last executing test programs: 1h36m2.058977346s ago: executing program 1 (id=1281): r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r2, 0x5450, 0x0) 1h36m1.97921678s ago: executing program 1 (id=1283): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) close(r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000140)={0x0, 0x3564, 0x4000002, 0x5}) 1h36m1.887981655s ago: executing program 1 (id=1284): r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000280)=0x80) dup3(r1, r2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) 1h36m1.802614659s ago: executing program 1 (id=1285): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, 0x0, 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x205) 1h36m1.726316173s ago: executing program 1 (id=1286): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) write$fb(r1, 0x0, 0x0) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x8001) 1h36m1.378312861s ago: executing program 1 (id=1287): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000000000), 0x2aa000, 0x0) close(r0) socket$nl_audit(0x10, 0x3, 0x9) read$alg(r0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(r0, 0x0, 0xc084) 1h36m1.378094131s ago: executing program 32 (id=1287): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000000000), 0x2aa000, 0x0) close(r0) socket$nl_audit(0x10, 0x3, 0x9) read$alg(r0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(r0, 0x0, 0xc084) 1h27m23.136718977s ago: executing program 2 (id=3379): socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0xc) r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000200), 0x2, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x81) 1h27m23.056544241s ago: executing program 2 (id=3380): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) recvmsg$can_raw(r3, &(0x7f00000001c0)={&(0x7f00000012c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) dup3(r0, r4, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r4, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}, 0x1, 0x0, 0x0, 0x880}, 0x4000004) 1h27m22.939148068s ago: executing program 2 (id=3381): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) dup3(r2, r3, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 1h27m22.849174172s ago: executing program 2 (id=3382): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x81) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x226) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1) 1h27m22.708096399s ago: executing program 2 (id=3383): mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0xfffffffd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002480), 0x0, &(0x7f00000024c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) read$FUSE(r0, &(0x7f0000004280)={0x2020, 0x0, 0x0}, 0x2020) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0xfffffffffffffffe, r1, {0x7, 0x29, 0xe, 0x40, 0x0, 0x8, 0x5, 0x8, 0x0, 0x0, 0xc0}}, 0x50) 1h27m22.515168609s ago: executing program 2 (id=3384): r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xc6}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x4000804) 1h27m22.515038709s ago: executing program 33 (id=3384): r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xc6}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x4000804) 1h8m51.61774736s ago: executing program 3 (id=6564): r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0x5452, &(0x7f00000020c0)={0x0, 0xaa, 0x0, 0x0, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}, 0x1, 0x0, 0x0, 0x44000}, 0x20000090) 1h8m51.517935655s ago: executing program 3 (id=6565): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc85eb51b0ace6a", "4617a9f6040839230fb7fead776dd8dc", "3f4051c4", "a44a889722b66244"}, 0x28) recvfrom$inet6(r0, 0x0, 0x2, 0x2, 0x0, 0x0) shutdown(r0, 0x0) 1h8m50.907779506s ago: executing program 3 (id=6568): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0x5450, 0x0) pipe2(0x0, 0x84180) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x0, 0x800) r1 = mq_open(&(0x7f00000001c0)='^%*$\x00', 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0x5450, 0x0) 1h8m50.781268023s ago: executing program 3 (id=6570): mkdirat(0xffffffffffffff9c, &(0x7f0000000d40)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x1) 1h8m49.639255922s ago: executing program 3 (id=6574): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$selinux_attr(0xffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r1, r1) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={&(0x7f00000019c0)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc}, 0x14}}, 0x20000050) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000a40)) 1h8m49.438747752s ago: executing program 3 (id=6575): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x14) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20008011}, 0x40000) close_range(r0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 1h8m49.438549742s ago: executing program 34 (id=6575): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x14) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20008011}, 0x40000) close_range(r0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 34m30.500051947s ago: executing program 0 (id=11666): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x145040, 0x0) r0 = creat(&(0x7f0000000140)='./file1\x00', 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.log\x00', 0x80041, 0x100) sendmsg$nl_route_sched_retired(r0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2041, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCGDEV(r1, 0x5450, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights, @rights, @rights], 0x18}}], 0x1, 0x2040, 0x0) setsockopt(0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0x5450, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) mq_open(&(0x7f0000000800)='.\\$\xf0\x00', 0x40, 0x0, 0x0) 34m30.06962501s ago: executing program 0 (id=11667): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) pipe2$watch_queue(0x0, 0x80) r3 = memfd_create(&(0x7f0000000040)='%!@:$\x00', 0x0) ioctl$VT_GETMODE(r3, 0x5450, 0x0) r4 = accept$inet(r2, 0x0, 0x0) r5 = mq_open(&(0x7f0000000000)='\x04\x00\xff\xffoQ\x00', 0x40, 0x0, &(0x7f00000000c0)={0x1f, 0xffff, 0x7}) dup2(r5, r4) preadv2(r4, &(0x7f0000002d00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0, 0x0) 34m29.319659979s ago: executing program 0 (id=11668): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) pipe2(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f00000002c0)=ANY=[], 0x10) ioctl$TIOCSWINSZ(r3, 0x5452, &(0x7f0000000040)={0xf0, 0x3ff}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f00000000c0)) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) getsockopt$inet_opts(r4, 0x0, 0xd, &(0x7f0000000240)=""/9, &(0x7f0000000280)=0x9) 34m26.648157677s ago: executing program 0 (id=11672): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000ec0)) pwrite64(r1, 0x0, 0x0, 0x2) r3 = mq_open(&(0x7f00000003c0)='pids.events\x00', 0x40, 0x0, &(0x7f0000000400)={0xfffffffffffff511, 0x4230, 0x2c1f}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5450, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r4, 0x5450, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="6b3affda5c879d6a58e769e7c471d4151956fb9a2a22195478ed91bc50b4289bb7eac1ec9b9e81913be4cba6f6c6a76f49bd280d39f5635ffcb0223074bc96f8377099d2d1708aad6cc3172c6fccdca2d11cc74471853aa9e77d5cd445e156c12183f7611c92b7d510231e56edbd51b92b6ac606242b62b2a189b0c7c2ea8a68eeb5892f7c8c196c384a35e251cbfcbb7c5d5d87fee660cf27f105871ca83239f538529fce8cf61dcdce8822872d0daae3fedc68cbb165b75c03864c50ee3544450e55e6d4fc7d19fa7c67c98baac2c4041091", 0xd3}], 0x1, 0x0, 0x4) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000280)={0x10000, 0x8, 0x0, 0x0, 0x0, "2d8d1cc27ec616b56811afc090803c73ea182e"}) 34m26.079063047s ago: executing program 0 (id=11674): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0x5450, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r3 = accept(r1, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000003d40)={0xa, 0x0, 0x0, @loopback}, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0), 0x0, 0x0, 0x2) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, 0x0, 0x0) 34m23.209255756s ago: executing program 0 (id=11675): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') r0 = fsopen(&(0x7f0000000180)='configfs\x00', 0x1) fsmount(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000004c0)={@random="d93f47151094", @remote, @val={@void, {0x8100, 0x0, 0x0, 0x3}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "1200b0", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @dest_unreach={0x4, 0x2, 0x0, 0x0, '\x00', {0x0, 0x6, "277382", 0x0, 0x32, 0x0, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}}}}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f00000001c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee3, 0x8031, 0xffffffffffffffff, 0xffffd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) sendmsg$nl_route(r6, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newrule={0x24, 0x18, 0x409, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@FIB_RULE_POLICY=@FRA_GOTO={0x8, 0x1e, 0x1}]}, 0x24}}, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f0000000140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0022}) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x17) 33m38.212979012s ago: executing program 35 (id=11675): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') r0 = fsopen(&(0x7f0000000180)='configfs\x00', 0x1) fsmount(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000004c0)={@random="d93f47151094", @remote, @val={@void, {0x8100, 0x0, 0x0, 0x3}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "1200b0", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @dest_unreach={0x4, 0x2, 0x0, 0x0, '\x00', {0x0, 0x6, "277382", 0x0, 0x32, 0x0, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}}}}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f00000001c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee3, 0x8031, 0xffffffffffffffff, 0xffffd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) r6 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) sendmsg$nl_route(r6, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newrule={0x24, 0x18, 0x409, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@FIB_RULE_POLICY=@FRA_GOTO={0x8, 0x1e, 0x1}]}, 0x24}}, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f0000000140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0022}) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x17) 2.779064387s ago: executing program 4 (id=15570): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x4e, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0xa30e, 0x1, 0xfffffffa}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=@newtfilter={0x3c, 0x2c, 0xd3f, 0x70b524, 0x25dfdbf9, {0x0, 0x0, 0x0, r3, {0xfff3, 0xffe0}, {0x0, 0xfff1}, {0xfff3, 0x1}}, [@filter_kind_options=@f_flow={{0x9}, {0xc, 0x2, [@TCA_FLOW_KEYS={0x8, 0x1, 0x1}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008849}, 0xc884) 2.641055764s ago: executing program 4 (id=15571): r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f0000000000)="17460081ba60ccbb9d000000000000", 0xf}], 0x2}}], 0x1, 0x4004040) 2.571377377s ago: executing program 4 (id=15572): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8) 1.779487898s ago: executing program 5 (id=15574): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r4) r5 = socket$unix(0x1, 0x5, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x84, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x8000000, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x54, 0x2, {{0x100, 0x6, 0x6361, 0x5, 0xfffffffd, 0x6}, [@TCA_NETEM_LATENCY64={0xc, 0xa, 0x7}, @TCA_NETEM_SLOT={0x2c, 0xc, {0x1, 0x0, 0xb2, 0x9, 0x8, 0x7c}}]}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x80000, {0x0, 0x0, 0x0, r7, {0x0, 0x10}, {0x1, 0xb}, {0x8, 0xc}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x6b97, 0x8}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 1.719168901s ago: executing program 4 (id=15575): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@gettaction={0x50, 0x32, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x4048801) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0x4, 0x80000000, 0x0, {0x0, 0x0, 0x0, 0x0, {0x3, 0x3}, {0xa, 0xffe0}, {0x0, 0x9}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_ECN_PROB={0x8, 0x9, 0x2c}]}}]}, 0x3c}}, 0x20004055) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='nv\x00', 0x3) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1.637675005s ago: executing program 4 (id=15576): r0 = syz_usb_connect(0x0, 0x2d, &(0x7f00000012c0)=ANY=[@ANYBLOB="120100001ddf8208c007121522300000000109021b0001000000010904000001faf40d0009058203"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000180)=""/74, 0x4a) 1.559030769s ago: executing program 4 (id=15577): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) symlinkat(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setxattr$trusted_overlay_upper(0x0, &(0x7f0000000040), 0x0, 0x0, 0x3) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) gettid() r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, 0x0) 1.106680173s ago: executing program 5 (id=15578): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000440)=0x5) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 839.816566ms ago: executing program 5 (id=15579): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x0, 0x0) preadv2(r1, &(0x7f0000000280)=[{&(0x7f00000008c0)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x0) 839.431326ms ago: executing program 5 (id=15580): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x27, 0x9, 0x5}, 0x3f, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x6, 0xd3, 0xfbfffffb, 0x39, 0x747d5e13, 0x8, 0x99, 0xfffffffc, 0x4, 0xfffffffb, 0x4, 0x3, 0x4, 0xf252, 0x80, 0x800, 0x300000, 0x7, 0xe, 0x4623f, 0x0, 0x0, 0x1ff, 0x8000, 0xc8, 0x40003, 0xd, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x7, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x40, 0xf, 0xa, 0x5], [0x6, 0x1e, 0x3, 0x8000, 0x80, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x5, 0x7fff, 0x72c, 0x1c33, 0x3, 0x5, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x981, 0x4, 0x8, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0xfffffffd, 0x9, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x3ff, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0x3], [0x401, 0xc584, 0xffff, 0xcd3, 0x3ff, 0x20, 0x404, 0x4, 0x8, 0x6, 0x7, 0x9, 0xe8b, 0x9, 0x80000001, 0x8, 0x3f92, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x1000, 0x80000001, 0x4, 0x4, 0x5, 0x200003, 0x2, 0x5, 0x80, 0x218c, 0x8001, 0x47, 0x0, 0x3, 0x4, 0x3, 0x6d7e, 0x3, 0x8, 0x3, 0xbf23, 0x6, 0x8, 0x95e, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x6, 0xd9, 0xdffb, 0x7d, 0x401, 0x5], [0x108e, 0xffff, 0x2, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x5, 0x1000, 0x7f, 0x5, 0x7, 0x7, 0x0, 0x5, 0x1e2, 0x4, 0x9, 0x3, 0x3, 0x5, 0x200, 0x1000, 0x3b, 0x20000002, 0x5, 0x7fc, 0xa80a, 0x65f413f9, 0xfffffff8, 0x20008, 0x8a8, 0x2, 0x40, 0x40000409, 0x7, 0x4, 0x804, 0x10, 0x4, 0x0, 0x7fff, 0x0, 0xfffffff8, 0x401, 0x4, 0x202, 0x7, 0x4edf, 0xfffffffd, 0xa, 0xe, 0x2, 0xf, 0xf, 0x136, 0x5]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) readv(r0, &(0x7f0000001240)=[{&(0x7f00000012c0)=""/41, 0x29}], 0x1) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 64.083397ms ago: executing program 5 (id=15581): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x2}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x10, 0x0, &(0x7f0000000340)=[@request_death], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x50, 0x0, &(0x7f0000000600)="6c646bff8a4d96d8dc20d6e01c15e62e5e3a912b2979cd2aecd2b92ed736b5b71ba35520a30e8915f9c736b79b86adadcc3750c5df948e530256cc822f282863fc898fd39da9498597dc4912db4c984b"}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000003480)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000480)={0x2020}, 0x2020) 0s ago: executing program 5 (id=15582): r0 = userfaultfd(0x80001) socketpair(0x22, 0x80803, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0xbfa75000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x84042, 0x0) syz_open_dev$loop(&(0x7f0000000080), 0x47ffffa, 0x1a6c42) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, 0x4000}) kernel console output (not intermixed with test programs): b9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5559.460766][T11637] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5559.460838][T11637] r8:85700000 r7:00000c40 r6:866a17a8 r5:00001000 r4:830016c0 [ 5559.460858][T11637] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5559.460910][T11637] [<80503b7c>] (__kmalloc_noprof) from [<807c34ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5559.460993][T11637] r10:85700000 r9:8309e400 r8:00000000 r7:83434330 r6:866a17a8 r5:00001000 [ 5559.461015][T11637] r4:00000000 [ 5559.461031][T11637] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5559.461090][T11637] r10:85700000 r9:00000000 r8:866a1780 r7:00005450 r6:00000004 r5:81cd6504 [ 5559.461116][T11637] r4:866a17a8 r3:826c0200 [ 5559.461133][T11637] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5559.461196][T11637] r9:00000003 r8:866a1780 r7:00000000 r6:00000000 r5:00005450 r4:866a1780 [ 5559.461219][T11637] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5559.461269][T11637] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5559.461330][T11637] r7:00000000 r6:866a1781 r5:00000000 r4:00005450 [ 5559.461348][T11637] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5559.461395][T11637] Exception stack(0xdfc85fa8 to 0xdfc85ff0) [ 5559.461435][T11637] 5fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 5559.461465][T11637] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5559.461489][T11637] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5559.461518][T11637] r10:00000036 r9:85700000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5559.461537][T11637] r4:00000000 [ 5559.483615][T11637] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5560.173306][T11644] fuse: Unknown parameter '' [ 5560.390352][T11648] FAULT_INJECTION: forcing a failure. [ 5560.390352][T11648] name failslab, interval 1, probability 0, space 0, times 0 [ 5560.392884][T11648] CPU: 0 UID: 0 PID: 11648 Comm: syz.5.14717 Not tainted syzkaller #0 PREEMPT [ 5560.393009][T11648] Hardware name: ARM-Versatile Express [ 5560.393050][T11648] Call trace: [ 5560.393092][T11648] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5560.393196][T11648] r7:8321a400 r6:00000000 r5:60000013 r4:82260234 [ 5560.393216][T11648] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5560.393267][T11648] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5560.393322][T11648] r5:8321a400 r4:82917bc0 [ 5560.393339][T11648] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5560.393397][T11648] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5560.393465][T11648] r8:00000000 r7:8321a400 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 5560.393484][T11648] [<8051f21c>] (should_failslab) from [<80503228>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 5560.393532][T11648] [<805031d8>] (kmem_cache_alloc_node_noprof) from [<81550f2c>] (__alloc_skb+0x138/0x160) [ 5560.393600][T11648] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 5560.393621][T11648] r4:828060c0 [ 5560.393637][T11648] [<81550df4>] (__alloc_skb) from [<81670564>] (netlink_alloc_large_skb+0x88/0xa0) [ 5560.393702][T11648] r8:00000000 r7:867da400 r6:00000014 r5:8373ec80 r4:00000140 [ 5560.393719][T11648] [<816704dc>] (netlink_alloc_large_skb) from [<81670cac>] (netlink_sendmsg+0x134/0x444) [ 5560.393771][T11648] r5:8373ec80 r4:dfcb5f20 [ 5560.393789][T11648] [<81670b78>] (netlink_sendmsg) from [<81542ca0>] (__sock_sendmsg+0x44/0x78) [ 5560.393854][T11648] r10:00000000 r9:dfcb5dc4 r8:dfcb5dc4 r7:00000000 r6:8373ec80 r5:dfcb5f20 [ 5560.393874][T11648] r4:00000000 [ 5560.393890][T11648] [<81542c5c>] (__sock_sendmsg) from [<81543ff4>] (____sys_sendmsg+0x298/0x2cc) [ 5560.393949][T11648] r7:00000000 r6:8373ec80 r5:00000080 r4:dfcb5f20 [ 5560.393967][T11648] [<81543d5c>] (____sys_sendmsg) from [<81545fbc>] (___sys_sendmsg+0x9c/0xd0) [ 5560.394042][T11648] r10:dfcb5e24 r9:20002500 r8:00000080 r7:00000000 r6:8373ec80 r5:dfcb5f20 [ 5560.394063][T11648] r4:00000000 [ 5560.394080][T11648] [<81545f20>] (___sys_sendmsg) from [<81546454>] (__sys_sendmsg+0x8c/0xe0) [ 5560.394147][T11648] r10:00000128 r9:8321a400 r8:866a1f00 r7:00000080 r6:20002500 r5:866a1f01 [ 5560.394167][T11648] r4:00000003 [ 5560.394183][T11648] [<815463c8>] (__sys_sendmsg) from [<815464bc>] (sys_sendmsg+0x14/0x18) [ 5560.394247][T11648] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5560.394265][T11648] [<815464a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5560.394316][T11648] Exception stack(0xdfcb5fa8 to 0xdfcb5ff0) [ 5560.394354][T11648] 5fa0: 00000000 00000000 00000003 20002500 00000080 00000000 [ 5560.394390][T11648] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fb10bc [ 5560.394417][T11648] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5560.708964][T11650] fuse: blksize only supported for fuseblk [ 5566.717762][T11674] can: request_module (can-proto-4) failed. [ 5573.743780][T11707] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=6 sclass=netlink_audit_socket pid=11707 comm=syz.5.14739 [ 5575.444621][T11720] fuse: Bad value for 'rootmode' [ 5576.399760][ T31] audit: type=1400 audit(134223560.304:531): avc: denied { execute } for pid=11727 comm="syz.4.14748" path="/proc/8350/task/8351" dev="proc" ino=140236 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 5580.483013][T11774] FAULT_INJECTION: forcing a failure. [ 5580.483013][T11774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5580.507501][T11774] CPU: 1 UID: 0 PID: 11774 Comm: syz.4.14766 Not tainted syzkaller #0 PREEMPT [ 5580.507633][T11774] Hardware name: ARM-Versatile Express [ 5580.507654][T11774] Call trace: [ 5580.507690][T11774] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5580.507785][T11774] r7:00000000 r6:00000000 r5:60000013 r4:82260234 [ 5580.507800][T11774] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5580.507841][T11774] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5580.507884][T11774] r5:84adbc00 r4:8294f150 [ 5580.507896][T11774] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5580.507941][T11774] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5580.507991][T11774] r8:76f17f30 r7:00000000 r6:00000000 r5:dfd11f68 r4:00000002 [ 5580.508005][T11774] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5580.508045][T11774] [<80972540>] (should_fail_usercopy) from [<8058e5d8>] (simple_read_from_buffer+0x80/0x13c) [ 5580.508092][T11774] [<8058e558>] (simple_read_from_buffer) from [<806084e4>] (proc_fail_nth_read+0xb8/0x108) [ 5580.508145][T11774] r10:00000001 r9:8060842c r8:00000002 r7:dfd11f68 r6:0000000f r5:76f17f30 [ 5580.508162][T11774] r4:84adbc00 r3:dfd11e9f [ 5580.508174][T11774] [<8060842c>] (proc_fail_nth_read) from [<805533f4>] (vfs_read+0x98/0x324) [ 5580.508223][T11774] r8:76f17f30 r7:dfd11f68 r6:84adbc00 r5:0000000f r4:866a10c0 [ 5580.508236][T11774] [<8055335c>] (vfs_read) from [<80554104>] (ksys_read+0x74/0xe8) [ 5580.508287][T11774] r10:00000003 r9:84adbc00 r8:8020029c r7:00000000 r6:00000000 r5:866a10c0 [ 5580.508302][T11774] r4:866a10c3 [ 5580.508314][T11774] [<80554090>] (ksys_read) from [<80554188>] (sys_read+0x10/0x14) [ 5580.508366][T11774] r7:00000003 r6:00000004 r5:76f17f30 r4:0000000f [ 5580.508379][T11774] [<80554178>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5580.508416][T11774] Exception stack(0xdfd11fa8 to 0xdfd11ff0) [ 5580.508448][T11774] 1fa0: 0000000f 76f17f30 00000004 76f17f30 0000000f 00000000 [ 5580.508476][T11774] 1fc0: 0000000f 76f17f30 00000004 00000003 002e0000 00000000 00006364 76f180bc [ 5580.508496][T11774] 1fe0: 00000158 76f17ed0 000d80f4 00130194 [ 5580.523966][ T31] audit: type=1400 audit(134223564.424:532): avc: denied { shutdown } for pid=11770 comm="syz.5.14765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5581.857852][T11790] FAULT_INJECTION: forcing a failure. [ 5581.857852][T11790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5581.858244][T11790] CPU: 1 UID: 0 PID: 11790 Comm: syz.4.14771 Not tainted syzkaller #0 PREEMPT [ 5581.858338][T11790] Hardware name: ARM-Versatile Express [ 5581.858364][T11790] Call trace: [ 5581.858467][T11790] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5581.858649][T11790] r7:dfdc1e20 r6:00000000 r5:60000013 r4:82260234 [ 5581.858691][T11790] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5581.858771][T11790] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5581.859020][T11790] r5:85994800 r4:8294f150 [ 5581.859349][T11790] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5581.859424][T11790] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5581.859544][T11790] r8:00000040 r7:dfdc1e20 r6:20000e80 r5:00000000 r4:dfdc1f20 [ 5581.859566][T11790] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5581.859637][T11790] [<80972540>] (should_fail_usercopy) from [<81545e40>] (copy_msghdr_from_user+0x50/0x130) [ 5581.859715][T11790] [<81545df0>] (copy_msghdr_from_user) from [<81545f98>] (___sys_sendmsg+0x78/0xd0) [ 5581.859789][T11790] r8:00000040 r7:00000000 r6:83594c80 r5:dfdc1f20 r4:dfdc1e64 [ 5581.859812][T11790] [<81545f20>] (___sys_sendmsg) from [<81546454>] (__sys_sendmsg+0x8c/0xe0) [ 5581.859910][T11790] r10:00000128 r9:85994800 r8:861750c0 r7:00000040 r6:20000e80 r5:861750c1 [ 5581.859956][T11790] r4:00000003 [ 5581.859975][T11790] [<815463c8>] (__sys_sendmsg) from [<815464bc>] (sys_sendmsg+0x14/0x18) [ 5581.860075][T11790] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5581.860144][T11790] [<815464a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5581.860205][T11790] Exception stack(0xdfdc1fa8 to 0xdfdc1ff0) [ 5581.860249][T11790] 1fa0: 00000000 00000000 00000003 20000e80 00000040 00000000 [ 5581.860356][T11790] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f180bc [ 5581.860410][T11790] 1fe0: 76f17ec0 76f17eb0 0001948c 001322c0 [ 5584.219158][ T31] audit: type=1400 audit(134223568.124:533): avc: denied { listen } for pid=11828 comm="syz.5.14786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5586.626055][T11848] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11848 comm=syz.4.14793 [ 5591.048739][T11860] FAULT_INJECTION: forcing a failure. [ 5591.048739][T11860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5591.087402][T11860] CPU: 0 UID: 0 PID: 11860 Comm: syz.4.14796 Not tainted syzkaller #0 PREEMPT [ 5591.087495][T11860] Hardware name: ARM-Versatile Express [ 5591.087512][T11860] Call trace: [ 5591.087534][T11860] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5591.087599][T11860] r7:83594780 r6:00000000 r5:60000113 r4:82260234 [ 5591.087609][T11860] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5591.087635][T11860] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5591.087663][T11860] r5:857e0000 r4:8294f150 [ 5591.087671][T11860] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5591.087706][T11860] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5591.087775][T11860] r8:dfd69ecc r7:83594780 r6:20000080 r5:83594780 r4:000089e0 [ 5591.087796][T11860] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5591.087844][T11860] [<80972540>] (should_fail_usercopy) from [<8190343c>] (kcm_ioctl+0xb8/0x6b8) [ 5591.087899][T11860] [<81903384>] (kcm_ioctl) from [<81544828>] (sock_ioctl+0x4c4/0x600) [ 5591.087965][T11860] r10:857e0000 r9:81e8aa34 r8:dfd69ecc r7:83594780 r6:8565bb00 r5:20000080 [ 5591.087984][T11860] r4:000089e0 [ 5591.088000][T11860] [<81544364>] (sock_ioctl) from [<8056cd50>] (sys_ioctl+0x130/0xba0) [ 5591.088090][T11860] r9:00000004 r8:86175540 r7:20000080 r6:86175541 r5:00000000 r4:000089e0 [ 5591.088112][T11860] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5591.088159][T11860] Exception stack(0xdfd69fa8 to 0xdfd69ff0) [ 5591.088203][T11860] 9fa0: 00000000 00000000 00000004 000089e0 20000080 00000000 [ 5591.088240][T11860] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f180bc [ 5591.088265][T11860] 9fe0: 76f17ec0 76f17eb0 0001948c 001322c0 [ 5591.088299][T11860] r10:00000036 r9:857e0000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5591.088320][T11860] r4:00000000 [ 5596.106168][T11879] FAULT_INJECTION: forcing a failure. [ 5596.106168][T11879] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5596.106861][T11879] CPU: 0 UID: 0 PID: 11879 Comm: syz.5.14804 Not tainted syzkaller #0 PREEMPT [ 5596.106975][T11879] Hardware name: ARM-Versatile Express [ 5596.107008][T11879] Call trace: [ 5596.107046][T11879] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5596.107126][T11879] r7:00000000 r6:00000000 r5:60000013 r4:82260234 [ 5596.107155][T11879] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5596.107207][T11879] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5596.107243][T11879] r5:84adb000 r4:8294f150 [ 5596.107252][T11879] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5596.107283][T11879] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5596.107315][T11879] r8:76fb0f30 r7:00000000 r6:00000000 r5:dfe69f68 r4:00000002 [ 5596.107323][T11879] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5596.107372][T11879] [<80972540>] (should_fail_usercopy) from [<8058e5d8>] (simple_read_from_buffer+0x80/0x13c) [ 5596.107433][T11879] [<8058e558>] (simple_read_from_buffer) from [<806084e4>] (proc_fail_nth_read+0xb8/0x108) [ 5596.107485][T11879] r10:00000001 r9:8060842c r8:00000002 r7:dfe69f68 r6:0000000f r5:76fb0f30 [ 5596.107497][T11879] r4:84adb000 r3:dfe69e9f [ 5596.107505][T11879] [<8060842c>] (proc_fail_nth_read) from [<805533f4>] (vfs_read+0x98/0x324) [ 5596.107537][T11879] r8:76fb0f30 r7:dfe69f68 r6:84adb000 r5:0000000f r4:866a1240 [ 5596.107546][T11879] [<8055335c>] (vfs_read) from [<80554104>] (ksys_read+0x74/0xe8) [ 5596.107584][T11879] r10:00000003 r9:84adb000 r8:8020029c r7:00000000 r6:00000000 r5:866a1240 [ 5596.107608][T11879] r4:866a1243 [ 5596.107626][T11879] [<80554090>] (ksys_read) from [<80554188>] (sys_read+0x10/0x14) [ 5596.107680][T11879] r7:00000003 r6:00000005 r5:76fb0f30 r4:0000000f [ 5596.107690][T11879] [<80554178>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5596.107738][T11879] Exception stack(0xdfe69fa8 to 0xdfe69ff0) [ 5596.107774][T11879] 9fa0: 0000000f 76fb0f30 00000005 76fb0f30 0000000f 00000000 [ 5596.107809][T11879] 9fc0: 0000000f 76fb0f30 00000005 00000003 002e0000 00000000 00006364 76fb10bc [ 5596.107841][T11879] 9fe0: 00000158 76fb0ed0 000d80f4 00130194 [ 5604.132422][ T31] audit: type=1400 audit(134223588.034:534): avc: denied { write } for pid=11921 comm="syz.5.14819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 5611.572847][ T31] audit: type=1400 audit(134223595.474:535): avc: denied { execute } for pid=11964 comm="syz.4.14828" name="file0" dev="tmpfs" ino=19992 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 5612.341657][T11976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=11976 comm=syz.5.14833 [ 5617.292066][T12007] FAULT_INJECTION: forcing a failure. [ 5617.292066][T12007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5617.292457][T12007] CPU: 0 UID: 0 PID: 12007 Comm: syz.5.14842 Not tainted syzkaller #0 PREEMPT [ 5617.292557][T12007] Hardware name: ARM-Versatile Express [ 5617.292583][T12007] Call trace: [ 5617.292638][T12007] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5617.292740][T12007] r7:00000000 r6:00000000 r5:60000013 r4:82260234 [ 5617.292762][T12007] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5617.292819][T12007] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5617.292871][T12007] r5:85703000 r4:8294f150 [ 5617.292887][T12007] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5617.292941][T12007] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5617.293001][T12007] r8:76fb0f30 r7:00000000 r6:00000000 r5:dfaa5f68 r4:00000002 [ 5617.293018][T12007] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5617.293069][T12007] [<80972540>] (should_fail_usercopy) from [<8058e5d8>] (simple_read_from_buffer+0x80/0x13c) [ 5617.293128][T12007] [<8058e558>] (simple_read_from_buffer) from [<806084e4>] (proc_fail_nth_read+0xb8/0x108) [ 5617.293194][T12007] r10:00000001 r9:8060842c r8:00000002 r7:dfaa5f68 r6:0000000f r5:76fb0f30 [ 5617.293215][T12007] r4:85703000 r3:dfaa5e9f [ 5617.293231][T12007] [<8060842c>] (proc_fail_nth_read) from [<805533f4>] (vfs_read+0x98/0x324) [ 5617.293291][T12007] r8:76fb0f30 r7:dfaa5f68 r6:85703000 r5:0000000f r4:848779c0 [ 5617.293309][T12007] [<8055335c>] (vfs_read) from [<80554104>] (ksys_read+0x74/0xe8) [ 5617.293380][T12007] r10:00000003 r9:85703000 r8:8020029c r7:00000000 r6:00000000 r5:848779c0 [ 5617.293622][T12007] r4:848779c3 [ 5617.293881][T12007] [<80554090>] (ksys_read) from [<80554188>] (sys_read+0x10/0x14) [ 5617.294055][T12007] r7:00000003 r6:00000004 r5:76fb0f30 r4:0000000f [ 5617.294291][T12007] [<80554178>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5617.294365][T12007] Exception stack(0xdfaa5fa8 to 0xdfaa5ff0) [ 5617.294531][T12007] 5fa0: 0000000f 76fb0f30 00000004 76fb0f30 0000000f 00000000 [ 5617.294616][T12007] 5fc0: 0000000f 76fb0f30 00000004 00000003 002e0000 00000000 00006364 76fb10bc [ 5617.294721][T12007] 5fe0: 00000158 76fb0ed0 000d80f4 00130194 [ 5620.260143][T12026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12026 comm=syz.5.14847 [ 5653.058413][T12204] FAULT_INJECTION: forcing a failure. [ 5653.058413][T12204] name failslab, interval 1, probability 0, space 0, times 0 [ 5653.059625][T12204] CPU: 0 UID: 0 PID: 12204 Comm: syz.4.14896 Not tainted syzkaller #0 PREEMPT [ 5653.059694][T12204] Hardware name: ARM-Versatile Express [ 5653.059708][T12204] Call trace: [ 5653.059729][T12204] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5653.059796][T12204] r7:84170000 r6:00000000 r5:60000013 r4:82260234 [ 5653.059806][T12204] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5653.059871][T12204] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5653.059917][T12204] r5:84170000 r4:82917bc0 [ 5653.059925][T12204] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5653.059975][T12204] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5653.060011][T12204] r8:00000000 r7:84170000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 5653.060207][T12204] [<8051f21c>] (should_failslab) from [<80503228>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 5653.060294][T12204] [<805031d8>] (kmem_cache_alloc_node_noprof) from [<81550f2c>] (__alloc_skb+0x138/0x160) [ 5653.060331][T12204] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 5653.060341][T12204] r4:828060c0 [ 5653.060348][T12204] [<81550df4>] (__alloc_skb) from [<81670564>] (netlink_alloc_large_skb+0x88/0xa0) [ 5653.060382][T12204] r8:00000000 r7:867dac00 r6:00000014 r5:85141680 r4:00000140 [ 5653.060390][T12204] [<816704dc>] (netlink_alloc_large_skb) from [<81670cac>] (netlink_sendmsg+0x134/0x444) [ 5653.060415][T12204] r5:85141680 r4:dfc49f20 [ 5653.060422][T12204] [<81670b78>] (netlink_sendmsg) from [<81542ca0>] (__sock_sendmsg+0x44/0x78) [ 5653.060453][T12204] r10:00000000 r9:dfc49dc4 r8:dfc49dc4 r7:00000000 r6:85141680 r5:dfc49f20 [ 5653.060462][T12204] r4:00000000 [ 5653.060469][T12204] [<81542c5c>] (__sock_sendmsg) from [<81543ff4>] (____sys_sendmsg+0x298/0x2cc) [ 5653.060553][T12204] r7:00000000 r6:85141680 r5:00000000 r4:dfc49f20 [ 5653.060570][T12204] [<81543d5c>] (____sys_sendmsg) from [<81545fbc>] (___sys_sendmsg+0x9c/0xd0) [ 5653.060606][T12204] r10:dfc49e24 r9:20002880 r8:00000000 r7:00000000 r6:85141680 r5:dfc49f20 [ 5653.060615][T12204] r4:00000000 [ 5653.060675][T12204] [<81545f20>] (___sys_sendmsg) from [<81546454>] (__sys_sendmsg+0x8c/0xe0) [ 5653.060711][T12204] r10:00000128 r9:84170000 r8:84877000 r7:00000000 r6:20002880 r5:84877001 [ 5653.060720][T12204] r4:00000003 [ 5653.060727][T12204] [<815463c8>] (__sys_sendmsg) from [<815464bc>] (sys_sendmsg+0x14/0x18) [ 5653.060759][T12204] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5653.060767][T12204] [<815464a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5653.060789][T12204] Exception stack(0xdfc49fa8 to 0xdfc49ff0) [ 5653.060810][T12204] 9fa0: 00000000 00000000 00000003 20002880 00000000 00000000 [ 5653.060827][T12204] 9fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f180bc [ 5653.060839][T12204] 9fe0: 76f17ec0 76f17eb0 0001948c 001322c0 [ 5661.309500][T12237] FAULT_INJECTION: forcing a failure. [ 5661.309500][T12237] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5661.309755][T12237] CPU: 1 UID: 0 PID: 12237 Comm: syz.5.14909 Not tainted syzkaller #0 PREEMPT [ 5661.309815][T12237] Hardware name: ARM-Versatile Express [ 5661.309831][T12237] Call trace: [ 5661.309853][T12237] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5661.309915][T12237] r7:00006364 r6:00000000 r5:60000113 r4:82260234 [ 5661.309925][T12237] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5661.309950][T12237] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5661.309975][T12237] r5:84adb000 r4:8294f150 [ 5661.309982][T12237] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5661.310013][T12237] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5661.310087][T12237] r8:00000000 r7:00006364 r6:76f900bc r5:84adb830 r4:76f8fbb8 [ 5661.310108][T12237] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5661.310152][T12237] [<80972540>] (should_fail_usercopy) from [<8022b624>] (setup_sigframe+0xe4/0x1c4) [ 5661.310180][T12237] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 5661.310211][T12237] r10:00000128 r9:b5003500 r8:00000000 r7:84adb830 r6:76f8fbb8 r5:dfc8dfb0 [ 5661.310221][T12237] r4:84adb000 [ 5661.310228][T12237] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 5661.310250][T12237] Exception stack(0xdfc8dfb0 to 0xdfc8dff8) [ 5661.310270][T12237] dfa0: fffffffc 20000500 00000000 00000000 [ 5661.310287][T12237] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f900bc [ 5661.310305][T12237] dfe0: 76f8fec0 76f8feb0 0001948c 001322c0 60000010 00000004 [ 5661.310322][T12237] r10:00000128 r9:84adb000 r8:8020029c r7:00000128 r6:00130270 r5:00000000 [ 5661.310331][T12237] r4:00000000 [ 5662.059361][ T31] audit: type=1400 audit(134223645.954:536): avc: denied { module_request } for pid=12243 comm="syz.4.14912" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5662.165487][ T31] audit: type=1400 audit(134223646.064:537): avc: denied { read } for pid=12247 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 5662.281695][ T31] audit: type=1400 audit(134223646.184:538): avc: denied { sys_module } for pid=12243 comm="syz.4.14912" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5662.508675][ T31] audit: type=1400 audit(134223646.344:539): avc: denied { accept } for pid=12243 comm="syz.4.14912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 5662.509161][ T31] audit: type=1400 audit(134223646.344:540): avc: denied { read } for pid=12243 comm="syz.4.14912" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5662.509499][ T31] audit: type=1400 audit(134223646.344:541): avc: denied { open } for pid=12243 comm="syz.4.14912" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5662.509717][ T31] audit: type=1400 audit(134223646.354:542): avc: denied { ioctl } for pid=12243 comm="syz.4.14912" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5662.767368][ T31] audit: type=1400 audit(134223646.664:543): avc: denied { create } for pid=12250 comm="syz.4.14914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5662.828071][ T31] audit: type=1400 audit(134223646.724:544): avc: denied { write } for pid=12250 comm="syz.4.14914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5663.218683][ T31] audit: type=1400 audit(134223647.124:545): avc: denied { read } for pid=12250 comm="syz.4.14914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5665.009307][T12261] SELinux: failed to load policy [ 5667.669235][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 5667.669681][ T31] audit: type=1400 audit(134223651.574:560): avc: denied { open } for pid=12277 comm="syz.4.14922" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 5667.747646][ T31] audit: type=1400 audit(134223651.654:561): avc: denied { ioctl } for pid=12277 comm="syz.4.14922" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x4b72 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 5668.363549][ T31] audit: type=1400 audit(134223652.264:562): avc: denied { append } for pid=12279 comm="syz.4.14923" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5669.823081][ T31] audit: type=1400 audit(134223653.724:563): avc: denied { bind } for pid=12293 comm="syz.5.14926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5669.843662][ T31] audit: type=1400 audit(134223653.744:564): avc: denied { write } for pid=12293 comm="syz.5.14926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5672.339316][ T31] audit: type=1400 audit(134223656.244:565): avc: denied { create } for pid=12305 comm="syz.4.14930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5672.377175][ T31] audit: type=1400 audit(134223656.274:566): avc: denied { create } for pid=12305 comm="syz.4.14930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 5672.377544][ T31] audit: type=1400 audit(134223656.274:567): avc: denied { write } for pid=12305 comm="syz.4.14930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 5673.560646][ T31] audit: type=1400 audit(134223657.464:568): avc: denied { create } for pid=12311 comm="syz.5.14933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5673.596993][ T31] audit: type=1400 audit(134223657.494:569): avc: denied { write } for pid=12311 comm="syz.5.14933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5673.986802][ T31] audit: type=1400 audit(134223657.884:570): avc: denied { create } for pid=12311 comm="syz.5.14933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5674.251387][ T31] audit: type=1400 audit(134223658.154:571): avc: denied { connect } for pid=12311 comm="syz.5.14933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5676.156261][T12323] FAULT_INJECTION: forcing a failure. [ 5676.156261][T12323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5676.157553][T12323] CPU: 0 UID: 0 PID: 12323 Comm: syz.4.14936 Not tainted syzkaller #0 PREEMPT [ 5676.157603][T12323] Hardware name: ARM-Versatile Express [ 5676.157620][T12323] Call trace: [ 5676.157640][T12323] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5676.157732][T12323] r7:00000077 r6:00000000 r5:60000013 r4:82260234 [ 5676.157745][T12323] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5676.157834][T12323] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5676.157863][T12323] r5:857e2400 r4:8294f150 [ 5676.157870][T12323] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5676.157914][T12323] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5676.157945][T12323] r8:00000000 r7:00000077 r6:76ef6bb8 r5:00000000 r4:dfc79fb0 [ 5676.157953][T12323] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5676.157979][T12323] [<80972540>] (should_fail_usercopy) from [<8022b37c>] (restore_sigframe+0x4c/0x210) [ 5676.158005][T12323] [<8022b330>] (restore_sigframe) from [<8022b744>] (sys_sigreturn+0x40/0x60) [ 5676.158040][T12323] r7:00000077 r6:00130270 r5:00000000 r4:dfc79fb0 [ 5676.158048][T12323] [<8022b704>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5676.158071][T12323] Exception stack(0xdfc79fa8 to 0xdfc79ff0) [ 5676.158093][T12323] 9fa0: 00000000 00000000 00000011 20000500 00000000 00000000 [ 5676.158109][T12323] 9fc0: 00000000 00000000 00130270 00000077 002e0000 00000000 00006364 76ef70bc [ 5676.158121][T12323] 9fe0: 76ef6ec0 76ef6bb8 000ef4f0 000ef4f8 [ 5676.158155][T12323] r5:00000000 r4:00000000 [ 5676.569573][T12326] FAULT_INJECTION: forcing a failure. [ 5676.569573][T12326] name failslab, interval 1, probability 0, space 0, times 0 [ 5676.569963][T12326] CPU: 0 UID: 0 PID: 12326 Comm: syz.4.14938 Not tainted syzkaller #0 PREEMPT [ 5676.570015][T12326] Hardware name: ARM-Versatile Express [ 5676.570030][T12326] Call trace: [ 5676.570052][T12326] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5676.570105][T12326] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5676.570121][T12326] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5676.570228][T12326] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5676.570311][T12326] r5:857e0000 r4:82917bc0 [ 5676.570329][T12326] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5676.570366][T12326] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5676.570400][T12326] r8:857e0000 r7:00000d40 r6:84877028 r5:0000001a r4:83001240 [ 5676.570408][T12326] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5676.570431][T12326] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5676.570463][T12326] r10:00000fff r9:8309f800 r8:00000000 r7:836b3088 r6:84877028 r5:85473ffd [ 5676.570472][T12326] r4:85473fee [ 5676.570480][T12326] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5676.570509][T12326] r9:8309f800 r8:00000000 r7:836b3088 r6:84877028 r5:00001000 r4:85473fef [ 5676.570518][T12326] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5676.570542][T12326] r5:00001000 r4:85473000 [ 5676.570550][T12326] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5676.570597][T12326] r10:857e0000 r9:00000000 r8:84877000 r7:00005450 r6:00000004 r5:81cd6504 [ 5676.570655][T12326] r4:84877028 r3:826c0200 [ 5676.570664][T12326] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5676.570717][T12326] r9:00000005 r8:84877000 r7:00000000 r6:00000000 r5:00005450 r4:84877000 [ 5676.570727][T12326] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5676.570813][T12326] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5676.570847][T12326] r7:00000000 r6:84877001 r5:00000000 r4:00005450 [ 5676.570855][T12326] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5676.570876][T12326] Exception stack(0xdfcbdfa8 to 0xdfcbdff0) [ 5676.570896][T12326] dfa0: 00000000 00000000 00000005 00005450 00000000 00000000 [ 5676.570912][T12326] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f180bc [ 5676.570924][T12326] dfe0: 76f17ec0 76f17eb0 0001948c 001322c0 [ 5676.570941][T12326] r10:00000036 r9:857e0000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5676.570950][T12326] r4:00000000 [ 5676.571180][T12326] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5679.427157][ T31] audit: type=1400 audit(134223663.314:572): avc: denied { create } for pid=12340 comm="syz.4.14942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5679.600188][ T31] audit: type=1400 audit(134223663.504:573): avc: denied { ioctl } for pid=12340 comm="syz.4.14942" path="socket:[142317]" dev="sockfs" ino=142317 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5679.709281][T12344] FAULT_INJECTION: forcing a failure. [ 5679.709281][T12344] name failslab, interval 1, probability 0, space 0, times 0 [ 5679.728496][T12344] CPU: 1 UID: 0 PID: 12344 Comm: syz.5.14943 Not tainted syzkaller #0 PREEMPT [ 5679.728659][T12344] Hardware name: ARM-Versatile Express [ 5679.728688][T12344] Call trace: [ 5679.728735][T12344] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5679.728849][T12344] r7:00000c40 r6:00000000 r5:60000013 r4:82260234 [ 5679.728870][T12344] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5679.728925][T12344] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5679.728983][T12344] r5:857e5400 r4:82917bc0 [ 5679.729000][T12344] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5679.729060][T12344] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5679.729129][T12344] r8:857e5400 r7:00000c40 r6:86175868 r5:00001000 r4:830016c0 [ 5679.729148][T12344] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5679.729200][T12344] [<80503b7c>] (__kmalloc_noprof) from [<807c34ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5679.729277][T12344] r10:857e5400 r9:856a1800 r8:00000000 r7:836b3ee0 r6:86175868 r5:00001000 [ 5679.729301][T12344] r4:00000000 [ 5679.729319][T12344] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5679.729384][T12344] r10:857e5400 r9:00000000 r8:86175840 r7:00005409 r6:00000004 r5:81cd6504 [ 5679.729409][T12344] r4:86175868 r3:826c0200 [ 5679.729426][T12344] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5679.729492][T12344] r9:00000003 r8:86175840 r7:000005a9 r6:000005a9 r5:00005409 r4:86175840 [ 5679.729514][T12344] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5679.729568][T12344] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5679.729635][T12344] r7:000005a9 r6:86175841 r5:00000000 r4:00005409 [ 5679.729654][T12344] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5679.729701][T12344] Exception stack(0xdfd09fa8 to 0xdfd09ff0) [ 5679.729742][T12344] 9fa0: 00000000 00000000 00000003 00005409 000005a9 00000000 [ 5679.729778][T12344] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5679.729806][T12344] 9fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5679.729843][T12344] r10:00000036 r9:857e5400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5679.729863][T12344] r4:00000000 [ 5679.758691][T12344] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5686.541489][ T31] audit: type=1400 audit(134223670.444:574): avc: denied { create } for pid=12366 comm="syz.5.14952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5686.544987][ T31] audit: type=1400 audit(134223670.444:575): avc: denied { write } for pid=12366 comm="syz.5.14952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5690.259029][T12379] FAULT_INJECTION: forcing a failure. [ 5690.259029][T12379] name failslab, interval 1, probability 0, space 0, times 0 [ 5690.260587][T12379] CPU: 0 UID: 0 PID: 12379 Comm: syz.5.14956 Not tainted syzkaller #0 PREEMPT [ 5690.260701][T12379] Hardware name: ARM-Versatile Express [ 5690.260728][T12379] Call trace: [ 5690.260768][T12379] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5690.260878][T12379] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5690.260898][T12379] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5690.260948][T12379] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5690.260999][T12379] r5:857e5400 r4:82917bc0 [ 5690.261014][T12379] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5690.261072][T12379] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5690.261133][T12379] r8:857e5400 r7:00000d40 r6:84877e68 r5:0000001e r4:83001240 [ 5690.261152][T12379] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5690.261197][T12379] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5690.261259][T12379] r10:00000fff r9:856a1800 r8:00000000 r7:8368ebb0 r6:84877e68 r5:85473ffc [ 5690.261278][T12379] r4:85473fe9 [ 5690.261294][T12379] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5690.261371][T12379] r9:856a1800 r8:00000000 r7:8368ebb0 r6:84877e68 r5:00001000 r4:85473fea [ 5690.261388][T12379] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5690.261442][T12379] r5:00001000 r4:85473000 [ 5690.261456][T12379] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5690.261513][T12379] r10:857e5400 r9:00000000 r8:84877e40 r7:00005409 r6:00000004 r5:81cd6504 [ 5690.261534][T12379] r4:84877e68 r3:826c0200 [ 5690.261551][T12379] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5690.261608][T12379] r9:00000003 r8:84877e40 r7:000005a9 r6:000005a9 r5:00005409 r4:84877e40 [ 5690.261625][T12379] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5690.261677][T12379] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5690.261736][T12379] r7:000005a9 r6:84877e41 r5:00000000 r4:00005409 [ 5690.261753][T12379] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5690.261796][T12379] Exception stack(0xdfd45fa8 to 0xdfd45ff0) [ 5690.261834][T12379] 5fa0: 00000000 00000000 00000003 00005409 000005a9 00000000 [ 5690.261867][T12379] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5690.261893][T12379] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5690.261925][T12379] r10:00000036 r9:857e5400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5690.261945][T12379] r4:00000000 [ 5690.305796][T12379] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5693.572366][T12402] FAULT_INJECTION: forcing a failure. [ 5693.572366][T12402] name failslab, interval 1, probability 0, space 0, times 0 [ 5693.574070][T12402] CPU: 0 UID: 0 PID: 12402 Comm: syz.5.14965 Not tainted syzkaller #0 PREEMPT [ 5693.574189][T12402] Hardware name: ARM-Versatile Express [ 5693.574220][T12402] Call trace: [ 5693.574264][T12402] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5693.574392][T12402] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5693.574415][T12402] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5693.574468][T12402] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5693.574530][T12402] r5:857e0000 r4:82917bc0 [ 5693.574547][T12402] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5693.574604][T12402] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5693.574672][T12402] r8:857e0000 r7:00000d40 r6:84877c28 r5:00000021 r4:83001240 [ 5693.574690][T12402] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5693.574764][T12402] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5693.574831][T12402] r10:00000fff r9:8309e400 r8:00000000 r7:8343db28 r6:84877c28 r5:85470ffc [ 5693.574850][T12402] r4:85470fe6 [ 5693.574865][T12402] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5693.575069][T12402] r9:8309e400 r8:00000000 r7:8343db28 r6:84877c28 r5:00001000 r4:85470fe7 [ 5693.575092][T12402] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5693.575192][T12402] r5:00001000 r4:85470000 [ 5693.575209][T12402] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5693.575278][T12402] r10:857e0000 r9:00000000 r8:84877c00 r7:00008916 r6:00000004 r5:81cd6504 [ 5693.575306][T12402] r4:84877c28 r3:826c0200 [ 5693.575328][T12402] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5693.575393][T12402] r9:00000004 r8:84877c00 r7:20000000 r6:20000000 r5:00008916 r4:84877c00 [ 5693.575437][T12402] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5693.575494][T12402] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5693.575559][T12402] r7:20000000 r6:84877c01 r5:00000000 r4:00008916 [ 5693.575576][T12402] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5693.575619][T12402] Exception stack(0xdfd51fa8 to 0xdfd51ff0) [ 5693.575657][T12402] 1fa0: 00000000 00000000 00000004 00008916 20000000 00000000 [ 5693.575692][T12402] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5693.575722][T12402] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5693.575755][T12402] r10:00000036 r9:857e0000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5693.575774][T12402] r4:00000000 [ 5693.593280][T12402] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5698.350280][ T31] audit: type=1400 audit(134223682.244:576): avc: denied { node_bind } for pid=12429 comm="syz.5.14973" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5698.370641][ T31] audit: type=1400 audit(134223682.254:577): avc: denied { execmem } for pid=12429 comm="syz.5.14973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5698.850592][T12437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12437 comm=syz.5.14976 [ 5699.099541][ T31] audit: type=1400 audit(134223683.004:578): avc: denied { setattr } for pid=12438 comm="syz.5.14977" name="NETLINK" dev="sockfs" ino=143596 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5700.112487][T12451] FAULT_INJECTION: forcing a failure. [ 5700.112487][T12451] name failslab, interval 1, probability 0, space 0, times 0 [ 5700.112843][T12451] CPU: 1 UID: 0 PID: 12451 Comm: syz.5.14979 Not tainted syzkaller #0 PREEMPT [ 5700.112933][T12451] Hardware name: ARM-Versatile Express [ 5700.112959][T12451] Call trace: [ 5700.113065][T12451] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5700.113248][T12451] r7:00000c40 r6:00000000 r5:60000013 r4:82260234 [ 5700.113363][T12451] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5700.113465][T12451] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5700.113523][T12451] r5:857e0000 r4:82917bc0 [ 5700.113542][T12451] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5700.113600][T12451] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5700.113722][T12451] r8:857e0000 r7:00000c40 r6:84877da8 r5:00001000 r4:830016c0 [ 5700.113778][T12451] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5700.113941][T12451] [<80503b7c>] (__kmalloc_noprof) from [<807c34ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5700.114053][T12451] r10:0000005d r9:856a1800 r8:00000000 r7:8368ee58 r6:84877da8 r5:00001000 [ 5700.114080][T12451] r4:00000000 [ 5700.114140][T12451] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf9f4>] (tomoyo_path_perm+0xe4/0x200) [ 5700.114269][T12451] r10:0000005d r9:8368ee58 r8:00000001 r7:00000000 r6:00000007 r5:00000000 [ 5700.114301][T12451] r4:00000000 r3:00000000 [ 5700.114399][T12451] [<807bf910>] (tomoyo_path_perm) from [<807c3e68>] (tomoyo_file_truncate+0x1c/0x20) [ 5700.114560][T12451] r8:86072658 r7:857e0000 r6:00080002 r5:00000000 r4:84877d80 [ 5700.114583][T12451] [<807c3e4c>] (tomoyo_file_truncate) from [<807809b4>] (security_file_truncate+0x54/0x194) [ 5700.114656][T12451] [<80780960>] (security_file_truncate) from [<8054eb38>] (do_ftruncate+0x98/0x258) [ 5700.114738][T12451] r5:00000000 r4:84877d80 [ 5700.114889][T12451] [<8054eaa0>] (do_ftruncate) from [<8054edb4>] (sys_ftruncate+0x44/0x78) [ 5700.115047][T12451] r10:0000005d r9:857e0000 r8:8020029c r7:84877d80 r6:00000000 r5:84877d81 [ 5700.115159][T12451] r4:00080002 [ 5700.115212][T12451] [<8054ed70>] (sys_ftruncate) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5700.115288][T12451] Exception stack(0xdfe51fa8 to 0xdfe51ff0) [ 5700.115451][T12451] 1fa0: 00000000 00000000 00000003 00080002 00000000 00000000 [ 5700.115553][T12451] 1fc0: 00000000 00000000 00130270 0000005d 002e0000 00000000 00006364 76f900bc [ 5700.115606][T12451] 1fe0: 76f8fec0 76f8feb0 0001948c 001322c0 [ 5700.115688][T12451] r7:0000005d r6:00130270 r5:00000000 r4:00000000 [ 5700.157808][T12451] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5705.180704][ T31] audit: type=1400 audit(134223689.084:579): avc: denied { accept } for pid=12462 comm="syz.5.14985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5707.108580][ T31] audit: type=1400 audit(134223691.014:580): avc: denied { append } for pid=12467 comm="syz.5.14988" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 5707.255832][ T31] audit: type=1400 audit(134223691.154:581): avc: denied { listen } for pid=12470 comm="syz.5.14989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5707.327298][ T31] audit: type=1400 audit(134223691.194:582): avc: denied { create } for pid=12470 comm="syz.5.14989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5707.327599][ T31] audit: type=1400 audit(134223691.224:583): avc: denied { bind } for pid=12470 comm="syz.5.14989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5707.354589][ T31] audit: type=1400 audit(134223691.254:584): avc: denied { accept } for pid=12470 comm="syz.5.14989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5707.513610][ T31] audit: type=1400 audit(134223691.414:585): avc: denied { write } for pid=12470 comm="syz.5.14989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5707.519600][ T31] audit: type=1400 audit(134223691.424:586): avc: denied { ioctl } for pid=12470 comm="syz.5.14989" path="socket:[143627]" dev="sockfs" ino=143627 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5708.275777][ T31] audit: type=1400 audit(134223692.174:587): avc: denied { write } for pid=12477 comm="syz.4.14990" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 5714.934804][ T31] audit: type=1400 audit(134223698.834:588): avc: denied { create } for pid=12503 comm="syz.5.15001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5723.472361][ T31] audit: type=1400 audit(134223707.374:589): avc: denied { ioctl } for pid=12539 comm="syz.5.15012" path="socket:[144583]" dev="sockfs" ino=144583 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5724.581593][ T31] audit: type=1400 audit(134223708.484:590): avc: denied { allowed } for pid=12546 comm="syz.4.15015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5729.224756][ T31] audit: type=1400 audit(134223713.124:591): avc: denied { ioctl } for pid=12560 comm="syz.4.15021" path="socket:[144652]" dev="sockfs" ino=144652 ioctlcmd=0x8935 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5738.140680][ T31] audit: type=1400 audit(134223722.044:592): avc: denied { create } for pid=12600 comm="syz.5.15031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5738.179992][ T31] audit: type=1400 audit(134223722.064:593): avc: denied { write } for pid=12600 comm="syz.5.15031" path="socket:[143873]" dev="sockfs" ino=143873 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5745.117361][T12622] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=12622 comm=syz.4.15037 [ 5745.232137][ T31] audit: type=1400 audit(134223729.134:594): avc: denied { name_bind } for pid=12621 comm="syz.4.15037" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 5746.863493][T12635] FAULT_INJECTION: forcing a failure. [ 5746.863493][T12635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5746.897621][T12635] CPU: 0 UID: 0 PID: 12635 Comm: syz.5.15041 Not tainted syzkaller #0 PREEMPT [ 5746.897789][T12635] Hardware name: ARM-Versatile Express [ 5746.897823][T12635] Call trace: [ 5746.897872][T12635] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5746.897990][T12635] r7:20000000 r6:00000000 r5:60000013 r4:82260234 [ 5746.898014][T12635] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5746.898064][T12635] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5746.898120][T12635] r5:85703000 r4:8294f150 [ 5746.898137][T12635] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5746.898200][T12635] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5746.898273][T12635] r8:b5403587 r7:20000000 r6:e02dde64 r5:0000000c r4:0000000c [ 5746.898305][T12635] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5746.898362][T12635] [<80972540>] (should_fail_usercopy) from [<8154405c>] (move_addr_to_kernel+0x34/0xf8) [ 5746.898424][T12635] [<81544028>] (move_addr_to_kernel) from [<81545dc4>] (__copy_msghdr+0xe4/0x110) [ 5746.898492][T12635] r7:e02dde20 r6:20000100 r5:e02dddd0 r4:e02ddf20 [ 5746.898509][T12635] [<81545ce0>] (__copy_msghdr) from [<81545e9c>] (copy_msghdr_from_user+0xac/0x130) [ 5746.898563][T12635] r5:00000000 r4:e02ddf20 [ 5746.898579][T12635] [<81545df0>] (copy_msghdr_from_user) from [<81545f98>] (___sys_sendmsg+0x78/0xd0) [ 5746.898648][T12635] r8:20014800 r7:00000000 r6:8359cc80 r5:e02ddf20 r4:e02dde64 [ 5746.898666][T12635] [<81545f20>] (___sys_sendmsg) from [<81546454>] (__sys_sendmsg+0x8c/0xe0) [ 5746.898739][T12635] r10:00000128 r9:85703000 r8:86175cc0 r7:20014800 r6:20000100 r5:86175cc1 [ 5746.898791][T12635] r4:00000004 [ 5746.898809][T12635] [<815463c8>] (__sys_sendmsg) from [<815464bc>] (sys_sendmsg+0x14/0x18) [ 5746.898877][T12635] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5746.898900][T12635] [<815464a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5746.898945][T12635] Exception stack(0xe02ddfa8 to 0xe02ddff0) [ 5746.898991][T12635] dfa0: 00000000 00000000 00000004 20000100 20014800 00000000 [ 5746.899026][T12635] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fb10bc [ 5746.899054][T12635] dfe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5747.251987][ T31] audit: type=1400 audit(134223731.154:595): avc: denied { ioctl } for pid=12637 comm="syz.5.15042" path="socket:[144818]" dev="sockfs" ino=144818 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 5747.337547][ T31] audit: type=1400 audit(134223731.234:596): avc: denied { read write } for pid=12645 comm="syz.5.15043" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5747.340766][ T31] audit: type=1400 audit(134223731.244:597): avc: denied { open } for pid=12645 comm="syz.5.15043" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5747.889100][ T31] audit: type=1400 audit(134223731.794:598): avc: denied { setopt } for pid=12645 comm="syz.5.15043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5748.403346][ T31] audit: type=1400 audit(134223732.304:599): avc: denied { write } for pid=12645 comm="syz.5.15043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5748.972470][ T31] audit: type=1400 audit(134223732.854:600): avc: denied { ioctl } for pid=12645 comm="syz.5.15043" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5748.973002][ T31] audit: type=1400 audit(134223732.854:601): avc: denied { set_context_mgr } for pid=12645 comm="syz.5.15043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 5749.857822][ T31] audit: type=1400 audit(134223733.734:602): avc: denied { map_create } for pid=12652 comm="syz.4.15045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5753.244639][ T31] audit: type=1400 audit(134223737.144:603): avc: denied { write } for pid=12666 comm="syz.5.15049" path="socket:[143999]" dev="sockfs" ino=143999 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5757.411867][ T31] audit: type=1400 audit(134223741.314:604): avc: denied { getopt } for pid=12687 comm="syz.5.15054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5759.037426][T12700] FAULT_INJECTION: forcing a failure. [ 5759.037426][T12700] name failslab, interval 1, probability 0, space 0, times 0 [ 5759.037658][T12700] CPU: 1 UID: 0 PID: 12700 Comm: syz.4.15059 Not tainted syzkaller #0 PREEMPT [ 5759.037713][T12700] Hardware name: ARM-Versatile Express [ 5759.037750][T12700] Call trace: [ 5759.037780][T12700] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5759.037844][T12700] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5759.037857][T12700] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5759.037884][T12700] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5759.037911][T12700] r5:84151800 r4:82917bc0 [ 5759.037918][T12700] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5759.037947][T12700] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5759.037979][T12700] r8:84151800 r7:00000d40 r6:87470c28 r5:0000001a r4:83001240 [ 5759.037988][T12700] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5759.038027][T12700] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5759.038259][T12700] r10:00000fff r9:8309f800 r8:00000000 r7:83640550 r6:87470c28 r5:86089ffd [ 5759.040114][T12700] r4:86089fee [ 5759.041065][T12700] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5759.042796][T12700] r9:8309f800 r8:00000000 r7:83640550 r6:87470c28 r5:00001000 r4:86089fef [ 5759.042866][T12700] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5759.042999][T12700] r5:00001000 r4:86089000 [ 5759.044017][T12700] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5759.044104][T12700] r10:fffff000 r9:00000000 r8:8291ed6c r7:0000ee01 r6:00000006 r5:81cd6504 [ 5759.046844][T12700] r4:87470c28 r3:826c0200 [ 5759.046997][T12700] [<807bf524>] (tomoyo_path_number_perm) from [<807c3fa4>] (tomoyo_path_chown+0x6c/0x78) [ 5759.047186][T12700] r9:8359a100 r8:8291ed6c r7:0000ee01 r6:00000000 r5:87470c28 r4:00000000 [ 5759.047320][T12700] [<807c3f38>] (tomoyo_path_chown) from [<8077afb8>] (security_path_chown+0x6c/0x1fc) [ 5759.047511][T12700] r5:0000ee01 r4:87470c28 [ 5759.047684][T12700] [<8077af4c>] (security_path_chown) from [<8054f8cc>] (chown_common+0x168/0x248) [ 5759.047771][T12700] r7:0000ee01 r6:8359a080 r5:87470c28 r4:0000ee01 [ 5759.047792][T12700] [<8054f764>] (chown_common) from [<8054fcc0>] (vfs_fchown+0x58/0x78) [ 5759.047853][T12700] r10:0000005f r9:84151800 r8:8020029c r7:0000ee01 r6:00000000 r5:87470c00 [ 5759.047876][T12700] r4:00000000 [ 5759.047891][T12700] [<8054fc68>] (vfs_fchown) from [<8054fd14>] (ksys_fchown+0x34/0x64) [ 5759.047950][T12700] r7:87470c00 r6:00000000 r5:0000ee01 r4:87470c01 [ 5759.047966][T12700] [<8054fce0>] (ksys_fchown) from [<8034da20>] (sys_fchown16+0x38/0x3c) [ 5759.048028][T12700] r7:0000005f r6:00130270 r5:00000000 r4:00000000 [ 5759.048047][T12700] [<8034d9e8>] (sys_fchown16) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5759.048145][T12700] Exception stack(0xe0371fa8 to 0xe0371ff0) [ 5759.048227][T12700] 1fa0: 00000000 00000000 00000003 0000ee01 00000000 00000000 [ 5759.048408][T12700] 1fc0: 00000000 00000000 00130270 0000005f 002e0000 00000000 00006364 76f180bc [ 5759.048592][T12700] 1fe0: 76f17ec0 76f17eb0 0001948c 001322c0 [ 5759.182261][T12700] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5759.578881][ T31] audit: type=1400 audit(134223743.454:605): avc: denied { read } for pid=12702 comm="syz.4.15060" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_log_t:s0" [ 5759.579367][ T31] audit: type=1400 audit(134223743.454:606): avc: denied { open } for pid=12702 comm="syz.4.15060" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_log_t:s0" [ 5761.449337][ T31] audit: type=1400 audit(134223745.344:607): avc: denied { create } for pid=12711 comm="syz.4.15063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 5762.719408][ T31] audit: type=1400 audit(134223746.624:608): avc: denied { ioctl } for pid=12714 comm="syz.4.15064" path="socket:[144093]" dev="sockfs" ino=144093 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5764.159879][T12727] FAULT_INJECTION: forcing a failure. [ 5764.159879][T12727] name failslab, interval 1, probability 0, space 0, times 0 [ 5764.160245][T12727] CPU: 1 UID: 0 PID: 12727 Comm: syz.5.15068 Not tainted syzkaller #0 PREEMPT [ 5764.160405][T12727] Hardware name: ARM-Versatile Express [ 5764.160434][T12727] Call trace: [ 5764.160477][T12727] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5764.161075][T12727] r7:00000c40 r6:00000000 r5:60000013 r4:82260234 [ 5764.162680][T12727] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5764.164345][T12727] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5764.166549][T12727] r5:8587e000 r4:82917bc0 [ 5764.166978][T12727] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5764.167115][T12727] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5764.167185][T12727] r8:8587e000 r7:00000c40 r6:86175ce8 r5:00001000 r4:830016c0 [ 5764.167202][T12727] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5764.167251][T12727] [<80503b7c>] (__kmalloc_noprof) from [<807c34ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5764.167322][T12727] r10:fffff000 r9:8309f800 r8:00000000 r7:836b1c38 r6:86175ce8 r5:00001000 [ 5764.167341][T12727] r4:00000000 [ 5764.167357][T12727] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5764.167493][T12727] r10:fffff000 r9:00000000 r8:8291ed6c r7:00000000 r6:00000007 r5:81cd6504 [ 5764.167519][T12727] r4:86175ce8 r3:826c0200 [ 5764.167536][T12727] [<807bf524>] (tomoyo_path_number_perm) from [<807c3f84>] (tomoyo_path_chown+0x4c/0x78) [ 5764.167599][T12727] r9:8373e600 r8:8291ed6c r7:0000ee01 r6:00000000 r5:86175ce8 r4:00000000 [ 5764.167616][T12727] [<807c3f38>] (tomoyo_path_chown) from [<8077afb8>] (security_path_chown+0x6c/0x1fc) [ 5764.167673][T12727] r5:0000ee01 r4:86175ce8 [ 5764.167689][T12727] [<8077af4c>] (security_path_chown) from [<8054f8cc>] (chown_common+0x168/0x248) [ 5764.167867][T12727] r7:0000ee01 r6:8373e580 r5:86175ce8 r4:0000ee01 [ 5764.168556][T12727] [<8054f764>] (chown_common) from [<8054fcc0>] (vfs_fchown+0x58/0x78) [ 5764.168892][T12727] r10:0000005f r9:8587e000 r8:8020029c r7:0000ee01 r6:00000000 r5:86175cc0 [ 5764.169186][T12727] r4:00000000 [ 5764.169418][T12727] [<8054fc68>] (vfs_fchown) from [<8054fd14>] (ksys_fchown+0x34/0x64) [ 5764.173861][T12727] r7:86175cc0 r6:00000000 r5:0000ee01 r4:86175cc1 [ 5764.173965][T12727] [<8054fce0>] (ksys_fchown) from [<8034da20>] (sys_fchown16+0x38/0x3c) [ 5764.174083][T12727] r7:0000005f r6:00130270 r5:00000000 r4:00000000 [ 5764.174107][T12727] [<8034d9e8>] (sys_fchown16) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5764.174155][T12727] Exception stack(0xe03b1fa8 to 0xe03b1ff0) [ 5764.174282][T12727] 1fa0: 00000000 00000000 00000003 0000ee01 00000000 00000000 [ 5764.174333][T12727] 1fc0: 00000000 00000000 00130270 0000005f 002e0000 00000000 00006364 76fb10bc [ 5764.174361][T12727] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5764.287718][T12727] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5767.231804][T12741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=12741 comm=syz.5.15072 [ 5767.351201][T12751] FAULT_INJECTION: forcing a failure. [ 5767.351201][T12751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5767.351579][T12751] CPU: 1 UID: 0 PID: 12751 Comm: syz.5.15073 Not tainted syzkaller #0 PREEMPT [ 5767.351670][T12751] Hardware name: ARM-Versatile Express [ 5767.351697][T12751] Call trace: [ 5767.351739][T12751] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5767.351844][T12751] r7:00000000 r6:00000000 r5:60000013 r4:82260234 [ 5767.351869][T12751] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5767.352065][T12751] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5767.352704][T12751] r5:83aa3c00 r4:8294f150 [ 5767.352797][T12751] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5767.352902][T12751] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5767.353015][T12751] r8:76fb0f30 r7:00000000 r6:00000000 r5:e042df68 r4:00000002 [ 5767.353069][T12751] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5767.353145][T12751] [<80972540>] (should_fail_usercopy) from [<8058e5d8>] (simple_read_from_buffer+0x80/0x13c) [ 5767.353215][T12751] [<8058e558>] (simple_read_from_buffer) from [<806084e4>] (proc_fail_nth_read+0xb8/0x108) [ 5767.353290][T12751] r10:00000001 r9:8060842c r8:00000002 r7:e042df68 r6:0000000f r5:76fb0f30 [ 5767.353319][T12751] r4:83aa3c00 r3:e042de9f [ 5767.353380][T12751] [<8060842c>] (proc_fail_nth_read) from [<805533f4>] (vfs_read+0x98/0x324) [ 5767.353497][T12751] r8:76fb0f30 r7:e042df68 r6:83aa3c00 r5:0000000f r4:86175540 [ 5767.353571][T12751] [<8055335c>] (vfs_read) from [<80554104>] (ksys_read+0x74/0xe8) [ 5767.353656][T12751] r10:00000003 r9:83aa3c00 r8:8020029c r7:00000000 r6:00000000 r5:86175540 [ 5767.353695][T12751] r4:86175543 [ 5767.353840][T12751] [<80554090>] (ksys_read) from [<80554188>] (sys_read+0x10/0x14) [ 5767.353914][T12751] r7:00000003 r6:00000004 r5:76fb0f30 r4:0000000f [ 5767.354053][T12751] [<80554178>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5767.354328][T12751] Exception stack(0xe042dfa8 to 0xe042dff0) [ 5767.354415][T12751] dfa0: 0000000f 76fb0f30 00000004 76fb0f30 0000000f 00000000 [ 5767.354477][T12751] dfc0: 0000000f 76fb0f30 00000004 00000003 002e0000 00000000 00006364 76fb10bc [ 5767.354543][T12751] dfe0: 00000158 76fb0ed0 000d80f4 00130194 [ 5768.258875][ T31] audit: type=1400 audit(134223752.164:609): avc: denied { bind } for pid=12759 comm="syz.5.15076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5771.337250][ T31] audit: type=1400 audit(134223755.234:610): avc: denied { prog_load } for pid=12798 comm="syz.5.15080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5771.337655][ T31] audit: type=1400 audit(134223755.234:611): avc: denied { bpf } for pid=12798 comm="syz.5.15080" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5771.338024][ T31] audit: type=1400 audit(134223755.234:612): avc: denied { perfmon } for pid=12798 comm="syz.5.15080" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5771.349342][ T31] audit: type=1400 audit(134223755.254:613): avc: denied { prog_run } for pid=12798 comm="syz.5.15080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5773.627061][ T31] audit: type=1400 audit(134223757.524:614): avc: denied { map } for pid=12809 comm="syz.5.15085" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5774.639110][ T31] audit: type=1400 audit(134223758.544:615): avc: denied { write } for pid=12811 comm="syz.4.15084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5776.268209][ C0] vkms_vblank_simulate: vblank timer overrun [ 5776.914677][ T31] audit: type=1400 audit(134223760.814:616): avc: denied { getopt } for pid=12822 comm="syz.4.15090" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5776.989209][ T31] audit: type=1400 audit(134223760.894:617): avc: denied { setopt } for pid=12822 comm="syz.4.15090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5777.908450][ T31] audit: type=1400 audit(134223761.814:618): avc: denied { ioctl } for pid=12822 comm="syz.4.15090" path="socket:[145079]" dev="sockfs" ino=145079 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5788.699792][ T31] audit: type=1400 audit(134223772.604:619): avc: denied { setopt } for pid=12872 comm="syz.5.15104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5788.831910][ T31] audit: type=1400 audit(134223772.734:620): avc: denied { lock } for pid=12872 comm="syz.5.15104" path="socket:[145173]" dev="sockfs" ino=145173 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5788.937105][ T31] audit: type=1400 audit(134223772.804:621): avc: denied { shutdown } for pid=12872 comm="syz.5.15104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5794.244471][ T31] audit: type=1400 audit(134223778.144:622): avc: denied { shutdown } for pid=12886 comm="syz.5.15111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5804.368397][T12916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5129 sclass=netlink_audit_socket pid=12916 comm=syz.5.15120 [ 5805.649078][T12923] FAULT_INJECTION: forcing a failure. [ 5805.649078][T12923] name failslab, interval 1, probability 0, space 0, times 0 [ 5805.649368][T12923] CPU: 1 UID: 0 PID: 12923 Comm: syz.5.15122 Not tainted syzkaller #0 PREEMPT [ 5805.649425][T12923] Hardware name: ARM-Versatile Express [ 5805.649463][T12923] Call trace: [ 5805.649488][T12923] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5805.649549][T12923] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5805.649562][T12923] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5805.649589][T12923] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5805.649615][T12923] r5:832f0c00 r4:82917bc0 [ 5805.649623][T12923] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5805.649652][T12923] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5805.649685][T12923] r8:832f0c00 r7:00000d40 r6:861757a8 r5:0000001a r4:83001240 [ 5805.649693][T12923] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5805.649716][T12923] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5805.649748][T12923] r10:00000fff r9:8309f800 r8:00000000 r7:8370ccc0 r6:861757a8 r5:8608bffd [ 5805.649757][T12923] r4:8608bfee [ 5805.649765][T12923] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5805.649880][T12923] r9:8309f800 r8:00000000 r7:8370ccc0 r6:861757a8 r5:00001000 r4:8608bfef [ 5805.649893][T12923] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5805.649976][T12923] r5:00001000 r4:8608b000 [ 5805.650025][T12923] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5805.650076][T12923] r10:832f0c00 r9:00000000 r8:86175780 r7:00005421 r6:00000004 r5:81cd6504 [ 5805.650089][T12923] r4:861757a8 r3:826c0200 [ 5805.650133][T12923] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5805.650181][T12923] r9:00000003 r8:86175780 r7:20002300 r6:20002300 r5:00005421 r4:86175780 [ 5805.650302][T12923] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5805.650396][T12923] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5805.650626][T12923] r7:20002300 r6:86175781 r5:00000000 r4:00005421 [ 5805.650723][T12923] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5805.650846][T12923] Exception stack(0xdfa65fa8 to 0xdfa65ff0) [ 5805.650910][T12923] 5fa0: 00000000 00000000 00000003 00005421 20002300 00000000 [ 5805.651073][T12923] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5805.651178][T12923] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5805.651197][T12923] r10:00000036 r9:832f0c00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5805.651206][T12923] r4:00000000 [ 5805.680222][T12923] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5806.088797][ T31] audit: type=1400 audit(134223789.994:623): avc: denied { map } for pid=12924 comm="syz.5.15123" path="socket:[145416]" dev="sockfs" ino=145416 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5806.091863][ T31] audit: type=1400 audit(134223789.994:624): avc: denied { read } for pid=12924 comm="syz.5.15123" path="socket:[145416]" dev="sockfs" ino=145416 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5809.163369][T12944] FAULT_INJECTION: forcing a failure. [ 5809.163369][T12944] name failslab, interval 1, probability 0, space 0, times 0 [ 5809.163792][T12944] CPU: 1 UID: 0 PID: 12944 Comm: syz.5.15128 Not tainted syzkaller #0 PREEMPT [ 5809.163896][T12944] Hardware name: ARM-Versatile Express [ 5809.163924][T12944] Call trace: [ 5809.163970][T12944] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5809.164091][T12944] r7:00000c40 r6:00000000 r5:60000013 r4:82260234 [ 5809.164117][T12944] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5809.164347][T12944] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5809.164429][T12944] r5:8321a400 r4:82917bc0 [ 5809.164473][T12944] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5809.164573][T12944] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5809.164677][T12944] r8:8321a400 r7:00000c40 r6:86175328 r5:00001000 r4:830016c0 [ 5809.164730][T12944] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5809.164951][T12944] [<80503b7c>] (__kmalloc_noprof) from [<807c34ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5809.165093][T12944] r10:8321a400 r9:8309f800 r8:00000000 r7:8370ccc0 r6:86175328 r5:00001000 [ 5809.165118][T12944] r4:00000000 [ 5809.165137][T12944] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5809.165205][T12944] r10:8321a400 r9:00000000 r8:86175300 r7:00008902 r6:00000004 r5:81cd6504 [ 5809.165310][T12944] r4:86175328 r3:826c0200 [ 5809.165376][T12944] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5809.165597][T12944] r9:00000003 r8:86175300 r7:20000040 r6:20000040 r5:00008902 r4:86175300 [ 5809.165734][T12944] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5809.165838][T12944] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5809.165910][T12944] r7:20000040 r6:86175301 r5:00000000 r4:00008902 [ 5809.166039][T12944] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5809.166137][T12944] Exception stack(0xdfab1fa8 to 0xdfab1ff0) [ 5809.166532][T12944] 1fa0: 00000000 00000000 00000003 00008902 20000040 00000000 [ 5809.166583][T12944] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5809.166614][T12944] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5809.166651][T12944] r10:00000036 r9:8321a400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5809.166673][T12944] r4:00000000 [ 5809.200327][T12944] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5811.458174][ T31] audit: type=1400 audit(134223795.354:625): avc: denied { create } for pid=12956 comm="syz.5.15132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5817.753506][ T31] audit: type=1400 audit(134223801.654:626): avc: denied { create } for pid=12971 comm="syz.5.15136" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5817.754643][ T31] audit: type=1400 audit(134223801.654:627): avc: denied { map } for pid=12971 comm="syz.5.15136" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=146443 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5817.755890][ T31] audit: type=1400 audit(134223801.654:628): avc: denied { read write } for pid=12971 comm="syz.5.15136" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=146443 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5817.929030][ T31] audit: type=1400 audit(134223801.824:629): avc: denied { write } for pid=12971 comm="syz.5.15136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5817.984382][ T31] audit: type=1400 audit(134223801.884:630): avc: denied { ioctl } for pid=12971 comm="syz.5.15136" path="socket:[146446]" dev="sockfs" ino=146446 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5818.363673][T12978] FAULT_INJECTION: forcing a failure. [ 5818.363673][T12978] name failslab, interval 1, probability 0, space 0, times 0 [ 5818.364059][T12978] CPU: 1 UID: 0 PID: 12978 Comm: syz.5.15137 Not tainted syzkaller #0 PREEMPT [ 5818.364151][T12978] Hardware name: ARM-Versatile Express [ 5818.364174][T12978] Call trace: [ 5818.364222][T12978] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5818.364400][T12978] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5818.364504][T12978] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5818.364614][T12978] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5818.364768][T12978] r5:83a8d400 r4:82917bc0 [ 5818.364843][T12978] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5818.364913][T12978] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5818.365153][T12978] r8:83a8d400 r7:00000d40 r6:861750e8 r5:0000001a r4:83001240 [ 5818.365183][T12978] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5818.365475][T12978] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5818.365682][T12978] r10:00000fff r9:8309f800 r8:00000000 r7:85109990 r6:861750e8 r5:8608bffd [ 5818.365871][T12978] r4:8608bfee [ 5818.366045][T12978] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5818.366122][T12978] r9:8309f800 r8:00000000 r7:85109990 r6:861750e8 r5:00001000 r4:8608bfef [ 5818.366167][T12978] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5818.366354][T12978] r5:00001000 r4:8608b000 [ 5818.366647][T12978] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5818.366724][T12978] r10:83a8d400 r9:00000000 r8:861750c0 r7:00008902 r6:00000004 r5:81cd6504 [ 5818.366780][T12978] r4:861750e8 r3:826c0200 [ 5818.366800][T12978] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5818.366865][T12978] r9:00000003 r8:861750c0 r7:20000040 r6:20000040 r5:00008902 r4:861750c0 [ 5818.366887][T12978] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5818.366946][T12978] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5818.367008][T12978] r7:20000040 r6:861750c1 r5:00000000 r4:00008902 [ 5818.367037][T12978] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5818.367272][T12978] Exception stack(0xdfad1fa8 to 0xdfad1ff0) [ 5818.367330][T12978] 1fa0: 00000000 00000000 00000003 00008902 20000040 00000000 [ 5818.367410][T12978] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5818.367479][T12978] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5818.367559][T12978] r10:00000036 r9:83a8d400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5818.367672][T12978] r4:00000000 [ 5818.432146][T12978] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5827.872963][ T31] audit: type=1400 audit(134223811.774:631): avc: denied { create } for pid=13022 comm="syz.5.15149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5827.889685][ T31] audit: type=1400 audit(134223811.794:632): avc: denied { getopt } for pid=13022 comm="syz.5.15149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5827.933640][ T31] audit: type=1400 audit(134223811.834:633): avc: denied { setattr } for pid=13022 comm="syz.5.15149" path="pipe:[145589]" dev="pipefs" ino=145589 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 5827.962514][ T31] audit: type=1400 audit(134223811.864:634): avc: denied { ioctl } for pid=13022 comm="syz.5.15149" path="socket:[145588]" dev="sockfs" ino=145588 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5827.978850][ T31] audit: type=1400 audit(134223811.884:635): avc: denied { write } for pid=13022 comm="syz.5.15149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5829.953480][T13037] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5129 sclass=netlink_audit_socket pid=13037 comm=syz.4.15153 [ 5835.579715][T13060] 8021q: VLANs not supported on wg0 [ 5837.797568][ T31] audit: type=1400 audit(134223821.664:636): avc: denied { accept } for pid=13062 comm="syz.5.15162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5846.170197][ T31] audit: type=1400 audit(134223830.074:637): avc: denied { create } for pid=13088 comm="syz.5.15168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5846.179163][ T31] audit: type=1400 audit(134223830.074:638): avc: denied { connect } for pid=13088 comm="syz.5.15168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5846.182978][ T31] audit: type=1400 audit(134223830.074:639): avc: denied { listen } for pid=13088 comm="syz.5.15168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5846.193963][ T31] audit: type=1400 audit(134223830.094:640): avc: denied { accept } for pid=13088 comm="syz.5.15168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5848.702250][T13100] FAULT_INJECTION: forcing a failure. [ 5848.702250][T13100] name failslab, interval 1, probability 0, space 0, times 0 [ 5848.703167][T13100] CPU: 0 UID: 0 PID: 13100 Comm: syz.5.15172 Not tainted syzkaller #0 PREEMPT [ 5848.703304][T13100] Hardware name: ARM-Versatile Express [ 5848.703335][T13100] Call trace: [ 5848.703377][T13100] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5848.703478][T13100] r7:84170000 r6:00000000 r5:60000013 r4:82260234 [ 5848.703497][T13100] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5848.703546][T13100] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5848.703596][T13100] r5:84170000 r4:82917bc0 [ 5848.703611][T13100] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5848.703666][T13100] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5848.703732][T13100] r8:00000000 r7:84170000 r6:00400cc0 r5:ffffffff r4:830a7c00 [ 5848.703750][T13100] [<8051f21c>] (should_failslab) from [<80503228>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 5848.703797][T13100] [<805031d8>] (kmem_cache_alloc_node_noprof) from [<81550f2c>] (__alloc_skb+0x138/0x160) [ 5848.703863][T13100] r10:dfbc5d18 r9:00000000 r8:00400cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 5848.703883][T13100] r4:828060c0 [ 5848.703898][T13100] [<81550df4>] (__alloc_skb) from [<8155904c>] (alloc_skb_with_frags+0x44/0x1ec) [ 5848.703956][T13100] r8:802c200c r7:dfbc5cc4 r6:00000000 r5:00001000 r4:00000003 [ 5848.703972][T13100] [<81559008>] (alloc_skb_with_frags) from [<81549b0c>] (sock_alloc_send_pskb+0x1f4/0x228) [ 5848.704028][T13100] r10:dfbc5d18 r9:00000000 r8:802c200c r7:dfbc5cc4 r6:84170000 r5:7fffffff [ 5848.704055][T13100] r4:866e7900 [ 5848.704072][T13100] [<81549918>] (sock_alloc_send_pskb) from [<81819048>] (unix_dgram_sendmsg+0x124/0x748) [ 5848.704138][T13100] r10:00000000 r9:dfbc5dc4 r8:84170000 r7:866e7900 r6:00000000 r5:00000000 [ 5848.704157][T13100] r4:dfbc5f20 [ 5848.704172][T13100] [<81818f24>] (unix_dgram_sendmsg) from [<818196b0>] (unix_seqpacket_sendmsg+0x44/0x84) [ 5848.704231][T13100] r10:00000000 r9:dfbc5dc4 r8:dfbc5dc4 r7:00000000 r6:852fd900 r5:dfbc5f20 [ 5848.704250][T13100] r4:00000000 [ 5848.704265][T13100] [<8181966c>] (unix_seqpacket_sendmsg) from [<81542ca0>] (__sock_sendmsg+0x44/0x78) [ 5848.704318][T13100] r5:dfbc5f20 r4:00000000 [ 5848.704335][T13100] [<81542c5c>] (__sock_sendmsg) from [<81543ff4>] (____sys_sendmsg+0x298/0x2cc) [ 5848.704394][T13100] r7:00000000 r6:852fd900 r5:00040800 r4:dfbc5f20 [ 5848.704416][T13100] [<81543d5c>] (____sys_sendmsg) from [<81545fbc>] (___sys_sendmsg+0x9c/0xd0) [ 5848.704482][T13100] r10:dfbc5e24 r9:20000440 r8:00040800 r7:00000000 r6:852fd900 r5:dfbc5f20 [ 5848.704505][T13100] r4:00000000 [ 5848.704521][T13100] [<81545f20>] (___sys_sendmsg) from [<81546454>] (__sys_sendmsg+0x8c/0xe0) [ 5848.704591][T13100] r10:00000128 r9:84170000 r8:84b59300 r7:00040800 r6:20000440 r5:84b59301 [ 5848.704612][T13100] r4:00000004 [ 5848.704630][T13100] [<815463c8>] (__sys_sendmsg) from [<815464bc>] (sys_sendmsg+0x14/0x18) [ 5848.704694][T13100] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5848.704714][T13100] [<815464a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5848.704769][T13100] Exception stack(0xdfbc5fa8 to 0xdfbc5ff0) [ 5848.704815][T13100] 5fa0: 00000000 00000000 00000004 20000440 00040800 00000000 [ 5848.704856][T13100] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fb10bc [ 5848.704887][T13100] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5854.269124][ T31] audit: type=1400 audit(134223838.104:641): avc: denied { lock } for pid=13128 comm="syz.5.15184" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5860.162177][ T31] audit: type=1400 audit(134223844.044:642): avc: denied { mounton } for pid=13142 comm="syz.5.15188" path="/2169/file0" dev="tmpfs" ino=11432 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5860.162698][ T31] audit: type=1400 audit(134223844.054:643): avc: denied { remount } for pid=13142 comm="syz.5.15188" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5860.229602][ T31] audit: type=1400 audit(134223844.114:644): avc: denied { unmount } for pid=2422 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5866.365531][ T31] audit: type=1400 audit(134223850.264:645): avc: denied { getopt } for pid=13161 comm="syz.5.15195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5877.231802][T13210] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5877.233244][T13210] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5877.263237][T13210] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5877.264765][T13210] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5879.844457][T13235] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=13235 comm=syz.5.15216 [ 5882.191355][T13250] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5130 sclass=netlink_tcpdiag_socket pid=13250 comm=syz.5.15223 [ 5882.719959][ T31] audit: type=1400 audit(134223866.624:646): avc: denied { setopt } for pid=13248 comm="syz.4.15222" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5883.462676][T13269] FAULT_INJECTION: forcing a failure. [ 5883.462676][T13269] name failslab, interval 1, probability 0, space 0, times 0 [ 5883.463088][T13269] CPU: 0 UID: 0 PID: 13269 Comm: syz.5.15229 Not tainted syzkaller #0 PREEMPT [ 5883.463176][T13269] Hardware name: ARM-Versatile Express [ 5883.463202][T13269] Call trace: [ 5883.463283][T13269] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5883.463398][T13269] r7:00000d40 r6:00000000 r5:60000013 r4:82260234 [ 5883.463422][T13269] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5883.463471][T13269] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5883.463518][T13269] r5:8403bc00 r4:82917bc0 [ 5883.463532][T13269] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5883.463583][T13269] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5883.463696][T13269] r8:8403bc00 r7:00000d40 r6:8645f328 r5:0000001a r4:83001240 [ 5883.463728][T13269] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5883.463823][T13269] [<80503b7c>] (__kmalloc_noprof) from [<807c33b4>] (tomoyo_encode2+0x64/0xf0) [ 5883.463930][T13269] r10:00000fff r9:8309f800 r8:00000000 r7:8368e4c8 r6:8645f328 r5:85472ffd [ 5883.464005][T13269] r4:85472fee [ 5883.464085][T13269] [<807c3350>] (tomoyo_encode2) from [<807c3464>] (tomoyo_encode+0x24/0x30) [ 5883.464386][T13269] r9:8309f800 r8:00000000 r7:8368e4c8 r6:8645f328 r5:00001000 r4:85472fef [ 5883.464441][T13269] [<807c3440>] (tomoyo_encode) from [<807c34f0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5883.464582][T13269] r5:00001000 r4:85472000 [ 5883.464602][T13269] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf5f0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5883.464812][T13269] r10:8403bc00 r9:00000000 r8:8645f300 r7:000089fa r6:00000004 r5:81cd6504 [ 5883.464936][T13269] r4:8645f328 r3:826c0200 [ 5883.465057][T13269] [<807bf524>] (tomoyo_path_number_perm) from [<807c3ed0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5883.465265][T13269] r9:00000003 r8:8645f300 r7:20002a80 r6:20002a80 r5:000089fa r4:8645f300 [ 5883.465289][T13269] [<807c3eb4>] (tomoyo_file_ioctl) from [<80770724>] (security_file_ioctl+0x64/0x1e4) [ 5883.465390][T13269] [<807706c0>] (security_file_ioctl) from [<8056cc6c>] (sys_ioctl+0x4c/0xba0) [ 5883.465457][T13269] r7:20002a80 r6:8645f301 r5:00000000 r4:000089fa [ 5883.465533][T13269] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5883.465748][T13269] Exception stack(0xdfd09fa8 to 0xdfd09ff0) [ 5883.465905][T13269] 9fa0: 00000000 00000000 00000003 000089fa 20002a80 00000000 [ 5883.465949][T13269] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5883.466586][T13269] 9fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5883.466736][T13269] r10:00000036 r9:8403bc00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5883.466798][T13269] r4:00000000 [ 5883.518919][T13269] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5889.892004][T13295] FAULT_INJECTION: forcing a failure. [ 5889.892004][T13295] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5889.892241][T13295] CPU: 0 UID: 0 PID: 13295 Comm: syz.5.15237 Not tainted syzkaller #0 PREEMPT [ 5889.892294][T13295] Hardware name: ARM-Versatile Express [ 5889.892307][T13295] Call trace: [ 5889.892330][T13295] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5889.892390][T13295] r7:852fcf00 r6:00000000 r5:60000013 r4:82260234 [ 5889.892400][T13295] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5889.892427][T13295] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5889.892455][T13295] r5:84151800 r4:8294f150 [ 5889.892463][T13295] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5889.892512][T13295] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5889.892563][T13295] r8:8645f240 r7:852fcf00 r6:8565d880 r5:20002a80 r4:000089fa [ 5889.892572][T13295] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5889.892598][T13295] [<80972540>] (should_fail_usercopy) from [<81544704>] (sock_ioctl+0x3a0/0x600) [ 5889.892628][T13295] [<81544364>] (sock_ioctl) from [<8056cd50>] (sys_ioctl+0x130/0xba0) [ 5889.892665][T13295] r9:00000003 r8:8645f240 r7:20002a80 r6:8645f241 r5:00000000 r4:000089fa [ 5889.892674][T13295] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5889.892788][T13295] Exception stack(0xdfd41fa8 to 0xdfd41ff0) [ 5889.893039][T13295] 1fa0: 00000000 00000000 00000003 000089fa 20002a80 00000000 [ 5889.893436][T13295] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 5889.893517][T13295] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5889.893543][T13295] r10:00000036 r9:84151800 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5889.893584][T13295] r4:00000000 [ 5891.473209][ T31] audit: type=1400 audit(134223875.374:647): avc: denied { bind } for pid=13312 comm="syz.5.15247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5891.475262][ T31] audit: type=1400 audit(134223875.374:648): avc: denied { name_bind } for pid=13312 comm="syz.5.15247" src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 5891.478792][ T31] audit: type=1400 audit(134223875.374:649): avc: denied { node_bind } for pid=13312 comm="syz.5.15247" saddr=224.0.0.1 src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 5891.480944][ T31] audit: type=1400 audit(134223875.374:650): avc: denied { connect } for pid=13312 comm="syz.5.15247" laddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5891.597097][ T31] audit: type=1400 audit(134223875.474:651): avc: denied { create } for pid=13313 comm="syz.4.15246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5891.647379][ T31] audit: type=1400 audit(134223875.544:652): avc: denied { setopt } for pid=13313 comm="syz.4.15246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5892.169890][ T31] audit: type=1400 audit(134223876.074:653): avc: denied { setopt } for pid=13316 comm="syz.5.15248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5892.662509][ T31] audit: type=1400 audit(134223876.564:654): avc: denied { getopt } for pid=13316 comm="syz.5.15248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5893.529833][T13335] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=13335 comm=syz.5.15252 [ 5893.568053][T13337] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=13337 comm=syz.5.15252 [ 5894.435982][ T31] audit: type=1400 audit(134223878.334:655): avc: denied { ioctl } for pid=13345 comm="syz.5.15256" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=147241 ioctlcmd=0xaa05 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5899.705824][T13381] FAULT_INJECTION: forcing a failure. [ 5899.705824][T13381] name failslab, interval 1, probability 0, space 0, times 0 [ 5899.719825][T13381] CPU: 1 UID: 0 PID: 13381 Comm: syz.4.15271 Not tainted syzkaller #0 PREEMPT [ 5899.719980][T13381] Hardware name: ARM-Versatile Express [ 5899.720010][T13381] Call trace: [ 5899.720065][T13381] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5899.720173][T13381] r7:00000c40 r6:00000000 r5:60000113 r4:82260234 [ 5899.720193][T13381] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5899.720241][T13381] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5899.720293][T13381] r5:85706000 r4:82917bc0 [ 5899.720308][T13381] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5899.720362][T13381] [<80972300>] (should_fail_ex) from [<8051f288>] (should_failslab+0x6c/0x94) [ 5899.720424][T13381] r8:85706000 r7:00000c40 r6:847f4ce8 r5:00001000 r4:830016c0 [ 5899.720441][T13381] [<8051f21c>] (should_failslab) from [<80503c18>] (__kmalloc_noprof+0x9c/0x458) [ 5899.720485][T13381] [<80503b7c>] (__kmalloc_noprof) from [<807c34ac>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5899.720545][T13381] r10:000000c5 r9:8309e400 r8:00000000 r7:8343d908 r6:847f4ce8 r5:00001000 [ 5899.720563][T13381] r4:00000000 [ 5899.720578][T13381] [<807c3470>] (tomoyo_realpath_from_path) from [<807bf9f4>] (tomoyo_path_perm+0xe4/0x200) [ 5899.720634][T13381] r10:000000c5 r9:85706000 r8:00000001 r7:00000000 r6:00000005 r5:00000000 [ 5899.720654][T13381] r4:00000000 r3:00000000 [ 5899.720668][T13381] [<807bf910>] (tomoyo_path_perm) from [<807c3cfc>] (tomoyo_inode_getattr+0x1c/0x20) [ 5899.720722][T13381] r8:8020029c r7:847f4cc0 r6:847f4ce8 r5:dfdedeb8 r4:847f4ce8 [ 5899.720738][T13381] [<807c3ce0>] (tomoyo_inode_getattr) from [<8077c9d0>] (security_inode_getattr+0x64/0x1ac) [ 5899.720787][T13381] [<8077c96c>] (security_inode_getattr) from [<8055b8e4>] (vfs_fstat+0x30/0x8c) [ 5899.720839][T13381] r5:dfdedeb8 r4:847f4cc1 [ 5899.720856][T13381] [<8055b8b4>] (vfs_fstat) from [<8055ba00>] (__do_sys_fstat64+0x44/0x80) [ 5899.720907][T13381] r7:000000c5 r6:00130270 r5:20000180 r4:00000003 [ 5899.720922][T13381] [<8055b9bc>] (__do_sys_fstat64) from [<8055bf08>] (sys_fstat64+0x10/0x14) [ 5899.720971][T13381] r5:00000000 r4:00000000 [ 5899.720985][T13381] [<8055bef8>] (sys_fstat64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5899.721034][T13381] Exception stack(0xdfdedfa8 to 0xdfdedff0) [ 5899.721075][T13381] dfa0: 00000000 00000000 00000003 20000180 00000000 00000000 [ 5899.721107][T13381] dfc0: 00000000 00000000 00130270 000000c5 002e0000 00000000 00006364 76f180bc [ 5899.721131][T13381] dfe0: 76f17ec0 76f17eb0 0001948c 001322c0 [ 5899.744894][T13381] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5900.322928][T13387] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13387 comm=syz.5.15274 [ 5900.647719][T13390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13390 comm=syz.5.15275 [ 5901.208820][T13390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13390 comm=syz.5.15275 [ 5914.017416][ T31] audit: type=1400 audit(134223897.914:656): avc: denied { create } for pid=13458 comm="syz.4.15301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5917.375102][ T31] audit: type=1400 audit(134223901.274:657): avc: denied { write } for pid=13471 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5917.407681][ T31] audit: type=1400 audit(134223901.304:658): avc: denied { open } for pid=13471 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5917.421348][ T31] audit: type=1400 audit(134223901.324:659): avc: denied { search } for pid=13471 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5917.421705][ T31] audit: type=1400 audit(134223901.324:660): avc: denied { search } for pid=13471 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5917.421910][ T31] audit: type=1400 audit(134223901.324:661): avc: denied { search } for pid=13471 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5917.422106][ T31] audit: type=1400 audit(134223901.324:662): avc: denied { search } for pid=13471 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5917.463633][ T31] audit: type=1400 audit(134223901.364:663): avc: denied { read open } for pid=13473 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5917.466098][ T31] audit: type=1400 audit(134223901.364:664): avc: denied { getattr } for pid=13473 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5917.536130][ T31] audit: type=1400 audit(134223901.434:665): avc: denied { add_name } for pid=13471 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5924.639384][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 5924.639774][ T31] audit: type=1400 audit(134223908.544:675): avc: denied { bind } for pid=13512 comm="syz.5.15314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5924.648853][ T31] audit: type=1400 audit(134223908.554:676): avc: denied { accept } for pid=13512 comm="syz.5.15314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5931.930077][ T31] audit: type=1400 audit(134223915.834:677): avc: denied { read } for pid=13552 comm="syz.4.15326" name="nbd4" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5931.931612][ T31] audit: type=1400 audit(134223915.834:678): avc: denied { open } for pid=13552 comm="syz.4.15326" path="/dev/nbd4" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5934.751571][ T31] audit: type=1400 audit(134223918.614:679): avc: denied { write } for pid=13573 comm="syz.5.15333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5941.023599][ T31] audit: type=1400 audit(134223924.924:680): avc: denied { lock } for pid=13604 comm="syz.4.15342" path="socket:[148736]" dev="sockfs" ino=148736 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5941.061229][ T31] audit: type=1400 audit(134223924.964:681): avc: denied { getopt } for pid=13604 comm="syz.4.15342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5947.159197][ T31] audit: type=1400 audit(134223931.064:682): avc: denied { map } for pid=13626 comm="syz.4.15347" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5948.431025][ T31] audit: type=1400 audit(134223932.324:683): avc: denied { connect } for pid=13635 comm="syz.4.15348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5949.617891][ T31] audit: type=1400 audit(134223933.514:684): avc: denied { name_bind } for pid=13649 comm="syz.5.15352" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5949.622952][T13650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13650 comm=syz.5.15352 [ 5949.663519][T13650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13650 comm=syz.5.15352 [ 5949.922920][T13652] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 5952.808217][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=13664 comm=syz.5.15358 [ 5959.703715][T13743] FAULT_INJECTION: forcing a failure. [ 5959.703715][T13743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5959.709281][T13743] CPU: 0 UID: 0 PID: 13743 Comm: syz.5.15366 Not tainted syzkaller #0 PREEMPT [ 5959.709458][T13743] Hardware name: ARM-Versatile Express [ 5959.709490][T13743] Call trace: [ 5959.709535][T13743] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5959.709658][T13743] r7:e0451e20 r6:00000000 r5:60000113 r4:82260234 [ 5959.709678][T13743] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5959.709729][T13743] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5959.709780][T13743] r5:857e2400 r4:8294f150 [ 5959.709795][T13743] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5959.709849][T13743] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5959.709906][T13743] r8:2400c040 r7:e0451e20 r6:200001c0 r5:00000000 r4:e0451f20 [ 5959.709922][T13743] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5959.709968][T13743] [<80972540>] (should_fail_usercopy) from [<81545e40>] (copy_msghdr_from_user+0x50/0x130) [ 5959.710024][T13743] [<81545df0>] (copy_msghdr_from_user) from [<81545f98>] (___sys_sendmsg+0x78/0xd0) [ 5959.710084][T13743] r8:2400c040 r7:00000000 r6:84cc1b80 r5:e0451f20 r4:e0451e64 [ 5959.710104][T13743] [<81545f20>] (___sys_sendmsg) from [<81546454>] (__sys_sendmsg+0x8c/0xe0) [ 5959.710171][T13743] r10:00000128 r9:857e2400 r8:84b59180 r7:2400c040 r6:200001c0 r5:84b59181 [ 5959.710191][T13743] r4:00000004 [ 5959.710207][T13743] [<815463c8>] (__sys_sendmsg) from [<815464bc>] (sys_sendmsg+0x14/0x18) [ 5959.710303][T13743] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5959.710353][T13743] [<815464a8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5959.710403][T13743] Exception stack(0xe0451fa8 to 0xe0451ff0) [ 5959.710442][T13743] 1fa0: 00000000 00000000 00000004 200001c0 2400c040 00000000 [ 5959.710475][T13743] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fb10bc [ 5959.710500][T13743] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 5960.708456][ T31] audit: type=1400 audit(134223944.604:685): avc: denied { mount } for pid=13748 comm="syz.4.15369" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 5960.787060][ T31] audit: type=1400 audit(134223944.664:686): avc: denied { remount } for pid=13748 comm="syz.4.15369" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 5961.285486][ T31] audit: type=1400 audit(134223945.184:687): avc: denied { unmount } for pid=21597 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 5962.217471][ T31] audit: type=1400 audit(134223946.094:688): avc: denied { ioctl } for pid=13760 comm="syz.5.15374" path="socket:[148944]" dev="sockfs" ino=148944 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5964.870961][ T31] audit: type=1400 audit(134223948.774:689): avc: denied { getopt } for pid=13790 comm="syz.5.15384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5964.883126][ T31] audit: type=1400 audit(134223948.784:690): avc: denied { bind } for pid=13790 comm="syz.5.15384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5965.084031][ T31] audit: type=1400 audit(134223948.984:691): avc: denied { ioctl } for pid=13790 comm="syz.5.15384" path="socket:[148165]" dev="sockfs" ino=148165 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5965.268418][ T31] audit: type=1400 audit(134223949.174:692): avc: denied { write } for pid=13790 comm="syz.5.15384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5965.283197][ T31] audit: type=1400 audit(134223949.174:693): avc: denied { create } for pid=13790 comm="syz.5.15384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5965.801861][T13800] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5135 sclass=netlink_audit_socket pid=13800 comm=syz.5.15386 [ 5966.194607][ T31] audit: type=1400 audit(134223950.094:694): avc: denied { execute } for pid=13803 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5966.220356][ T31] audit: type=1400 audit(134223950.094:695): avc: denied { execute_no_trans } for pid=13803 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5966.318393][ T31] audit: type=1400 audit(134223950.204:696): avc: denied { mounton } for pid=13807 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5966.376784][T13804] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5966.425489][T13804] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5966.487900][T13804] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5966.579830][T13804] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5967.013921][T13804] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5967.032242][T13804] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5967.038829][T13804] bond0 (unregistering): Released all slaves [ 5967.167323][T13804] hsr_slave_0: left promiscuous mode [ 5967.169312][T13804] hsr_slave_1: left promiscuous mode [ 5967.181651][T13804] veth0_macvtap: left promiscuous mode [ 5969.964955][T13807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5969.985161][T13807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5971.203250][T13807] hsr_slave_0: entered promiscuous mode [ 5971.205776][T13807] hsr_slave_1: entered promiscuous mode [ 5971.824579][T13807] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 5971.838378][T13807] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 5971.863399][T13807] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 5971.874917][T13807] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 5972.884514][T13807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5974.065954][T13807] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 5978.301067][T13807] veth0_vlan: entered promiscuous mode [ 5978.340359][T13807] veth1_vlan: entered promiscuous mode [ 5978.460414][T13807] veth0_macvtap: entered promiscuous mode [ 5978.474125][T13807] veth1_macvtap: entered promiscuous mode [ 5978.574048][T12200] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5978.574863][T12200] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5978.575562][T12200] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5978.575780][T12200] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5978.776260][ T31] audit: type=1400 audit(134223962.674:697): avc: denied { mounton } for pid=13807 comm="syz-executor" path="/syzkaller.2WH5aC/syz-tmp" dev="vda" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 5978.790592][ T31] audit: type=1400 audit(134223962.694:698): avc: denied { mount } for pid=13807 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5978.798538][ T31] audit: type=1400 audit(134223962.694:699): avc: denied { mount } for pid=13807 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 5978.813070][ T31] audit: type=1400 audit(134223962.714:700): avc: denied { mounton } for pid=13807 comm="syz-executor" path="/syzkaller.2WH5aC/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 5978.815855][ T31] audit: type=1400 audit(134223962.714:701): avc: denied { mounton } for pid=13807 comm="syz-executor" path="/syzkaller.2WH5aC/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=149459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 5978.869003][ T31] audit: type=1400 audit(134223962.774:702): avc: denied { unmount } for pid=13807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 5978.923554][ T31] audit: type=1400 audit(134223962.824:703): avc: denied { mounton } for pid=13807 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 5978.925591][ T31] audit: type=1400 audit(134223962.824:704): avc: denied { mount } for pid=13807 comm="syz-executor" name="/" dev="gadgetfs" ino=1815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 5978.932356][ T31] audit: type=1400 audit(134223962.834:705): avc: denied { mount } for pid=13807 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 5978.934215][ T31] audit: type=1400 audit(134223962.834:706): avc: denied { mounton } for pid=13807 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 5979.751159][T14260] FAULT_INJECTION: forcing a failure. [ 5979.751159][T14260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5979.751496][T14260] CPU: 1 UID: 0 PID: 14260 Comm: syz.5.15388 Not tainted syzkaller #0 PREEMPT [ 5979.751584][T14260] Hardware name: ARM-Versatile Express [ 5979.751615][T14260] Call trace: [ 5979.751660][T14260] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5979.751776][T14260] r7:00006364 r6:00000000 r5:60030113 r4:82260234 [ 5979.751798][T14260] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5979.751915][T14260] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5979.752067][T14260] r5:863b0000 r4:8294f150 [ 5979.752128][T14260] [<8021fb9c>] (dump_stack) from [<809724c4>] (should_fail_ex+0x1c4/0x228) [ 5979.752249][T14260] [<80972300>] (should_fail_ex) from [<8097253c>] (should_fail+0x14/0x18) [ 5979.752431][T14260] r8:00000000 r7:00006364 r6:76f8d0bc r5:863b0830 r4:76f8cbb8 [ 5979.752749][T14260] [<80972528>] (should_fail) from [<8097255c>] (should_fail_usercopy+0x1c/0x20) [ 5979.752817][T14260] [<80972540>] (should_fail_usercopy) from [<8022b624>] (setup_sigframe+0xe4/0x1c4) [ 5979.752876][T14260] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 5979.752947][T14260] r10:00000122 r9:b5403587 r8:00000000 r7:863b0830 r6:76f8cbb8 r5:eab75fb0 [ 5979.753100][T14260] r4:863b0000 [ 5979.753157][T14260] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 5979.753335][T14260] Exception stack(0xeab75fb0 to 0xeab75ff8) [ 5979.753441][T14260] 5fa0: fffffffc 00000000 00000000 00004000 [ 5979.753742][T14260] 5fc0: 00000000 00000000 00130270 00000122 002e0000 00000000 00006364 76f8d0bc [ 5979.753881][T14260] 5fe0: 76f8cec0 76f8ceb0 0001948c 001322c0 60000010 00000004 [ 5979.754022][T14260] r10:00000122 r9:863b0000 r8:8020029c r7:00000122 r6:00130270 r5:00000000 [ 5979.754070][T14260] r4:00000000 [ 5989.249917][T12200] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5989.325394][T12200] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5989.414535][T12200] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5989.618716][T12200] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5990.279013][T12200] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5990.300683][T12200] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5990.333316][T12200] bond0 (unregistering): Released all slaves [ 5990.439548][T12200] hsr_slave_0: left promiscuous mode [ 5990.489398][T12200] veth1_macvtap: left promiscuous mode [ 5990.490515][T12200] veth0_macvtap: left promiscuous mode [ 5990.495102][T12200] veth1_vlan: left promiscuous mode [ 5990.497103][T12200] veth0_vlan: left promiscuous mode [ 5994.223411][T14269] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5994.249780][T14269] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5996.138771][T14269] hsr_slave_0: entered promiscuous mode [ 5996.147552][T14269] hsr_slave_1: entered promiscuous mode [ 5996.148431][T14269] debugfs: 'hsr0' already exists in 'hsr' [ 5996.148652][T14269] Cannot create hsr debugfs directory [ 5997.492863][T14269] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 5997.552814][T14269] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 5997.592718][T14269] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 5997.603742][T14269] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 5999.405422][T14269] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6008.271008][T14269] veth0_vlan: entered promiscuous mode [ 6008.332474][T14269] veth1_vlan: entered promiscuous mode [ 6008.480254][T14269] veth0_macvtap: entered promiscuous mode [ 6008.518786][T14269] veth1_macvtap: entered promiscuous mode [ 6008.713501][T14294] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6008.714223][T14294] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6008.714989][T14294] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6008.715261][T14294] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6009.182179][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 6009.183343][ T31] audit: type=1400 audit(134223993.084:709): avc: denied { connect } for pid=14709 comm="syz.4.15398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6026.574841][ T31] audit: type=1400 audit(134224010.474:710): avc: denied { setopt } for pid=14736 comm="syz.4.15409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6029.915582][T14742] tmpfs: Unsupported parameter 'huge' [ 6030.119950][T14748] netlink: 83 bytes leftover after parsing attributes in process `syz.4.15413'. [ 6032.091264][ T31] audit: type=1400 audit(134224015.994:711): avc: denied { read } for pid=14757 comm="syz.4.15417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6034.334621][ T31] audit: type=1400 audit(134224018.234:712): avc: denied { read } for pid=14760 comm="syz.4.15418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6034.411265][ T31] audit: type=1326 audit(134224018.314:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.413279][ T31] audit: type=1326 audit(134224018.314:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.422005][ T31] audit: type=1326 audit(134224018.324:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.422685][ T31] audit: type=1326 audit(134224018.324:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.423392][ T31] audit: type=1326 audit(134224018.324:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.425519][ T31] audit: type=1326 audit(134224018.324:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.434625][ T31] audit: type=1326 audit(134224018.334:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6034.434841][ T31] audit: type=1326 audit(134224018.334:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14766 comm="syz.4.15422" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6048.279779][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 6048.280126][ T31] audit: type=1400 audit(134224032.184:727): avc: denied { unmount } for pid=14269 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6064.552954][ T31] audit: type=1400 audit(134224048.454:728): avc: denied { mount } for pid=14812 comm="syz.5.15434" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 6064.640930][T14819] *** NOT YET: opcode c3 *** [ 6079.499377][ T31] audit: type=1326 audit(134224063.404:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14844 comm="syz.5.15444" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 6081.028169][ T31] audit: type=1400 audit(134224064.924:730): avc: denied { execute } for pid=14852 comm="syz.5.15447" dev="tmpfs" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6081.041131][ T31] audit: type=1400 audit(134224064.944:731): avc: denied { execute_no_trans } for pid=14852 comm="syz.5.15447" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6088.262461][ T31] audit: type=1400 audit(134224072.164:732): avc: denied { block_suspend } for pid=14900 comm="syz.5.15470" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6088.869794][ T31] audit: type=1400 audit(134224072.774:733): avc: denied { getopt } for pid=14910 comm="syz.5.15473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6092.063757][ T31] audit: type=1326 audit(134224075.964:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14950 comm="syz.5.15491" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 6094.124320][ T31] audit: type=1326 audit(134224078.024:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14964 comm="syz.5.15496" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 6106.284236][ T31] audit: type=1400 audit(134224090.184:736): avc: denied { call } for pid=15077 comm="syz.4.15539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 6110.047863][T15092] bond0: (slave bond_slave_0): Releasing backup interface [ 6110.066218][T15092] bond0: (slave bond_slave_1): Releasing backup interface [ 6111.760886][T15103] tmpfs: Unsupported parameter 'huge' [ 6113.550640][T15114] netlink: 8 bytes leftover after parsing attributes in process `syz.4.15551'. [ 6118.884350][T15155] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6118.885116][T15155] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6118.975593][ T31] audit: type=1400 audit(134224102.874:737): avc: denied { mounton } for pid=15154 comm="syz.4.15564" path="/proc/201/task" dev="proc" ino=151502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 6119.745010][T15164] comedi: valid board names for 8255 driver are: [ 6119.745257][T15164] 8255 [ 6119.745440][T15164] comedi: valid board names for vmk80xx driver are: [ 6119.745523][T15164] vmk80xx [ 6119.745591][T15164] comedi: valid board names for usbduxsigma driver are: [ 6119.745611][T15164] usbduxsigma [ 6119.745618][T15164] comedi: valid board names for usbduxfast driver are: [ 6119.745626][T15164] usbduxfast [ 6119.745633][T15164] comedi: valid board names for usbdux driver are: [ 6119.745640][T15164] usbdux [ 6119.745647][T15164] comedi: valid board names for ni6501 driver are: [ 6119.745654][T15164] ni6501 [ 6119.745660][T15164] comedi: valid board names for dt9812 driver are: [ 6119.745667][T15164] dt9812 [ 6119.745672][T15164] comedi: valid board names for ni_labpc_cs driver are: [ 6119.745679][T15164] ni_labpc_cs [ 6119.745686][T15164] comedi: valid board names for ni_daq_700 driver are: [ 6119.745693][T15164] ni_daq_700 [ 6119.745699][T15164] comedi: valid board names for labpc_pci driver are: [ 6119.745706][T15164] labpc_pci [ 6119.745712][T15164] comedi: valid board names for adl_pci9118 driver are: [ 6119.745728][T15164] pci9118dg [ 6119.745748][T15164] pci9118hg [ 6119.745754][T15164] pci9118hr [ 6119.745761][T15164] comedi: valid board names for 8255_pci driver are: [ 6119.745768][T15164] 8255_pci [ 6119.745834][T15164] comedi: valid board names for comedi_parport driver are: [ 6119.745845][T15164] comedi_parport [ 6119.745853][T15164] comedi: valid board names for comedi_test driver are: [ 6119.745895][T15164] comedi_test [ 6119.745904][T15164] comedi: valid board names for comedi_bond driver are: [ 6119.746001][T15164] comedi_bond [ 6120.171817][ T31] audit: type=1400 audit(134224104.074:738): avc: denied { setopt } for pid=15167 comm="syz.4.15569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6120.173888][ T31] audit: type=1400 audit(134224104.074:739): avc: denied { write } for pid=15167 comm="syz.4.15569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6121.601470][T15192] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6121.604393][T15192] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6121.824173][T15202] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6121.829993][T15202] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6122.671631][T15219] input: syz1 as /devices/virtual/input/input17 [ 6124.689359][T15229] ------------[ cut here ]------------ [ 6124.689869][T15229] WARNING: CPU: 0 ** replaying previous printk message ** [ 6124.689869][T15229] WARNING: CPU: 0 PID: 15229 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 6124.697505][T15229] Modules linked in: [ 6124.699023][T15229] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 6124.699586][T15229] CPU: 0 UID: 0 PID: 15229 Comm: syz.5.15582 Not tainted syzkaller #0 PREEMPT [ 6124.699948][T15229] Hardware name: ARM-Versatile Express [ 6124.700185][T15229] Call trace: [ 6124.700446][T15229] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6124.700858][T15229] r7:00000000 r6:8281f77c r5:00000000 r4:82260234 [ 6124.701124][T15229] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 6124.701511][T15229] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 6124.701901][T15229] r5:00000000 r4:82a77d18 [ 6124.702125][T15229] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 6124.702396][T15229] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 6124.702669][T15229] r7:804bed18 [ 6124.702840][T15229] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 6124.703174][T15229] r3:8280c684 r2:00000001 r1:82246c50 r0:8224e6cc [ 6124.703438][T15229] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 6124.703785][T15229] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 6124.704152][T15229] r8:00000009 r7:8227aa78 r6:dfa79d14 r5:85700c00 r4:00000000 [ 6124.704441][T15229] [<80254bd0>] (warn_slowpath_fmt) from [<804bed18>] (kunmap_local_indexed+0x20c/0x224) [ 6124.704843][T15229] r10:00000000 r9:dedefc3c r8:deb65610 r7:00a00000 r6:00000003 r5:85700c00 [ 6124.705384][T15229] r4:ffefd000 [ 6124.705749][T15229] [<804beb0c>] (kunmap_local_indexed) from [<8053b470>] (move_pages+0xb1c/0x1a00) [ 6124.706444][T15229] r7:00a00000 r6:00000000 r5:8665d1a4 r4:ffefb000 [ 6124.706950][T15229] [<8053a954>] (move_pages) from [<805c49dc>] (userfaultfd_ioctl+0x1254/0x2408) [ 6124.707548][T15229] r10:841bf740 r9:dfa79e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 6124.707943][T15229] r4:848fd200 [ 6124.708170][T15229] [<805c3788>] (userfaultfd_ioctl) from [<8056cd50>] (sys_ioctl+0x130/0xba0) [ 6124.708544][T15229] r10:85700c00 r9:00000003 r8:866a1f00 r7:20000040 r6:866a1f01 r5:00000000 [ 6124.708900][T15229] r4:c028aa05 [ 6124.709066][T15229] [<8056cc20>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6124.709409][T15229] Exception stack(0xdfa79fa8 to 0xdfa79ff0) [ 6124.709707][T15229] 9fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 6124.710072][T15229] 9fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76fae0bc [ 6124.711938][T15229] 9fe0: 76fadec0 76fadeb0 0001948c 001322c0 [ 6124.712263][T15229] r10:00000036 r9:85700c00 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 6124.714323][T15229] r4:00000000 [ 6124.716712][T15229] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:29:25 Registers: info registers vcpu 0 CPU#0 R00=5b70d000 R01=008a9fef R02=826b72c4 R03=81a39c70 R04=00000008 R05=828f7848 R06=00000000 R07=828f7840 R08=85700c00 R09=00000028 R10=828f7848 R11=df801d4c R12=df801d50 R13=df801d40 R14=8033d8b4 R15=81a39c80 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ec061e50 R01=8244d0a4 R02=001896a0 R03=80201260 R04=8280cce4 R05=df80a000 R06=8240f71c R07=df80a00c R08=00000000 R09=84150c00 R10=b5003500 R11=df805fd4 R12=df805fd8 R13=df805fb8 R14=81a387e4 R15=8020127c PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000