last executing test programs: 2.808457283s ago: executing program 1 (id=13792): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x5452, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000140)={{}, 0x4, 0x40, 0xba03}, 0x10) 2.670321861s ago: executing program 0 (id=13794): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) getsockname$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) getsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000100)=""/144, &(0x7f00000001c0)=0x90) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x351002, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)) write$P9_RREMOVE(r1, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = dup3(r3, r2, 0x0) accept4$llc(r4, 0x0, &(0x7f0000000040), 0x80800) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x248, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x1, 0x7, 0x9, 0x1, 0x8, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x49}]}, &(0x7f0000000280)='syzkaller\x00', 0x8, 0xe8, &(0x7f00000002c0)=""/232, 0x1f00, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x2c, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r0], 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@map=r0, 0x20, 0x0, 0x8, &(0x7f0000000500)=[0x0], 0x1, 0x0, &(0x7f0000000540)=[0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000680)={@fallback=r1, r5, 0x2, 0x2000, r0, @value=r1, @void, @void, @void, r6}, 0x20) close_range(r0, r0, 0x0) r7 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x311000) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) dup2(r8, r7) write$RDMA_USER_CM_CMD_SET_OPTION(r7, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0xd3a, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0}}, 0x24008014) 2.399164146s ago: executing program 0 (id=13795): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x80000) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000f80)={0x0, 0x1a, &(0x7f0000000f40)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x8010) 2.120630392s ago: executing program 0 (id=13796): r0 = landlock_create_ruleset(&(0x7f0000000000)={0x8000, 0x1, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x9a3982, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)={0x1, 0x3, [@broadcast, @local, @empty]}) 1.813463518s ago: executing program 1 (id=13797): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x40040, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20004040) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='memory.swap.max\x00', 0x657, 0xfeffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xfffffff7) socket$inet(0x2, 0xa, 0x0) r4 = openat$binder_debug(0xffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close(r4) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'wlan0\x00', 0x8}) r6 = socket(0x10, 0x2, 0x0) getsockopt$IP_SET_OP_VERSION(r6, 0x1, 0x9, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendto$llc(r4, 0x0, 0x0, 0x8004, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) 1.60870317s ago: executing program 0 (id=13798): r0 = socket(0x1d, 0x2, 0x6) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, 0x0, 0x0) 1.468618688s ago: executing program 1 (id=13799): pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$RTC_UIE_OFF(r0, 0x7004) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x802, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x20}, 0xfdef) write$uinput_user_dev(r1, &(0x7f0000002240)={'syz0\x00', {0xc6f, 0x9, 0xfff, 0x1}, 0x20, [0x3ff, 0x3, 0x8, 0x7, 0x6, 0xffffffc0, 0x3, 0x5, 0x2, 0x80000001, 0x8, 0x12, 0x1, 0x4, 0x1, 0x2, 0x86, 0x5a3, 0x6, 0x3, 0x5, 0xff, 0x0, 0x0, 0x3, 0x2, 0x7, 0x3ff, 0x3, 0x7, 0x8, 0x5, 0xff, 0xfffffffb, 0xe, 0x8, 0xfffffff6, 0x8, 0x3, 0xd, 0xfa, 0xc3, 0x8, 0x3, 0x9, 0xc8, 0x7, 0x6, 0x8001, 0x0, 0x6, 0x1ff, 0x9, 0x3, 0xff, 0xa33, 0xc, 0x400, 0x5, 0x1000, 0xffff, 0x7ff, 0xfff, 0x1], [0xc6, 0x0, 0xffff818c, 0x3ad, 0x6, 0x4, 0x1, 0xd4, 0x2, 0x8, 0xbb1, 0x800, 0x7, 0x3, 0x3, 0x17f, 0x0, 0x2, 0x5, 0x80000001, 0x1, 0x4, 0x3, 0x3, 0x3c, 0x5, 0xfffffff1, 0x7f727a65, 0xeee, 0x6, 0x0, 0x1, 0xffffffff, 0x7, 0x5, 0x9, 0x4, 0x1000, 0xaf0, 0x8, 0x2a, 0xf7f1, 0x101, 0x3, 0x6, 0x3, 0x9, 0x7, 0x1, 0xfffffabf, 0x5, 0x4, 0x3, 0x5, 0x4, 0xffffffff, 0x7fffffff, 0x0, 0x7, 0x8, 0xffff4ec2, 0x2, 0xb6, 0x40], [0x81, 0x3, 0xa6000000, 0x3, 0x8001, 0x7, 0x0, 0x8, 0x1ff, 0x8, 0xcd, 0x9, 0x2, 0xcad, 0x2, 0x5, 0x4, 0x9, 0x9, 0x1c1, 0x4, 0x1, 0xa734, 0x1ff, 0x9, 0x6, 0x7, 0x0, 0x1, 0x0, 0x1, 0x6, 0xf16, 0x10, 0x1ff, 0x1, 0x6fb6, 0xff, 0xe2, 0x8, 0x9, 0x5, 0x34c, 0x29e1, 0x7, 0x7ff, 0x1000, 0x2, 0xffff0001, 0xe, 0x9, 0x5, 0x5ef0, 0xe7, 0x1000, 0x0, 0xc, 0x5, 0xff, 0x8, 0x7ff, 0x0, 0xff, 0x1], [0x6, 0x5, 0x3, 0x0, 0x6658, 0xf, 0xc2ed, 0xffff, 0x0, 0x8, 0x1, 0x3, 0x9, 0x3, 0xfffffff8, 0x3, 0xfffffff6, 0x7, 0x3, 0x3031, 0x57d, 0x1, 0x6a, 0x10000, 0x7, 0x200, 0x2, 0x10001, 0x8000, 0x2, 0x5, 0x8, 0x6, 0x800, 0xfffffffa, 0x6, 0x59, 0x200, 0x9, 0x7, 0x7, 0x4, 0x8001, 0x7, 0x1, 0x8, 0x8, 0x3, 0x3, 0xc, 0xfffffffd, 0x6, 0x9, 0x1, 0x6, 0xfffffe01, 0x5, 0x7daf, 0x0, 0x6, 0xffffffff, 0x1, 0xd, 0x3]}, 0x45c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) read(r4, 0x0, 0x0) sendmsg$unix(r3, &(0x7f00000030c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003080)=ANY=[@ANYBLOB="100000000100000001000000", @ANYRES32=r2], 0x10}, 0x0) recvmsg$unix(r2, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x10}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4040001}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xdc, 0x0, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_SEQ_ADJ_REPLY={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_TUPLE_REPLY={0x80, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x408c0) 1.388757572s ago: executing program 0 (id=13800): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x272a80, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x5421, &(0x7f0000000180)={'syztnl0\x00', 0x0}) r4 = socket(0x1d, 0x2, 0x6) r5 = socket$can_raw(0x1d, 0x3, 0x1) fcntl$dupfd(r1, 0x406, r5) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000040)={0x1d, r6, 0x7, {0x1, 0x1, 0x3}}, 0x18) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000000)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0xc070}, 0x24044054) write$FUSE_POLL(r0, 0x0, 0x0) 817.990804ms ago: executing program 1 (id=13801): r0 = openat$selinux_status(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$selinux_status(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close(r3) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000180)={0xe, {0x2, 0x2, 0x9}}, 0xc) write$tcp_congestion(r1, &(0x7f0000000280)='htcp\x00', 0x5) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$can_raw(0x1d, 0x3, 0x1) dup3(r4, r5, 0x80000) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x28, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2ed9, 0xd}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r7 = accept(r6, 0x0, 0x0) write$FUSE_NOTIFY_RESEND(r7, 0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x83) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x8e79f0352167ea94) openat$vnet(0xffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xa) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {0x2}, 0xfff}) 310.297252ms ago: executing program 1 (id=13802): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, 0x0, 0x1, {0x1, 0x0, 0x3}, 0xff}, 0x18) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40080}, 0x20004080) 89.755174ms ago: executing program 0 (id=13803): r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380), 0x0, 0x0, 0xffffffffffffffff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$can_raw(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)={0x0}}, 0x4008840) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$link(0x1d, r0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x3, 0x1) write$binfmt_misc(r2, 0x0, 0x0) writev(r2, &(0x7f0000002400)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)}, {&(0x7f0000001400)="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", 0x1000}], 0x3) 0s ago: executing program 1 (id=13804): r0 = socket(0x1d, 0x2, 0x6) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, 0x0, 0x0) kernel console output (not intermixed with test programs): 877 comm="syz.1.13314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 7189.227764][ T28] audit: type=1400 audit(134225429.136:36320): avc: denied { create } for pid=20877 comm="syz.1.13314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7189.247486][ T28] audit: type=1400 audit(134225429.156:36321): avc: denied { write } for pid=20877 comm="syz.1.13314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7189.289165][ T28] audit: type=1400 audit(134225429.196:36322): avc: denied { read } for pid=20877 comm="syz.1.13314" dev="nsfs" ino=4026532652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7189.295153][ T28] audit: type=1400 audit(134225429.206:36323): avc: denied { open } for pid=20877 comm="syz.1.13314" path="net:[4026532652]" dev="nsfs" ino=4026532652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7189.302473][ T28] audit: type=1400 audit(134225429.206:36324): avc: denied { create } for pid=20877 comm="syz.1.13314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7190.997132][T20897] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20897 comm=syz.0.13324 [ 7191.148890][T20900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20900 comm=syz.0.13325 [ 7194.155581][ T28] kauditd_printk_skb: 123 callbacks suppressed [ 7194.156000][ T28] audit: type=1400 audit(134225434.066:36446): avc: denied { create } for pid=20932 comm="syz.0.13340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7194.161670][ T28] audit: type=1400 audit(134225434.066:36447): avc: denied { write } for pid=20932 comm="syz.0.13340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7194.185613][ T28] audit: type=1400 audit(134225434.096:36448): avc: denied { create } for pid=20932 comm="syz.0.13340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7194.188328][ T28] audit: type=1400 audit(134225434.096:36449): avc: denied { write } for pid=20932 comm="syz.0.13340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7194.617871][ T28] audit: type=1400 audit(134225434.526:36450): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7194.619750][ T28] audit: type=1400 audit(134225434.526:36451): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7194.621089][ T28] audit: type=1400 audit(134225434.526:36452): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7194.706185][ T28] audit: type=1400 audit(134225434.616:36453): avc: denied { create } for pid=20934 comm="syz.1.13341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7194.710861][ T28] audit: type=1400 audit(134225434.616:36454): avc: denied { ioctl } for pid=20934 comm="syz.1.13341" path="socket:[146347]" dev="sockfs" ino=146347 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7194.717168][ T28] audit: type=1400 audit(134225434.626:36455): avc: denied { setattr } for pid=20932 comm="syz.0.13340" name="KCM" dev="sockfs" ino=146793 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7199.400271][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 7199.405504][ T28] audit: type=1400 audit(134225439.306:36525): avc: denied { write } for pid=20975 comm="syz.1.13360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7199.700104][ T28] audit: type=1400 audit(134225439.606:36526): avc: denied { create } for pid=20987 comm="syz.0.13365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7199.708714][ T28] audit: type=1400 audit(134225439.616:36527): avc: denied { write } for pid=20987 comm="syz.0.13365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7199.885994][T20977] FAULT_INJECTION: forcing a failure. [ 7199.885994][T20977] name failslab, interval 1, probability 0, space 0, times 0 [ 7199.887884][T20977] CPU: 0 UID: 0 PID: 20977 Comm: syz.1.13360 Tainted: G L syzkaller #0 PREEMPT [ 7199.887977][T20977] Tainted: [L]=SOFTLOCKUP [ 7199.887997][T20977] Hardware name: ARM-Versatile Express [ 7199.888039][T20977] Call trace: [ 7199.888099][T20977] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7199.888219][T20977] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7199.888239][T20977] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7199.888294][T20977] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7199.888360][T20977] r7:00000820 r6:00000000 r5:833a3100 r4:82b17c88 [ 7199.888379][T20977] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7199.888441][T20977] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7199.888516][T20977] r8:831dcc00 r7:00000820 r6:00000000 r5:00000000 r4:830e4c00 [ 7199.888538][T20977] [<8054c558>] (should_failslab) from [<80529ae8>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 7199.888593][T20977] [<80529a94>] (kmem_cache_alloc_noprof) from [<815ea6e0>] (skb_clone+0x60/0x1c8) [ 7199.888698][T20977] r10:00000000 r9:88710000 r8:831dcc00 r7:86094400 r6:00000001 r5:831dcc00 [ 7199.888727][T20977] r4:00000820 [ 7199.888746][T20977] [<815ea680>] (skb_clone) from [<819a2890>] (can_send+0x1bc/0x378) [ 7199.888820][T20977] r7:86094400 r6:00000001 r5:00000000 r4:831dcc00 [ 7199.888841][T20977] [<819a26d4>] (can_send) from [<819b4abc>] (isotp_sendmsg+0x3ec/0x86c) [ 7199.888912][T20977] r9:88710000 r8:831dcc00 r7:00000000 r6:8748c000 r5:88712000 r4:00000014 [ 7199.888934][T20977] [<819b46d0>] (isotp_sendmsg) from [<815d5c20>] (__sock_sendmsg+0x44/0x78) [ 7199.889004][T20977] r10:00000080 r9:00000000 r8:dfa91dcc r7:00000000 r6:858c11c0 r5:dfa91f20 [ 7199.889024][T20977] r4:00000000 [ 7199.889042][T20977] [<815d5bdc>] (__sock_sendmsg) from [<815d6c50>] (____sys_sendmsg+0x238/0x2c4) [ 7199.889117][T20977] r7:00000000 r6:00000000 r5:858c11c0 r4:dfa91f20 [ 7199.889137][T20977] [<815d6a18>] (____sys_sendmsg) from [<815d7050>] (___sys_sendmsg+0x9c/0xd0) [ 7199.889201][T20977] r10:00000128 r9:20000340 r8:00000080 r7:00000000 r6:858c11c0 r5:dfa91f20 [ 7199.889224][T20977] r4:00000000 [ 7199.889243][T20977] [<815d6fb4>] (___sys_sendmsg) from [<815d90b4>] (__sys_sendmsg+0x8c/0xe0) [ 7199.889306][T20977] r9:833a3100 r8:860e0e80 r7:00000080 r6:20000340 r5:860e0e81 r4:00000003 [ 7199.889328][T20977] [<815d9028>] (__sys_sendmsg) from [<815d911c>] (sys_sendmsg+0x14/0x18) [ 7199.889393][T20977] r8:8020029c r7:00000128 r6:0012ed04 r5:00000000 r4:00000000 [ 7199.889411][T20977] [<815d9108>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7199.889459][T20977] Exception stack(0xdfa91fa8 to 0xdfa91ff0) [ 7199.889497][T20977] 1fa0: 00000000 00000000 00000003 20000340 00000080 00000000 [ 7199.889528][T20977] 1fc0: 00000000 00000000 0012ed04 00000128 003462d8 00000000 00000001 76f870dc [ 7199.889555][T20977] 1fe0: 76f86e88 76f86e78 00018bc4 00130300 [ 7199.918191][ T28] audit: type=1400 audit(134225439.796:36528): avc: denied { write } for pid=20991 comm="syz.0.13367" name="audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7199.918687][ T28] audit: type=1400 audit(134225439.796:36529): avc: denied { open } for pid=20991 comm="syz.0.13367" path="/dev/audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7199.931893][ T28] audit: type=1400 audit(134225439.826:36530): avc: denied { create } for pid=20991 comm="syz.0.13367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7199.960051][ T28] audit: type=1400 audit(134225439.866:36531): avc: denied { write } for pid=20991 comm="syz.0.13367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7199.992442][ T28] audit: type=1400 audit(134225439.896:36532): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7199.993328][ T28] audit: type=1400 audit(134225439.896:36533): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7199.998551][ T28] audit: type=1400 audit(134225439.906:36534): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7200.308275][ T9549] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7200.379503][ T9549] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7200.450557][ T9549] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7200.561291][ T9549] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7201.040060][ T9549] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 7201.049933][ T9549] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 7201.056599][ T9549] bond0 (unregistering): Released all slaves [ 7201.167817][ T9549] hsr_slave_0: left promiscuous mode [ 7201.175009][ T9549] hsr_slave_1: left promiscuous mode [ 7201.192421][ T9549] veth1_macvtap: left promiscuous mode [ 7201.193028][ T9549] veth0_macvtap: left promiscuous mode [ 7201.193476][ T9549] veth1_vlan: left promiscuous mode [ 7201.197681][ T9549] veth0_vlan: left promiscuous mode [ 7204.382820][ T2947] 8021q: adding VLAN 0 to HW filter on device eth1 [ 7204.450732][ T28] kauditd_printk_skb: 159 callbacks suppressed [ 7204.451141][ T28] audit: type=1400 audit(134225444.356:36694): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7204.451405][ T28] audit: type=1400 audit(134225444.356:36695): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7204.451662][ T28] audit: type=1400 audit(134225444.356:36696): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7204.521747][ T28] audit: type=1400 audit(134225444.426:36697): avc: denied { create } for pid=21131 comm="syz.1.13373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7204.535209][ T28] audit: type=1400 audit(134225444.436:36698): avc: denied { ioctl } for pid=21131 comm="syz.1.13373" path="socket:[146945]" dev="sockfs" ino=146945 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7204.549276][ T28] audit: type=1400 audit(134225444.456:36699): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7204.549771][ T28] audit: type=1400 audit(134225444.456:36700): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7204.550007][ T28] audit: type=1400 audit(134225444.456:36701): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7204.664278][ T28] audit: type=1400 audit(134225444.566:36702): avc: denied { create } for pid=21134 comm="syz.1.13374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7204.670932][ T28] audit: type=1400 audit(134225444.576:36703): avc: denied { sys_module } for pid=20997 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7205.447507][T20997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 7205.458346][T20997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 7206.398118][ T2947] 8021q: adding VLAN 0 to HW filter on device eth2 [ 7207.068115][T20997] hsr_slave_0: entered promiscuous mode [ 7207.078868][T20997] hsr_slave_1: entered promiscuous mode [ 7207.902065][T20997] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 7207.918695][T20997] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 7207.938970][T20997] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 7207.946164][T20997] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 7207.952444][T20997] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 7207.966837][T20997] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 7207.981115][T20997] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 7207.992507][T20997] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 7209.149489][T20997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 7209.463297][ T28] kauditd_printk_skb: 363 callbacks suppressed [ 7209.466918][ T28] audit: type=1400 audit(134225449.366:37067): avc: denied { search } for pid=21355 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.468809][ T28] audit: type=1400 audit(134225449.376:37068): avc: denied { search } for pid=21355 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.475484][ T28] audit: type=1400 audit(134225449.376:37069): avc: denied { search } for pid=21355 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.475873][ T28] audit: type=1400 audit(134225449.376:37070): avc: denied { search } for pid=21355 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.488459][ T28] audit: type=1400 audit(134225449.396:37071): avc: denied { module_request } for pid=20997 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7209.507227][ T28] audit: type=1400 audit(134225449.406:37072): avc: denied { search } for pid=21356 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.507439][ T28] audit: type=1400 audit(134225449.416:37073): avc: denied { search } for pid=21356 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.507594][ T28] audit: type=1400 audit(134225449.416:37074): avc: denied { search } for pid=21356 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.515068][ T28] audit: type=1400 audit(134225449.416:37075): avc: denied { read open } for pid=21356 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7209.515325][ T28] audit: type=1400 audit(134225449.416:37076): avc: denied { getattr } for pid=21356 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7213.648452][T20997] veth0_vlan: entered promiscuous mode [ 7213.705285][T20997] veth1_vlan: entered promiscuous mode [ 7213.812496][T20997] veth0_macvtap: entered promiscuous mode [ 7213.836547][T20997] veth1_macvtap: entered promiscuous mode [ 7213.908554][ T3102] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 7213.908982][ T3102] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 7213.909312][ T3102] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 7213.909571][ T3102] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 7214.487633][ T28] kauditd_printk_skb: 733 callbacks suppressed [ 7214.488772][ T28] audit: type=1400 audit(134225454.396:37810): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7214.491185][ T28] audit: type=1400 audit(134225454.396:37811): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7214.492772][ T28] audit: type=1400 audit(134225454.396:37812): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7214.589876][ T28] audit: type=1400 audit(134225454.496:37813): avc: denied { create } for pid=21430 comm="syz.1.13389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7214.600241][ T28] audit: type=1400 audit(134225454.506:37814): avc: denied { write } for pid=21430 comm="syz.1.13389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7214.609248][ T28] audit: type=1400 audit(134225454.516:37815): avc: denied { write } for pid=21430 comm="syz.1.13389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7214.667866][ T28] audit: type=1400 audit(134225454.566:37816): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7214.670254][ T28] audit: type=1400 audit(134225454.566:37817): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7214.678509][ T28] audit: type=1400 audit(134225454.586:37818): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7214.957372][ T28] audit: type=1400 audit(134225454.866:37819): avc: denied { read write } for pid=21433 comm="syz.1.13390" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7218.137190][T21474] FAULT_INJECTION: forcing a failure. [ 7218.137190][T21474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7218.138535][T21474] CPU: 0 UID: 0 PID: 21474 Comm: syz.1.13404 Tainted: G L syzkaller #0 PREEMPT [ 7218.138616][T21474] Tainted: [L]=SOFTLOCKUP [ 7218.138627][T21474] Hardware name: ARM-Versatile Express [ 7218.138649][T21474] Call trace: [ 7218.138725][T21474] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7218.138861][T21474] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7218.138871][T21474] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7218.138900][T21474] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7218.138931][T21474] r7:20000340 r6:00000000 r5:85024980 r4:82b4ed08 [ 7218.138946][T21474] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7218.139078][T21474] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7218.139195][T21474] r8:24004810 r7:20000340 r6:ea5f9e28 r5:00000000 r4:ea5f9f20 [ 7218.139208][T21474] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7218.139268][T21474] [<809c9988>] (should_fail_usercopy) from [<815d6e24>] (copy_msghdr_from_user+0x50/0x1e0) [ 7218.139305][T21474] [<815d6dd4>] (copy_msghdr_from_user) from [<815d702c>] (___sys_sendmsg+0x78/0xd0) [ 7218.139345][T21474] r8:24004810 r7:00000000 r6:836971c0 r5:ea5f9f20 r4:ea5f9e6c [ 7218.139355][T21474] [<815d6fb4>] (___sys_sendmsg) from [<815d90b4>] (__sys_sendmsg+0x8c/0xe0) [ 7218.139391][T21474] r9:85024980 r8:861b8480 r7:24004810 r6:20000340 r5:861b8481 r4:00000003 [ 7218.139401][T21474] [<815d9028>] (__sys_sendmsg) from [<815d911c>] (sys_sendmsg+0x14/0x18) [ 7218.139434][T21474] r8:8020029c r7:00000128 r6:0012ed04 r5:00000000 r4:00000000 [ 7218.139444][T21474] [<815d9108>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7218.139503][T21474] Exception stack(0xea5f9fa8 to 0xea5f9ff0) [ 7218.139530][T21474] 9fa0: 00000000 00000000 00000003 20000340 24004810 00000000 [ 7218.139549][T21474] 9fc0: 00000000 00000000 0012ed04 00000128 00346378 00000000 003d0f00 76f660dc [ 7218.139615][T21474] 9fe0: 76f65e88 76f65e78 00018bc4 00130300 [ 7218.347846][T21478] FAULT_INJECTION: forcing a failure. [ 7218.347846][T21478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7218.351561][T21478] CPU: 0 UID: 0 PID: 21478 Comm: syz.0.13407 Tainted: G L syzkaller #0 PREEMPT [ 7218.351691][T21478] Tainted: [L]=SOFTLOCKUP [ 7218.351788][T21478] Hardware name: ARM-Versatile Express [ 7218.351831][T21478] Call trace: [ 7218.351876][T21478] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7218.352002][T21478] r7:60000113 r6:60000113 r5:8231a6c4 r4:00000000 [ 7218.352074][T21478] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7218.352161][T21478] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7218.352229][T21478] r7:00000000 r6:00000000 r5:83f70000 r4:82b4ed08 [ 7218.352261][T21478] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7218.352324][T21478] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7218.352466][T21478] r8:00000003 r7:00000000 r6:00000100 r5:20000000 r4:20000000 [ 7218.352488][T21478] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7218.352544][T21478] [<809c9988>] (should_fail_usercopy) from [<809cf920>] (strncpy_from_user+0x20/0x1b0) [ 7218.352599][T21478] [<809cf900>] (strncpy_from_user) from [<805b9894>] (path_setxattrat+0x7c/0x1bc) [ 7218.352715][T21478] r10:00000002 r9:20000200 r8:00000003 r7:00000000 r6:00001000 r5:00000184 [ 7218.352746][T21478] r4:20000000 [ 7218.352764][T21478] [<805b9818>] (path_setxattrat) from [<805b9bd4>] (sys_fsetxattr+0x30/0x38) [ 7218.352837][T21478] r10:000000e4 r9:83f70000 r8:8020029c r7:000000e4 r6:0012ed04 r5:00000000 [ 7218.352860][T21478] r4:00000002 [ 7218.352877][T21478] [<805b9ba4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7218.352961][T21478] Exception stack(0xea5f5fa8 to 0xea5f5ff0) [ 7218.353006][T21478] 5fa0: 00000002 00000000 00000003 20000000 20000200 00000184 [ 7218.353043][T21478] 5fc0: 00000002 00000000 0012ed04 000000e4 003462d8 00000000 00000001 76f580dc [ 7218.353072][T21478] 5fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7219.174805][T21496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21496 comm=syz.0.13415 [ 7219.514148][ T28] kauditd_printk_skb: 159 callbacks suppressed [ 7219.514577][ T28] audit: type=1400 audit(134225459.416:37979): avc: denied { create } for pid=21499 comm="syz.0.13417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7219.529168][ T28] audit: type=1400 audit(134225459.426:37980): avc: denied { write } for pid=21499 comm="syz.0.13417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7219.808141][ T28] audit: type=1400 audit(134225459.706:37981): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7219.810310][ T28] audit: type=1400 audit(134225459.716:37982): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7219.819354][ T28] audit: type=1400 audit(134225459.716:37983): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7219.953218][ T28] audit: type=1400 audit(134225459.856:37984): avc: denied { create } for pid=21504 comm="syz.1.13419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7219.975968][ T28] audit: type=1400 audit(134225459.886:37985): avc: denied { read append } for pid=21504 comm="syz.1.13419" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_exec_t:s0" [ 7219.982202][ T28] audit: type=1400 audit(134225459.886:37986): avc: denied { create } for pid=21504 comm="syz.1.13419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 7219.995735][ T28] audit: type=1400 audit(134225459.906:37987): avc: denied { module_request } for pid=21504 comm="syz.1.13419" kmod="net-pf-8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7220.115968][ T28] audit: type=1400 audit(134225460.016:37988): avc: denied { create } for pid=21505 comm="syz.0.13420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7224.529375][ T28] kauditd_printk_skb: 122 callbacks suppressed [ 7224.529786][ T28] audit: type=1400 audit(134225464.436:38111): avc: denied { write } for pid=21553 comm="syz.1.13439" path="socket:[148109]" dev="sockfs" ino=148109 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7224.690015][ T28] audit: type=1400 audit(134225464.596:38112): avc: denied { create } for pid=21562 comm="syz.0.13443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7224.701049][ T28] audit: type=1400 audit(134225464.606:38113): avc: denied { ioctl } for pid=21562 comm="syz.0.13443" path="socket:[148616]" dev="sockfs" ino=148616 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7224.703384][ T28] audit: type=1400 audit(134225464.606:38114): avc: denied { bind } for pid=21562 comm="syz.0.13443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7224.716081][ T28] audit: type=1400 audit(134225464.626:38115): avc: denied { write } for pid=21562 comm="syz.0.13443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7224.811342][ T28] audit: type=1400 audit(134225464.716:38116): avc: denied { read } for pid=21564 comm="syz.0.13444" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7224.815793][ T28] audit: type=1400 audit(134225464.726:38117): avc: denied { open } for pid=21564 comm="syz.0.13444" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7224.827559][T21565] FAULT_INJECTION: forcing a failure. [ 7224.827559][T21565] name failslab, interval 1, probability 0, space 0, times 0 [ 7224.827861][T21565] CPU: 1 UID: 0 PID: 21565 Comm: syz.0.13444 Tainted: G L syzkaller #0 PREEMPT [ 7224.827914][T21565] Tainted: [L]=SOFTLOCKUP [ 7224.827934][T21565] Hardware name: ARM-Versatile Express [ 7224.827960][T21565] Call trace: [ 7224.828006][T21565] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7224.828122][T21565] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7224.828143][T21565] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7224.828197][T21565] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7224.828254][T21565] r7:00000000 r6:00000000 r5:84fe24c0 r4:82b17c88 [ 7224.828332][T21565] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7224.828469][T21565] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7224.828600][T21565] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 7224.828678][T21565] [<8054c558>] (should_failslab) from [<8052aa38>] (__kmalloc_noprof+0xa4/0x39c) [ 7224.828818][T21565] [<8052a994>] (__kmalloc_noprof) from [<80807bc4>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 7224.828957][T21565] r10:00000000 r9:830c0000 r8:00000000 r7:83423770 r6:8544ff28 r5:00001000 [ 7224.829121][T21565] r4:00000000 [ 7224.829213][T21565] [<80807b88>] (tomoyo_realpath_from_path) from [<80803c8c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 7224.829356][T21565] r10:00000000 r9:00000004 r8:8544ff00 r7:c008551c r6:81cda0f4 r5:00000004 [ 7224.829417][T21565] r4:8544ff28 r3:828d0400 [ 7224.829428][T21565] [<80803bc0>] (tomoyo_path_number_perm) from [<808085e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 7224.829469][T21565] r10:84fe24c0 r9:00000004 r8:8544ff00 r7:200001c0 r6:200001c0 r5:c008551c [ 7224.829649][T21565] r4:8544ff00 [ 7224.829924][T21565] [<808085c4>] (tomoyo_file_ioctl) from [<807b373c>] (security_file_ioctl+0x80/0x1d4) [ 7224.830773][T21565] [<807b36bc>] (security_file_ioctl) from [<805993fc>] (sys_ioctl+0x4c/0xb5c) [ 7224.830866][T21565] r7:200001c0 r6:c008551c r5:8544ff01 r4:00000000 [ 7224.830910][T21565] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7224.830966][T21565] Exception stack(0xea881fa8 to 0xea881ff0) [ 7224.831066][T21565] 1fa0: 00000000 00000000 00000004 c008551c 200001c0 00000000 [ 7224.831120][T21565] 1fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f580dc [ 7224.831912][T21565] 1fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7224.831955][T21565] r10:00000036 r9:84fe24c0 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 7224.832380][T21565] r4:00000000 [ 7224.845377][T21565] ERROR: Out of memory at tomoyo_realpath_from_path. [ 7224.847067][ T28] audit: type=1400 audit(134225464.756:38118): avc: denied { ioctl } for pid=21564 comm="syz.0.13444" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x551c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7224.978217][ T28] audit: type=1400 audit(134225464.886:38119): avc: denied { create } for pid=21566 comm="syz.0.13445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7224.990736][ T28] audit: type=1400 audit(134225464.896:38120): avc: denied { getopt } for pid=21566 comm="syz.0.13445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7229.647828][ T28] kauditd_printk_skb: 81 callbacks suppressed [ 7229.648457][ T28] audit: type=1400 audit(134225469.556:38202): avc: denied { read } for pid=21618 comm="syz.1.13466" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_exec_t:s0" [ 7229.665515][ T28] audit: type=1400 audit(134225469.576:38203): avc: denied { read open } for pid=21618 comm="syz.1.13466" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_exec_t:s0" [ 7229.674345][ T28] audit: type=1400 audit(134225469.576:38204): avc: denied { ioctl } for pid=21618 comm="syz.1.13466" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_exec_t:s0" [ 7229.690752][ T28] audit: type=1400 audit(134225469.596:38205): avc: denied { allowed } for pid=21618 comm="syz.1.13466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 7229.722423][ T28] audit: type=1400 audit(134225469.626:38206): avc: denied { read append } for pid=21618 comm="syz.1.13466" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7229.726649][ T28] audit: type=1400 audit(134225469.636:38207): avc: denied { open } for pid=21618 comm="syz.1.13466" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7229.730311][ T28] audit: type=1400 audit(134225469.636:38208): avc: denied { ioctl } for pid=21618 comm="syz.1.13466" path="/dev/zero" dev="devtmpfs" ino=5 ioctlcmd=0x6e84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7229.751681][ T28] audit: type=1400 audit(134225469.656:38209): avc: denied { create } for pid=21618 comm="syz.1.13466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 7229.820926][ T28] audit: type=1400 audit(134225469.726:38210): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7229.825894][ T28] audit: type=1400 audit(134225469.736:38211): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7230.224264][ T9941] usb 2-1: new full-speed USB device number 49 using dummy_hcd [ 7230.399120][ T9941] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 4 [ 7230.401127][ T9941] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 32, changing to 4 [ 7230.438295][ T9941] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 7230.438666][ T9941] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 7230.438934][ T9941] usb 2-1: Product: syz [ 7230.439113][ T9941] usb 2-1: Manufacturer: syz [ 7230.439347][ T9941] usb 2-1: SerialNumber: syz [ 7230.701797][ T9941] usb 2-1: 1:1 : UAC_AS_GENERAL descriptor not found [ 7230.716176][ T9941] usb 2-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 7230.748462][ T9941] usb 2-1: USB disconnect, device number 49 [ 7234.720292][ T28] kauditd_printk_skb: 92 callbacks suppressed [ 7234.720819][ T28] audit: type=1400 audit(134225474.626:38304): avc: denied { create } for pid=21688 comm="syz.1.13484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7234.752147][ T28] audit: type=1400 audit(134225474.656:38305): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7234.753265][ T28] audit: type=1400 audit(134225474.656:38306): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7234.757043][ T28] audit: type=1400 audit(134225474.666:38307): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7234.773137][ T28] audit: type=1400 audit(134225474.676:38308): avc: denied { create } for pid=21689 comm="syz.0.13485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7234.779540][ T28] audit: type=1400 audit(134225474.686:38309): avc: denied { create } for pid=21689 comm="syz.0.13485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7234.784104][ T28] audit: type=1400 audit(134225474.686:38310): avc: denied { ioctl } for pid=21689 comm="syz.0.13485" path="socket:[148334]" dev="sockfs" ino=148334 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7234.807899][ T28] audit: type=1400 audit(134225474.716:38311): avc: denied { ioctl } for pid=21689 comm="syz.0.13485" path="socket:[148334]" dev="sockfs" ino=148334 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7234.814550][ T28] audit: type=1400 audit(134225474.716:38312): avc: denied { write } for pid=21689 comm="syz.0.13485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7234.825675][ T28] audit: type=1400 audit(134225474.736:38313): avc: denied { read } for pid=21689 comm="syz.0.13485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7237.736942][T21716] FAULT_INJECTION: forcing a failure. [ 7237.736942][T21716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7237.737423][T21716] CPU: 1 UID: 0 PID: 21716 Comm: syz.0.13494 Tainted: G L syzkaller #0 PREEMPT [ 7237.737521][T21716] Tainted: [L]=SOFTLOCKUP [ 7237.737566][T21716] Hardware name: ARM-Versatile Express [ 7237.737604][T21716] Call trace: [ 7237.737646][T21716] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7237.737764][T21716] r7:60000113 r6:60000113 r5:8231a6c4 r4:00000000 [ 7237.737783][T21716] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7237.737834][T21716] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7237.737983][T21716] r7:83f2a0ec r6:00000000 r5:83f29880 r4:82b4ed08 [ 7237.738094][T21716] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7237.738289][T21716] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7237.738606][T21716] r8:b5003587 r7:83f2a0ec r6:76f57b20 r5:eafa5f58 r4:76f57b00 [ 7237.738947][T21716] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7237.739151][T21716] [<809c9988>] (should_fail_usercopy) from [<80269138>] (copy_siginfo_to_user+0x1c/0xa4) [ 7237.739217][T21716] [<8026911c>] (copy_siginfo_to_user) from [<8022a864>] (do_work_pending+0x338/0x4e8) [ 7237.739510][T21716] r9:00130300 r8:b5003587 r7:83f2a0ec r6:76f57b00 r5:eafa5fb0 r4:83f29880 [ 7237.739789][T21716] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 7237.740009][T21716] Exception stack(0xeafa5fb0 to 0xeafa5ff8) [ 7237.740415][T21716] 5fa0: 00000004 20000100 20000001 00000000 [ 7237.740578][T21716] 5fc0: 00000000 00000000 0012ed04 00000128 003462d8 00000000 00000001 76f580dc [ 7237.741107][T21716] 5fe0: 76f57e88 76f57e78 00018bc4 001302fc 60000010 00000004 [ 7237.741267][T21716] r10:00000128 r9:83f29880 r8:8020029c r7:00000128 r6:0012ed04 r5:00000000 [ 7237.741325][T21716] r4:00000000 [ 7239.935371][ T28] kauditd_printk_skb: 120 callbacks suppressed [ 7239.935672][ T28] audit: type=1400 audit(134225479.846:38434): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7239.935903][ T28] audit: type=1400 audit(134225479.846:38435): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7239.936148][ T28] audit: type=1400 audit(134225479.846:38436): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7239.947128][ T28] audit: type=1400 audit(134225479.856:38437): avc: denied { read } for pid=21739 comm="syz.0.13504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7239.976122][ T28] audit: type=1400 audit(134225479.886:38438): avc: denied { read } for pid=21739 comm="syz.0.13504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7240.036436][ T28] audit: type=1400 audit(134225479.946:38439): avc: denied { create } for pid=21739 comm="syz.0.13504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7240.039466][ T28] audit: type=1400 audit(134225479.946:38440): avc: denied { write } for pid=21739 comm="syz.0.13504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7240.042659][ T28] audit: type=1400 audit(134225479.946:38441): avc: denied { read } for pid=21739 comm="syz.0.13504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7240.048438][ T28] audit: type=1400 audit(134225479.956:38442): avc: denied { read } for pid=21739 comm="syz.0.13504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7240.078138][ T28] audit: type=1400 audit(134225479.986:38443): avc: denied { create } for pid=21745 comm="syz.1.13505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7242.054908][T23595] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 7242.370088][T23595] usb 2-1: New USB device found, idVendor=0582, idProduct=0004, bcdDevice= 0.40 [ 7242.373443][T23595] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 7242.374025][T23595] usb 2-1: Product: syz [ 7242.374229][T23595] usb 2-1: Manufacturer: syz [ 7242.374395][T23595] usb 2-1: SerialNumber: syz [ 7243.329450][T23595] usb 2-1: USB disconnect, device number 50 [ 7243.910889][T21797] FAULT_INJECTION: forcing a failure. [ 7243.910889][T21797] name failslab, interval 1, probability 0, space 0, times 0 [ 7243.912691][T21797] CPU: 1 UID: 0 PID: 21797 Comm: syz.1.13517 Tainted: G L syzkaller #0 PREEMPT [ 7243.912831][T21797] Tainted: [L]=SOFTLOCKUP [ 7243.912857][T21797] Hardware name: ARM-Versatile Express [ 7243.912892][T21797] Call trace: [ 7243.912938][T21797] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7243.913063][T21797] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7243.913103][T21797] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7243.913169][T21797] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7243.913245][T21797] r7:00000000 r6:00000000 r5:85030000 r4:82b17c88 [ 7243.913268][T21797] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7243.913339][T21797] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7243.913428][T21797] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 7243.913450][T21797] [<8054c558>] (should_failslab) from [<8052aa38>] (__kmalloc_noprof+0xa4/0x39c) [ 7243.913517][T21797] [<8052a994>] (__kmalloc_noprof) from [<80807bc4>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 7243.913664][T21797] r10:00000000 r9:830c0000 r8:00000000 r7:83423770 r6:862a7728 r5:00001000 [ 7243.913692][T21797] r4:00000000 [ 7243.913746][T21797] [<80807b88>] (tomoyo_realpath_from_path) from [<80803c8c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 7243.913839][T21797] r10:00000000 r9:00000004 r8:862a7700 r7:c008551c r6:81cda0f4 r5:00000004 [ 7243.913869][T21797] r4:862a7728 r3:828d0400 [ 7243.913891][T21797] [<80803bc0>] (tomoyo_path_number_perm) from [<808085e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 7243.913976][T21797] r10:85030000 r9:00000004 r8:862a7700 r7:00000000 r6:00000000 r5:c008551c [ 7243.914003][T21797] r4:862a7700 [ 7243.914023][T21797] [<808085c4>] (tomoyo_file_ioctl) from [<807b373c>] (security_file_ioctl+0x80/0x1d4) [ 7243.914107][T21797] [<807b36bc>] (security_file_ioctl) from [<805993fc>] (sys_ioctl+0x4c/0xb5c) [ 7243.914187][T21797] r7:00000000 r6:c008551c r5:862a7701 r4:00000000 [ 7243.914210][T21797] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7243.914268][T21797] Exception stack(0xeb5adfa8 to 0xeb5adff0) [ 7243.914314][T21797] dfa0: 00000000 00000000 00000004 c008551c 00000000 00000000 [ 7243.914360][T21797] dfc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f870dc [ 7243.914395][T21797] dfe0: 76f86e88 76f86e78 00018bc4 00130300 [ 7243.914441][T21797] r10:00000036 r9:85030000 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 7243.914468][T21797] r4:00000000 [ 7243.962888][T21797] ERROR: Out of memory at tomoyo_realpath_from_path. [ 7245.006311][ T28] kauditd_printk_skb: 142 callbacks suppressed [ 7245.009372][ T28] audit: type=1400 audit(134225484.916:38586): avc: denied { read } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.038238][ T28] audit: type=1400 audit(134225484.946:38587): avc: denied { create } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.041510][ T28] audit: type=1400 audit(134225484.946:38588): avc: denied { write } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.041897][ T28] audit: type=1400 audit(134225484.946:38589): avc: denied { module_request } for pid=21802 comm="syz.1.13520" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7245.260956][ T28] audit: type=1400 audit(134225485.166:38590): avc: denied { write } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.274617][ T28] audit: type=1400 audit(134225485.166:38591): avc: denied { module_request } for pid=21802 comm="syz.1.13520" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7245.318127][ T28] audit: type=1400 audit(134225485.226:38592): avc: denied { read } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.336433][ T28] audit: type=1400 audit(134225485.246:38593): avc: denied { create } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.349413][ T28] audit: type=1400 audit(134225485.246:38594): avc: denied { write } for pid=21802 comm="syz.1.13520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7245.377194][ T28] audit: type=1400 audit(134225485.256:38595): avc: denied { module_request } for pid=21802 comm="syz.1.13520" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7246.434886][T21820] FAULT_INJECTION: forcing a failure. [ 7246.434886][T21820] name failslab, interval 1, probability 0, space 0, times 0 [ 7246.436084][T21820] CPU: 1 UID: 0 PID: 21820 Comm: syz.0.13523 Tainted: G L syzkaller #0 PREEMPT [ 7246.436146][T21820] Tainted: [L]=SOFTLOCKUP [ 7246.436158][T21820] Hardware name: ARM-Versatile Express [ 7246.436175][T21820] Call trace: [ 7246.436209][T21820] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7246.436284][T21820] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7246.436297][T21820] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7246.436352][T21820] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7246.436395][T21820] r7:00000cc0 r6:00000000 r5:8502b100 r4:82b17c88 [ 7246.436405][T21820] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7246.436445][T21820] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7246.436492][T21820] r8:82a04d00 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4cc0 [ 7246.436504][T21820] [<8054c558>] (should_failslab) from [<80529ae8>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 7246.436568][T21820] [<80529a94>] (kmem_cache_alloc_noprof) from [<8058067c>] (alloc_empty_file+0x54/0x13c) [ 7246.436643][T21820] r10:ebf05f18 r9:8502b100 r8:82a04d00 r7:830ff080 r6:00020002 r5:82b1add0 [ 7246.436698][T21820] r4:825218a8 [ 7246.436713][T21820] [<80580628>] (alloc_empty_file) from [<80594668>] (path_openat+0x44/0x1214) [ 7246.436758][T21820] r8:ebf05e50 r7:ffffff9c r6:ebf05f18 r5:8502b100 r4:831d86c0 [ 7246.436769][T21820] [<80594624>] (path_openat) from [<805958f0>] (do_file_open+0xb8/0x150) [ 7246.436810][T21820] r10:00000142 r9:8502b100 r8:00000001 r7:ffffff9c r6:ebf05f18 r5:8502b100 [ 7246.436822][T21820] r4:831d86c0 [ 7246.436832][T21820] [<80595838>] (do_file_open) from [<8057ac78>] (do_sys_openat2+0x8c/0xf0) [ 7246.436878][T21820] r8:8020029c r7:0018a340 r6:ffffff9c r5:831d86c0 r4:00000004 [ 7246.436890][T21820] [<8057abec>] (do_sys_openat2) from [<8057b054>] (sys_openat+0x80/0xd0) [ 7246.436988][T21820] r7:00000142 r6:00000000 r5:0018a340 r4:ffffff9c [ 7246.437000][T21820] [<8057afd4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7246.437033][T21820] Exception stack(0xebf05fa8 to 0xebf05ff0) [ 7246.437061][T21820] 5fa0: 00000000 00000000 ffffff9c 0018a340 00020002 00000000 [ 7246.437090][T21820] 5fc0: 00000000 00000000 00000000 00000142 00000005 00000000 003d0f00 76f580dc [ 7246.437108][T21820] 5fe0: 76f55d68 76f55d54 0010b524 00112108 [ 7246.437127][T21820] r6:00000000 r5:00000000 r4:00000000 [ 7250.039049][ T28] kauditd_printk_skb: 138 callbacks suppressed [ 7250.039408][ T28] audit: type=1400 audit(134225489.946:38734): avc: denied { sys_module } for pid=21855 comm="syz.1.13538" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7250.039646][ T28] audit: type=1400 audit(134225489.946:38735): avc: denied { module_request } for pid=21855 comm="syz.1.13538" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7250.094438][ T28] audit: type=1400 audit(134225489.986:38736): avc: denied { mount } for pid=21858 comm="syz.0.13539" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 7250.134405][ T28] audit: type=1400 audit(134225490.036:38737): avc: denied { create } for pid=21858 comm="syz.0.13539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7250.146206][T21860] audit: audit_lost=34 audit_rate_limit=0 audit_backlog_limit=64 [ 7250.146704][T21860] audit: out of memory in audit_log_start [ 7250.365647][ T28] audit: type=1400 audit(134225490.276:38738): avc: denied { write } for pid=21855 comm="syz.1.13538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7250.385566][ T28] audit: type=1400 audit(134225490.296:38739): avc: denied { write } for pid=21855 comm="syz.1.13538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7250.399998][ T28] audit: type=1400 audit(134225490.306:38740): avc: denied { create } for pid=21855 comm="syz.1.13538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7250.406252][ T28] audit: type=1400 audit(134225490.316:38741): avc: denied { write } for pid=21855 comm="syz.1.13538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7250.676595][T21866] FAULT_INJECTION: forcing a failure. [ 7250.676595][T21866] name failslab, interval 1, probability 0, space 0, times 0 [ 7250.677155][T21866] CPU: 0 UID: 0 PID: 21866 Comm: syz.0.13541 Tainted: G L syzkaller #0 PREEMPT [ 7250.677236][T21866] Tainted: [L]=SOFTLOCKUP [ 7250.677259][T21866] Hardware name: ARM-Versatile Express [ 7250.677281][T21866] Call trace: [ 7250.677376][T21866] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7250.677488][T21866] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7250.677509][T21866] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7250.677597][T21866] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7250.677661][T21866] r7:00000000 r6:00000000 r5:85040c40 r4:82b17c88 [ 7250.677711][T21866] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7250.677771][T21866] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7250.677870][T21866] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 7250.677936][T21866] [<8054c558>] (should_failslab) from [<8052aa38>] (__kmalloc_noprof+0xa4/0x39c) [ 7250.677994][T21866] [<8052a994>] (__kmalloc_noprof) from [<80807bc4>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 7250.678065][T21866] r10:00000000 r9:830c0000 r8:00000000 r7:83417088 r6:854544a8 r5:00001000 [ 7250.678089][T21866] r4:00000000 [ 7250.678145][T21866] [<80807b88>] (tomoyo_realpath_from_path) from [<80803c8c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 7250.678249][T21866] r10:00000000 r9:00000003 r8:85454480 r7:00000002 r6:81cda0f4 r5:00000004 [ 7250.678306][T21866] r4:854544a8 r3:828d0400 [ 7250.678398][T21866] [<80803bc0>] (tomoyo_path_number_perm) from [<808085e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 7250.678493][T21866] r10:85040c40 r9:00000003 r8:85454480 r7:20000580 r6:20000580 r5:00000002 [ 7250.678594][T21866] r4:85454480 [ 7250.678718][T21866] [<808085c4>] (tomoyo_file_ioctl) from [<807b373c>] (security_file_ioctl+0x80/0x1d4) [ 7250.678848][T21866] [<807b36bc>] (security_file_ioctl) from [<805993fc>] (sys_ioctl+0x4c/0xb5c) [ 7250.678950][T21866] r7:20000580 r6:00000002 r5:85454481 r4:00000000 [ 7250.678971][T21866] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7250.679157][T21866] Exception stack(0xec1b9fa8 to 0xec1b9ff0) [ 7250.679283][T21866] 9fa0: 00000000 00000000 00000003 00000002 20000580 00000000 [ 7250.679420][T21866] 9fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f580dc [ 7250.679455][T21866] 9fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7250.679518][T21866] r10:00000036 r9:85040c40 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 7250.679577][T21866] r4:00000000 [ 7250.698071][T21866] ERROR: Out of memory at tomoyo_realpath_from_path. [ 7255.118595][ T28] kauditd_printk_skb: 124 callbacks suppressed [ 7255.119668][ T28] audit: type=1400 audit(134225495.026:38866): avc: denied { write } for pid=21901 comm="syz.1.13556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7255.146607][ T28] audit: type=1400 audit(134225495.056:38867): avc: denied { connect } for pid=21901 comm="syz.1.13556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 7255.186474][ T28] audit: type=1400 audit(134225495.096:38868): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7255.189099][ T28] audit: type=1400 audit(134225495.096:38869): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7255.197141][ T28] audit: type=1400 audit(134225495.106:38870): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7255.316802][ T28] audit: type=1400 audit(134225495.226:38871): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7255.319672][ T28] audit: type=1400 audit(134225495.226:38872): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7255.335084][ T28] audit: type=1400 audit(134225495.236:38873): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7255.411839][ T28] audit: type=1400 audit(134225495.316:38874): avc: denied { read } for pid=21907 comm="syz.1.13558" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7255.412987][ T28] audit: type=1400 audit(134225495.316:38875): avc: denied { open } for pid=21907 comm="syz.1.13558" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7260.410504][ T28] kauditd_printk_skb: 98 callbacks suppressed [ 7260.410992][ T28] audit: type=1400 audit(134225500.316:38974): avc: denied { read } for pid=21945 comm="syz.0.13573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7260.429817][ T28] audit: type=1400 audit(134225500.336:38975): avc: denied { write } for pid=21945 comm="syz.0.13573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7260.535218][ T28] audit: type=1400 audit(134225500.436:38976): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7260.536823][ T28] audit: type=1400 audit(134225500.436:38977): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7260.537212][ T28] audit: type=1400 audit(134225500.436:38978): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7260.667034][ T28] audit: type=1400 audit(134225500.576:38979): avc: denied { read } for pid=21950 comm="syz.0.13575" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7260.669037][ T28] audit: type=1400 audit(134225500.576:38980): avc: denied { open } for pid=21950 comm="syz.0.13575" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7260.728810][ T28] audit: type=1400 audit(134225500.636:38981): avc: denied { create } for pid=21951 comm="syz.1.13574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7260.761308][ T28] audit: type=1400 audit(134225500.666:38982): avc: denied { read write } for pid=21950 comm="syz.0.13575" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7260.763145][ T28] audit: type=1400 audit(134225500.666:38983): avc: denied { open } for pid=21950 comm="syz.0.13575" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7261.444321][ T9941] usb 2-1: new full-speed USB device number 51 using dummy_hcd [ 7261.584501][ T9941] usb 2-1: device descriptor read/64, error -71 [ 7261.665068][T21966] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21966 comm=syz.0.13580 [ 7261.824278][ T9941] usb 2-1: new full-speed USB device number 52 using dummy_hcd [ 7261.964834][ T9941] usb 2-1: device descriptor read/64, error -71 [ 7262.075263][ T9941] usb usb2-port1: attempt power cycle [ 7262.424590][ T9941] usb 2-1: new full-speed USB device number 53 using dummy_hcd [ 7262.457329][ T9941] usb 2-1: device descriptor read/8, error -71 [ 7262.714264][ T9941] usb 2-1: new full-speed USB device number 54 using dummy_hcd [ 7262.748088][ T9941] usb 2-1: device descriptor read/8, error -71 [ 7262.866952][ T9941] usb usb2-port1: unable to enumerate USB device [ 7267.094532][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 7267.094856][ T28] audit: type=1400 audit(134225506.996:39047): avc: denied { read } for pid=21975 comm="syz.0.13584" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7267.095109][ T28] audit: type=1400 audit(134225506.996:39048): avc: denied { open } for pid=21975 comm="syz.0.13584" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7267.095340][ T28] audit: type=1400 audit(134225506.996:39049): avc: denied { ioctl } for pid=21975 comm="syz.0.13584" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x4b4d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7267.214139][ T28] audit: type=1400 audit(134225507.116:39050): avc: denied { write } for pid=21977 comm="syz.0.13585" name="comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7267.222163][ T28] audit: type=1400 audit(134225507.126:39051): avc: denied { open } for pid=21977 comm="syz.0.13585" path="/dev/comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7267.232544][ T28] audit: type=1400 audit(134225507.136:39052): avc: denied { ioctl } for pid=21977 comm="syz.0.13585" path="/dev/comedi2" dev="devtmpfs" ino=713 ioctlcmd=0x9410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7267.642862][ T28] audit: type=1400 audit(134225507.546:39053): avc: denied { create } for pid=21981 comm="syz.0.13587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7267.654893][ T28] audit: type=1400 audit(134225507.566:39054): avc: denied { write } for pid=21981 comm="syz.0.13587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7267.676570][ T28] audit: type=1400 audit(134225507.586:39055): avc: denied { write } for pid=21981 comm="syz.0.13587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7268.601062][ T28] audit: type=1400 audit(134225508.506:39056): avc: denied { read append } for pid=21989 comm="syz.0.13590" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7271.542297][T22003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22003 comm=syz.1.13595 [ 7272.077803][T22003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22003 comm=syz.1.13595 [ 7272.105634][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 7272.105824][ T28] audit: type=1400 audit(134225512.016:39083): avc: denied { ioctl } for pid=22010 comm="syz.0.13597" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0xf502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7272.207800][ T28] audit: type=1400 audit(134225512.116:39084): avc: denied { create } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7272.211035][ T28] audit: type=1400 audit(134225512.116:39085): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7272.237364][ T28] audit: type=1400 audit(134225512.146:39086): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7272.810235][ T28] audit: type=1400 audit(134225512.716:39087): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7273.007507][ T28] audit: type=1400 audit(134225512.916:39088): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7273.145817][ T28] audit: type=1400 audit(134225513.056:39089): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7273.182087][ T28] audit: type=1400 audit(134225513.076:39090): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7273.306487][ T28] audit: type=1400 audit(134225513.216:39091): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7273.321326][ T28] audit: type=1400 audit(134225513.226:39092): avc: denied { write } for pid=22012 comm="syz.0.13598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7274.808727][T22019] FAULT_INJECTION: forcing a failure. [ 7274.808727][T22019] name failslab, interval 1, probability 0, space 0, times 0 [ 7274.809944][T22019] CPU: 1 UID: 0 PID: 22019 Comm: syz.0.13600 Tainted: G L syzkaller #0 PREEMPT [ 7274.810001][T22019] Tainted: [L]=SOFTLOCKUP [ 7274.810012][T22019] Hardware name: ARM-Versatile Express [ 7274.810040][T22019] Call trace: [ 7274.810063][T22019] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7274.810121][T22019] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7274.810131][T22019] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7274.810399][T22019] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7274.810433][T22019] r7:00000cc0 r6:00000000 r5:83f4b100 r4:82b17c88 [ 7274.810467][T22019] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7274.810528][T22019] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7274.810585][T22019] r8:00000080 r7:00000cc0 r6:00000000 r5:00000000 r4:83001300 [ 7274.810616][T22019] [<8054c558>] (should_failslab) from [<805262b4>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 7274.810645][T22019] [<80526260>] (__kmalloc_cache_noprof) from [<810d7ba8>] (raw_ioctl_init+0x184/0x34c) [ 7274.810683][T22019] r10:83f4b100 r9:82521738 r8:853e8200 r7:887c3400 r6:00000009 r5:86389800 [ 7274.810693][T22019] r4:00000000 [ 7274.810702][T22019] [<810d7a24>] (raw_ioctl_init) from [<810d968c>] (raw_ioctl+0x6e4/0x1228) [ 7274.810735][T22019] r10:83f4b100 r9:00000004 r8:838d6080 r7:76f56e28 r6:76f56e28 r5:838d6081 [ 7274.810745][T22019] r4:86389800 [ 7274.810753][T22019] [<810d8fa8>] (raw_ioctl) from [<805995f4>] (sys_ioctl+0x244/0xb5c) [ 7274.810786][T22019] r10:83f4b100 r9:00000004 r8:838d6080 r7:76f56e28 r6:41015500 r5:838d6081 [ 7274.810796][T22019] r4:00000000 [ 7274.810804][T22019] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7274.810827][T22019] Exception stack(0xec7f9fa8 to 0xec7f9ff0) [ 7274.810847][T22019] 9fa0: 00000000 76f56e38 00000004 41015500 76f56e28 76f55dc8 [ 7274.810864][T22019] 9fc0: 00000000 76f56e38 76f55e38 00000036 00000003 76f55e00 00000004 00470000 [ 7274.810877][T22019] 9fe0: 00000000 76f55db0 00310000 0012fe0c [ 7274.810896][T22019] r10:00000036 r9:83f4b100 r8:8020029c r7:00000036 r6:76f55e38 r5:76f56e38 [ 7274.810906][T22019] r4:00000000 [ 7279.046166][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 7279.046584][ T28] audit: type=1400 audit(134225518.956:39122): avc: denied { read } for pid=22035 comm="syz.0.13606" dev="nsfs" ino=4026532647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7279.046868][ T28] audit: type=1400 audit(134225518.956:39123): avc: denied { open } for pid=22035 comm="syz.0.13606" path="net:[4026532647]" dev="nsfs" ino=4026532647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7279.050783][ T28] audit: type=1400 audit(134225518.956:39124): avc: denied { create } for pid=22035 comm="syz.0.13606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7279.168619][ T28] audit: type=1400 audit(134225519.076:39125): avc: denied { create } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7279.175124][ T28] audit: type=1400 audit(134225519.086:39126): avc: denied { bind } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7279.183238][ T28] audit: type=1400 audit(134225519.086:39127): avc: denied { create } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7279.198251][ T28] audit: type=1400 audit(134225519.106:39128): avc: denied { write } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7279.202058][ T28] audit: type=1400 audit(134225519.106:39129): avc: denied { read } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7279.212330][ T28] audit: type=1400 audit(134225519.116:39130): avc: denied { read } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7279.223503][ T28] audit: type=1400 audit(134225519.126:39131): avc: denied { write } for pid=22037 comm="syz.0.13607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.131986][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 7284.132434][ T28] audit: type=1400 audit(134225524.036:39201): avc: denied { read } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.137414][ T28] audit: type=1400 audit(134225524.046:39202): avc: denied { write } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.146115][ T28] audit: type=1400 audit(134225524.056:39203): avc: denied { module_request } for pid=22045 comm="syz.0.13610" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7284.286760][ T28] audit: type=1400 audit(134225524.196:39204): avc: denied { read } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.290188][ T28] audit: type=1400 audit(134225524.196:39205): avc: denied { write } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.298804][ T28] audit: type=1400 audit(134225524.206:39206): avc: denied { module_request } for pid=22045 comm="syz.0.13610" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7284.449629][ T28] audit: type=1400 audit(134225524.356:39207): avc: denied { read } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.458430][ T28] audit: type=1400 audit(134225524.356:39208): avc: denied { write } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7284.461598][ T28] audit: type=1400 audit(134225524.366:39209): avc: denied { module_request } for pid=22045 comm="syz.0.13610" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7284.602366][ T28] audit: type=1400 audit(134225524.506:39210): avc: denied { read } for pid=22045 comm="syz.0.13610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7287.705144][T22089] FAULT_INJECTION: forcing a failure. [ 7287.705144][T22089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7287.706646][T22089] CPU: 0 UID: 0 PID: 22089 Comm: syz.1.13620 Tainted: G L syzkaller #0 PREEMPT [ 7287.706749][T22089] Tainted: [L]=SOFTLOCKUP [ 7287.706772][T22089] Hardware name: ARM-Versatile Express [ 7287.706803][T22089] Call trace: [ 7287.706844][T22089] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7287.706963][T22089] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7287.706983][T22089] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7287.707039][T22089] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7287.707107][T22089] r7:00000000 r6:00000000 r5:847abd40 r4:82b4ed08 [ 7287.707127][T22089] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7287.707191][T22089] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7287.707326][T22089] r8:00000000 r7:00000000 r6:000000b4 r5:76f86a78 r4:831d8c00 [ 7287.707349][T22089] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7287.707412][T22089] [<809c9988>] (should_fail_usercopy) from [<809cf920>] (strncpy_from_user+0x20/0x1b0) [ 7287.707472][T22089] [<809cf900>] (strncpy_from_user) from [<8058d520>] (do_getname+0x4c/0x14c) [ 7287.707542][T22089] r10:831d8c0c r9:847abd40 r8:00000000 r7:00000000 r6:76f86a78 r5:825218b8 [ 7287.707565][T22089] r4:831d8c00 [ 7287.707582][T22089] [<8058d4d4>] (do_getname) from [<80593054>] (getname_flags+0x14/0x18) [ 7287.707648][T22089] r10:00000142 r9:847abd40 r8:8020029c r7:76f86a78 r6:ffffff9c r5:ec9c5f50 [ 7287.707675][T22089] r4:00000000 r3:00000001 [ 7287.707694][T22089] [<80593040>] (getname_flags) from [<8057ac50>] (do_sys_openat2+0x64/0xf0) [ 7287.707748][T22089] [<8057abec>] (do_sys_openat2) from [<8057b054>] (sys_openat+0x80/0xd0) [ 7287.707807][T22089] r7:00000142 r6:00000000 r5:76f86a78 r4:ffffff9c [ 7287.707826][T22089] [<8057afd4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7287.707872][T22089] Exception stack(0xec9c5fa8 to 0xec9c5ff0) [ 7287.707910][T22089] 5fa0: 00000000 00000000 ffffff9c 76f86a78 00030480 00000000 [ 7287.707943][T22089] 5fc0: 00000000 00000000 76f86ea8 00000142 003462d8 00000000 00000001 76f870dc [ 7287.707971][T22089] 5fe0: 76f869f8 76f869e4 0010b524 00112108 [ 7287.707997][T22089] r6:76f86ea8 r5:00000000 r4:00000000 [ 7289.167702][ T28] kauditd_printk_skb: 76 callbacks suppressed [ 7289.167918][ T28] audit: type=1400 audit(134225529.076:39287): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7289.168538][ T28] audit: type=1400 audit(134225529.076:39288): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7289.169367][ T28] audit: type=1400 audit(134225529.076:39289): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7289.239629][ T28] audit: type=1400 audit(134225529.146:39290): avc: denied { create } for pid=22098 comm="syz.1.13625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7289.249694][ T28] audit: type=1400 audit(134225529.156:39291): avc: denied { write } for pid=22098 comm="syz.1.13625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7289.304367][ T28] audit: type=1400 audit(134225529.206:39292): avc: denied { module_request } for pid=22098 comm="syz.1.13625" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7289.506309][ T28] audit: type=1400 audit(134225529.396:39293): avc: denied { ioctl } for pid=22096 comm="syz.0.13624" path="/dev/sequencer2" dev="devtmpfs" ino=722 ioctlcmd=0x1277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7289.559133][ T28] audit: type=1400 audit(134225529.466:39294): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7289.560752][ T28] audit: type=1400 audit(134225529.466:39295): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7289.561650][ T28] audit: type=1400 audit(134225529.466:39296): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7292.330238][T22124] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22124 comm=syz.1.13636 [ 7292.860449][T22132] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22132 comm=syz.0.13640 [ 7292.918463][T22134] fuse: Bad value for 'fd' [ 7295.135791][ T28] kauditd_printk_skb: 119 callbacks suppressed [ 7295.138456][ T28] audit: type=1400 audit(134225535.046:39416): avc: denied { create } for pid=22150 comm="syz.0.13649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.142887][ T28] audit: type=1400 audit(134225535.046:39417): avc: denied { setopt } for pid=22150 comm="syz.0.13649" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.150026][ T28] audit: type=1400 audit(134225535.056:39418): avc: denied { create } for pid=22150 comm="syz.0.13649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.169801][ T28] audit: type=1400 audit(134225535.076:39419): avc: denied { write } for pid=22150 comm="syz.0.13649" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.172161][ T28] audit: type=1400 audit(134225535.076:39420): avc: denied { getopt } for pid=22150 comm="syz.0.13649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.180166][ T28] audit: type=1400 audit(134225535.086:39421): avc: denied { setattr } for pid=22150 comm="syz.0.13649" name="RAWv6" dev="sockfs" ino=150179 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.188279][ T28] audit: type=1400 audit(134225535.096:39422): avc: denied { ioctl } for pid=22150 comm="syz.0.13649" path="socket:[150180]" dev="sockfs" ino=150180 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7295.297342][ T28] audit: type=1400 audit(134225535.206:39423): avc: denied { create } for pid=22152 comm="syz.0.13650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7295.310101][ T28] audit: type=1400 audit(134225535.216:39424): avc: denied { create } for pid=22152 comm="syz.0.13650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7295.329539][ T28] audit: type=1400 audit(134225535.236:39425): avc: denied { ioctl } for pid=22152 comm="syz.0.13650" path="socket:[150702]" dev="sockfs" ino=150702 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7295.516901][T22155] FAULT_INJECTION: forcing a failure. [ 7295.516901][T22155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7295.517539][T22155] CPU: 1 UID: 0 PID: 22155 Comm: syz.0.13651 Tainted: G L syzkaller #0 PREEMPT [ 7295.517629][T22155] Tainted: [L]=SOFTLOCKUP [ 7295.517702][T22155] Hardware name: ARM-Versatile Express [ 7295.517736][T22155] Call trace: [ 7295.517781][T22155] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7295.517898][T22155] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7295.517919][T22155] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7295.517969][T22155] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7295.518024][T22155] r7:20000140 r6:00000000 r5:85040c40 r4:82b4ed08 [ 7295.518042][T22155] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7295.518113][T22155] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7295.518186][T22155] r8:00000040 r7:20000140 r6:ece6de28 r5:00000000 r4:ece6df20 [ 7295.518208][T22155] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7295.518302][T22155] [<809c9988>] (should_fail_usercopy) from [<815d6e24>] (copy_msghdr_from_user+0x50/0x1e0) [ 7295.518381][T22155] [<815d6dd4>] (copy_msghdr_from_user) from [<815d702c>] (___sys_sendmsg+0x78/0xd0) [ 7295.518487][T22155] r8:00000040 r7:00000000 r6:836d4040 r5:ece6df20 r4:ece6de6c [ 7295.518548][T22155] [<815d6fb4>] (___sys_sendmsg) from [<815d90b4>] (__sys_sendmsg+0x8c/0xe0) [ 7295.518629][T22155] r9:85040c40 r8:860e0200 r7:00000040 r6:20000140 r5:860e0201 r4:00000003 [ 7295.518652][T22155] [<815d9028>] (__sys_sendmsg) from [<815d911c>] (sys_sendmsg+0x14/0x18) [ 7295.518721][T22155] r8:8020029c r7:00000128 r6:0012ed04 r5:00000000 r4:00000000 [ 7295.518740][T22155] [<815d9108>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7295.518793][T22155] Exception stack(0xece6dfa8 to 0xece6dff0) [ 7295.518851][T22155] dfa0: 00000000 00000000 00000003 20000140 00000040 00000000 [ 7295.518923][T22155] dfc0: 00000000 00000000 0012ed04 00000128 003462d8 00000000 00000001 76f580dc [ 7295.518961][T22155] dfe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7301.388235][ T28] kauditd_printk_skb: 73 callbacks suppressed [ 7301.388640][ T28] audit: type=1400 audit(134225541.296:39499): avc: denied { read append } for pid=22186 comm="syz.0.13665" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7301.396018][ T28] audit: type=1400 audit(134225541.306:39500): avc: denied { read open } for pid=22186 comm="syz.0.13665" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7301.402407][ T28] audit: type=1400 audit(134225541.306:39501): avc: denied { ioctl } for pid=22186 comm="syz.0.13665" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7301.416559][ T28] audit: type=1400 audit(134225541.326:39502): avc: denied { create } for pid=22186 comm="syz.0.13665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7301.426890][ T28] audit: type=1400 audit(134225541.326:39503): avc: denied { ioctl } for pid=22186 comm="syz.0.13665" path="socket:[150779]" dev="sockfs" ino=150779 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7301.558726][ T28] audit: type=1400 audit(134225541.466:39504): avc: denied { create } for pid=22188 comm="syz.0.13666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7301.570517][ T28] audit: type=1400 audit(134225541.476:39505): avc: denied { ioctl } for pid=22188 comm="syz.0.13666" path="socket:[150786]" dev="sockfs" ino=150786 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7301.581828][ T28] audit: type=1400 audit(134225541.486:39506): avc: denied { bind } for pid=22188 comm="syz.0.13666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7301.595665][ T28] audit: type=1400 audit(134225541.506:39507): avc: denied { write } for pid=22188 comm="syz.0.13666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7302.275923][ T28] audit: type=1400 audit(134225542.186:39508): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7304.591654][T22207] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 7306.535847][ T28] kauditd_printk_skb: 122 callbacks suppressed [ 7306.538590][ T28] audit: type=1400 audit(134225546.446:39631): avc: denied { read append } for pid=22233 comm="syz.0.13687" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7306.538827][ T28] audit: type=1400 audit(134225546.446:39632): avc: denied { open } for pid=22233 comm="syz.0.13687" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:vmware_device_t:s0" [ 7306.567465][ T28] audit: type=1400 audit(134225546.476:39633): avc: denied { create } for pid=22233 comm="syz.0.13687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7306.580604][ T28] audit: type=1400 audit(134225546.486:39634): avc: denied { ioctl } for pid=22233 comm="syz.0.13687" path="socket:[150327]" dev="sockfs" ino=150327 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7306.718775][ T28] audit: type=1400 audit(134225546.626:39635): avc: denied { create } for pid=22235 comm="syz.0.13688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7306.731513][ T28] audit: type=1400 audit(134225546.636:39636): avc: denied { ioctl } for pid=22235 comm="syz.0.13688" path="socket:[150331]" dev="sockfs" ino=150331 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7306.767411][ T28] audit: type=1400 audit(134225546.666:39637): avc: denied { bind } for pid=22235 comm="syz.0.13688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7306.768876][ T28] audit: type=1400 audit(134225546.676:39638): avc: denied { write } for pid=22235 comm="syz.0.13688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7306.795856][ T28] audit: type=1400 audit(134225546.706:39639): avc: denied { write } for pid=22235 comm="syz.0.13688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7307.112342][ T28] audit: type=1400 audit(134225547.016:39640): avc: denied { write } for pid=22229 comm="syz.1.13685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7307.929472][T22239] SELinux: Context system_u:object_r:dbusd_etc_t:s0 is not valid (left unmapped). [ 7311.585594][ T28] kauditd_printk_skb: 108 callbacks suppressed [ 7311.585850][ T28] audit: type=1400 audit(134225551.496:39747): avc: denied { write } for pid=22265 comm="syz.0.13699" name="userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7311.595316][ T28] audit: type=1400 audit(134225551.506:39748): avc: denied { write open } for pid=22265 comm="syz.0.13699" path="/dev/userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7311.604388][ T28] audit: type=1400 audit(134225551.506:39749): avc: denied { create } for pid=22265 comm="syz.0.13699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7311.627427][ T28] audit: type=1400 audit(134225551.536:39750): avc: denied { ioctl } for pid=22265 comm="syz.0.13699" path="socket:[150925]" dev="sockfs" ino=150925 ioctlcmd=0x9421 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 7311.646756][ T28] audit: type=1400 audit(134225551.556:39751): avc: denied { ioctl } for pid=22265 comm="syz.0.13699" path="socket:[150928]" dev="sockfs" ino=150928 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7311.651132][ T28] audit: type=1400 audit(134225551.556:39752): avc: denied { write } for pid=22265 comm="syz.0.13699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7311.752235][ T28] audit: type=1400 audit(134225551.656:39753): avc: denied { ioctl } for pid=22265 comm="syz.0.13699" path="socket:[150925]" dev="sockfs" ino=150925 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 7311.788307][ T28] audit: type=1400 audit(134225551.696:39754): avc: denied { create } for pid=22265 comm="syz.0.13699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7311.946991][ T28] audit: type=1400 audit(134225551.856:39755): avc: denied { write } for pid=22267 comm="syz.1.13700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7312.016166][ T28] audit: type=1400 audit(134225551.926:39756): avc: denied { create } for pid=22270 comm="syz.0.13701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7314.424736][T12535] usb 2-1: new high-speed USB device number 55 using dummy_hcd [ 7314.598417][T12535] usb 2-1: config 0 has no interfaces? [ 7314.598824][T12535] usb 2-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 7314.599118][T12535] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 7314.608490][T12535] usb 2-1: config 0 descriptor?? [ 7314.756480][T22298] FAULT_INJECTION: forcing a failure. [ 7314.756480][T22298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7314.756864][T22298] CPU: 1 UID: 0 PID: 22298 Comm: syz.0.13708 Tainted: G L syzkaller #0 PREEMPT [ 7314.756925][T22298] Tainted: [L]=SOFTLOCKUP [ 7314.756936][T22298] Hardware name: ARM-Versatile Express [ 7314.756950][T22298] Call trace: [ 7314.756973][T22298] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7314.757039][T22298] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7314.757049][T22298] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7314.757076][T22298] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7314.757119][T22298] r7:20001440 r6:00000000 r5:83ffee40 r4:82b4ed08 [ 7314.757195][T22298] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7314.757348][T22298] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7314.757624][T22298] r8:00000080 r7:20001440 r6:ed5a5e28 r5:00000000 r4:ed5a5f20 [ 7314.757647][T22298] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7314.757751][T22298] [<809c9988>] (should_fail_usercopy) from [<815d6e24>] (copy_msghdr_from_user+0x50/0x1e0) [ 7314.757865][T22298] [<815d6dd4>] (copy_msghdr_from_user) from [<815d702c>] (___sys_sendmsg+0x78/0xd0) [ 7314.757904][T22298] r8:00000080 r7:00000000 r6:836d4f40 r5:ed5a5f20 r4:ed5a5e6c [ 7314.758107][T22298] [<815d6fb4>] (___sys_sendmsg) from [<815d90b4>] (__sys_sendmsg+0x8c/0xe0) [ 7314.758261][T22298] r9:83ffee40 r8:861b8480 r7:00000080 r6:20001440 r5:861b8481 r4:00000003 [ 7314.758357][T22298] [<815d9028>] (__sys_sendmsg) from [<815d911c>] (sys_sendmsg+0x14/0x18) [ 7314.758486][T22298] r8:8020029c r7:00000128 r6:0012ed04 r5:00000000 r4:00000000 [ 7314.758496][T22298] [<815d9108>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7314.758522][T22298] Exception stack(0xed5a5fa8 to 0xed5a5ff0) [ 7314.758542][T22298] 5fa0: 00000000 00000000 00000003 20001440 00000080 00000000 [ 7314.758652][T22298] 5fc0: 00000000 00000000 0012ed04 00000128 003462d8 00000000 00000001 76f580dc [ 7314.758821][T22298] 5fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7314.881349][T12535] usb 2-1: USB disconnect, device number 55 [ 7316.986052][ T28] kauditd_printk_skb: 118 callbacks suppressed [ 7316.987709][ T28] audit: type=1400 audit(134225556.896:39875): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7316.993358][ T28] audit: type=1400 audit(134225556.896:39876): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7316.999763][ T28] audit: type=1400 audit(134225556.906:39877): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7317.106607][ T28] audit: type=1400 audit(134225557.016:39878): avc: denied { create } for pid=22318 comm="syz.1.13714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7317.148796][ T28] audit: type=1400 audit(134225557.056:39879): avc: denied { ioctl } for pid=22318 comm="syz.1.13714" path="socket:[151047]" dev="sockfs" ino=151047 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7317.196577][ T28] audit: type=1400 audit(134225557.106:39880): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7317.204977][ T28] audit: type=1400 audit(134225557.106:39881): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7317.205679][ T28] audit: type=1400 audit(134225557.106:39882): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7317.336636][ T28] audit: type=1400 audit(134225557.246:39883): avc: denied { create } for pid=22320 comm="syz.1.13715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7317.352863][ T28] audit: type=1400 audit(134225557.256:39884): avc: denied { write } for pid=22320 comm="syz.1.13715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7317.668426][T22325] FAULT_INJECTION: forcing a failure. [ 7317.668426][T22325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 7317.672923][T22325] CPU: 0 UID: 0 PID: 22325 Comm: syz.1.13717 Tainted: G L syzkaller #0 PREEMPT [ 7317.673073][T22325] Tainted: [L]=SOFTLOCKUP [ 7317.673095][T22325] Hardware name: ARM-Versatile Express [ 7317.673136][T22325] Call trace: [ 7317.673195][T22325] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7317.673341][T22325] r7:60030113 r6:60030113 r5:8231a6c4 r4:00000000 [ 7317.673403][T22325] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7317.673480][T22325] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7317.673554][T22325] r7:00000000 r6:00000000 r5:85030000 r4:82b4ed08 [ 7317.673575][T22325] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7317.673689][T22325] [<809c974c>] (should_fail_ex) from [<809c9984>] (should_fail+0x14/0x18) [ 7317.673770][T22325] r8:76f86f08 r7:00000000 r6:00000000 r5:ed66df68 r4:00000002 [ 7317.673789][T22325] [<809c9970>] (should_fail) from [<809c99a4>] (should_fail_usercopy+0x1c/0x20) [ 7317.673839][T22325] [<809c9988>] (should_fail_usercopy) from [<805bc808>] (simple_read_from_buffer+0x80/0x140) [ 7317.673898][T22325] [<805bc788>] (simple_read_from_buffer) from [<80640e38>] (proc_fail_nth_read+0xb8/0x108) [ 7317.673966][T22325] r10:80640d80 r9:00000001 r8:00000002 r7:ed66df68 r6:0000000f r5:76f86f08 [ 7317.673990][T22325] r4:85030000 r3:ed66de9f [ 7317.674006][T22325] [<80640d80>] (proc_fail_nth_read) from [<8057dd68>] (vfs_read+0xc0/0x328) [ 7317.674147][T22325] r8:85030000 r7:ed66df68 r6:76f86f08 r5:85451c80 r4:0000000f [ 7317.674174][T22325] [<8057dca8>] (vfs_read) from [<8057e9fc>] (ksys_read+0x74/0xec) [ 7317.674242][T22325] r10:00000003 r9:85030000 r8:8020029c r7:00000000 r6:00000000 r5:85451c80 [ 7317.674264][T22325] r4:85451c83 [ 7317.674280][T22325] [<8057e988>] (ksys_read) from [<8057ea84>] (sys_read+0x10/0x14) [ 7317.674338][T22325] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 7317.674356][T22325] [<8057ea74>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7317.674405][T22325] Exception stack(0xed66dfa8 to 0xed66dff0) [ 7317.674444][T22325] dfa0: 00000000 00000000 00000005 76f86f08 0000000f 00000000 [ 7317.674481][T22325] dfc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f870dc [ 7317.674510][T22325] dfe0: 76f86e58 76f86e44 0010b524 00112108 [ 7317.954218][T12535] usb 1-1: new high-speed USB device number 97 using dummy_hcd [ 7318.117393][T12535] usb 1-1: config 0 has no interfaces? [ 7318.117624][T12535] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 7318.117829][T12535] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 7318.125260][T12535] usb 1-1: config 0 descriptor?? [ 7318.399867][T12535] usb 1-1: USB disconnect, device number 97 [ 7321.997363][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 7321.997722][ T28] audit: type=1400 audit(134225561.906:39939): avc: denied { create } for pid=22355 comm="syz.1.13726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7322.008304][ T28] audit: type=1400 audit(134225561.916:39940): avc: denied { ioctl } for pid=22355 comm="syz.1.13726" path="socket:[151680]" dev="sockfs" ino=151680 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7322.016320][ T28] audit: type=1400 audit(134225561.926:39941): avc: denied { bind } for pid=22355 comm="syz.1.13726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7322.021054][ T28] audit: type=1400 audit(134225561.926:39942): avc: denied { write } for pid=22355 comm="syz.1.13726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7322.027723][ T28] audit: type=1400 audit(134225561.936:39943): avc: denied { write } for pid=22355 comm="syz.1.13726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7323.050756][ T28] audit: type=1400 audit(134225562.956:39944): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7323.051184][ T28] audit: type=1400 audit(134225562.956:39945): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7323.051595][ T28] audit: type=1400 audit(134225562.956:39946): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7323.124835][ T28] audit: type=1400 audit(134225563.026:39947): avc: denied { create } for pid=22357 comm="syz.0.13727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7323.131058][ T28] audit: type=1400 audit(134225563.036:39948): avc: denied { read write } for pid=22357 comm="syz.0.13727" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7325.028953][T22363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22363 comm=syz.0.13729 [ 7327.602317][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 7327.602834][ T28] audit: type=1400 audit(134225567.506:39987): avc: denied { read append } for pid=22376 comm="syz.0.13735" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7327.609356][ T28] audit: type=1400 audit(134225567.516:39988): avc: denied { read open } for pid=22376 comm="syz.0.13735" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7327.651469][ T28] audit: type=1400 audit(134225567.556:39989): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7327.660477][T22378] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=50 sclass=netlink_audit_socket pid=22378 comm=syz.0.13735 [ 7327.662342][ T28] audit: type=1400 audit(134225567.566:39990): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7327.672908][ T28] audit: type=1400 audit(134225567.566:39991): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7327.677678][ T28] audit: type=1400 audit(134225567.576:39992): avc: denied { create } for pid=22376 comm="syz.0.13735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7327.784493][ T28] audit: type=1400 audit(134225567.686:39993): avc: denied { ioctl } for pid=22376 comm="syz.0.13735" path="socket:[151214]" dev="sockfs" ino=151214 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7327.852416][ T28] audit: type=1400 audit(134225567.756:39994): avc: denied { read write } for pid=22379 comm="syz.1.13736" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7327.855638][ T28] audit: type=1400 audit(134225567.756:39995): avc: denied { open } for pid=22379 comm="syz.1.13736" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7327.887365][ T28] audit: type=1400 audit(134225567.796:39996): avc: denied { read write } for pid=22379 comm="syz.1.13736" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7329.851030][T22388] FAULT_INJECTION: forcing a failure. [ 7329.851030][T22388] name failslab, interval 1, probability 0, space 0, times 0 [ 7329.851648][T22388] CPU: 0 UID: 0 PID: 22388 Comm: syz.0.13739 Tainted: G L syzkaller #0 PREEMPT [ 7329.851791][T22388] Tainted: [L]=SOFTLOCKUP [ 7329.851821][T22388] Hardware name: ARM-Versatile Express [ 7329.851886][T22388] Call trace: [ 7329.852012][T22388] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7329.852149][T22388] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7329.852171][T22388] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7329.852234][T22388] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7329.852291][T22388] r7:00000000 r6:00000000 r5:8502b100 r4:82b17c88 [ 7329.852309][T22388] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7329.852372][T22388] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7329.852445][T22388] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 7329.852467][T22388] [<8054c558>] (should_failslab) from [<8052aa38>] (__kmalloc_noprof+0xa4/0x39c) [ 7329.852541][T22388] [<8052a994>] (__kmalloc_noprof) from [<80807bc4>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 7329.852612][T22388] r10:00000000 r9:83810800 r8:00000000 r7:85878440 r6:83318fa8 r5:00001000 [ 7329.852685][T22388] r4:00000000 [ 7329.852709][T22388] [<80807b88>] (tomoyo_realpath_from_path) from [<80803c8c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 7329.852783][T22388] r10:00000000 r9:00000003 r8:83318f80 r7:00000002 r6:81cda0f4 r5:00000004 [ 7329.853002][T22388] r4:83318fa8 r3:828d0400 [ 7329.853035][T22388] [<80803bc0>] (tomoyo_path_number_perm) from [<808085e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 7329.853129][T22388] r10:8502b100 r9:00000003 r8:83318f80 r7:20000040 r6:20000040 r5:00000002 [ 7329.853176][T22388] r4:83318f80 [ 7329.853200][T22388] [<808085c4>] (tomoyo_file_ioctl) from [<807b373c>] (security_file_ioctl+0x80/0x1d4) [ 7329.853267][T22388] [<807b36bc>] (security_file_ioctl) from [<805993fc>] (sys_ioctl+0x4c/0xb5c) [ 7329.853335][T22388] r7:20000040 r6:00000002 r5:83318f81 r4:00000000 [ 7329.853356][T22388] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7329.853410][T22388] Exception stack(0xed8e9fa8 to 0xed8e9ff0) [ 7329.853450][T22388] 9fa0: 00000000 00000000 00000003 00000002 20000040 00000000 [ 7329.853489][T22388] 9fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f580dc [ 7329.853520][T22388] 9fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7329.853735][T22388] r10:00000036 r9:8502b100 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 7329.853773][T22388] r4:00000000 [ 7329.896031][T22388] ERROR: Out of memory at tomoyo_realpath_from_path. [ 7332.709201][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 7332.714188][ T28] audit: type=1400 audit(134225572.616:40025): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7332.716721][ T28] audit: type=1400 audit(134225572.616:40026): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7332.719270][ T28] audit: type=1400 audit(134225572.616:40027): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7332.814828][ T28] audit: type=1400 audit(134225572.716:40028): avc: denied { create } for pid=22403 comm="syz.1.13745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7332.831698][ T28] audit: type=1400 audit(134225572.726:40029): avc: denied { write } for pid=22403 comm="syz.1.13745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7333.622548][ T28] audit: type=1400 audit(134225573.526:40030): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7333.626305][ T28] audit: type=1400 audit(134225573.536:40031): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7333.630525][ T28] audit: type=1400 audit(134225573.536:40032): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7333.713451][ T28] audit: type=1400 audit(134225573.616:40033): avc: denied { read append } for pid=22405 comm="syz.1.13746" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7333.717671][ T28] audit: type=1400 audit(134225573.616:40034): avc: denied { open } for pid=22405 comm="syz.1.13746" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7337.747254][ T28] kauditd_printk_skb: 72 callbacks suppressed [ 7337.748197][ T28] audit: type=1400 audit(134225577.656:40107): avc: denied { remount } for pid=22436 comm="syz.1.13758" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 7337.768426][ T28] audit: type=1400 audit(134225577.676:40108): avc: denied { create } for pid=22436 comm="syz.1.13758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7337.777916][ T28] audit: type=1400 audit(134225577.686:40109): avc: denied { write } for pid=22436 comm="syz.1.13758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7337.779761][ T28] audit: type=1400 audit(134225577.686:40110): avc: denied { read } for pid=22436 comm="syz.1.13758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7337.849047][ T28] audit: type=1400 audit(134225577.756:40111): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7337.855379][ T28] audit: type=1400 audit(134225577.756:40112): avc: denied { open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7337.860367][ T28] audit: type=1400 audit(134225577.756:40113): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7337.983048][ T28] audit: type=1400 audit(134225577.886:40114): avc: denied { read } for pid=22439 comm="syz.1.13760" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7337.995883][ T28] audit: type=1400 audit(134225577.906:40115): avc: denied { read open } for pid=22439 comm="syz.1.13760" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7338.021391][ T28] audit: type=1400 audit(134225577.926:40116): avc: denied { create } for pid=22439 comm="syz.1.13760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7340.737464][T22462] FAULT_INJECTION: forcing a failure. [ 7340.737464][T22462] name failslab, interval 1, probability 0, space 0, times 0 [ 7340.744347][T22462] CPU: 1 UID: 0 PID: 22462 Comm: syz.0.13770 Tainted: G L syzkaller #0 PREEMPT [ 7340.744498][T22462] Tainted: [L]=SOFTLOCKUP [ 7340.744523][T22462] Hardware name: ARM-Versatile Express [ 7340.744552][T22462] Call trace: [ 7340.744595][T22462] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7340.744740][T22462] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7340.744764][T22462] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7340.744814][T22462] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7340.744895][T22462] r7:00000000 r6:00000000 r5:8479b100 r4:82b17c88 [ 7340.744913][T22462] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7340.744966][T22462] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7340.745041][T22462] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 7340.745062][T22462] [<8054c558>] (should_failslab) from [<8052aa38>] (__kmalloc_noprof+0xa4/0x39c) [ 7340.745139][T22462] [<8052a994>] (__kmalloc_noprof) from [<80807bc4>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 7340.745209][T22462] r10:00000000 r9:830c0000 r8:00000000 r7:834fe7f8 r6:861768a8 r5:00001000 [ 7340.745230][T22462] r4:00000000 [ 7340.745248][T22462] [<80807b88>] (tomoyo_realpath_from_path) from [<80803c8c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 7340.745315][T22462] r10:00000000 r9:00000004 r8:86176880 r7:00001264 r6:81cda0f4 r5:00000004 [ 7340.745340][T22462] r4:861768a8 r3:828d0400 [ 7340.745358][T22462] [<80803bc0>] (tomoyo_path_number_perm) from [<808085e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 7340.745431][T22462] r10:8479b100 r9:00000004 r8:86176880 r7:00000000 r6:00000000 r5:00001264 [ 7340.745451][T22462] r4:86176880 [ 7340.745471][T22462] [<808085c4>] (tomoyo_file_ioctl) from [<807b373c>] (security_file_ioctl+0x80/0x1d4) [ 7340.745531][T22462] [<807b36bc>] (security_file_ioctl) from [<805993fc>] (sys_ioctl+0x4c/0xb5c) [ 7340.745594][T22462] r7:00000000 r6:00001264 r5:86176881 r4:00000000 [ 7340.745614][T22462] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7340.745663][T22462] Exception stack(0xeddb5fa8 to 0xeddb5ff0) [ 7340.745704][T22462] 5fa0: 00000000 00000000 00000004 00001264 00000000 00000000 [ 7340.745738][T22462] 5fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f580dc [ 7340.745765][T22462] 5fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7340.745801][T22462] r10:00000036 r9:8479b100 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 7340.745821][T22462] r4:00000000 [ 7340.765931][T22462] ERROR: Out of memory at tomoyo_realpath_from_path. [ 7343.074700][ T28] kauditd_printk_skb: 87 callbacks suppressed [ 7343.075500][ T28] audit: type=1400 audit(134225582.986:40204): avc: denied { read } for pid=22483 comm="syz.0.13781" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7343.077960][ T28] audit: type=1400 audit(134225582.986:40205): avc: denied { read open } for pid=22483 comm="syz.0.13781" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7343.088802][T22484] FAULT_INJECTION: forcing a failure. [ 7343.088802][T22484] name failslab, interval 1, probability 0, space 0, times 0 [ 7343.089137][T22484] CPU: 0 UID: 0 PID: 22484 Comm: syz.0.13781 Tainted: G L syzkaller #0 PREEMPT [ 7343.089182][T22484] Tainted: [L]=SOFTLOCKUP [ 7343.089193][T22484] Hardware name: ARM-Versatile Express [ 7343.089205][T22484] Call trace: [ 7343.089226][T22484] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7343.089287][T22484] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7343.089313][T22484] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7343.089350][T22484] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7343.089426][T22484] r7:00000000 r6:00000000 r5:85028000 r4:82b17c88 [ 7343.089440][T22484] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7343.089474][T22484] [<809c974c>] (should_fail_ex) from [<8054c5c4>] (should_failslab+0x6c/0x94) [ 7343.089512][T22484] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 7343.089521][T22484] [<8054c558>] (should_failslab) from [<8052aa38>] (__kmalloc_noprof+0xa4/0x39c) [ 7343.089547][T22484] [<8052a994>] (__kmalloc_noprof) from [<80807bc4>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 7343.089584][T22484] r10:00000000 r9:830c0000 r8:00000000 r7:834ef5d8 r6:861b8a28 r5:00001000 [ 7343.089593][T22484] r4:00000000 [ 7343.089600][T22484] [<80807b88>] (tomoyo_realpath_from_path) from [<80803c8c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 7343.089634][T22484] r10:00000000 r9:00000003 r8:861b8a00 r7:00000002 r6:81cda0f4 r5:00000004 [ 7343.089644][T22484] r4:861b8a28 r3:828d0400 [ 7343.089652][T22484] [<80803bc0>] (tomoyo_path_number_perm) from [<808085e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 7343.089686][T22484] r10:85028000 r9:00000003 r8:861b8a00 r7:20000240 r6:20000240 r5:00000002 [ 7343.089695][T22484] r4:861b8a00 [ 7343.089703][T22484] [<808085c4>] (tomoyo_file_ioctl) from [<807b373c>] (security_file_ioctl+0x80/0x1d4) [ 7343.089733][T22484] [<807b36bc>] (security_file_ioctl) from [<805993fc>] (sys_ioctl+0x4c/0xb5c) [ 7343.089763][T22484] r7:20000240 r6:00000002 r5:861b8a01 r4:00000000 [ 7343.089772][T22484] [<805993b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7343.089804][T22484] Exception stack(0xedbf5fa8 to 0xedbf5ff0) [ 7343.089826][T22484] 5fa0: 00000000 00000000 00000003 00000002 20000240 00000000 [ 7343.089843][T22484] 5fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f580dc [ 7343.089856][T22484] 5fe0: 76f57e88 76f57e78 00018bc4 00130300 [ 7343.090024][T22484] r10:00000036 r9:85028000 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 7343.090054][T22484] r4:00000000 [ 7343.108428][T22484] ERROR: Out of memory at tomoyo_realpath_from_path. [ 7343.158147][ T28] audit: type=1400 audit(134225583.066:40206): avc: denied { read write } for pid=19758 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7343.180963][ T28] audit: type=1400 audit(134225583.086:40207): avc: denied { read write open } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7343.181919][ T28] audit: type=1400 audit(134225583.086:40208): avc: denied { ioctl } for pid=19758 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7343.327516][ T28] audit: type=1400 audit(134225583.236:40209): avc: denied { write } for pid=22486 comm="syz.0.13783" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7343.340287][ T28] audit: type=1400 audit(134225583.246:40210): avc: denied { write open } for pid=22486 comm="syz.0.13783" path="/dev/input/mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7343.361839][ T28] audit: type=1400 audit(134225583.266:40211): avc: denied { create } for pid=22485 comm="syz.1.13782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7343.398167][ T28] audit: type=1400 audit(134225583.296:40212): avc: denied { create } for pid=22486 comm="syz.0.13783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7343.405438][ T28] audit: type=1400 audit(134225583.316:40213): avc: denied { ioctl } for pid=22486 comm="syz.0.13783" path="socket:[151933]" dev="sockfs" ino=151933 ioctlcmd=0x940f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7344.305127][T22498] random: crng reseeded on system resumption [ 7344.328233][T22498] FAULT_INJECTION: forcing a failure. [ 7344.328233][T22498] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 7344.329388][T22498] CPU: 1 UID: 0 PID: 22498 Comm: syz.1.13789 Tainted: G L syzkaller #0 PREEMPT [ 7344.329465][T22498] Tainted: [L]=SOFTLOCKUP [ 7344.329476][T22498] Hardware name: ARM-Versatile Express [ 7344.329495][T22498] Call trace: [ 7344.329516][T22498] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7344.329576][T22498] r7:60000013 r6:60000013 r5:8231a6c4 r4:00000000 [ 7344.329585][T22498] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7344.329611][T22498] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7344.329640][T22498] r7:00000001 r6:00000000 r5:846fbd40 r4:82b17cdc [ 7344.329648][T22498] [<8021e340>] (dump_stack) from [<809c990c>] (should_fail_ex+0x1c0/0x224) [ 7344.329678][T22498] [<809c974c>] (should_fail_ex) from [<8054c654>] (should_fail_alloc_page+0x68/0x74) [ 7344.329714][T22498] r8:edbf5d5c r7:00000001 r6:00000000 r5:00000920 r4:edbf5d68 [ 7344.329723][T22498] [<8054c5ec>] (should_fail_alloc_page) from [<805126d8>] (prepare_alloc_pages+0xf8/0x1b4) [ 7344.329751][T22498] [<805125e0>] (prepare_alloc_pages) from [<8051b7a4>] (__alloc_frozen_pages_noprof+0xb0/0x161c) [ 7344.329785][T22498] r10:00000000 r9:846fbd40 r8:00000000 r7:82c7e46c r6:00000920 r5:00000000 [ 7344.329795][T22498] r4:82c7e380 [ 7344.329803][T22498] [<8051b6f4>] (__alloc_frozen_pages_noprof) from [<8051cdf8>] (get_free_pages_noprof+0x1c/0x74) [ 7344.329837][T22498] r10:81c037e8 r9:00000000 r8:00000000 r7:82c7e46c r6:00000820 r5:00000000 [ 7344.329848][T22498] r4:82c7e380 [ 7344.329855][T22498] [<8051cddc>] (get_free_pages_noprof) from [<8051ce68>] (get_zeroed_page_noprof+0x18/0x1c) [ 7344.329882][T22498] [<8051ce50>] (get_zeroed_page_noprof) from [<802d6568>] (get_image_page+0x18/0x144) [ 7344.329912][T22498] [<802d6550>] (get_image_page) from [<802d8a98>] (snapshot_write_next+0x25c/0xac0) [ 7344.329944][T22498] r10:81c037e8 r9:00000000 r8:00000000 r7:82c7e46c r6:00000000 r5:82c7e46c [ 7344.329955][T22498] r4:82c7e380 r3:00000000 [ 7344.329963][T22498] [<802d883c>] (snapshot_write_next) from [<802dd264>] (snapshot_write+0xf8/0x110) [ 7344.329993][T22498] r10:81c037e8 r9:00000000 r8:00000000 r7:82c7e46c r6:00400040 r5:edbf5f68 [ 7344.330003][T22498] r4:82c7e46c [ 7344.330011][T22498] [<802dd16c>] (snapshot_write) from [<8057e60c>] (vfs_write+0xd4/0x450) [ 7344.330043][T22498] r9:846fbd40 r8:802dd16c r7:edbf5f68 r6:00000000 r5:86176480 r4:00000000 [ 7344.330053][T22498] [<8057e538>] (vfs_write) from [<8057eafc>] (ksys_write+0x74/0xec) [ 7344.330093][T22498] r10:00000004 r9:846fbd40 r8:8020029c r7:00000000 r6:00000000 r5:86176480 [ 7344.330102][T22498] r4:86176481 [ 7344.330111][T22498] [<8057ea88>] (ksys_write) from [<8057eb84>] (sys_write+0x10/0x14) [ 7344.330140][T22498] r7:00000004 r6:0012ed04 r5:00000000 r4:00000000 [ 7344.330148][T22498] [<8057eb74>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7344.330172][T22498] Exception stack(0xedbf5fa8 to 0xedbf5ff0) [ 7344.330191][T22498] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 7344.330208][T22498] 5fc0: 00000000 00000000 0012ed04 00000004 003462d8 00000000 00000001 76f870dc [ 7344.330222][T22498] 5fe0: 76f86e88 76f86e78 00018bc4 00130300 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1342:(snd_func_refer) error evaluating name ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5728:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2722:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1342:(snd_func_refer) error evaluating name ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5728:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2722:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 7349.236371][ T2217] ------------[ cut here ]------------ [ 7349.237037][ T2217] WARNING: drivers/gpu/drm/drm_vblank.c:1320 at drm_crtc_wait_one_vblank+0x19c/0x21c, CPU#1: kworker/1:1/2217 [ 7349.239892][ T2217] faux_driver vkms: [drm] vblank wait timed out on crtc 0 [ 7349.240863][ T2217] Modules linked in: [ 7349.241854][ T2217] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 7349.242733][ T2217] CPU: 1 UID: 0 PID: 2217 Comm: kworker/1:1 Tainted: G L syzkaller #0 PREEMPT [ 7349.243609][ T2217] Tainted: [L]=SOFTLOCKUP [ 7349.244132][ T2217] Hardware name: ARM-Versatile Express [ 7349.244978][ T2217] Workqueue: events drm_fb_helper_damage_work [ 7349.245769][ T2217] Call trace: [ 7349.246194][ T2217] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7349.247023][ T2217] r7:82a1e6fc r6:00000000 r5:8231a6c4 r4:00000001 [ 7349.247696][ T2217] [<80201af0>] (show_stack) from [<8021e32c>] (dump_stack_lvl+0x5c/0x70) [ 7349.248453][ T2217] [<8021e2d0>] (dump_stack_lvl) from [<8021e358>] (dump_stack+0x18/0x1c) [ 7349.249373][ T2217] r7:82a1e6fc r6:00000000 r5:83f3e200 r4:82c7bd3c [ 7349.249984][ T2217] [<8021e340>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 7349.250799][ T2217] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 7349.251638][ T2217] r7:80b49650 [ 7349.252013][ T2217] [<80202818>] (panic) from [<802507e4>] (get_taint+0x0/0x1c) [ 7349.252837][ T2217] r3:82a0b544 r2:00000001 r1:82301230 r0:82308afc [ 7349.253428][ T2217] [<8025076c>] (check_panic_on_warn) from [<80250960>] (__warn+0x98/0x1ac) [ 7349.254354][ T2217] [<802508c8>] (__warn) from [<80250c5c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 7349.255251][ T2217] r8:00000009 r7:82396a6c r6:ee469dfc r5:83f3e200 r4:00000000 [ 7349.255934][ T2217] [<80250a78>] (warn_slowpath_fmt) from [<80b49650>] (drm_crtc_wait_one_vblank+0x19c/0x21c) [ 7349.256994][ T2217] r10:84235e44 r9:ffffff92 r8:00000000 r7:0006b162 r6:00000000 r5:00000000 [ 7349.257858][ T2217] r4:83fce800 [ 7349.258211][ T2217] [<80b494b4>] (drm_crtc_wait_one_vblank) from [<80b4d21c>] (drm_client_modeset_wait_for_vblank+0x60/0x74) [ 7349.259452][ T2217] r10:8302ae05 r9:83fce800 r8:83892e00 r7:ee469ec4 r6:83fce800 r5:00000000 [ 7349.260262][ T2217] r4:83f14040 [ 7349.260633][ T2217] [<80b4d1bc>] (drm_client_modeset_wait_for_vblank) from [<80b669e4>] (drm_fb_helper_damage_work+0x80/0x1e0) [ 7349.261694][ T2217] r7:ee469ec4 r6:83892eb4 r5:00000000 r4:83892e94 [ 7349.262325][ T2217] [<80b66964>] (drm_fb_helper_damage_work) from [<80276484>] (process_one_work+0x1c8/0x5a0) [ 7349.263404][ T2217] r9:83f3e200 r8:01800000 r7:ddde4e00 r6:8302ae00 r5:83892e94 r4:85c96f80 [ 7349.264332][ T2217] [<802762bc>] (process_one_work) from [<80277248>] (worker_thread+0x16c/0x318) [ 7349.265313][ T2217] r10:ddde4e00 r9:85c96fb0 r8:83f3e200 r7:82a03d80 r6:ddde4e20 r5:ddde4e00 [ 7349.266149][ T2217] r4:85c96f80 [ 7349.266508][ T2217] [<802770dc>] (worker_thread) from [<8028125c>] (kthread+0x11c/0x154) [ 7349.267320][ T2217] r10:00000000 r9:ecffde88 r8:86442e80 r7:85c96f80 r6:802770dc r5:83f3e200 [ 7349.268026][ T2217] r4:8508eac0 [ 7349.268371][ T2217] [<80281140>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7349.269198][ T2217] Exception stack(0xee469fb0 to 0xee469ff8) [ 7349.269754][ T2217] 9fa0: 00000000 00000000 00000000 00000000 [ 7349.270474][ T2217] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7349.271118][ T2217] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7349.271738][ T2217] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281140 r4:8508eac0 [ 7353.885295][ T2217] SMP: failed to stop secondary CPUs [ 7353.887568][ T2217] Rebooting in 86400 seconds..