fput_close_sync+0x58/0xd4) [ 114.964969][ T4003] r9:8501e400 r8:8020029c r7:00000006 r6:00000000 r5:83321400 r4:83321478 [ 114.964989][ T4003] [<80588834>] (fput_close_sync) from [<805830b4>] (sys_close+0x30/0x70) [ 114.965021][ T4003] r5:83321400 r4:00000000 [ 114.965030][ T4003] [<80583084>] (sys_close) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 114.965057][ T4003] Exception stack(0xeb385fa8 to 0xeb385ff0) [ 114.965080][ T4003] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 114.965101][ T4003] 5fc0: 00000000 00000000 00000000 00000006 003462d8 00000000 00000001 76fa00dc [ 114.965127][ T4003] 5fe0: 76f9fe20 76f9fe0c 0010ba34 00112618 [ 114.965150][ T4003] r5:00000000 r4:00000000 [ 115.002192][ T9] usb 2-1: USB disconnect, device number 2 [ 117.411503][ T3612] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 117.611975][ T3612] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 117.613307][ T3612] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.616780][ T3612] usb 1-1: Product: syz [ 117.618451][ T3612] usb 1-1: Manufacturer: syz [ 117.620548][ T3612] usb 1-1: SerialNumber: syz [ 118.234661][ T3612] rtl8150 1-1:1.0: couldn't reset the device [ 118.235356][ T3612] rtl8150 1-1:1.0: probe with driver rtl8150 failed with error -5 [ 118.253148][ T3612] usb 1-1: USB disconnect, device number 2 [ 119.161614][ T28] audit: type=1400 audit(119.080:199): avc: denied { create } for pid=4062 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.166440][ T28] audit: type=1400 audit(119.090:200): avc: denied { ioctl } for pid=4062 comm="syz.0.110" path="socket:[3910]" dev="sockfs" ino=3910 ioctlcmd=0x4b45 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.202099][ T28] audit: type=1400 audit(119.130:201): avc: denied { write } for pid=4062 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.205763][ T28] audit: type=1400 audit(119.130:202): avc: denied { nlmsg_write } for pid=4062 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.558914][ T28] audit: type=1400 audit(119.480:203): avc: denied { perfmon } for pid=4071 comm="syz.1.113" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 119.582590][ T28] audit: type=1400 audit(119.500:204): avc: denied { connect } for pid=4074 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 120.011587][ T28] audit: type=1400 audit(119.920:205): avc: denied { write } for pid=4077 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 120.083492][ T28] audit: type=1400 audit(120.010:206): avc: denied { setopt } for pid=4074 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 121.561761][ T9] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 121.591954][ T3612] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 121.733965][ T9] usb 2-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 121.738199][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 121.747004][ T9] usb 2-1: config 0 descriptor?? [ 121.760345][ T9] cp210x 2-1:0.0: cp210x converter detected [ 121.867965][ T3612] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 121.879477][ T3612] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 121.884635][ T3612] usb 1-1: Product: syz [ 121.888287][ T3612] usb 1-1: Manufacturer: syz [ 121.900468][ T3612] usb 1-1: SerialNumber: syz [ 122.038006][ T9] cp210x 2-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 122.039959][ T9] cp210x 2-1:0.0: querying part number failed [ 122.059035][ T9] usb 2-1: cp210x converter now attached to ttyUSB0 [ 122.122656][ T9] usb 2-1: USB disconnect, device number 3 [ 122.132402][ T9] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 122.138720][ T9] cp210x 2-1:0.0: device disconnected [ 122.194871][ T28] audit: type=1400 audit(122.120:207): avc: denied { create } for pid=4095 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 122.198707][ T28] audit: type=1400 audit(122.120:208): avc: denied { connect } for pid=4095 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 122.516403][ T3612] rtl8150 1-1:1.0: couldn't reset the device [ 122.517961][ T3612] rtl8150 1-1:1.0: probe with driver rtl8150 failed with error -5 [ 122.562186][ T3612] usb 1-1: USB disconnect, device number 3 [ 122.746831][ T4133] SELinux: Context system_u:object_r:random_device_t:s0 is not valid (left unmapped). [ 127.264993][ T4180] FAULT_INJECTION: forcing a failure. [ 127.264993][ T4180] name failslab, interval 1, probability 0, space 0, times 0 [ 127.265474][ T4180] CPU: 1 UID: 0 PID: 4180 Comm: syz.1.142 Tainted: G L syzkaller #0 PREEMPT [ 127.265574][ T4180] Tainted: [L]=SOFTLOCKUP [ 127.265596][ T4180] Hardware name: ARM-Versatile Express [ 127.265623][ T4180] Call trace: [ 127.265680][ T4180] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 127.265792][ T4180] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 127.265814][ T4180] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 127.265875][ T4180] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 127.265971][ T4180] r7:00000000 r6:00000000 r5:839d1900 r4:82b18108 [ 127.265989][ T4180] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 127.266163][ T4180] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 127.266302][ T4180] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000011 [ 127.266519][ T4180] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 127.266593][ T4180] [<8053223c>] (__kmalloc_noprof) from [<80815164>] (tomoyo_encode2+0x64/0xec) [ 127.266766][ T4180] r10:00000fff r9:85eab000 r8:00000000 r7:834ab330 r6:84dfc5a8 r5:85e5dffc [ 127.266834][ T4180] r4:85e5dff6 [ 127.266901][ T4180] [<80815100>] (tomoyo_encode2) from [<80815210>] (tomoyo_encode+0x24/0x30) [ 127.267028][ T4180] r9:85eab000 r8:00000000 r7:834ab330 r6:84dfc5a8 r5:00001000 r4:85e5dff7 [ 127.267041][ T4180] [<808151ec>] (tomoyo_encode) from [<8081529c>] (tomoyo_realpath_from_path+0x80/0x16c) [ 127.267072][ T4180] r5:00001000 r4:85e5d000 [ 127.267081][ T4180] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 127.267153][ T4180] r10:00000000 r9:00000004 r8:84dfc580 r7:00008933 r6:81cda124 r5:00000004 [ 127.267173][ T4180] r4:84dfc5a8 r3:828d1400 [ 127.267183][ T4180] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 127.267278][ T4180] r10:839d1900 r9:00000004 r8:84dfc580 r7:20000200 r6:20000200 r5:00008933 [ 127.267314][ T4180] r4:84dfc580 [ 127.267348][ T4180] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 127.267432][ T4180] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 127.267496][ T4180] r7:20000200 r6:00008933 r5:84dfc581 r4:00000000 [ 127.267580][ T4180] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 127.267718][ T4180] Exception stack(0xeceedfa8 to 0xeceedff0) [ 127.267813][ T4180] dfa0: 00000000 00000000 00000004 00008933 20000200 00000000 [ 127.267878][ T4180] dfc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fa00dc [ 127.267919][ T4180] dfe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 127.268101][ T4180] r10:00000036 r9:839d1900 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 127.268165][ T4180] r4:00000000 [ 127.311549][ T4180] ERROR: Out of memory at tomoyo_realpath_from_path. [ 127.837829][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 127.839797][ T28] audit: type=1400 audit(127.760:215): avc: denied { setopt } for pid=4190 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 128.532477][ T4198] FAULT_INJECTION: forcing a failure. [ 128.532477][ T4198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.533084][ T4198] CPU: 1 UID: 0 PID: 4198 Comm: syz.1.148 Tainted: G L syzkaller #0 PREEMPT [ 128.533192][ T4198] Tainted: [L]=SOFTLOCKUP [ 128.533214][ T4198] Hardware name: ARM-Versatile Express [ 128.533240][ T4198] Call trace: [ 128.533295][ T4198] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 128.533411][ T4198] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 128.533432][ T4198] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 128.533491][ T4198] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 128.533558][ T4198] r7:00000000 r6:00000000 r5:839d1900 r4:82b4f188 [ 128.533576][ T4198] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 128.533633][ T4198] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 128.533696][ T4198] r8:76f9ff08 r7:00000000 r6:00000000 r5:ed141f68 r4:00000002 [ 128.533716][ T4198] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 128.533764][ T4198] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 128.533828][ T4198] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 128.533904][ T4198] r10:8064c488 r9:00000001 r8:00000002 r7:ed141f68 r6:0000000f r5:76f9ff08 [ 128.533930][ T4198] r4:839d1900 r3:ed141e9f [ 128.533947][ T4198] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 128.534025][ T4198] r8:839d1900 r7:ed141f68 r6:76f9ff08 r5:84dfc800 r4:0000000f [ 128.534046][ T4198] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 128.534114][ T4198] r10:00000003 r9:839d1900 r8:8020029c r7:00000000 r6:00000000 r5:84dfc800 [ 128.534136][ T4198] r4:84dfc803 [ 128.534154][ T4198] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 128.535884][ T4198] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 128.535912][ T4198] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 128.535969][ T4198] Exception stack(0xed141fa8 to 0xed141ff0) [ 128.536015][ T4198] 1fa0: 00000000 00000000 00000004 76f9ff08 0000000f 00000000 [ 128.536053][ T4198] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fa00dc [ 128.536085][ T4198] 1fe0: 76f9fe58 76f9fe44 0010ba34 00112618 [ 128.668691][ T28] audit: type=1400 audit(128.590:216): avc: denied { bind } for pid=4199 comm="syz.1.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 129.587347][ T4215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4215 comm=syz.0.154 [ 130.027487][ T4220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4220 comm=syz.0.156 [ 130.136342][ T4222] fuse: Unknown parameter 'ƒser_id' [ 131.775478][ T4237] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4237 comm=syz.0.162 [ 132.528382][ T28] audit: type=1400 audit(132.440:217): avc: denied { create } for pid=4245 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 132.545951][ T28] audit: type=1400 audit(132.470:218): avc: denied { setopt } for pid=4245 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.346636][ T28] audit: type=1400 audit(133.270:219): avc: denied { setattr } for pid=4251 comm="syz.0.167" name="NETLINK" dev="sockfs" ino=2926 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 135.482606][ T28] audit: type=1400 audit(135.410:220): avc: denied { ioctl } for pid=4275 comm="syz.0.173" path="socket:[2974]" dev="sockfs" ino=2974 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 140.366002][ T4313] FAULT_INJECTION: forcing a failure. [ 140.366002][ T4313] name failslab, interval 1, probability 0, space 0, times 0 [ 140.366365][ T4313] CPU: 1 UID: 0 PID: 4313 Comm: syz.1.184 Tainted: G L syzkaller #0 PREEMPT [ 140.366445][ T4313] Tainted: [L]=SOFTLOCKUP [ 140.366457][ T4313] Hardware name: ARM-Versatile Express [ 140.366484][ T4313] Call trace: [ 140.366526][ T4313] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 140.366625][ T4313] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 140.366646][ T4313] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 140.366703][ T4313] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 140.366770][ T4313] r7:00000000 r6:00000000 r5:8466d780 r4:82b18108 [ 140.366790][ T4313] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 140.366847][ T4313] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 140.366988][ T4313] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 140.367113][ T4313] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 140.367208][ T4313] [<8053223c>] (__kmalloc_noprof) from [<80815258>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 140.367293][ T4313] r10:00000000 r9:85f04000 r8:00000000 r7:834ab5d8 r6:833219a8 r5:00001000 [ 140.367383][ T4313] r4:00000000 [ 140.367492][ T4313] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 140.367625][ T4313] r10:00000000 r9:00000004 r8:83321980 r7:00008933 r6:81cda124 r5:00000004 [ 140.367729][ T4313] r4:833219a8 r3:828d1400 [ 140.367789][ T4313] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 140.367878][ T4313] r10:8466d780 r9:00000004 r8:83321980 r7:00000000 r6:00000000 r5:00008933 [ 140.368262][ T4313] r4:83321980 [ 140.368443][ T4313] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 140.368513][ T4313] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 140.368674][ T4313] r7:00000000 r6:00008933 r5:83321981 r4:00000000 [ 140.368720][ T4313] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 140.369278][ T4313] Exception stack(0xed8bdfa8 to 0xed8bdff0) [ 140.369335][ T4313] dfa0: 00000000 00000000 00000004 00008933 00000000 00000000 [ 140.369631][ T4313] dfc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fa00dc [ 140.369725][ T4313] dfe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 140.369826][ T4313] r10:00000036 r9:8466d780 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 140.369922][ T4313] r4:00000000 [ 140.388518][ T4313] ERROR: Out of memory at tomoyo_realpath_from_path. [ 141.098162][ T4330] FAULT_INJECTION: forcing a failure. [ 141.098162][ T4330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.098762][ T4330] CPU: 1 UID: 0 PID: 4330 Comm: syz.0.189 Tainted: G L syzkaller #0 PREEMPT [ 141.098874][ T4330] Tainted: [L]=SOFTLOCKUP [ 141.098894][ T4330] Hardware name: ARM-Versatile Express [ 141.098920][ T4330] Call trace: [ 141.098968][ T4330] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 141.099080][ T4330] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 141.099099][ T4330] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 141.099159][ T4330] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 141.099281][ T4330] r7:00000000 r6:00000000 r5:83fb8c80 r4:82b4f188 [ 141.099384][ T4330] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 141.099475][ T4330] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 141.099560][ T4330] r8:76f11f08 r7:00000000 r6:00000000 r5:eda01f68 r4:00000002 [ 141.099612][ T4330] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 141.099853][ T4330] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 141.101056][ T4330] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 141.101127][ T4330] r10:8064c488 r9:00000001 r8:00000002 r7:eda01f68 r6:0000000f r5:76f11f08 [ 141.101151][ T4330] r4:83fb8c80 r3:eda01e9f [ 141.101169][ T4330] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 141.101239][ T4330] r8:83fb8c80 r7:eda01f68 r6:76f11f08 r5:83323180 r4:0000000f [ 141.101267][ T4330] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 141.101348][ T4330] r10:00000003 r9:83fb8c80 r8:8020029c r7:00000000 r6:00000000 r5:83323180 [ 141.101443][ T4330] r4:83323183 [ 141.101480][ T4330] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 141.101552][ T4330] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 141.101572][ T4330] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 141.101730][ T4330] Exception stack(0xeda01fa8 to 0xeda01ff0) [ 141.101824][ T4330] 1fa0: 00000000 00000000 00000006 76f11f08 0000000f 00000000 [ 141.101899][ T4330] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f120dc [ 141.101979][ T4330] 1fe0: 76f11e58 76f11e44 0010ba34 00112618 [ 141.686168][ T4337] FAULT_INJECTION: forcing a failure. [ 141.686168][ T4337] name failslab, interval 1, probability 0, space 0, times 0 [ 141.686717][ T4337] CPU: 1 UID: 0 PID: 4337 Comm: syz.1.192 Tainted: G L syzkaller #0 PREEMPT [ 141.686822][ T4337] Tainted: [L]=SOFTLOCKUP [ 141.686844][ T4337] Hardware name: ARM-Versatile Express [ 141.686872][ T4337] Call trace: [ 141.686947][ T4337] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 141.687135][ T4337] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 141.687230][ T4337] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 141.687318][ T4337] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 141.687643][ T4337] r7:00000028 r6:00000000 r5:8466d780 r4:82b18108 [ 141.687701][ T4337] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 141.687788][ T4337] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 141.687862][ T4337] r8:ffffffff r7:00000028 r6:00000dc0 r5:00000000 r4:83001240 [ 141.687883][ T4337] [<80554020>] (should_failslab) from [<80534050>] (__kmalloc_cache_node_noprof+0x54/0x318) [ 141.687941][ T4337] [<80533ffc>] (__kmalloc_cache_node_noprof) from [<8050fac4>] (__get_vm_area_node+0x84/0x124) [ 141.688016][ T4337] r10:ffffffff r9:00000dc0 r8:ffffffff r7:00002000 r6:00000022 r5:00004000 [ 141.688040][ T4337] r4:00002000 [ 141.688060][ T4337] [<8050fa40>] (__get_vm_area_node) from [<805103cc>] (__vmalloc_node_range_noprof+0x90/0x6a4) [ 141.688139][ T4337] r10:ffffffff r9:ff800000 r8:00000dc0 r7:8233a3a0 r6:00004000 r5:df800000 [ 141.688164][ T4337] r4:00002000 [ 141.688182][ T4337] [<8051033c>] (__vmalloc_node_range_noprof) from [<8051112c>] (__vmalloc_node_noprof+0x6c/0x74) [ 141.688255][ T4337] r10:83fb8c80 r9:8024f3ec r8:00000000 r7:8466d780 r6:ffffffff r5:ed999f30 [ 141.688329][ T4337] r4:ffffffff [ 141.688357][ T4337] [<805110c0>] (__vmalloc_node_noprof) from [<8024d914>] (copy_process+0x2e0/0x1c68) [ 141.688456][ T4337] r4:00800000 [ 141.688480][ T4337] [<8024d634>] (copy_process) from [<8024f3ec>] (kernel_clone+0xbc/0x43c) [ 141.688555][ T4337] r10:8466d780 r9:8466d780 r8:00000000 r7:00000000 r6:20000040 r5:ed999f30 [ 141.688603][ T4337] r4:00800000 [ 141.688641][ T4337] [<8024f330>] (kernel_clone) from [<8024fb1c>] (sys_clone+0x78/0x9c) [ 141.688720][ T4337] r10:00000078 r9:8466d780 r8:8020029c r7:fffffde0 r6:20000040 r5:20001f00 [ 141.688764][ T4337] r4:00000000 [ 141.688785][ T4337] [<8024faa4>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 141.688839][ T4337] Exception stack(0xed999fa8 to 0xed999ff0) [ 141.688885][ T4337] 9fa0: 20001f80 20001f00 00800000 fffffde0 20001f00 20000040 [ 141.688926][ T4337] 9fc0: 20001f80 20001f00 fffffde8 00000078 003462d8 00000000 003d0f00 76fa00dc [ 141.688960][ T4337] 9fe0: 76f9fe60 76f9fe50 000193e4 00130810 [ 141.689019][ T4337] r7:00000078 r6:fffffde8 r5:20001f00 r4:20001f80 [ 141.724557][ T4337] syz.1.192: vmalloc error: size 8192, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 141.727187][ T4337] CPU: 1 UID: 0 PID: 4337 Comm: syz.1.192 Tainted: G L syzkaller #0 PREEMPT [ 141.727282][ T4337] Tainted: [L]=SOFTLOCKUP [ 141.727303][ T4337] Hardware name: ARM-Versatile Express [ 141.727329][ T4337] Call trace: [ 141.727365][ T4337] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 141.727475][ T4337] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 141.727496][ T4337] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 141.727555][ T4337] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 141.727619][ T4337] r7:00000000 r6:8233a368 r5:8466d780 r4:00000000 [ 141.727637][ T4337] [<8021e370>] (dump_stack) from [<80522ca8>] (warn_alloc+0xe0/0x188) [ 141.727695][ T4337] [<80522bc8>] (warn_alloc) from [<80510404>] (__vmalloc_node_range_noprof+0xc8/0x6a4) [ 141.727810][ T4337] r3:00002000 r2:8233a368 [ 141.727842][ T4337] r7:8233a3a0 r6:00004000 r5:df800000 r4:00002000 [ 141.727862][ T4337] [<8051033c>] (__vmalloc_node_range_noprof) from [<8051112c>] (__vmalloc_node_noprof+0x6c/0x74) [ 141.727935][ T4337] r10:83fb8c80 r9:8024f3ec r8:00000000 r7:8466d780 r6:ffffffff r5:ed999f30 [ 141.727958][ T4337] r4:ffffffff [ 141.727973][ T4337] [<805110c0>] (__vmalloc_node_noprof) from [<8024d914>] (copy_process+0x2e0/0x1c68) [ 141.728029][ T4337] r4:00800000 [ 141.728071][ T4337] [<8024d634>] (copy_process) from [<8024f3ec>] (kernel_clone+0xbc/0x43c) [ 141.728155][ T4337] r10:8466d780 r9:8466d780 r8:00000000 r7:00000000 r6:20000040 r5:ed999f30 [ 141.728177][ T4337] r4:00800000 [ 141.728216][ T4337] [<8024f330>] (kernel_clone) from [<8024fb1c>] (sys_clone+0x78/0x9c) [ 141.728285][ T4337] r10:00000078 r9:8466d780 r8:8020029c r7:fffffde0 r6:20000040 r5:20001f00 [ 141.728307][ T4337] r4:00000000 [ 141.728325][ T4337] [<8024faa4>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 141.728379][ T4337] Exception stack(0xed999fa8 to 0xed999ff0) [ 141.728426][ T4337] 9fa0: 20001f80 20001f00 00800000 fffffde0 20001f00 20000040 [ 141.728460][ T4337] 9fc0: 20001f80 20001f00 fffffde8 00000078 003462d8 00000000 003d0f00 76fa00dc [ 141.728491][ T4337] 9fe0: 76f9fe60 76f9fe50 000193e4 00130810 [ 141.728519][ T4337] r7:00000078 r6:fffffde8 r5:20001f00 r4:20001f80 [ 141.728680][ T4337] Mem-Info: [ 141.729061][ T4337] active_anon:1361 inactive_anon:0 isolated_anon:0 [ 141.729061][ T4337] active_file:6144 inactive_file:35367 isolated_file:0 [ 141.729061][ T4337] unevictable:768 dirty:36 writeback:0 [ 141.729061][ T4337] slab_reclaimable:1099 slab_unreclaimable:6061 [ 141.729061][ T4337] mapped:2419 shmem:777 pagetables:357 [ 141.729061][ T4337] sec_pagetables:0 bounce:0 [ 141.729061][ T4337] kernel_misc_reclaimable:0 [ 141.729061][ T4337] free:430607 free_pcp:1049 free_cma:4032 [ 141.729461][ T4337] Node 0 active_anon:5444kB inactive_anon:0kB active_file:24576kB inactive_file:141468kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9676kB dirty:144kB writeback:0kB shmem:3108kB kernel_stack:1504kB pagetables:1428kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB gpu_active:0kB gpu_reclaim:0kB [ 141.730337][ T4337] Normal free:1373884kB boost:0kB min:4768kB low:6188kB high:7608kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:952kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1424836kB mlocked:0kB bounce:0kB free_pcp:4196kB local_pcp:2836kB free_cma:0kB [ 141.730512][ T4337] lowmem_reserve[]: 0 4224 4224 [ 141.730753][ T4337] Normal: 3*4kB (UME) 6*8kB (UM) 4*16kB (M) 4*32kB (M) 3*64kB (ME) 4*128kB (M) 5*256kB (UME) 7*512kB (UME) 4*1024kB (M) 2*2048kB (ME) 332*4096kB (UM) = 1373884kB [ 141.830677][ T4337] 42288 total pagecache pages [ 141.841458][ T4337] 0 pages in swap cache [ 141.841913][ T4337] Free swap = 124996kB [ 141.842004][ T4337] Total swap = 124996kB [ 141.842162][ T4337] 524288 pages RAM [ 141.842195][ T4337] 135168 pages HighMem/MovableOnly [ 141.842220][ T4337] 32911 pages reserved [ 141.842252][ T4337] 4096 pages cma reserved [ 142.055345][ T28] audit: type=1400 audit(141.980:221): avc: denied { write } for pid=4339 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 142.769976][ T4350] FAULT_INJECTION: forcing a failure. [ 142.769976][ T4350] name failslab, interval 1, probability 0, space 0, times 0 [ 142.783423][ T4350] CPU: 0 UID: 0 PID: 4350 Comm: syz.1.198 Tainted: G L syzkaller #0 PREEMPT [ 142.783543][ T4350] Tainted: [L]=SOFTLOCKUP [ 142.783597][ T4350] Hardware name: ARM-Versatile Express [ 142.783614][ T4350] Call trace: [ 142.783659][ T4350] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 142.783781][ T4350] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 142.783799][ T4350] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 142.783849][ T4350] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 142.783910][ T4350] r7:00000000 r6:00000000 r5:839d1900 r4:82b18108 [ 142.783925][ T4350] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 142.783958][ T4350] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 142.783993][ T4350] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 142.784012][ T4350] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 142.784070][ T4350] [<8053223c>] (__kmalloc_noprof) from [<80815258>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 142.784124][ T4350] r10:00000000 r9:830c0000 r8:00000000 r7:8341fc38 r6:833231a8 r5:00001000 [ 142.784150][ T4350] r4:00000000 [ 142.784168][ T4350] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 142.784229][ T4350] r10:00000000 r9:00000003 r8:83323180 r7:4008af75 r6:81cda124 r5:00000004 [ 142.784240][ T4350] r4:833231a8 r3:828d1400 [ 142.784249][ T4350] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 142.784316][ T4350] r10:839d1900 r9:00000003 r8:83323180 r7:00000000 r6:00000000 r5:4008af75 [ 142.784333][ T4350] r4:83323180 [ 142.784349][ T4350] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 142.784398][ T4350] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 142.784468][ T4350] r7:00000000 r6:4008af75 r5:83323181 r4:00000000 [ 142.784485][ T4350] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 142.784514][ T4350] Exception stack(0xedb45fa8 to 0xedb45ff0) [ 142.784537][ T4350] 5fa0: 00000000 00000000 00000003 4008af75 00000000 00000000 [ 142.784555][ T4350] 5fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fa00dc [ 142.784569][ T4350] 5fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 142.784587][ T4350] r10:00000036 r9:839d1900 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 142.784597][ T4350] r4:00000000 [ 142.813569][ T4350] ERROR: Out of memory at tomoyo_realpath_from_path. [ 143.736420][ T28] audit: type=1400 audit(143.660:222): avc: denied { accept } for pid=4358 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 144.669315][ T28] audit: type=1400 audit(144.590:223): avc: denied { nlmsg_write } for pid=4363 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 145.637063][ T28] audit: type=1400 audit(145.560:224): avc: denied { write } for pid=4370 comm="syz.1.204" name="route" dev="proc" ino=4026532671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 146.322173][ T4372] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=11 sclass=netlink_audit_socket pid=4372 comm=syz.1.204 [ 147.412299][ T4379] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4379 comm=syz.0.207 [ 147.453585][ T4379] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4379 comm=syz.0.207 [ 148.023884][ T4382] Zero length message leads to an empty skb [ 154.518988][ T4422] FAULT_INJECTION: forcing a failure. [ 154.518988][ T4422] name failslab, interval 1, probability 0, space 0, times 0 [ 154.524129][ T4422] CPU: 0 UID: 0 PID: 4422 Comm: syz.0.223 Tainted: G L syzkaller #0 PREEMPT [ 154.524268][ T4422] Tainted: [L]=SOFTLOCKUP [ 154.524287][ T4422] Hardware name: ARM-Versatile Express [ 154.524309][ T4422] Call trace: [ 154.524353][ T4422] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 154.524453][ T4422] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 154.524472][ T4422] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 154.524527][ T4422] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 154.524593][ T4422] r7:00000000 r6:00000000 r5:84662580 r4:82b18108 [ 154.524611][ T4422] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 154.524663][ T4422] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 154.524721][ T4422] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 154.524739][ T4422] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 154.524810][ T4422] [<8053223c>] (__kmalloc_noprof) from [<80815258>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 154.524887][ T4422] r10:00000000 r9:85eaa800 r8:00000000 r7:854d9ee0 r6:84dfc3a8 r5:00001000 [ 154.524907][ T4422] r4:00000000 [ 154.524923][ T4422] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 154.524986][ T4422] r10:00000000 r9:00000004 r8:84dfc380 r7:c0709411 r6:81cda124 r5:00000004 [ 154.525009][ T4422] r4:84dfc3a8 r3:828d1400 [ 154.525027][ T4422] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 154.525096][ T4422] r10:84662580 r9:00000004 r8:84dfc380 r7:20001340 r6:20001340 r5:c0709411 [ 154.525118][ T4422] r4:84dfc380 [ 154.525134][ T4422] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 154.525183][ T4422] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 154.525242][ T4422] r7:20001340 r6:c0709411 r5:84dfc381 r4:00000000 [ 154.525262][ T4422] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 154.525306][ T4422] Exception stack(0xedbc5fa8 to 0xedbc5ff0) [ 154.525372][ T4422] 5fa0: 00000000 00000000 00000004 c0709411 20001340 00000000 [ 154.525405][ T4422] 5fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76f120dc [ 154.525431][ T4422] 5fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 154.525466][ T4422] r10:00000036 r9:84662580 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 154.525485][ T4422] r4:00000000 [ 154.551958][ T4422] ERROR: Out of memory at tomoyo_realpath_from_path. [ 155.406551][ T28] audit: type=1400 audit(155.330:225): avc: denied { ioctl } for pid=4431 comm="syz.0.226" path="socket:[5326]" dev="sockfs" ino=5326 ioctlcmd=0x6407 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 155.566829][ T28] audit: type=1400 audit(155.490:226): avc: denied { ioctl } for pid=4431 comm="syz.0.226" path="socket:[5331]" dev="sockfs" ino=5331 ioctlcmd=0x4149 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 156.938422][ T4445] FAULT_INJECTION: forcing a failure. [ 156.938422][ T4445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.938948][ T4445] CPU: 1 UID: 0 PID: 4445 Comm: syz.0.232 Tainted: G L syzkaller #0 PREEMPT [ 156.939030][ T4445] Tainted: [L]=SOFTLOCKUP [ 156.939047][ T4445] Hardware name: ARM-Versatile Express [ 156.939068][ T4445] Call trace: [ 156.939110][ T4445] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 156.939204][ T4445] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 156.939223][ T4445] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 156.939271][ T4445] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 156.939322][ T4445] r7:20000200 r6:00000000 r5:83fff080 r4:82b4f188 [ 156.939336][ T4445] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 156.939381][ T4445] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 156.939430][ T4445] r8:00004000 r7:20000200 r6:edd79e28 r5:00000000 r4:edd79f20 [ 156.939546][ T4445] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 156.939643][ T4445] [<809d7488>] (should_fail_usercopy) from [<815eac54>] (copy_msghdr_from_user+0x50/0x1e0) [ 156.939808][ T4445] [<815eac04>] (copy_msghdr_from_user) from [<815eae5c>] (___sys_sendmsg+0x78/0xd0) [ 156.939888][ T4445] r8:00004000 r7:00000000 r6:8542a2c0 r5:edd79f20 r4:edd79e6c [ 156.939907][ T4445] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 156.940033][ T4445] r9:83fff080 r8:84dfcc00 r7:00004000 r6:20000200 r5:84dfcc01 r4:00000003 [ 156.940089][ T4445] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 156.940169][ T4445] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 156.940226][ T4445] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 156.940268][ T4445] Exception stack(0xedd79fa8 to 0xedd79ff0) [ 156.940303][ T4445] 9fa0: 00000000 00000000 00000003 20000200 00004000 00000000 [ 156.940377][ T4445] 9fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f120dc [ 156.940403][ T4445] 9fe0: 76f11e88 76f11e78 00018ebc 00130810 [ 164.649484][ T4483] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=25 sclass=netlink_tcpdiag_socket pid=4483 comm=syz.1.246 [ 165.728591][ T28] audit: type=1400 audit(165.650:227): avc: denied { read } for pid=4490 comm="syz.1.249" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:random_device_t:s0" [ 165.732695][ T28] audit: type=1400 audit(165.660:228): avc: denied { open } for pid=4490 comm="syz.1.249" path="/dev/ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:random_device_t:s0" [ 165.944782][ T28] audit: type=1400 audit(165.870:229): avc: denied { getopt } for pid=4490 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 166.439611][ T4494] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4494 comm=syz.1.250 [ 170.673870][ T3612] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 170.831741][ T3612] usb 2-1: Using ep0 maxpacket: 32 [ 170.849031][ T3612] usb 2-1: unable to get BOS descriptor or descriptor too short [ 170.872920][ T3612] usb 2-1: New USB device found, idVendor=0499, idProduct=1054, bcdDevice= 0.40 [ 170.874023][ T3612] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 170.875072][ T3612] usb 2-1: Product: syz [ 170.875824][ T3612] usb 2-1: Manufacturer: syz [ 170.876540][ T3612] usb 2-1: SerialNumber: syz [ 171.198768][ T3612] usb 2-1: parse_audio_format_rates_v2v3(): unable to find clock source (clock -22) [ 171.218330][ T3612] usb 2-1: unit 37 not found! [ 171.218729][ T3612] usb 2-1: unit 0 not found! [ 171.707351][ T3612] usb 2-1: USB disconnect, device number 4 [ 172.336755][ T4544] FAULT_INJECTION: forcing a failure. [ 172.336755][ T4544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.342102][ T4544] CPU: 0 UID: 0 PID: 4544 Comm: syz.1.257 Tainted: G L syzkaller #0 PREEMPT [ 172.342323][ T4544] Tainted: [L]=SOFTLOCKUP [ 172.342350][ T4544] Hardware name: ARM-Versatile Express [ 172.342377][ T4544] Call trace: [ 172.342454][ T4544] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 172.342577][ T4544] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 172.342602][ T4544] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 172.342663][ T4544] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 172.342749][ T4544] r7:00000000 r6:00000000 r5:85035780 r4:82b4f188 [ 172.342777][ T4544] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 172.342847][ T4544] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 172.342913][ T4544] r8:76f9ff08 r7:00000000 r6:00000000 r5:ee4b1f68 r4:00000002 [ 172.342933][ T4544] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 172.342984][ T4544] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 172.343045][ T4544] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 172.343128][ T4544] r10:8064c488 r9:00000001 r8:00000002 r7:ee4b1f68 r6:0000000f r5:76f9ff08 [ 172.343157][ T4544] r4:85035780 r3:ee4b1e9f [ 172.343176][ T4544] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 172.343254][ T4544] r8:85035780 r7:ee4b1f68 r6:76f9ff08 r5:859c6900 r4:0000000f [ 172.343284][ T4544] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 172.343366][ T4544] r10:00000003 r9:85035780 r8:8020029c r7:00000000 r6:00000000 r5:859c6900 [ 172.343391][ T4544] r4:859c6903 [ 172.343435][ T4544] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 172.343512][ T4544] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 172.343533][ T4544] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 172.343589][ T4544] Exception stack(0xee4b1fa8 to 0xee4b1ff0) [ 172.343634][ T4544] 1fa0: 00000000 00000000 00000004 76f9ff08 0000000f 00000000 [ 172.343675][ T4544] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fa00dc [ 172.343747][ T4544] 1fe0: 76f9fe58 76f9fe44 0010ba34 00112618 [ 172.665398][ T4549] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4549 comm=syz.0.259 [ 172.784856][ T28] audit: type=1400 audit(172.710:230): avc: denied { audit_write } for pid=4548 comm="syz.1.258" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 172.902020][ T4552] syz.0.260(4552): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 172.951441][ T28] audit: type=1400 audit(172.870:231): avc: denied { write } for pid=4551 comm="syz.0.260" path="socket:[4714]" dev="sockfs" ino=4714 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 173.231977][ T3612] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 173.382450][ T3612] usb 1-1: device descriptor read/64, error -71 [ 173.652004][ T3612] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 173.781527][ T3612] usb 1-1: device descriptor read/64, error -71 [ 173.907387][ T3612] usb usb1-port1: attempt power cycle [ 174.261508][ T3612] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 174.284825][ T3612] usb 1-1: device descriptor read/8, error -71 [ 174.521975][ T3612] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 174.529350][ T4569] FAULT_INJECTION: forcing a failure. [ 174.529350][ T4569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.529763][ T4569] CPU: 1 UID: 0 PID: 4569 Comm: syz.1.267 Tainted: G L syzkaller #0 PREEMPT [ 174.529820][ T4569] Tainted: [L]=SOFTLOCKUP [ 174.529830][ T4569] Hardware name: ARM-Versatile Express [ 174.529842][ T4569] Call trace: [ 174.529868][ T4569] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 174.529932][ T4569] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 174.529942][ T4569] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 174.529969][ T4569] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 174.530000][ T4569] r7:00000000 r6:00000000 r5:84667080 r4:82b4f188 [ 174.530009][ T4569] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 174.530037][ T4569] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 174.530066][ T4569] r8:00000000 r7:00000000 r6:0000003f r5:ee671eb8 r4:20000040 [ 174.530074][ T4569] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 174.530096][ T4569] [<809d7488>] (should_fail_usercopy) from [<815ea4cc>] (copy_from_sockptr_offset.constprop.0+0x48/0xcc) [ 174.530204][ T4569] [<815ea484>] (copy_from_sockptr_offset.constprop.0) from [<815ea714>] (do_sock_getsockopt+0x1c4/0x2f8) [ 174.530264][ T4569] r6:0000003f r5:00000001 r4:85514040 [ 174.530335][ T4569] [<815ea550>] (do_sock_getsockopt) from [<815eccb4>] (__sys_getsockopt+0x94/0xdc) [ 174.530420][ T4569] r10:00000127 r9:84667080 r8:8606da00 r7:ee671f50 r6:0000003f r5:ee671f58 [ 174.530494][ T4569] r4:8606da01 [ 174.530544][ T4569] [<815ecc20>] (__sys_getsockopt) from [<815ecd18>] (sys_getsockopt+0x1c/0x24) [ 174.530632][ T4569] r8:8020029c r7:00000127 r6:0012f214 r5:00000000 r4:20000040 [ 174.530704][ T4569] [<815eccfc>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 174.530904][ T4569] Exception stack(0xee671fa8 to 0xee671ff0) [ 174.531057][ T4569] 1fa0: 20000040 00000000 00000003 00000001 0000003f 00000000 [ 174.531363][ T4569] 1fc0: 20000040 00000000 0012f214 00000127 003462d8 00000000 00000001 76fa00dc [ 174.531389][ T4569] 1fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 174.556986][ T3612] usb 1-1: device descriptor read/8, error -71 [ 174.661675][ T3612] usb usb1-port1: unable to enumerate USB device [ 182.007558][ T4597] FAULT_INJECTION: forcing a failure. [ 182.007558][ T4597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.015957][ T4597] CPU: 0 UID: 0 PID: 4597 Comm: syz.1.280 Tainted: G L syzkaller #0 PREEMPT [ 182.016121][ T4597] Tainted: [L]=SOFTLOCKUP [ 182.016143][ T4597] Hardware name: ARM-Versatile Express [ 182.016171][ T4597] Call trace: [ 182.016232][ T4597] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 182.016351][ T4597] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 182.016376][ T4597] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 182.016436][ T4597] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 182.016501][ T4597] r7:00000000 r6:00000000 r5:840f3200 r4:82b4f188 [ 182.016520][ T4597] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 182.016579][ T4597] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 182.016640][ T4597] r8:00000000 r7:00000000 r6:000000b4 r5:20000000 r4:83319a80 [ 182.016660][ T4597] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 182.016708][ T4597] [<809d7488>] (should_fail_usercopy) from [<809dd428>] (strncpy_from_user+0x20/0x1b0) [ 182.016760][ T4597] [<809dd408>] (strncpy_from_user) from [<80595700>] (do_getname+0x4c/0x14c) [ 182.016832][ T4597] r10:83319a8c r9:840f3200 r8:00000000 r7:00000000 r6:20000000 r5:825258b8 [ 182.016856][ T4597] r4:83319a80 [ 182.016871][ T4597] [<805956b4>] (do_getname) from [<8059b2c4>] (getname_flags+0x14/0x18) [ 182.016940][ T4597] r10:00000142 r9:840f3200 r8:8020029c r7:20000000 r6:ffffff9c r5:ee925f50 [ 182.016964][ T4597] r4:00000000 r3:00000001 [ 182.016981][ T4597] [<8059b2b0>] (getname_flags) from [<80582a48>] (do_sys_openat2+0x64/0xf0) [ 182.017035][ T4597] [<805829e4>] (do_sys_openat2) from [<80582e4c>] (sys_openat+0x80/0xd0) [ 182.017092][ T4597] r7:00000142 r6:00000000 r5:20000000 r4:ffffff9c [ 182.017110][ T4597] [<80582dcc>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 182.017156][ T4597] Exception stack(0xee925fa8 to 0xee925ff0) [ 182.017197][ T4597] 5fa0: 00000000 00000000 ffffff9c 20000000 00000041 00000000 [ 182.017247][ T4597] 5fc0: 00000000 00000000 0012f214 00000142 003462d8 00000000 00000001 76fa00dc [ 182.017278][ T4597] 5fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 182.017306][ T4597] r6:0012f214 r5:00000000 r4:00000000 [ 182.463151][ T4599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4599 comm=syz.1.281 [ 183.635208][ T4612] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4612 comm=syz.0.286 [ 183.664589][ T28] audit: type=1400 audit(183.590:232): avc: denied { getopt } for pid=4611 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 185.955344][ T4637] FAULT_INJECTION: forcing a failure. [ 185.955344][ T4637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.955662][ T4637] CPU: 1 UID: 0 PID: 4637 Comm: syz.1.295 Tainted: G L syzkaller #0 PREEMPT [ 185.955766][ T4637] Tainted: [L]=SOFTLOCKUP [ 185.955778][ T4637] Hardware name: ARM-Versatile Express [ 185.955791][ T4637] Call trace: [ 185.955818][ T4637] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 185.955884][ T4637] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 185.955894][ T4637] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 185.955924][ T4637] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 185.955959][ T4637] r7:00000000 r6:00000000 r5:85035780 r4:82b4f188 [ 185.955967][ T4637] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 185.955997][ T4637] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 185.956028][ T4637] r8:00000003 r7:00000000 r6:00000100 r5:20000080 r4:20000080 [ 185.956037][ T4637] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 185.956062][ T4637] [<809d7488>] (should_fail_usercopy) from [<809dd428>] (strncpy_from_user+0x20/0x1b0) [ 185.956095][ T4637] [<809dd408>] (strncpy_from_user) from [<805c25bc>] (path_setxattrat+0x7c/0x1bc) [ 185.956135][ T4637] r10:00000003 r9:00000000 r8:00000003 r7:00000000 r6:00001000 r5:00000000 [ 185.956180][ T4637] r4:20000080 [ 185.956189][ T4637] [<805c2540>] (path_setxattrat) from [<805c28fc>] (sys_fsetxattr+0x30/0x38) [ 185.956228][ T4637] r10:000000e4 r9:85035780 r8:8020029c r7:000000e4 r6:0012f214 r5:00000000 [ 185.956239][ T4637] r4:00000003 [ 185.956248][ T4637] [<805c28cc>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 185.956274][ T4637] Exception stack(0xeea99fa8 to 0xeea99ff0) [ 185.956346][ T4637] 9fa0: 00000003 00000000 00000003 20000080 00000000 00000000 [ 185.956430][ T4637] 9fc0: 00000003 00000000 0012f214 000000e4 003462d8 00000000 00000001 76fa00dc [ 185.956527][ T4637] 9fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 206.332557][ T28] audit: type=1400 audit(206.250:233): avc: denied { remount } for pid=4687 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 206.521577][ T28] audit: type=1400 audit(206.440:234): avc: denied { getopt } for pid=4689 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 206.842373][ T4697] comedi comedi2: comedi_config --init_data is deprecated [ 207.888480][ T28] audit: type=1400 audit(207.810:235): avc: denied { accept } for pid=4706 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 207.900343][ T28] audit: type=1400 audit(207.820:236): avc: denied { create } for pid=4706 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 208.713247][ T4719] comedi comedi2: comedi_config --init_data is deprecated [ 209.813084][ T28] audit: type=1400 audit(209.740:237): avc: denied { name_bind } for pid=4726 comm="syz.0.329" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 209.815152][ T28] audit: type=1400 audit(209.740:238): avc: denied { node_bind } for pid=4726 comm="syz.0.329" saddr=fe80::17 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 212.351485][ T2873] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 212.502024][ T2873] usb 2-1: Using ep0 maxpacket: 32 [ 212.531544][ T2873] usb 2-1: config 145 interface 0 has no altsetting 0 [ 212.566357][ T2873] usb 2-1: New USB device found, idVendor=1b3d, idProduct=01e9, bcdDevice=f6.6d [ 212.568223][ T2873] usb 2-1: New USB device strings: Mfr=250, Product=2, SerialNumber=3 [ 212.569638][ T2873] usb 2-1: Product: syz [ 212.570614][ T2873] usb 2-1: Manufacturer: syz [ 212.572176][ T2873] usb 2-1: SerialNumber: syz [ 213.062122][ T2873] ftdi_sio 2-1:145.0: FTDI USB Serial Device converter detected [ 213.064771][ T2873] ftdi_sio ttyUSB0: unknown device type: 0xf66d [ 213.074533][ T2873] usb 2-1: USB disconnect, device number 5 [ 213.078345][ T2873] ftdi_sio 2-1:145.0: device disconnected [ 213.645814][ T28] audit: type=1400 audit(213.570:239): avc: denied { write } for pid=4775 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 214.786589][ T4781] SELinux: policydb version 376897120 does not match my version range 15-35 [ 214.788961][ T4781] SELinux: failed to load policy [ 216.404168][ T28] audit: type=1404 audit(216.330:240): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 216.508123][ T28] audit: type=1400 audit(216.430:241): avc: denied { create } for pid=4799 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 216.558412][ T28] audit: type=1400 audit(216.480:242): avc: denied { read } for pid=4799 comm="syz.1.348" name="dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 216.687550][ T28] audit: type=1400 audit(216.610:243): avc: denied { read write } for pid=4801 comm="syz.0.349" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 216.702070][ T28] audit: type=1400 audit(216.630:244): avc: denied { create } for pid=4801 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 216.715355][ T28] audit: type=1400 audit(216.640:245): avc: denied { getopt } for pid=4801 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 216.732663][ T28] audit: type=1400 audit(216.660:246): avc: denied { setopt } for pid=4801 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 216.842408][ T28] audit: type=1400 audit(216.740:247): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 217.272703][ T28] audit: type=1400 audit(217.200:248): avc: denied { create } for pid=4804 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 217.317872][ T4805] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26996 sclass=netlink_tcpdiag_socket pid=4805 comm=syz.0.350 [ 218.661945][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 218.663012][ T28] audit: type=1400 audit(218.580:258): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 218.734987][ T28] audit: type=1400 audit(218.660:259): avc: denied { create } for pid=4814 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 218.752878][ T28] audit: type=1400 audit(218.680:260): avc: denied { create } for pid=4814 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.813608][ T28] audit: type=1400 audit(218.740:261): avc: denied { read write } for pid=4814 comm="syz.1.356" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 218.864384][ T28] audit: type=1400 audit(218.790:262): avc: denied { create } for pid=4814 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.868411][ T28] audit: type=1400 audit(218.790:263): avc: denied { create } for pid=4814 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.883208][ T28] audit: type=1400 audit(218.810:264): avc: denied { create } for pid=4816 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.905421][ T28] audit: type=1400 audit(218.830:265): avc: denied { create } for pid=4816 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.927301][ T28] audit: type=1400 audit(218.850:266): avc: denied { create } for pid=4814 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 218.961921][ T28] audit: type=1400 audit(218.890:267): avc: denied { create } for pid=4814 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 224.749400][ T28] kauditd_printk_skb: 95 callbacks suppressed [ 224.749887][ T28] audit: type=1400 audit(224.670:363): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 224.904152][ T28] audit: type=1400 audit(224.830:364): avc: denied { read } for pid=4862 comm="syz.0.378" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 224.916364][ T28] audit: type=1400 audit(224.840:365): avc: denied { read } for pid=4862 comm="syz.0.378" dev="nsfs" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 224.976791][ T28] audit: type=1400 audit(224.900:366): avc: denied { create } for pid=4862 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 225.151546][ T28] audit: type=1400 audit(225.070:367): avc: denied { module_request } for pid=4862 comm="syz.0.378" kmod="netdev-syztnl0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 225.151989][ T28] audit: type=1400 audit(225.070:368): avc: denied { sys_module } for pid=4862 comm="syz.0.378" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 225.203457][ T28] audit: type=1400 audit(225.130:369): avc: denied { bpf } for pid=4862 comm="syz.0.378" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 225.342348][ T28] audit: type=1400 audit(225.270:370): avc: denied { map_create } for pid=4862 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.356737][ T28] audit: type=1400 audit(225.280:371): avc: denied { create } for pid=4862 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=0 [ 225.359498][ T28] audit: type=1400 audit(225.280:372): avc: denied { create } for pid=4862 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 229.760395][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 229.761908][ T28] audit: type=1400 audit(229.680:418): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 230.013767][ T28] audit: type=1400 audit(229.940:419): avc: denied { read } for pid=4894 comm="syz.1.392" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 230.046936][ T28] audit: type=1400 audit(229.970:420): avc: denied { mounton } for pid=4894 comm="syz.1.392" path="/197/file1" dev="tmpfs" ino=1049 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 230.282707][ T28] audit: type=1400 audit(230.210:421): avc: denied { read write } for pid=4894 comm="syz.1.392" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 230.704831][ T28] audit: type=1400 audit(230.630:422): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 230.831225][ T28] audit: type=1400 audit(230.750:423): avc: denied { create } for pid=4896 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 231.088477][ T28] audit: type=1400 audit(231.010:424): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 231.556539][ T28] audit: type=1400 audit(231.480:425): avc: denied { read write } for pid=4898 comm="syz.1.394" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 231.564124][ T28] audit: type=1400 audit(231.490:426): avc: denied { mounton } for pid=4898 comm="syz.1.394" path="/199/file0" dev="tmpfs" ino=1061 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 231.722006][ T28] audit: type=1400 audit(231.640:427): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 234.097646][ T4912] syz.1.400 uses obsolete (PF_INET,SOCK_PACKET) [ 234.892929][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 234.893346][ T28] audit: type=1400 audit(234.820:456): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 235.262009][ T28] audit: type=1400 audit(235.180:457): avc: denied { create } for pid=4919 comm="syz.1.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 235.263914][ T28] audit: type=1400 audit(235.180:458): avc: denied { read write } for pid=4919 comm="syz.1.404" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 235.332218][ T28] audit: type=1400 audit(235.260:459): avc: denied { create } for pid=4919 comm="syz.1.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 235.565848][ T28] audit: type=1400 audit(235.490:460): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 235.786655][ T28] audit: type=1400 audit(235.710:461): avc: denied { read write } for pid=4921 comm="syz.1.405" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 236.022401][ T28] audit: type=1400 audit(235.950:462): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 236.320023][ T28] audit: type=1400 audit(236.240:463): avc: denied { create } for pid=4923 comm="syz.1.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 236.358837][ T28] audit: type=1400 audit(236.280:464): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 236.452831][ T28] audit: type=1400 audit(236.380:465): avc: denied { read write } for pid=4925 comm="syz.1.407" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 238.689013][ T4943] FAULT_INJECTION: forcing a failure. [ 238.689013][ T4943] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.689320][ T4943] CPU: 0 UID: 0 PID: 4943 Comm: syz.1.415 Tainted: G L syzkaller #0 PREEMPT [ 238.689380][ T4943] Tainted: [L]=SOFTLOCKUP [ 238.689412][ T4943] Hardware name: ARM-Versatile Express [ 238.689426][ T4943] Call trace: [ 238.689452][ T4943] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 238.689515][ T4943] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 238.689525][ T4943] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 238.689553][ T4943] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 238.689585][ T4943] r7:00000000 r6:00000000 r5:833eb200 r4:82b4f188 [ 238.689593][ T4943] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 238.689621][ T4943] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 238.689656][ T4943] r8:dfce9eb8 r7:00000000 r6:76f9ff08 r5:00000001 r4:00000001 [ 238.689665][ T4943] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 238.689688][ T4943] [<809d7488>] (should_fail_usercopy) from [<80917cd8>] (kstrtouint_from_user+0x54/0x13c) [ 238.689715][ T4943] [<80917c84>] (kstrtouint_from_user) from [<8064d844>] (proc_fail_nth_write+0x40/0xf4) [ 238.689752][ T4943] r8:8064d804 r7:dfce9f68 r6:76f9ff08 r5:860fcf80 r4:00000001 [ 238.689760][ T4943] [<8064d804>] (proc_fail_nth_write) from [<80586404>] (vfs_write+0xd4/0x450) [ 238.689793][ T4943] r5:860fcf80 r4:00000001 [ 238.689801][ T4943] [<80586330>] (vfs_write) from [<805868f4>] (ksys_write+0x74/0xec) [ 238.689836][ T4943] r10:00000004 r9:833eb200 r8:8020029c r7:00000000 r6:00000002 r5:860fcf80 [ 238.689847][ T4943] r4:860fcf83 [ 238.689855][ T4943] [<80586880>] (ksys_write) from [<8058697c>] (sys_write+0x10/0x14) [ 238.689887][ T4943] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 238.689972][ T4943] [<8058696c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 238.690021][ T4943] Exception stack(0xdfce9fa8 to 0xdfce9ff0) [ 238.690391][ T4943] 9fa0: 00000000 00000000 00000003 76f9ff08 00000001 00000000 [ 238.690448][ T4943] 9fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76fa00dc [ 238.690486][ T4943] 9fe0: 76f9fe58 76f9fe44 0010ba34 00112618 [ 239.949236][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 239.952540][ T28] audit: type=1400 audit(239.870:490): avc: denied { create } for pid=4948 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 239.974047][ T28] audit: type=1400 audit(239.900:491): avc: denied { create } for pid=4948 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 239.984566][ T28] audit: type=1400 audit(239.910:492): avc: denied { map_create } for pid=4948 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.010162][ T28] audit: type=1400 audit(239.930:493): avc: denied { create } for pid=4948 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 240.028506][ T28] audit: type=1400 audit(239.950:494): avc: denied { create } for pid=4948 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 240.041609][ T28] audit: type=1400 audit(239.960:495): avc: denied { create } for pid=4948 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 240.103776][ T28] audit: type=1400 audit(240.030:496): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 240.396880][ T28] audit: type=1400 audit(240.320:497): avc: denied { read write } for pid=4950 comm="syz.1.419" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 240.403899][ T28] audit: type=1400 audit(240.330:498): avc: denied { mounton } for pid=4950 comm="syz.1.419" path="/224/file0" dev="tmpfs" ino=1195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 240.619238][ T28] audit: type=1400 audit(240.540:499): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 240.950399][ T4953] FAULT_INJECTION: forcing a failure. [ 240.950399][ T4953] name failslab, interval 1, probability 0, space 0, times 0 [ 240.952630][ T4953] CPU: 1 UID: 0 PID: 4953 Comm: syz.1.420 Tainted: G L syzkaller #0 PREEMPT [ 240.952776][ T4953] Tainted: [L]=SOFTLOCKUP [ 240.952800][ T4953] Hardware name: ARM-Versatile Express [ 240.952827][ T4953] Call trace: [ 240.952880][ T4953] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 240.952997][ T4953] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 240.953018][ T4953] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 240.953084][ T4953] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 240.953155][ T4953] r7:00000000 r6:00000000 r5:833fcb00 r4:82b18108 [ 240.953176][ T4953] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 240.953235][ T4953] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 240.953305][ T4953] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:0000001d [ 240.953325][ T4953] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 240.953379][ T4953] [<8053223c>] (__kmalloc_noprof) from [<80815164>] (tomoyo_encode2+0x64/0xec) [ 240.953451][ T4953] r10:00000fff r9:85d9c000 r8:00000000 r7:836563b8 r6:860fc328 r5:85f93ffc [ 240.953474][ T4953] r4:85f93fea [ 240.953492][ T4953] [<80815100>] (tomoyo_encode2) from [<80815210>] (tomoyo_encode+0x24/0x30) [ 240.953558][ T4953] r9:85d9c000 r8:00000000 r7:836563b8 r6:860fc328 r5:00001000 r4:85f93feb [ 240.953577][ T4953] [<808151ec>] (tomoyo_encode) from [<8081529c>] (tomoyo_realpath_from_path+0x80/0x16c) [ 240.953632][ T4953] r5:00001000 r4:85f93000 [ 240.953649][ T4953] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 240.953727][ T4953] r10:00000000 r9:00000003 r8:860fc300 r7:c0186405 r6:81cda124 r5:00000004 [ 240.953760][ T4953] r4:860fc328 r3:828d1400 [ 240.953779][ T4953] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 240.953848][ T4953] r10:833fcb00 r9:00000003 r8:860fc300 r7:20000000 r6:20000000 r5:c0186405 [ 240.953869][ T4953] r4:860fc300 [ 240.953888][ T4953] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 240.953943][ T4953] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 240.954007][ T4953] r7:20000000 r6:c0186405 r5:860fc301 r4:00000000 [ 240.954029][ T4953] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 240.954084][ T4953] Exception stack(0xdfb25fa8 to 0xdfb25ff0) [ 240.954134][ T4953] 5fa0: 00000000 00000000 00000003 c0186405 20000000 00000000 [ 240.954178][ T4953] 5fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fa00dc [ 240.954213][ T4953] 5fe0: 76f9fe88 76f9fe78 00018ebc 00130810 [ 240.954255][ T4953] r10:00000036 r9:833fcb00 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 240.954278][ T4953] r4:00000000 [ 240.984981][ T4953] ERROR: Out of memory at tomoyo_realpath_from_path. [ 243.022124][ T4970] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5121 sclass=netlink_audit_socket pid=4970 comm=syz.0.427 [ 245.034776][ T28] kauditd_printk_skb: 95 callbacks suppressed [ 245.035198][ T28] audit: type=1400 audit(244.960:595): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 245.076561][ T28] audit: type=1400 audit(245.000:596): avc: denied { read } for pid=4997 comm="syz.0.440" name="controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 245.080251][ T28] audit: type=1400 audit(245.000:597): avc: denied { read write } for pid=4997 comm="syz.0.440" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 245.131526][ T28] audit: type=1400 audit(245.050:598): avc: denied { create } for pid=4997 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 245.149210][ T28] audit: type=1400 audit(245.070:599): avc: denied { create } for pid=4997 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 245.206120][ T28] audit: type=1400 audit(245.120:600): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 245.301235][ T28] audit: type=1400 audit(245.220:601): avc: denied { create } for pid=4999 comm="syz.1.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 245.380749][ T28] audit: type=1400 audit(245.300:602): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 245.418880][ T28] audit: type=1400 audit(245.340:603): avc: denied { read write } for pid=5001 comm="syz.0.443" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 245.442833][ T28] audit: type=1400 audit(245.370:604): avc: denied { mounton } for pid=5001 comm="syz.0.443" path="/202/file0" dev="tmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 245.467060][ T5002] FAULT_INJECTION: forcing a failure. [ 245.467060][ T5002] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.467412][ T5002] CPU: 1 UID: 0 PID: 5002 Comm: syz.0.443 Tainted: G L syzkaller #0 PREEMPT [ 245.467476][ T5002] Tainted: [L]=SOFTLOCKUP [ 245.467487][ T5002] Hardware name: ARM-Versatile Express [ 245.467501][ T5002] Call trace: [ 245.467529][ T5002] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 245.467593][ T5002] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 245.467604][ T5002] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 245.467635][ T5002] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 245.467702][ T5002] r7:00000000 r6:00000000 r5:8501e400 r4:82b4f188 [ 245.467793][ T5002] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 245.467858][ T5002] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 245.467929][ T5002] r8:e03edeb8 r7:00000000 r6:76f11f08 r5:00000001 r4:00000001 [ 245.467945][ T5002] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 245.468010][ T5002] [<809d7488>] (should_fail_usercopy) from [<80917cd8>] (kstrtouint_from_user+0x54/0x13c) [ 245.468057][ T5002] [<80917c84>] (kstrtouint_from_user) from [<8064d844>] (proc_fail_nth_write+0x40/0xf4) [ 245.468123][ T5002] r8:8064d804 r7:e03edf68 r6:76f11f08 r5:86103d00 r4:00000001 [ 245.468134][ T5002] [<8064d804>] (proc_fail_nth_write) from [<80586404>] (vfs_write+0xd4/0x450) [ 245.468210][ T5002] r5:86103d00 r4:00000001 [ 245.468232][ T5002] [<80586330>] (vfs_write) from [<805868f4>] (ksys_write+0x74/0xec) [ 245.468289][ T5002] r10:00000004 r9:8501e400 r8:8020029c r7:00000000 r6:00000002 r5:86103d00 [ 245.468301][ T5002] r4:86103d03 [ 245.468327][ T5002] [<80586880>] (ksys_write) from [<8058697c>] (sys_write+0x10/0x14) [ 245.468364][ T5002] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 245.468375][ T5002] [<8058696c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 245.468420][ T5002] Exception stack(0xe03edfa8 to 0xe03edff0) [ 245.468478][ T5002] dfa0: 00000000 00000000 00000004 76f11f08 00000001 00000000 [ 245.468499][ T5002] dfc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f120dc [ 245.468515][ T5002] dfe0: 76f11e58 76f11e44 0010ba34 00112618 [ 250.464693][ T28] kauditd_printk_skb: 72 callbacks suppressed [ 250.465889][ T28] audit: type=1400 audit(250.390:677): avc: denied { create } for pid=5047 comm="syz.1.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.691646][ T28] audit: type=1400 audit(250.610:678): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 250.887581][ T28] audit: type=1400 audit(250.810:679): avc: denied { create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.918009][ T28] audit: type=1400 audit(250.840:680): avc: denied { create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.923045][ T28] audit: type=1400 audit(250.850:681): avc: denied { map_create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 250.928266][ T28] audit: type=1400 audit(250.850:682): avc: denied { create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.932971][ T28] audit: type=1400 audit(250.860:683): avc: denied { create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.942341][ T28] audit: type=1400 audit(250.870:684): avc: denied { create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.953843][ T28] audit: type=1400 audit(250.880:685): avc: denied { create } for pid=5049 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 251.206702][ T28] audit: type=1400 audit(251.130:686): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 253.347295][ T5064] FAULT_INJECTION: forcing a failure. [ 253.347295][ T5064] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 253.347792][ T5064] CPU: 1 UID: 0 PID: 5064 Comm: syz.1.473 Tainted: G L syzkaller #0 PREEMPT [ 253.347891][ T5064] Tainted: [L]=SOFTLOCKUP [ 253.347913][ T5064] Hardware name: ARM-Versatile Express [ 253.347938][ T5064] Call trace: [ 253.348041][ T5064] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 253.348167][ T5064] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 253.348195][ T5064] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 253.348259][ T5064] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 253.348334][ T5064] r7:00000000 r6:00000000 r5:85026400 r4:82b4f188 [ 253.348353][ T5064] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 253.348438][ T5064] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 253.348508][ T5064] r8:76f9ff08 r7:00000000 r6:00000000 r5:ea771f68 r4:00000002 [ 253.348528][ T5064] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 253.348579][ T5064] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 253.348638][ T5064] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 253.348715][ T5064] r10:8064c488 r9:00000001 r8:00000002 r7:ea771f68 r6:0000000f r5:76f9ff08 [ 253.348750][ T5064] r4:85026400 r3:ea771e9f [ 253.348770][ T5064] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 253.348847][ T5064] r8:85026400 r7:ea771f68 r6:76f9ff08 r5:86103e00 r4:0000000f [ 253.348867][ T5064] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 253.348943][ T5064] r10:00000003 r9:85026400 r8:8020029c r7:00000000 r6:00000000 r5:86103e00 [ 253.348968][ T5064] r4:86103e03 [ 253.349006][ T5064] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 253.349083][ T5064] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 253.349103][ T5064] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 253.349175][ T5064] Exception stack(0xea771fa8 to 0xea771ff0) [ 253.349222][ T5064] 1fa0: 00000000 00000000 00000003 76f9ff08 0000000f 00000000 [ 253.349265][ T5064] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fa00dc [ 253.349314][ T5064] 1fe0: 76f9fe58 76f9fe44 0010ba34 00112618 [ 253.681980][ T5066] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5066 comm=syz.1.474 [ 255.783923][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 255.786810][ T28] audit: type=1400 audit(255.710:728): avc: denied { read write } for pid=5075 comm="syz.1.479" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 255.792293][ T28] audit: type=1400 audit(255.710:729): avc: denied { mounton } for pid=5075 comm="syz.1.479" path="/262/file0" dev="tmpfs" ino=1395 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 256.003986][ T5076] FAULT_INJECTION: forcing a failure. [ 256.003986][ T5076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 256.004304][ T5076] CPU: 1 UID: 0 PID: 5076 Comm: syz.1.479 Tainted: G L syzkaller #0 PREEMPT [ 256.004363][ T5076] Tainted: [L]=SOFTLOCKUP [ 256.004373][ T5076] Hardware name: ARM-Versatile Express [ 256.004385][ T5076] Call trace: [ 256.004410][ T5076] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 256.004469][ T5076] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 256.004479][ T5076] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 256.004506][ T5076] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 256.004537][ T5076] r7:00000000 r6:00000000 r5:840f5780 r4:82b4f188 [ 256.004545][ T5076] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 256.004571][ T5076] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 256.004600][ T5076] r8:76f9ff08 r7:00000000 r6:00000000 r5:ea815f68 r4:00000002 [ 256.004695][ T5076] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 256.004777][ T5076] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 256.004858][ T5076] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 256.004966][ T5076] r10:8064c488 r9:00000001 r8:00000002 r7:ea815f68 r6:0000000f r5:76f9ff08 [ 256.005061][ T5076] r4:840f5780 r3:ea815e9f [ 256.005114][ T5076] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 256.005179][ T5076] r8:840f5780 r7:ea815f68 r6:76f9ff08 r5:860fca80 r4:0000000f [ 256.005210][ T5076] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 256.005451][ T5076] r10:00000003 r9:840f5780 r8:8020029c r7:00000000 r6:00000000 r5:860fca80 [ 256.005495][ T5076] r4:860fca83 [ 256.005507][ T5076] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 256.005582][ T5076] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 256.005668][ T5076] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 256.005696][ T5076] Exception stack(0xea815fa8 to 0xea815ff0) [ 256.005718][ T5076] 5fa0: 00000000 00000000 00000004 76f9ff08 0000000f 00000000 [ 256.005737][ T5076] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fa00dc [ 256.005771][ T5076] 5fe0: 76f9fe58 76f9fe44 0010ba34 00112618 [ 256.119873][ T28] audit: type=1400 audit(256.040:730): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 256.429272][ T28] audit: type=1400 audit(256.350:731): avc: denied { create } for pid=5077 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 256.620598][ T28] audit: type=1400 audit(256.540:732): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 256.992966][ T28] audit: type=1400 audit(256.920:733): avc: denied { create } for pid=5079 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 257.052528][ T28] audit: type=1400 audit(256.980:734): avc: denied { create } for pid=5079 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 257.112832][ T28] audit: type=1400 audit(257.040:735): avc: denied { map_create } for pid=5079 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.147485][ T28] audit: type=1400 audit(257.070:736): avc: denied { create } for pid=5079 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 257.172621][ T28] audit: type=1400 audit(257.100:737): avc: denied { create } for pid=5079 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 258.496737][ T5086] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5086 comm=syz.1.484 [ 258.543118][ T5086] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5086 comm=syz.1.484 [ 260.253837][ T5094] FAULT_INJECTION: forcing a failure. [ 260.253837][ T5094] name failslab, interval 1, probability 0, space 0, times 0 [ 260.254210][ T5094] CPU: 1 UID: 0 PID: 5094 Comm: syz.1.488 Tainted: G L syzkaller #0 PREEMPT [ 260.254270][ T5094] Tainted: [L]=SOFTLOCKUP [ 260.254280][ T5094] Hardware name: ARM-Versatile Express [ 260.254313][ T5094] Call trace: [ 260.254345][ T5094] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 260.254414][ T5094] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 260.254424][ T5094] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 260.254451][ T5094] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 260.254481][ T5094] r7:00000000 r6:00000000 r5:839e2580 r4:82b18108 [ 260.254489][ T5094] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 260.254515][ T5094] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 260.254545][ T5094] r8:00000000 r7:00000000 r6:83001300 r5:00000dc0 r4:00000078 [ 260.254554][ T5094] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 260.255682][ T5094] [<8053223c>] (__kmalloc_noprof) from [<807c7b88>] (lsm_blob_alloc+0x28/0x3c) [ 260.257228][ T5094] r10:85026400 r9:00000000 r8:00000000 r7:00800000 r6:00000000 r5:85026400 [ 260.257413][ T5094] r4:85026fa8 [ 260.257472][ T5094] [<807c7b60>] (lsm_blob_alloc) from [<807d26b0>] (security_task_alloc+0x34/0x224) [ 260.257582][ T5094] r5:85026400 r4:00800000 [ 260.257608][ T5094] [<807d267c>] (security_task_alloc) from [<8024ddf8>] (copy_process+0x7c4/0x1c68) [ 260.257697][ T5094] r7:839e2580 r6:00000000 r5:ea771f30 r4:00800000 [ 260.257824][ T5094] [<8024d634>] (copy_process) from [<8024f3ec>] (kernel_clone+0xbc/0x43c) [ 260.257951][ T5094] r10:839e2580 r9:839e2580 r8:00000000 r7:00000000 r6:20000040 r5:ea771f30 [ 260.257995][ T5094] r4:00800000 [ 260.258146][ T5094] [<8024f330>] (kernel_clone) from [<8024fb1c>] (sys_clone+0x78/0x9c) [ 260.258378][ T5094] r10:00000078 r9:839e2580 r8:8020029c r7:fffffde0 r6:20000040 r5:20001f00 [ 260.258493][ T5094] r4:00000000 [ 260.258517][ T5094] [<8024faa4>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 260.258596][ T5094] Exception stack(0xea771fa8 to 0xea771ff0) [ 260.258715][ T5094] 1fa0: 20001f80 20001f00 00800000 fffffde0 20001f00 20000040 [ 260.258784][ T5094] 1fc0: 20001f80 20001f00 fffffde8 00000078 003462d8 00000000 003d0f00 76fa00dc [ 260.258892][ T5094] 1fe0: 76f9fe60 76f9fe50 000193e4 00130810 [ 260.259959][ T5094] r7:00000078 r6:fffffde8 r5:20001f00 r4:20001f80 [ 261.143335][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 261.143859][ T28] audit: type=1400 audit(261.070:762): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 261.292782][ T28] audit: type=1400 audit(261.220:763): avc: denied { read write } for pid=5099 comm="syz.1.491" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 261.881350][ T28] audit: type=1400 audit(261.800:764): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.058419][ T28] audit: type=1400 audit(261.980:765): avc: denied { read write } for pid=5101 comm="syz.1.492" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 262.093938][ T28] audit: type=1400 audit(262.020:766): avc: denied { mounton } for pid=5101 comm="syz.1.492" path="/275/file0" dev="tmpfs" ino=1464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 262.193694][ T28] audit: type=1400 audit(262.120:767): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.316429][ T28] audit: type=1400 audit(262.230:768): avc: denied { create } for pid=5041 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 262.356481][ T28] audit: type=1400 audit(262.280:769): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.486718][ T28] audit: type=1400 audit(262.410:770): avc: denied { create } for pid=5103 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 262.593562][ T28] audit: type=1400 audit(262.520:771): avc: denied { read } for pid=5105 comm="syz.1.493" name="timer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 262.684075][ T5104] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5104 comm=syz.0.494 [ 267.341573][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 267.345084][ T28] audit: type=1400 audit(267.260:823): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 267.478728][ T28] audit: type=1400 audit(267.400:824): avc: denied { create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.542092][ T28] audit: type=1400 audit(267.470:825): avc: denied { create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.585153][ T28] audit: type=1400 audit(267.510:826): avc: denied { map_create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.622557][ T28] audit: type=1400 audit(267.540:827): avc: denied { create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.645142][ T28] audit: type=1400 audit(267.570:828): avc: denied { create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.667961][ T28] audit: type=1400 audit(267.590:829): avc: denied { create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.682277][ T28] audit: type=1400 audit(267.610:830): avc: denied { create } for pid=5136 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.744849][ T28] audit: type=1400 audit(267.670:831): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 268.043363][ T28] audit: type=1400 audit(267.960:832): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 272.449782][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 272.450134][ T28] audit: type=1400 audit(272.370:867): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 272.627136][ T28] audit: type=1400 audit(272.550:868): avc: denied { create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.756185][ T28] audit: type=1400 audit(272.680:869): avc: denied { create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.792743][ T28] audit: type=1400 audit(272.720:870): avc: denied { map_create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.832778][ T28] audit: type=1400 audit(272.760:871): avc: denied { create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.842472][ T28] audit: type=1400 audit(272.770:872): avc: denied { create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.875343][ T28] audit: type=1400 audit(272.800:873): avc: denied { create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.893257][ T28] audit: type=1400 audit(272.820:874): avc: denied { create } for pid=5162 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.964110][ T28] audit: type=1400 audit(272.890:875): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.142463][ T28] audit: type=1400 audit(273.070:876): avc: denied { read write } for pid=5164 comm="syz.1.522" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 277.869948][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 277.872848][ T28] audit: type=1400 audit(277.790:884): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 278.238581][ T28] audit: type=1400 audit(278.160:885): avc: denied { read write } for pid=5175 comm="syz.1.527" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 278.351672][ T28] audit: type=1400 audit(278.270:886): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 278.749625][ T28] audit: type=1400 audit(278.670:887): avc: denied { read } for pid=5177 comm="syz.1.528" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 278.981351][ T28] audit: type=1400 audit(278.900:888): avc: denied { create } for pid=5177 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 279.021290][ T28] audit: type=1400 audit(278.940:889): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 279.091139][ T28] audit: type=1400 audit(279.010:890): avc: denied { create } for pid=5133 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 279.092878][ T28] audit: type=1400 audit(279.020:891): avc: denied { create } for pid=5133 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 279.099754][ T28] audit: type=1400 audit(279.020:892): avc: denied { create } for pid=5133 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 279.108666][ T28] audit: type=1400 audit(279.030:893): avc: denied { create } for pid=5133 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 282.975501][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 282.976563][ T28] audit: type=1400 audit(282.900:938): avc: denied { create } for pid=5205 comm="syz.1.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 283.205383][ T28] audit: type=1400 audit(283.130:939): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 283.365920][ T28] audit: type=1400 audit(283.290:940): avc: denied { read } for pid=5207 comm="syz.1.542" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.406223][ T28] audit: type=1400 audit(283.330:941): avc: denied { read } for pid=5207 comm="syz.1.542" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:random_device_t:s0" [ 283.522409][ T28] audit: type=1400 audit(283.450:942): avc: denied { create } for pid=5207 comm="syz.1.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 283.614820][ T28] audit: type=1400 audit(283.540:943): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 283.761753][ T28] audit: type=1400 audit(283.680:944): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 283.823119][ T28] audit: type=1400 audit(283.750:945): avc: denied { create } for pid=5209 comm="syz.1.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 283.948358][ T28] audit: type=1400 audit(283.870:946): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 284.097174][ T28] audit: type=1400 audit(284.020:947): avc: denied { create } for pid=5209 comm="syz.1.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 284.922167][ T5220] netlink: 100 bytes leftover after parsing attributes in process `syz.0.548'. [ 285.681792][ T5228] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=5228 comm=syz.0.552 [ 288.049476][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 288.049957][ T28] audit: type=1400 audit(287.970:995): avc: denied { create } for pid=5245 comm="syz.1.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 288.095926][ T28] audit: type=1400 audit(288.020:996): avc: denied { create } for pid=5245 comm="syz.1.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 288.207421][ T28] audit: type=1400 audit(288.130:997): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 288.401441][ T28] audit: type=1400 audit(288.320:998): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 288.749425][ T28] audit: type=1400 audit(288.670:999): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 288.856075][ T28] audit: type=1400 audit(288.780:1000): avc: denied { read } for pid=5252 comm="syz.0.563" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 288.877146][ T28] audit: type=1400 audit(288.800:1001): avc: denied { create } for pid=5252 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 288.906895][ T28] audit: type=1400 audit(288.830:1002): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.337392][ T28] audit: type=1400 audit(289.260:1003): avc: denied { read write } for pid=5254 comm="syz.0.564" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 289.546143][ T28] audit: type=1400 audit(289.470:1004): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.768123][ T5256] mmap: syz.1.562 (5256) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 293.051522][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 293.052672][ T28] audit: type=1400 audit(292.970:1045): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.064254][ T28] audit: type=1400 audit(292.990:1046): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.205046][ T28] audit: type=1400 audit(293.130:1047): avc: denied { read write } for pid=5286 comm="syz.0.578" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 293.210116][ T28] audit: type=1400 audit(293.130:1048): avc: denied { read write } for pid=5286 comm="syz.0.578" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 293.214188][ T28] audit: type=1400 audit(293.140:1049): avc: denied { execmem } for pid=5286 comm="syz.0.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 293.217194][ T28] audit: type=1400 audit(293.140:1050): avc: denied { read } for pid=5286 comm="syz.0.578" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 293.353510][ T28] audit: type=1400 audit(293.280:1051): avc: denied { read write } for pid=5287 comm="syz.1.579" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 293.366995][ T28] audit: type=1400 audit(293.290:1052): avc: denied { mounton } for pid=5287 comm="syz.1.579" path="/332/file0" dev="tmpfs" ino=1757 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 293.613045][ T28] audit: type=1400 audit(293.540:1053): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.838885][ T28] audit: type=1400 audit(293.760:1054): avc: denied { read write } for pid=5291 comm="syz.1.580" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 298.154045][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 298.155066][ T28] audit: type=1400 audit(298.080:1088): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 298.350662][ T28] audit: type=1400 audit(298.270:1089): avc: denied { create } for pid=5302 comm="syz.0.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=0 [ 298.463632][ T28] audit: type=1400 audit(298.390:1090): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 298.924954][ T28] audit: type=1400 audit(298.850:1091): avc: denied { read write } for pid=5313 comm="syz.1.590" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 299.055835][ T28] audit: type=1400 audit(298.980:1092): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 299.115424][ T28] audit: type=1400 audit(299.040:1093): avc: denied { create } for pid=5315 comm="syz.1.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 299.121490][ T28] audit: type=1400 audit(299.040:1094): avc: denied { create } for pid=5315 comm="syz.1.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 299.131877][ T28] audit: type=1400 audit(299.060:1095): avc: denied { read } for pid=5315 comm="syz.1.591" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 299.525267][ T28] audit: type=1400 audit(299.450:1096): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 299.742988][ T28] audit: type=1400 audit(299.670:1097): avc: denied { create } for pid=5317 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 300.932064][ T5304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5304 comm=syz.0.585 [ 303.322997][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 303.323328][ T28] audit: type=1400 audit(303.250:1136): avc: denied { create } for pid=5345 comm="syz.1.606" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 303.339434][ T28] audit: type=1400 audit(303.260:1137): avc: denied { read write } for pid=5345 comm="syz.1.606" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 303.346494][ T28] audit: type=1400 audit(303.270:1138): avc: denied { create } for pid=5343 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 303.361684][ T28] audit: type=1400 audit(303.290:1139): avc: denied { create } for pid=5343 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 303.393454][ T28] audit: type=1400 audit(303.320:1140): avc: denied { write } for pid=5343 comm="syz.0.605" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 303.484683][ T28] audit: type=1400 audit(303.410:1141): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 303.535179][ T28] audit: type=1400 audit(303.460:1142): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 303.642593][ T28] audit: type=1400 audit(303.570:1143): avc: denied { read } for pid=5347 comm="syz.0.607" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 303.732677][ T28] audit: type=1400 audit(303.660:1144): avc: denied { create } for pid=5347 comm="syz.0.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 303.772658][ T28] audit: type=1400 audit(303.700:1145): avc: denied { map_create } for pid=5348 comm="syz.1.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.337941][ T5373] capability: warning: `syz.0.619' uses 32-bit capabilities (legacy support in use) [ 306.449592][ T5373] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1793 sclass=netlink_audit_socket pid=5373 comm=syz.0.619 [ 308.376687][ T28] kauditd_printk_skb: 106 callbacks suppressed [ 308.377133][ T28] audit: type=1400 audit(308.300:1252): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 308.641515][ T28] audit: type=1400 audit(308.560:1253): avc: denied { create } for pid=5400 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 308.644169][ T28] audit: type=1400 audit(308.570:1254): avc: denied { read write } for pid=5400 comm="syz.0.632" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 308.735742][ T28] audit: type=1400 audit(308.660:1255): avc: denied { read write } for pid=5400 comm="syz.0.632" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 308.739041][ T28] audit: type=1400 audit(308.660:1256): avc: denied { create } for pid=5400 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 308.995044][ T28] audit: type=1400 audit(308.920:1257): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 309.184569][ T28] audit: type=1400 audit(309.110:1258): avc: denied { create } for pid=5403 comm="syz.0.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 309.483480][ T28] audit: type=1400 audit(309.410:1259): avc: denied { create } for pid=5403 comm="syz.0.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 309.662141][ T28] audit: type=1400 audit(309.570:1260): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 309.839429][ T28] audit: type=1400 audit(309.760:1261): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 313.579202][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 313.579589][ T28] audit: type=1400 audit(313.500:1304): avc: denied { create } for pid=5426 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 313.603259][ T28] audit: type=1400 audit(313.530:1305): avc: denied { create } for pid=5426 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 313.735301][ T28] audit: type=1400 audit(313.660:1306): avc: denied { create } for pid=5426 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 313.762545][ T28] audit: type=1400 audit(313.690:1307): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 313.833386][ T28] audit: type=1400 audit(313.760:1308): avc: denied { prog_load } for pid=5426 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.835400][ T28] audit: type=1400 audit(313.760:1309): avc: denied { prog_load } for pid=5426 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.894409][ T28] audit: type=1400 audit(313.820:1310): avc: denied { read } for pid=5426 comm="syz.0.644" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 313.977708][ T28] audit: type=1400 audit(313.900:1311): avc: denied { create } for pid=5426 comm="syz.0.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 314.028278][ T28] audit: type=1400 audit(313.950:1312): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 314.126865][ T28] audit: type=1400 audit(314.050:1313): avc: denied { create } for pid=5431 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.073482][ T5438] FAULT_INJECTION: forcing a failure. [ 315.073482][ T5438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.075130][ T5438] CPU: 0 UID: 0 PID: 5438 Comm: syz.0.649 Tainted: G L syzkaller #0 PREEMPT [ 315.075244][ T5438] Tainted: [L]=SOFTLOCKUP [ 315.075263][ T5438] Hardware name: ARM-Versatile Express [ 315.075286][ T5438] Call trace: [ 315.075335][ T5438] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 315.075439][ T5438] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 315.075458][ T5438] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 315.075510][ T5438] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 315.075574][ T5438] r7:00000000 r6:00000000 r5:840f0c80 r4:82b4f188 [ 315.075591][ T5438] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 315.075643][ T5438] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 315.075698][ T5438] r8:76f11f08 r7:00000000 r6:00000000 r5:ed19df68 r4:00000002 [ 315.075816][ T5438] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 315.075867][ T5438] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 315.075918][ T5438] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 315.075987][ T5438] r10:8064c488 r9:00000001 r8:00000002 r7:ed19df68 r6:0000000f r5:76f11f08 [ 315.076013][ T5438] r4:840f0c80 r3:ed19de9f [ 315.076032][ T5438] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 315.076110][ T5438] r8:840f0c80 r7:ed19df68 r6:76f11f08 r5:86103a00 r4:0000000f [ 315.076133][ T5438] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 315.076208][ T5438] r10:00000003 r9:840f0c80 r8:8020029c r7:00000000 r6:00000000 r5:86103a00 [ 315.076231][ T5438] r4:86103a03 [ 315.076248][ T5438] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 315.076317][ T5438] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 315.076335][ T5438] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 315.076388][ T5438] Exception stack(0xed19dfa8 to 0xed19dff0) [ 315.076434][ T5438] dfa0: 00000000 00000000 00000004 76f11f08 0000000f 00000000 [ 315.076474][ T5438] dfc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f120dc [ 315.076505][ T5438] dfe0: 76f11e58 76f11e44 0010ba34 00112618 [ 318.945360][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 318.945702][ T28] audit: type=1400 audit(318.870:1356): avc: denied { create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 318.971529][ T28] audit: type=1400 audit(318.890:1357): avc: denied { create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 318.972186][ T28] audit: type=1400 audit(318.900:1358): avc: denied { map_create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 319.055274][ T28] audit: type=1400 audit(318.980:1359): avc: denied { create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 319.070122][ T28] audit: type=1400 audit(318.990:1360): avc: denied { create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 319.183483][ T28] audit: type=1400 audit(319.110:1361): avc: denied { create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 319.206407][ T28] audit: type=1400 audit(319.130:1362): avc: denied { create } for pid=5455 comm="syz.0.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 319.262804][ T28] audit: type=1400 audit(319.170:1363): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 319.715032][ T28] audit: type=1400 audit(319.640:1364): avc: denied { read write } for pid=5457 comm="syz.0.659" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 319.734856][ T28] audit: type=1400 audit(319.660:1365): avc: denied { mounton } for pid=5457 comm="syz.0.659" path="/282/file0" dev="tmpfs" ino=1506 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 324.032154][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 324.032579][ T28] audit: type=1400 audit(323.960:1376): avc: denied { create } for pid=5464 comm="syz.0.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 324.057636][ T28] audit: type=1400 audit(323.980:1377): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 324.467502][ T28] audit: type=1400 audit(324.390:1378): avc: denied { create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.523117][ T28] audit: type=1400 audit(324.450:1379): avc: denied { create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.552905][ T28] audit: type=1400 audit(324.470:1380): avc: denied { map_create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 324.553190][ T28] audit: type=1400 audit(324.480:1381): avc: denied { create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.561377][ T28] audit: type=1400 audit(324.480:1382): avc: denied { create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.566167][ T28] audit: type=1400 audit(324.490:1383): avc: denied { create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.573618][ T28] audit: type=1400 audit(324.500:1384): avc: denied { create } for pid=5467 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.600169][ T28] audit: type=1400 audit(324.520:1385): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 329.414579][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 329.415122][ T28] audit: type=1400 audit(329.340:1418): avc: denied { create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 329.447141][ T28] audit: type=1400 audit(329.370:1419): avc: denied { create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 329.463446][ T28] audit: type=1400 audit(329.390:1420): avc: denied { map_create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 329.529941][ T28] audit: type=1400 audit(329.450:1421): avc: denied { create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 329.536792][ T28] audit: type=1400 audit(329.460:1422): avc: denied { create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 329.644693][ T28] audit: type=1400 audit(329.570:1423): avc: denied { create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 329.655077][ T28] audit: type=1400 audit(329.580:1424): avc: denied { create } for pid=5489 comm="syz.0.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 329.719987][ T28] audit: type=1400 audit(329.640:1425): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 330.228665][ T28] audit: type=1400 audit(330.150:1426): avc: denied { create } for pid=5491 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 330.392444][ T5492] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5492 comm=syz.0.674 [ 330.642027][ T28] audit: type=1400 audit(330.570:1427): avc: denied { create } for pid=5491 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 334.451738][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 334.452149][ T28] audit: type=1400 audit(334.370:1467): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 334.557675][ T28] audit: type=1400 audit(334.480:1468): avc: denied { create } for pid=5510 comm="syz.1.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 334.615686][ T28] audit: type=1400 audit(334.540:1469): avc: denied { read write } for pid=5510 comm="syz.1.683" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 334.683133][ T28] audit: type=1400 audit(334.610:1470): avc: denied { read write } for pid=5512 comm="syz.0.684" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 334.853517][ T28] audit: type=1400 audit(334.780:1471): avc: denied { read write } for pid=5510 comm="syz.1.683" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 334.871796][ T28] audit: type=1400 audit(334.790:1472): avc: denied { module_request } for pid=5512 comm="syz.0.684" kmod="crypto-ccm(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 334.874055][ T28] audit: type=1400 audit(334.790:1473): avc: denied { module_request } for pid=5512 comm="syz.0.684" kmod="crypto-ccm(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 334.938795][ T28] audit: type=1400 audit(334.860:1474): avc: denied { create } for pid=5510 comm="syz.1.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 335.194193][ T28] audit: type=1400 audit(335.120:1475): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 335.223785][ T28] audit: type=1400 audit(335.150:1476): avc: denied { mounton } for pid=5512 comm="syz.0.684" path="/301/file0" dev="tmpfs" ino=1607 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 337.436219][ T5526] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5526 comm=syz.1.690 [ 339.479770][ T28] kauditd_printk_skb: 55 callbacks suppressed [ 339.480109][ T28] audit: type=1400 audit(339.400:1532): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 339.553343][ T28] audit: type=1400 audit(339.480:1533): avc: denied { create } for pid=5541 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 339.702983][ T28] audit: type=1400 audit(339.630:1534): avc: denied { create } for pid=5543 comm="syz.1.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 339.760467][ T28] audit: type=1400 audit(339.680:1535): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 339.984683][ T28] audit: type=1400 audit(339.910:1536): avc: denied { create } for pid=5543 comm="syz.1.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 340.045887][ T28] audit: type=1400 audit(339.970:1537): avc: denied { read write } for pid=5545 comm="syz.0.700" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 340.136195][ T28] audit: type=1400 audit(340.060:1538): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 340.219845][ T28] audit: type=1400 audit(340.140:1539): avc: denied { read write } for pid=5545 comm="syz.0.700" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 340.225869][ T28] audit: type=1400 audit(340.150:1540): avc: denied { create } for pid=5545 comm="syz.0.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 340.513897][ T28] audit: type=1400 audit(340.300:1541): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 344.273482][ T5591] SELinux: syz.0.719 (5591) wrote to checkreqprot. This is no longer supported. [ 344.553625][ T28] kauditd_printk_skb: 80 callbacks suppressed [ 344.554188][ T28] audit: type=1400 audit(344.480:1622): avc: denied { read } for pid=5592 comm="syz.1.720" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 344.563623][ T28] audit: type=1400 audit(344.480:1623): avc: denied { read } for pid=5592 comm="syz.1.720" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:random_device_t:s0" [ 344.568144][ T28] audit: type=1400 audit(344.490:1624): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 344.655196][ T28] audit: type=1400 audit(344.580:1625): avc: denied { create } for pid=5592 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 344.751844][ T28] audit: type=1400 audit(344.670:1626): avc: denied { create } for pid=5594 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 344.752311][ T28] audit: type=1400 audit(344.670:1627): avc: denied { create } for pid=5594 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 344.766239][ T28] audit: type=1400 audit(344.690:1628): avc: denied { map_create } for pid=5594 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 344.774119][ T28] audit: type=1400 audit(344.700:1629): avc: denied { create } for pid=5594 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 344.791352][ T28] audit: type=1400 audit(344.700:1630): avc: denied { create } for pid=5594 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 344.814309][ T28] audit: type=1400 audit(344.740:1631): avc: denied { create } for pid=5594 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 349.663450][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 349.666740][ T28] audit: type=1400 audit(349.590:1669): avc: denied { read } for pid=5617 comm="syz.0.732" dev="nsfs" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 349.814315][ T28] audit: type=1400 audit(349.740:1670): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 349.851757][ T28] audit: type=1400 audit(349.780:1671): avc: denied { execmem } for pid=5617 comm="syz.0.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 349.900545][ T28] audit: type=1400 audit(349.820:1672): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 350.083133][ T28] audit: type=1400 audit(350.010:1673): avc: denied { create } for pid=5619 comm="syz.1.733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 350.248154][ T28] audit: type=1400 audit(350.170:1674): avc: denied { read write } for pid=5619 comm="syz.1.733" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 350.339160][ T28] audit: type=1400 audit(350.260:1675): avc: denied { read } for pid=5619 comm="syz.1.733" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 350.382765][ T28] audit: type=1400 audit(350.310:1676): avc: denied { create } for pid=5619 comm="syz.1.733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 350.461453][ T28] audit: type=1400 audit(350.380:1677): avc: denied { read } for pid=5619 comm="syz.1.733" name="event1" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 350.640086][ T28] audit: type=1400 audit(350.560:1678): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 354.748075][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 354.748511][ T28] audit: type=1400 audit(354.670:1711): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 355.003009][ T28] audit: type=1400 audit(354.930:1712): avc: denied { create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.055048][ T28] audit: type=1400 audit(354.980:1713): avc: denied { create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.142312][ T28] audit: type=1400 audit(355.070:1714): avc: denied { map_create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.226844][ T28] audit: type=1400 audit(355.150:1715): avc: denied { create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.237884][ T28] audit: type=1400 audit(355.160:1716): avc: denied { create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.333230][ T28] audit: type=1400 audit(355.260:1717): avc: denied { create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.354030][ T28] audit: type=1400 audit(355.280:1718): avc: denied { create } for pid=5645 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.389798][ T28] audit: type=1400 audit(355.310:1719): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 355.678817][ T28] audit: type=1400 audit(355.600:1720): avc: denied { create } for pid=5647 comm="syz.1.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 358.931672][ T5659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5659 comm=syz.1.750 [ 359.795428][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 359.795817][ T28] audit: type=1400 audit(359.720:1756): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 359.986957][ T28] audit: type=1400 audit(359.910:1757): avc: denied { create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 360.010403][ T28] audit: type=1400 audit(359.930:1758): avc: denied { create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 360.013726][ T28] audit: type=1400 audit(359.940:1759): avc: denied { map_create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.025540][ T28] audit: type=1400 audit(359.950:1760): avc: denied { create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 360.043099][ T28] audit: type=1400 audit(359.970:1761): avc: denied { create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 360.064029][ T28] audit: type=1400 audit(359.990:1762): avc: denied { create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 360.089941][ T28] audit: type=1400 audit(360.010:1763): avc: denied { create } for pid=5667 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 360.142661][ T28] audit: type=1400 audit(360.050:1764): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 360.641174][ T28] audit: type=1400 audit(360.560:1765): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 360.873212][ T5672] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5672 comm=syz.0.753 [ 364.858054][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 364.858286][ T28] audit: type=1400 audit(364.780:1798): avc: denied { create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 364.897646][ T28] audit: type=1400 audit(364.820:1799): avc: denied { create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 364.904845][ T28] audit: type=1400 audit(364.830:1800): avc: denied { map_create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 364.924007][ T28] audit: type=1400 audit(364.850:1801): avc: denied { create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 364.942210][ T28] audit: type=1400 audit(364.870:1802): avc: denied { create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 364.965714][ T28] audit: type=1400 audit(364.890:1803): avc: denied { create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 364.967391][ T28] audit: type=1400 audit(364.890:1804): avc: denied { create } for pid=5689 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 365.033224][ T28] audit: type=1400 audit(364.960:1805): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 365.611922][ T28] audit: type=1400 audit(365.540:1806): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 365.743795][ T28] audit: type=1400 audit(365.670:1807): avc: denied { create } for pid=5693 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 369.923293][ T28] kauditd_printk_skb: 56 callbacks suppressed [ 369.923846][ T28] audit: type=1400 audit(369.850:1862): avc: denied { read write } for pid=5719 comm="syz.1.780" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 369.963888][ T28] audit: type=1400 audit(369.890:1863): avc: denied { create } for pid=5719 comm="syz.1.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 369.964363][ T28] audit: type=1400 audit(369.890:1864): avc: denied { read } for pid=5720 comm="syz.0.779" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 369.966967][ T28] audit: type=1400 audit(369.890:1865): avc: denied { read } for pid=5719 comm="syz.1.780" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 370.041672][ T28] audit: type=1400 audit(369.960:1866): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 370.355931][ T28] audit: type=1400 audit(370.280:1867): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 370.395016][ T28] audit: type=1400 audit(370.310:1868): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 370.622183][ T28] audit: type=1400 audit(370.550:1869): avc: denied { create } for pid=5726 comm="syz.1.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 370.696023][ T28] audit: type=1400 audit(370.620:1870): avc: denied { create } for pid=5726 comm="syz.1.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 370.720248][ T28] audit: type=1400 audit(370.640:1871): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 375.126179][ T28] kauditd_printk_skb: 64 callbacks suppressed [ 375.126680][ T28] audit: type=1400 audit(375.050:1936): avc: denied { read write } for pid=5760 comm="syz.1.798" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 375.218852][ T28] audit: type=1400 audit(375.130:1937): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 375.423588][ T28] audit: type=1400 audit(375.350:1938): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 375.458079][ T28] audit: type=1400 audit(375.380:1939): avc: denied { create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 375.493360][ T28] audit: type=1400 audit(375.420:1940): avc: denied { create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 375.503078][ T28] audit: type=1400 audit(375.430:1941): avc: denied { map_create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.515467][ T28] audit: type=1400 audit(375.440:1942): avc: denied { create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 375.517688][ T28] audit: type=1400 audit(375.440:1943): avc: denied { create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 375.559518][ T28] audit: type=1400 audit(375.480:1944): avc: denied { create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 375.570121][ T28] audit: type=1400 audit(375.490:1945): avc: denied { create } for pid=5762 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 376.252536][ T5767] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5767 comm=syz.0.801 [ 376.305001][ T5769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12592 sclass=netlink_route_socket pid=5769 comm=syz.1.802 [ 378.092550][ T5781] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5781 comm=syz.1.808 [ 379.712772][ T5795] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5795 comm=syz.1.814 [ 380.263514][ T28] kauditd_printk_skb: 62 callbacks suppressed [ 380.266344][ T28] audit: type=1400 audit(380.190:2008): avc: denied { create } for pid=5800 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 380.293161][ T28] audit: type=1400 audit(380.220:2009): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 380.299352][ T28] audit: type=1400 audit(380.220:2010): avc: denied { create } for pid=5800 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 380.314173][ T28] audit: type=1400 audit(380.240:2011): avc: denied { map_create } for pid=5800 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.333930][ T28] audit: type=1400 audit(380.260:2012): avc: denied { create } for pid=5800 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 380.374512][ T28] audit: type=1400 audit(380.300:2013): avc: denied { create } for pid=5800 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 380.415890][ T28] audit: type=1400 audit(380.340:2014): avc: denied { read write } for pid=5802 comm="syz.0.818" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 380.418986][ T28] audit: type=1400 audit(380.340:2015): avc: denied { mounton } for pid=5802 comm="syz.0.818" path="/349/file0" dev="tmpfs" ino=1858 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 380.501709][ T28] audit: type=1400 audit(380.410:2016): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 380.513081][ T28] audit: type=1400 audit(380.430:2017): avc: denied { create } for pid=5800 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 380.944800][ T5806] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5806 comm=syz.1.820 [ 382.013335][ T5817] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5817 comm=syz.0.825 [ 383.165291][ T5828] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5828 comm=syz.0.830 [ 385.354796][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 385.355129][ T28] audit: type=1400 audit(385.280:2071): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 385.420434][ T28] audit: type=1400 audit(385.340:2072): avc: denied { read } for pid=5839 comm="syz.0.835" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 385.452965][ T28] audit: type=1400 audit(385.380:2073): avc: denied { read } for pid=5839 comm="syz.0.835" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:random_device_t:s0" [ 385.484482][ T28] audit: type=1400 audit(385.410:2074): avc: denied { create } for pid=5839 comm="syz.0.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 385.642911][ T28] audit: type=1400 audit(385.560:2075): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 385.643391][ T28] audit: type=1400 audit(385.570:2076): avc: denied { create } for pid=5841 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 385.825830][ T28] audit: type=1400 audit(385.750:2077): avc: denied { read write } for pid=5841 comm="syz.1.836" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 385.828887][ T28] audit: type=1400 audit(385.750:2078): avc: denied { create } for pid=5843 comm="syz.0.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 385.835892][ T28] audit: type=1400 audit(385.760:2079): avc: denied { create } for pid=5841 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 385.908266][ T28] audit: type=1400 audit(385.830:2080): avc: denied { create } for pid=5843 comm="syz.0.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 386.391549][ T5846] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5846 comm=syz.1.838 [ 390.523237][ T5874] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5874 comm=syz.1.852 [ 390.813998][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 390.816963][ T28] audit: type=1400 audit(390.740:2131): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 390.994588][ T28] audit: type=1400 audit(390.910:2132): avc: denied { read } for pid=5875 comm="syz.1.853" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 391.021246][ T28] audit: type=1400 audit(390.940:2133): avc: denied { read } for pid=5875 comm="syz.1.853" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:random_device_t:s0" [ 391.127117][ T28] audit: type=1400 audit(391.050:2134): avc: denied { create } for pid=5875 comm="syz.1.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 391.194962][ T28] audit: type=1400 audit(391.120:2135): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 391.282227][ T28] audit: type=1400 audit(391.210:2136): avc: denied { create } for pid=5877 comm="syz.1.854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 391.448538][ T28] audit: type=1400 audit(391.370:2137): avc: denied { create } for pid=5877 comm="syz.1.854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 391.661271][ T28] audit: type=1400 audit(391.570:2138): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 392.002174][ T28] audit: type=1400 audit(391.930:2139): avc: denied { read write } for pid=5879 comm="syz.1.855" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 392.005651][ T28] audit: type=1400 audit(391.930:2140): avc: denied { read } for pid=5879 comm="syz.1.855" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 396.046494][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 396.046698][ T28] audit: type=1400 audit(395.970:2170): avc: denied { create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 396.065101][ T28] audit: type=1400 audit(395.990:2171): avc: denied { create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 396.086839][ T28] audit: type=1400 audit(396.010:2172): avc: denied { map_create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.141622][ T28] audit: type=1400 audit(396.070:2173): avc: denied { create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 396.164703][ T28] audit: type=1400 audit(396.090:2174): avc: denied { create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 396.278900][ T28] audit: type=1400 audit(396.200:2175): avc: denied { create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 396.312839][ T28] audit: type=1400 audit(396.240:2176): avc: denied { create } for pid=5898 comm="syz.1.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 396.436799][ T28] audit: type=1400 audit(396.360:2177): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 396.552324][ T28] audit: type=1400 audit(396.480:2178): avc: denied { read } for pid=5900 comm="syz.1.865" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 396.732678][ T28] audit: type=1400 audit(396.660:2179): avc: denied { create } for pid=5900 comm="syz.1.865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 397.714435][ T5864] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=8 sclass=netlink_tcpdiag_socket pid=5864 comm=syz.0.847 [ 401.062316][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 401.063460][ T28] audit: type=1400 audit(400.960:2210): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 401.137799][ T28] audit: type=1400 audit(401.060:2211): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 401.370280][ T28] audit: type=1400 audit(401.290:2212): avc: denied { read } for pid=5924 comm="syz.1.876" name="adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.396844][ T28] audit: type=1400 audit(401.320:2213): avc: denied { read } for pid=5924 comm="syz.1.876" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.432335][ T28] audit: type=1400 audit(401.360:2214): avc: denied { read } for pid=5924 comm="syz.1.876" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.468113][ T28] audit: type=1400 audit(401.390:2215): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 401.718439][ T28] audit: type=1400 audit(401.640:2216): avc: denied { create } for pid=5928 comm="syz.0.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 401.801288][ T28] audit: type=1400 audit(401.720:2217): avc: denied { create } for pid=5928 comm="syz.0.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 401.803454][ T28] audit: type=1400 audit(401.720:2218): avc: denied { create } for pid=5928 comm="syz.0.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 401.817013][ T28] audit: type=1400 audit(401.740:2219): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 406.458997][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 406.459954][ T28] audit: type=1400 audit(406.380:2248): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 406.703423][ T28] audit: type=1400 audit(406.630:2249): avc: denied { read } for pid=5964 comm="syz.1.892" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 406.732157][ T28] audit: type=1400 audit(406.660:2250): avc: denied { read } for pid=5964 comm="syz.1.892" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:random_device_t:s0" [ 406.822942][ T28] audit: type=1400 audit(406.750:2251): avc: denied { create } for pid=5964 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 407.025225][ T28] audit: type=1400 audit(406.950:2252): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 407.347941][ T28] audit: type=1400 audit(407.270:2253): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 407.583369][ T28] audit: type=1400 audit(407.510:2254): avc: denied { create } for pid=5968 comm="syz.1.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 407.778553][ T28] audit: type=1400 audit(407.700:2255): avc: denied { create } for pid=5968 comm="syz.1.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 407.835818][ T28] audit: type=1400 audit(407.760:2256): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 408.095972][ T28] audit: type=1400 audit(408.020:2257): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 411.466881][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 411.468772][ T28] audit: type=1400 audit(411.390:2305): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 411.572740][ T28] audit: type=1400 audit(411.500:2306): avc: denied { create } for pid=6001 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 411.639739][ T28] audit: type=1400 audit(411.560:2307): avc: denied { read write } for pid=6001 comm="syz.1.910" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 411.699188][ T28] audit: type=1400 audit(411.620:2308): avc: denied { create } for pid=6001 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 411.752932][ T28] audit: type=1400 audit(411.680:2309): avc: denied { create } for pid=6001 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 411.858314][ T28] audit: type=1400 audit(411.780:2310): avc: denied { create } for pid=6002 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 411.863560][ T28] audit: type=1400 audit(411.790:2311): avc: denied { create } for pid=6001 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 411.867400][ T28] audit: type=1400 audit(411.790:2312): avc: denied { read write } for pid=6001 comm="syz.1.910" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 411.932544][ T28] audit: type=1400 audit(411.860:2313): avc: denied { create } for pid=6001 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 412.059039][ T28] audit: type=1400 audit(411.980:2314): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 416.684816][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 416.685109][ T28] audit: type=1400 audit(416.610:2349): avc: denied { create } for pid=6034 comm="syz.0.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 416.827044][ T28] audit: type=1400 audit(416.750:2350): avc: denied { create } for pid=6034 comm="syz.0.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 416.868337][ T28] audit: type=1400 audit(416.790:2351): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.265547][ T28] audit: type=1400 audit(417.190:2352): avc: denied { module_request } for pid=6030 comm="syz.1.923" kmod="fs-iso9660" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 417.339140][ T28] audit: type=1400 audit(417.260:2353): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.546015][ T28] audit: type=1400 audit(417.470:2354): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.593793][ T28] audit: type=1400 audit(417.520:2355): avc: denied { create } for pid=6038 comm="syz.0.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 417.760138][ T28] audit: type=1400 audit(417.680:2356): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.792403][ T6041] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6041 comm=syz.1.929 [ 417.813433][ T28] audit: type=1400 audit(417.740:2357): avc: denied { create } for pid=6040 comm="syz.1.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 417.817494][ T28] audit: type=1400 audit(417.740:2358): avc: denied { create } for pid=6040 comm="syz.1.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 420.478433][ T6051] cgroup: fork rejected by pids controller in /syz0 [ 421.803776][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 421.805701][ T28] audit: type=1400 audit(421.730:2392): avc: denied { allowed } for pid=6096 comm="syz.1.939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 421.985056][ T28] audit: type=1400 audit(421.910:2393): avc: denied { create } for pid=6096 comm="syz.1.939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 422.091525][ T28] audit: type=1400 audit(422.010:2394): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 422.354934][ T28] audit: type=1400 audit(422.280:2395): avc: denied { create } for pid=6101 comm="syz.1.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 422.546484][ T28] audit: type=1400 audit(422.470:2396): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 423.051782][ T28] audit: type=1400 audit(422.970:2397): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 423.403542][ T28] audit: type=1400 audit(423.330:2398): avc: denied { create } for pid=6106 comm="syz.1.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 423.535532][ T28] audit: type=1400 audit(423.460:2399): avc: denied { create } for pid=6106 comm="syz.1.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 423.630654][ T28] audit: type=1400 audit(423.550:2400): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 423.899864][ T28] audit: type=1400 audit(423.820:2401): avc: denied { read } for pid=6108 comm="syz.1.944" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 426.133345][ T6115] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6115 comm=syz.1.947 [ 426.964229][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 426.966556][ T28] audit: type=1400 audit(426.890:2415): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 427.143061][ T28] audit: type=1400 audit(427.070:2416): avc: denied { read } for pid=6116 comm="syz.0.946" dev="nsfs" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 427.363245][ T28] audit: type=1400 audit(427.290:2417): avc: denied { create } for pid=6120 comm="syz.1.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 427.500030][ T28] audit: type=1400 audit(427.410:2418): avc: denied { create } for pid=6116 comm="syz.0.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 427.613424][ T28] audit: type=1400 audit(427.540:2419): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 428.316568][ T28] audit: type=1400 audit(428.240:2420): avc: denied { read } for pid=6122 comm="syz.1.950" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 428.403107][ T28] audit: type=1400 audit(428.320:2421): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 428.643465][ T28] audit: type=1400 audit(428.570:2422): avc: denied { read } for pid=6124 comm="syz.1.951" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 428.665957][ T28] audit: type=1400 audit(428.590:2423): avc: denied { create } for pid=6124 comm="syz.1.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 428.691997][ T28] audit: type=1400 audit(428.610:2424): avc: denied { create } for pid=6124 comm="syz.1.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.112023][ T6131] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6131 comm=syz.1.953 [ 430.538459][ T6133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6133 comm=syz.1.954 [ 431.994679][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 431.996857][ T28] audit: type=1400 audit(431.920:2451): avc: denied { read write } for pid=6138 comm="syz.1.958" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 432.041545][ T28] audit: type=1400 audit(431.960:2452): avc: denied { mounton } for pid=6138 comm="syz.1.958" path="/556/file0" dev="tmpfs" ino=2932 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 432.266583][ T28] audit: type=1400 audit(432.190:2453): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 432.601825][ T28] audit: type=1400 audit(432.520:2454): avc: denied { read write } for pid=6141 comm="syz.1.959" name="mouse0" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 432.883103][ T28] audit: type=1400 audit(432.620:2455): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 433.052608][ T28] audit: type=1400 audit(432.980:2456): avc: denied { create } for pid=6140 comm="syz.0.956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 433.088220][ T28] audit: type=1400 audit(433.010:2457): avc: denied { read } for pid=6144 comm="syz.1.960" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 433.124728][ T28] audit: type=1400 audit(433.050:2458): avc: denied { create } for pid=6144 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 433.134948][ T28] audit: type=1400 audit(433.060:2459): avc: denied { read } for pid=6144 comm="syz.1.960" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 433.160334][ T28] audit: type=1400 audit(433.080:2460): avc: denied { create } for pid=6144 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 437.169413][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 437.174485][ T28] audit: type=1400 audit(437.090:2491): avc: denied { create } for pid=6158 comm="syz.1.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 437.222957][ T28] audit: type=1400 audit(437.150:2492): avc: denied { read } for pid=6158 comm="syz.1.967" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 437.284024][ T28] audit: type=1400 audit(437.210:2493): avc: denied { create } for pid=6158 comm="syz.1.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 437.581242][ T28] audit: type=1400 audit(437.500:2494): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 437.860990][ T28] audit: type=1400 audit(437.780:2495): avc: denied { create } for pid=6160 comm="syz.1.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 437.902508][ T28] audit: type=1400 audit(437.830:2496): avc: denied { create } for pid=6153 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 437.941972][ T28] audit: type=1400 audit(437.870:2497): avc: denied { create } for pid=6153 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 438.326224][ T28] audit: type=1400 audit(438.250:2498): avc: denied { create } for pid=6153 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 438.431965][ T28] audit: type=1400 audit(438.360:2499): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 438.969464][ T28] audit: type=1400 audit(438.890:2500): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 442.204856][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 442.205270][ T28] audit: type=1400 audit(442.130:2512): avc: denied { mounton } for pid=6168 comm="syz.1.972" path="/569/file0" dev="tmpfs" ino=3002 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 442.493539][ T28] audit: type=1400 audit(442.420:2513): avc: denied { create } for pid=6168 comm="syz.1.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 442.545693][ T28] audit: type=1400 audit(442.470:2514): avc: denied { create } for pid=6153 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 442.756573][ T28] audit: type=1400 audit(442.680:2515): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 442.835017][ T28] audit: type=1400 audit(442.760:2516): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 443.244959][ T28] audit: type=1400 audit(443.170:2517): avc: denied { read write } for pid=6172 comm="syz.1.974" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 443.411886][ T28] audit: type=1400 audit(443.330:2518): avc: denied { read } for pid=6172 comm="syz.1.974" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 443.711657][ T28] audit: type=1400 audit(443.630:2519): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 444.284064][ T28] audit: type=1400 audit(444.210:2520): avc: denied { create } for pid=6175 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 444.332907][ T28] audit: type=1400 audit(444.260:2521): avc: denied { create } for pid=6175 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 445.066848][ T6179] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6179 comm=syz.1.976 [ 447.353646][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 447.353878][ T28] audit: type=1400 audit(447.280:2543): avc: denied { create } for pid=6190 comm="syz.1.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 447.359293][ T28] audit: type=1400 audit(447.280:2544): avc: denied { create } for pid=6174 comm="syz.0.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 447.531585][ T28] audit: type=1400 audit(447.450:2545): avc: denied { create } for pid=6190 comm="syz.1.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 447.651765][ T28] audit: type=1400 audit(447.570:2546): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 447.894411][ T28] audit: type=1400 audit(447.820:2547): avc: denied { create } for pid=6192 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 447.905208][ T28] audit: type=1400 audit(447.830:2548): avc: denied { read } for pid=6192 comm="syz.1.983" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 447.909362][ T28] audit: type=1400 audit(447.830:2549): avc: denied { create } for pid=6192 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 447.915260][ T28] audit: type=1400 audit(447.830:2550): avc: denied { create } for pid=6192 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 447.919404][ T28] audit: type=1400 audit(447.840:2551): avc: denied { create } for pid=6192 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 448.081573][ T28] audit: type=1400 audit(448.000:2552): avc: denied { create } for pid=6192 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 451.222134][ T6199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1548 sclass=netlink_route_socket pid=6199 comm=syz.0.984 [ 452.374708][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 452.374978][ T28] audit: type=1400 audit(452.300:2580): avc: denied { map_create } for pid=6209 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 452.383030][ T28] audit: type=1400 audit(452.310:2581): avc: denied { create } for pid=6209 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 452.387229][ T28] audit: type=1400 audit(452.310:2582): avc: denied { create } for pid=6209 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 452.407243][ T28] audit: type=1400 audit(452.330:2583): avc: denied { create } for pid=6209 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 452.417519][ T28] audit: type=1400 audit(452.340:2584): avc: denied { create } for pid=6209 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 452.552490][ T28] audit: type=1400 audit(452.460:2585): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 453.043586][ T28] audit: type=1400 audit(452.970:2586): avc: denied { read write } for pid=6211 comm="syz.1.991" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 453.172737][ T28] audit: type=1400 audit(453.090:2587): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 453.296477][ T28] audit: type=1400 audit(453.220:2588): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 454.115103][ T28] audit: type=1400 audit(454.040:2589): avc: denied { create } for pid=6214 comm="syz.1.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 456.882071][ T6228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6228 comm=syz.1.998 [ 457.604223][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 457.604674][ T28] audit: type=1400 audit(457.530:2608): avc: denied { create } for pid=6229 comm="syz.1.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 457.713108][ T28] audit: type=1400 audit(457.640:2609): avc: denied { create } for pid=6229 comm="syz.1.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 457.924558][ T28] audit: type=1400 audit(457.850:2610): avc: denied { read write } for pid=6229 comm="syz.1.999" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 458.112949][ T28] audit: type=1400 audit(458.040:2611): avc: denied { create } for pid=6229 comm="syz.1.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 458.223910][ T28] audit: type=1400 audit(458.150:2612): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 458.295503][ T28] audit: type=1400 audit(458.220:2613): avc: denied { create } for pid=6235 comm="syz.1.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 458.597959][ T28] audit: type=1400 audit(458.520:2614): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 458.837394][ T28] audit: type=1400 audit(458.760:2615): avc: denied { read } for pid=6233 comm="syz.0.1000" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 459.061310][ T28] audit: type=1400 audit(458.980:2616): avc: denied { create } for pid=6238 comm="syz.1.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 459.163106][ T28] audit: type=1400 audit(459.090:2617): avc: denied { read } for pid=6233 comm="syz.0.1000" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:random_device_t:s0" [ 460.691927][ T6245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6245 comm=syz.1.1005 [ 461.675828][ T38] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 461.731383][ T38] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 461.801887][ T38] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 461.904988][ T38] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 462.216586][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 462.228486][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 462.235334][ T38] bond0 (unregistering): Released all slaves [ 462.295337][ T38] hsr_slave_0: left promiscuous mode [ 462.298439][ T38] hsr_slave_1: left promiscuous mode [ 462.308239][ T38] veth1_macvtap: left promiscuous mode [ 462.309643][ T38] veth0_macvtap: left promiscuous mode [ 462.310667][ T38] veth1_vlan: left promiscuous mode [ 462.312256][ T38] veth0_vlan: left promiscuous mode [ 462.857591][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 462.860038][ T28] audit: type=1400 audit(462.780:2636): avc: denied { write } for pid=6267 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 462.982014][ T28] audit: type=1400 audit(462.900:2637): avc: denied { write } for pid=6268 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 462.992407][ T28] audit: type=1400 audit(462.910:2638): avc: denied { search } for pid=6268 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.015315][ T38] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.023356][ T28] audit: type=1400 audit(462.950:2639): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.026497][ T28] audit: type=1400 audit(462.950:2640): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.027149][ T28] audit: type=1400 audit(462.950:2641): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.029361][ T28] audit: type=1400 audit(462.950:2642): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.031295][ T28] audit: type=1400 audit(462.950:2643): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.034200][ T28] audit: type=1400 audit(462.960:2644): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.036038][ T28] audit: type=1400 audit(462.960:2645): avc: denied { search } for pid=6269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.072843][ T38] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.125600][ T38] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.197784][ T38] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.492203][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 463.501730][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 463.512543][ T38] bond0 (unregistering): Released all slaves [ 463.520598][ T2952] 8021q: adding VLAN 0 to HW filter on device eth1 [ 463.555460][ T38] hsr_slave_0: left promiscuous mode [ 463.557564][ T38] hsr_slave_1: left promiscuous mode [ 463.569280][ T38] veth1_macvtap: left promiscuous mode [ 463.569672][ T38] veth0_macvtap: left promiscuous mode [ 463.572369][ T38] veth1_vlan: left promiscuous mode [ 463.573308][ T38] veth0_vlan: left promiscuous mode [ 464.706922][ T2952] 8021q: adding VLAN 0 to HW filter on device eth2 [ 465.648712][ T2952] 8021q: adding VLAN 0 to HW filter on device eth3 [ 466.520151][ T2952] 8021q: adding VLAN 0 to HW filter on device eth4 [ 467.365729][ T2952] 8021q: adding VLAN 0 to HW filter on device eth5 [ 467.872693][ T28] kauditd_printk_skb: 225 callbacks suppressed [ 467.873175][ T28] audit: type=1400 audit(467.800:2871): avc: denied { getattr } for pid=6323 comm="mkdir" path="/run" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.884543][ T28] audit: type=1400 audit(467.810:2872): avc: denied { search } for pid=6321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.886817][ T28] audit: type=1400 audit(467.810:2873): avc: denied { search } for pid=6321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.889963][ T28] audit: type=1400 audit(467.810:2874): avc: denied { search } for pid=6321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.894205][ T28] audit: type=1400 audit(467.820:2875): avc: denied { search } for pid=6321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.897576][ T28] audit: type=1400 audit(467.820:2876): avc: denied { search } for pid=6321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.899605][ T28] audit: type=1400 audit(467.820:2877): avc: denied { search } for pid=6321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 467.999058][ T28] audit: type=1400 audit(467.920:2878): avc: denied { search } for pid=6324 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 468.109306][ T28] audit: type=1400 audit(468.030:2879): avc: denied { search } for pid=6325 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 468.206532][ T28] audit: type=1400 audit(468.130:2880): avc: denied { search } for pid=6326 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 468.252810][ T2952] 8021q: adding VLAN 0 to HW filter on device eth6 [ 469.207599][ T2952] 8021q: adding VLAN 0 to HW filter on device eth7 [ 470.108518][ T2952] 8021q: adding VLAN 0 to HW filter on device eth8 [ 481.414015][ T28] kauditd_printk_skb: 107 callbacks suppressed [ 481.414474][ T28] audit: type=1400 audit(481.340:2988): avc: denied { write } for pid=6367 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 481.428729][ T28] audit: type=1400 audit(481.350:2989): avc: denied { search } for pid=6367 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.448502][ T28] audit: type=1400 audit(481.370:2990): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.453756][ T28] audit: type=1400 audit(481.380:2991): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.454150][ T28] audit: type=1400 audit(481.380:2992): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.454236][ T28] audit: type=1400 audit(481.380:2993): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.454301][ T28] audit: type=1400 audit(481.380:2994): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.457692][ T28] audit: type=1400 audit(481.380:2995): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.457898][ T28] audit: type=1400 audit(481.380:2996): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 481.458072][ T28] audit: type=1400 audit(481.380:2997): avc: denied { search } for pid=6368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 486.449315][ T28] kauditd_printk_skb: 379 callbacks suppressed [ 486.452452][ T28] audit: type=1400 audit(486.370:3377): avc: denied { search } for pid=6420 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 486.557757][ T28] audit: type=1400 audit(486.480:3378): avc: denied { search } for pid=6421 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 486.629437][ T28] audit: type=1400 audit(486.550:3379): avc: denied { search } for pid=6416 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0