last executing test programs: 9.822927301s ago: executing program 1 (id=6102): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$full(0xffffff9c, &(0x7f0000000000), 0x80000, 0x0) r2 = signalfd(r0, &(0x7f00000002c0)={[0x4, 0x5]}, 0x8) dup3(r1, r2, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r4 = ioctl$NS_GET_PARENT(r3, 0x5450, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000400)={{0x0, 0x3, 0x0, 0x0, 0x10}}) (async, rerun: 64) ioctl$SNDRV_TIMER_IOCTL_STOP(r5, 0x54a1) (async, rerun: 64) ioctl$TUNSETVNETHDRSZ(r4, 0x5452, 0x0) (async) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) (async, rerun: 32) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000801}, 0x80) (rerun: 32) 8.961163796s ago: executing program 1 (id=6103): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x5450, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$binder_debug(0xffffff9c, &(0x7f00000004c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES8, @ANYBLOB="080028a0700025023b2cc1f7ab286058e06348000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 8.016870194s ago: executing program 1 (id=6106): setxattr$incfs_size(&(0x7f0000000180)='./file0/../file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=0x6, 0x8, 0x2) rename(&(0x7f0000000100)='./file0/../file0/file0\x00', &(0x7f00000000c0)='./file0/../file0/file0\x00') 7.418295286s ago: executing program 1 (id=6107): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/power/mem_sleep', 0x4c0100, 0x132) r2 = io_uring_setup(0x5828, &(0x7f00000003c0)={0x0, 0x46b2, 0x1, 0x2, 0x8005, 0x0, r1}) r3 = socket(0x10, 0x3, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) close(r4) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4, 0x1, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x80004}, 0x8000) recvfrom$inet_nvme(r3, 0x0, 0x0, 0x100, 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$dmmidi(&(0x7f0000000200), 0x9cea, 0x40) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000240), 0x0, 0x0, 0x1) fcntl$dupfd(r0, 0x406, r0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r7, 0x0) connect$unix(r6, &(0x7f0000000280)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = dup2(r7, r6) r9 = accept$unix(r8, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r9, 0x5451, 0x0) r10 = syz_open_dev$I2C(&(0x7f0000000040), 0x0, 0x200) ioctl$FIONCLEX(r10, 0x5450) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 3.068696231s ago: executing program 1 (id=6112): r0 = openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000300)) 2.654562743s ago: executing program 1 (id=6113): mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000008400)="92756f43b31ffe542788ef586b7c5a344424e3acac2590be6bbe37adface4a8f2e534ffe76a83a93f0b3680a72fddfde83f96d01982384e8d689219cb9669b14dbaa1b799f82ea1fc926126a4163618e16d4f94143a4e0f27c44fcef3920a0b3805ed4e78098d8689cc7791bd86648070718d238664332948d87866c8d2590fc0f017f9853abd9ed60b99f1aa6ae2dbd24ab6dbcebdb055246815ace147cc50fa3b2861148fcda374d5b203e51d72c45e4dde3e9ee9a47ffe458baf7bb49035135a8194aa1f0a83fa2abed56398f90daff679634619453f533f22583a6e0a4dc09e9de46684d5e0136e229510f3702cf3a4cd0065d3e5d3c419e38a80b070ca55010e082a9c510fd18cc0b26bb5e8e459e747befbc5c6b60ace80bf41417b7b78cf57e5b3984f0cdddc615c5e0000454d3f4a196fb6d18aa629cf0b0245f95ba958d86dc175616f8cd3ac473057dc3a5ff7107973326350107f4468e7ecd48d689b82c12d22ae5f1858302a1b4cfde8fd347a99ddcde40d1c49d9b5099fbccf09e782212be4b2ce36a2bc3c9ee794abffe72a5501e6c4f3f7f68b74761ffd6620609224a3bf11f655dadb5c8a5813b02fb46830e9ac6825f5d0e89910352eb3a58c0dd82d094f94dd2c85666f684a8f437bbd0e66b9f4d366117b67a054d212c4fbc287848cb0578391335d5d616b14d99a2e3df8e8a152d5de99bcefcaab5bb5cc71f3ddd66b379c104648e190e0b28a180d3aecc5423575d4ba7dbf31215c717da7b87dd454b6efcd36c91aaa631127f5bd88723d221752f102bc0c7ac6c5c7a1ad6747af40d01b6d39eab7b0e1292b44683c586386ad00acf60fb8f9bac551a6eb5bab7317b5d89f64db10bd9018dfa6d65d93862e851afbc30fd70fe5f0de322462045177231852ca80e4e78da4fea0c79ba354333026c8bc77d308a8d256a19ec45d2088c196691d3f9aac28ded36004a65ee1ce49ba9599ceee84534bb61d02d04a6732f1e27d72962f74b59f3522bf844c5022986d55934e48b8681b7f5b7532391448caeef00315d28320a46d8bd7813544e1e4bf994e14a519c2654ff20b42bdb69c262897e28eca528f0999840b00ed8256597d27cfc20d71d5f40d0bbca759f7594c6034aa1e16a84ed152fad0fdc1c303a7f61225712714f823afc5ea241d482d3585759623af8c97ca6a84a2033b3d7314ea0ef7ba9b288b362a294c92c8b9736829c16f61c5a1ee04aca965d71162292274595ea62c9c2918e8279c99f5d2830c617c58211fd7452330184b9428d5ec1d5cd75ddcc6de3326fdc70e891104b3b013c30ffccfaf3308d9671b01f6b080a930dac2052c6f39817a662121d90d40d6a1facfb50bec7d408030b6d0ae3e744f3bcc327c35dc43cf86b743db78ff2e593b19923235ed6467f299b08718fe1840c16a748935dff941150fb08b30573b37bf9af5c86cc8d9e229a832e4ef25ec91f71120f2b3e9062485976c280a2d172386029e2f2a4801197fca0a13514edacf5ddbac5a62e8bb13dd1572657a821a8739297f72e29239d1cdddf3e30cbe9af3141f2275ee4ae85d86ec888fe9a6751f252057e95b8beb055e276439581afee93cd44f1e92f70e5f725451d3ab662918ffbb1269509fbd511e95a00ec717f9d60d643864abd6ad1cc4dd7f933379a6078a86c2158db8076e7b660366fca7b1c46d09d2c8e67a6494bfb4c2c6750e76593895b5e2b2bc78093840c3c4a807826bc2750a96b4e1dd5b82b492bb2215518c92064d1763c37132604e52e73fac3f4511f791753aeecfbb19816e0da7a1bfbea9eeaa0f256eaedcb119a61f7d0ea0f5cd4969d45cb014800f2c888d5c2217cf0f69a7507779883b57352bb8883cc584891950d6e792537074f4fc4337aa19b9bf60e18edd939d289fb4a6b7aa6c66da20774e249ca4f779d3c910b1a9a8e4c38af6adecc87d5481d181fd66023ffff246f4e2556b218fe8110acebe20b1675f1de6f265b6d1d8514a53522396bf0e2f2b153c498e48b36d16f8b9bd56f45d7f5b9397d7f1339117a176d0bad0b68e800682416d3e18fe2197c7f8dc20600feb95cc6ba86ad47f113e159bd4389e30eab2874bd27eebc56020c4dab9973b13f3e82aa62a7e0a151d73de48cb811e32be63ffd303f5a6ea6f097ed763fbf36c430821e451146de79922348354ce285af0997bf3c66e6ef02942e24b8f1ccdd542f09cfe65c0da0094c0b5fd26bbc061538b41e5ed2cbb390ee29b10a4b7a696009e1b5b86c44c0a561a257c15415feaeb1433ea275ed6e4b228503fe71ee5942665164faaed6697112206be0fe7863aebd4bbe951d5dea1da294dba0793196385f4d5141c9d6c4b0fa22b2e200cfb70b52aca31655e71e5a576ccb8ccb5b1364748aa981edbb81a813b1aebc67be1f7619e7e197622d981280429f6ca5145c5b3b05e6bace9191e5c58fbf140f71f594cbfd4db0e9f6923f1758ff9464a61a720a5d4f09c622c3ce3f5d0d3a1d191111168108f41f12b16e9eaf3617c353715cd35260560cbfd0555d51ce5c40bbdb7c95ceaeadadb8902974de50b0863348183864f5ea682e678286a06a6f396af29a7c7fb33a3579e25835963612f3c0d4cf369d85959a0adeda94d35824050e6fba7f83f90867583f713d7783323c7010e94c9be331f860db395dbde6face5bfdb616fcefa9c6b01f6963daa840a31ff554a458c0c50cb5e09f91f54f63234589decaf45bbfbaef0dcbff4ae6e65ca26a530261c491ef8eb9a855a1d7463391c9b66be96cf24c3c321ee5a5bdc857f60b582683c6ae1e3775b62a9f19ff8fa51380ca8a2a3c6de79012f5727ba12025e7e6723a23a81e067ca6e54c7b38ff64880d235d21e7ee5258953dcbf9e2a962f006ca4ffe870859242c850cbae4222b3b72c4f86934379ba2ead1dcde906241b994d95c88355af5a9a30ace9c933a6942f341ad221dd825846a8fd44c03e2eaa9311c26e15a1bd7cbba961a22ef23d7ebba0e34cec5ef09b1ce72814a97e33bd29f3d9ec80a4f45d1d29486accf15c11f1a800bd84918e7626f678275d7c7acb02cc0e6e34bb766ba6b75c3ad14fca9352e09c3b69390c045cfc842ff9ade8ca693c07fadc7047a946e6e570c3afc5b501c964103397f5ddadc2d59a048348dd42f07cfe31bc9b5ae453f5086bb41bba4c8a3e518e30b0855184b053f923025dd72ce1bcbf41231978b34a8547c71d7313992165078903c61d312b0d9469413c9fd97ccdf0ea270fb6c47ec8861a1c8d909eeace761b5a06ba46e25785ff87f867777abb237c6c980687991f1ed0157d58492260c712cec34c1fc0962103955db4d5090b6e8409cf3c3c79d0e691cf4fbc0b2251a016dcd456969cd32e5429533bf0d6f8bda84c05f0e2040de8b53bfb8676eec4b76c3df6f46b1e43732035dda577e75f640777f6ae90fd2f1af42ba462dac732019c599bfef01acd6a0d4d1796bcb8f58519d6f9ad9a3206704a94d472516b988141f44ecd2e6f28a49aa0c449db87972fc995a97379914546ea43143ea2cf779a9cbe81f111fe89129db3610492164ab2598eca7e60d9a6963d8ba03a86729db86e420fd96d61b8fb11edc2b339b57a740074ae5b775eaf60cd85dc934e604bf2b4bd58ee01205b4df57ac20ff8db45a05982b579643882407050c005102a2e71f1e56dc76dbf5331112e83e48bfb5cf2a78a893190d78426175c162ffaa7278a43b9932318fc17fb8cb0dfac610b1ad235b91f9cb7623b155117e07f7b876a3c37627aa31eafed141cc0c5491c4f621a66b6d837a144d78719c46511c04a093cf65fce9fabe5bd6d499eceb63538ece3cf19053550a239bf978c08c879f9954485a4e3e0d5bedb84b407ced85c4dfc4d75af116815992c29f0bc927c4a990c38ae4fcc9feb90fec1b1b555e04d010423010855394d5ccfc8ed21164190cd8f83be5debb70290c3547f07e4dc42814f1e001798e6ceee2558b0c6ff8c1759f90269ee226131116332b99ac8dd104c92088e1f91ace3198c0f59bfb75c4e4a697660eed43a29c831a552de37fce6dce96fa51b6e2111f3071a4e94422d15e102e5f67da7ca6cae6bed7743ebffacb8a811a143605791d17232181a517e872f71262c3c73668f0ef83aad498f67fa26bae698cf78f24c2dbecd399a190e6b8d0684e929f2e8083765eb2c67793a1adbb89d36b58bfb197cdc5f3c894ac9d886e8f3b0936fabd233c09de8fab8099f72a74d908ba5c5e4d39790b0bf9e45b710f5587b7c937c76690c5c5fce621a53a9fd03b0a4ee6d8d1abbe2ed561820a77f12a08cad0755540ab6dd1604b7c30a8652995ab80b85e919011de9438a4637eb0291124ed4b745e782cff98510cb03be79c2a81351abf276584d75cdd96b9c97e73eb71000b3ab7c3c19c2cab4497298fcb3052b5d4503d05e7f310318be6f848547b1a4f4db82caee190801478be28065036aa4d91f290c1f396343e73a5fe8bb5ccf0a317177ed1f77acda1a4a49dccfcab8d1b5d79f015f788b6d5e9f8228a8bcdc0696e6b19f5edffbcd7e9509c87fbe1f726b93bf8c6d8d37428763e142560c46c9e894f7317859000c25abc4f3691ebcd020171e0d4911b5d97a238109aedeb00b2eb475c1e7b45175f8aa85193b5c0f43b434c15de01610c4d022646cd6e3637f349a434a77f571ac1c5d698452d1b991e267f78dca5e592ecd31ccafcad84e4e98d134b4adc525b81bd6843428883023a6ea407201738c8bf16b541ff7280274a34d4cf14819f2dbae167ca0cae8471c495e006b45194ad91c4516f21cbb10e0d26fd5d734cd7725df5b3fbe92955f4a9bb3b9b813aeeff79d6ed5db92def19d060a208c3ec8c42c110786f1e1496c50a7249b03fc792764366894a35320b99d0bef9fd0b6a246c36a357c6b985dc83a37a8d9b8b9ad643dea94860cbe763bb73cc8422b69d4d12332242c8954075fb7117a6679638073617abcdb4619855b2036af160647f66b3531645a3bf047ae290d6ae2249f114e7a8464278bae1486022bcc7c37390c8d9a0efb0e1cfa0da8ef7a5e072f99a47ecc75e4e442880375193db49bb82ba34901286ca473ed5b63e4048db4dc455e74b3fdd2e7898ca3f4c3a02d435cde6141eea645055123a7dcf0d22057f8d425701afc55859f5147954e719d58c7486b1e02ac16cb799b77632c66bb78e6e52e11017c1736424fa4d433f1e19b4c881d23f0b2a12d5fae3ae24339088088d9b496ad97bd9f6e20a8597d1452a0c72dcf43dbbda8f18166585c06d21fbffe5fe7b55f71c9b9f1b34a02bd05ca63c7c1b1bebbb9dd24fb10291b04c665d45154dd28b85d821ce7e613119128996785e1006a8dabc4899b10d2671107d5a0658ed363b9d4b39d02f8cc5e350fbf0a31048adecd1f9e2ca749bd86f195eb48e9b4605f050de03d642940d79184618f7f88a9a0a4683ad84d6134e395305bc1d4d9d17cc334b97653529d6682a87a5fac80a6d46d6e72fc22e58be7b8f8617b3372ef2622110ab1ec448717118b257acffe55d18c7855e9e8710ad977a6792b2315a189eb4468c68641e9b60c0dab7016ac1ad63cd8004b6eca8fc88b1e4263acc00499255c16b11487a0af858075f9c892dc8044c4146e5a5677c4a2cb24bde5e078985020d4ab1e4c87492e76b7e6f4bbd71d84bab1885c9702849e70cf728776b1a94c2a8fb8c7ca01b6111ef6f2032a290949bfe473fe215273b8b5b3ad540f187490f63077dccbca6f62f0a7a66717c596cdef412f2560b10685ede967b3ee68b8c951959aeb1d7564c3b9d806b2ce858381393a79916b78f7e90beadae30ffc0b2b614380f1c2cc551a44565209db3516be379ef566ab00c673fd8aaeeecdcf1168c1960e9a477b9e13757498a44ff089351d1f27abf9fd76816f924504647d1247715ca861ebe624172c322146d66eb2b247f8ecb3e1b5ddca89b287c57510cec40fcf89d802cf4368a861af320e01e34f7a6177d4bc549181b5e87ecdfe02f78c9a59a3bf91ebb6364023ec06410e7b4476ec4e3685bfa3bfe9ef9ecc12dcd899abe0f3c7f16b4686801c0c0a949aa26bed57df56f2bc54ef19af7fcbc7b0d691075f42a4a67acf980b568acb2342f42249f7c1ee3527c13182b096064ecd250887a942d26f637e1c4041b139659d2462a68680bb04387a3b399e396b9fe74de10356125fa47d0a20827370cbf36a79b6fffade91c439dd6cfff4bbe0dd3efefb61c491ee32f935d62307cba369ac8c20f6fe3d4857ce6d240ece5e4d149f0587155a8350fcc18efae2ff11cdbe15218a82499a1996df8b5462ee170b284321e76bbe5c3f4158387644d95f087c598e3d46fbe27f63fa784bda239512113424045a2c5dbc6bc3662ca730a86d13cf8f6fe2743224ca7b535caf6b4701a7dae9cfad3d7290104bbba15b6a064ae6e909a099f75fbe47c9e654d8e3b8dc0f3dbffe829e6c56f7a241e565136812a857f59ab565a9991c6b1d8abcc94c6b33bba314f6e5060e657e4647f969a551dd6c51dfca0ff5d9e4f401fedbc2c927eb1ed95ef25f4e5accba4999322ba1539499310dd5875433a22835cfd42fd77fd4680b7fe767d7aa5c33acde04a65bd3a663fcde4c80e9f2af498f13bf9abbaa1c1265edc691e94abdcc92270c05811cd2a8104eb18efbfec9e4ba9ae5cde211b9b93082ce034b6cd5fbe9cfbac4f7e2404ef159766124f73017cc3600f3c81cd78db25fc3459629eaf20dfdb062c7e502aa69412381d847a9d254d5befc451cda3606f0bc8ae62e0aee928f9ed0b21d705a8d31b899e16445ee064563d32f7b6bb5ad197023cf528d9b329ec67815c6ddf27d2a6ffa7328bb993407cde3d166159fd49fe469254b84c2916daea8df9d69bef019f1351b9bce193e30278835b82ea5f60dc0bdd7f7452b7a820ae7cd6dc29d7ac6a6c1b6411711a96338b1e769146b2a385d282bfaae61b041166efafab2d89a4567b9460cc22d752f8e9aacaaa0db7c84879f5359662d55df6570d4214740851c74574ced733807cbb54571110410892394c3dea07bd4154d0e5689d57c3360207dac951f96a358e9c466a5c5113f3a632e184f57f075edef4dcc9721b963beb95df09dedf848260cbc1ebfdc7408218eaba6d2c51928cd37c4c0c9f321fbb0994a56947cfd9643056db5dbea60a241f8f004c932bc8e645b2ec2eb9bc4e9e2f4156293234d05e70cb26b8a370b0206c756bda6defc11c5eb386640f535a4ffb714168defc6d82f40d8f5ba8768537ead5773c53bd779ca899a2dd31c9138569ff5107c2fb12b804375c3b3dc9b828bfd550328adf358f71e86a0c49fb119f5ef9e06c13855cbfc7d1a62ca2ea655ed912a6dc7bb8b18656e8923fc7a1702ab36947d79384d681c31923e98cf40209f776bc2b219a7ccd139e756a905aa351e6eaae90770c8a193f96cd5c66e4d77a357985556e14333716d80204a5c390e0d76f4081afe917f99ad8a0976b3342f51854b374b4baa9a7f22124d2b82749446e30d9795acb9c3c3a305a6d273ac528e8e9c95c37a78e765fdda55982c2961fbc85a14fc095a78b4654ee6dfc3298749a639ab9c8e155af3a77f8a409ce174532a492ef550a140f774d77d732b3b4ca5bc41fa4488ce5957ce219b032ae1f585273748d81b19edcf3e6cb9a93ec24e41c6b3c472f9baf3ca46cb8b9a91df18acebe7d83bd4473750c4f26806da2f95b9ea48b342460af729ab15e9f033eda67feec645f985d4b9489cf6ceec1b100d007bf46c74be53c7ea17296f9c5b5cbae736491213c93b513009ebdecfcd60d46d7b86c6e3b5e288f2ba5867c07936e7bd1b00de52191eb8630ff82ccafb27a59295164751811bf74eff1e5e2abdf3c93bc5dc9814be83b2562477935e2fa30db7ebb6ec380170cf10c1f98f8c5eb71c730c2b31b55a1dd1c12a64802ab95b63c529e0a96cec8f38680221d6089926d8309796c79994d63b67bfb62f66b4a502f30ed12be41e896e88bc45a160a526fbd5f002e677322f116ec5740d7563cd23ee853c008b84998e38fdf158556e28a532573956e7c00f91f08ca245c295a3d5e003a99ea727f61d12893b435d4c8f2f5cce00c6a3091e2a47f290c07168975c53d7529b71d10faf42d2bac9db8d53669cf59c709c25e9e40b5feaed4c37dde8b84c4961c00712326fb6aaa06e80d766b40b72480f3971def61d1d129676df2478e778d899ed317426ec33e496d1fdd2ec27128f8faee92828e13da72d6aee8330a7988ea1cc8b64ec4d8b20990864c16c52c4be6d00b304b87d97bffdd9c66a740b517223089d9f3f414abedc53c768dab9220b980e6c18d5f20ba8994cc8886d7bdee213442f456d79fce1b1eb48fbf600a666c8ade24d118e6328251cf7b57a6285c650e019850f392b1c29aec5c8fc489a3819d60d5de377d4c11b8ee5625b7c02c5d50d2af3397006f2e2a41a06f039229eef5878ed91f9f6be7e988924dbaeb8455f616275e8698d93fb536e2c839b203aa69bceceddbf9c53f8addba53d50ca0f7a4729a42ac6eb757f1b408ad4a0147546173e62f7621eb18a9e1681510cceb48e0a30ab7a1bf71d56742d5f034f2d725e7ea68a011dbb100fa6eefe4ee093873de366d34f4240ca027a25c5b979c9ac47dd1dcb6ed82c4aee09dcc23cf329a8644f89b5cf00e5683934b1837574e9b39b31b1009f276e15aa040959fdf100838ca3f5ab17e45036668d06044e3a13f3a0a6f68579e50d5b0164f900d7bcfcde78396cf30f0b1dff76dc397ab1a5a44b207eb1eaaf73b945c575029ae2dce20724991e6550155ded6a42672609f2439c5aab4882b2ffaf7da787b71d05d15516bd68c6f1a9d79b675395845f24ee853f877e72c14b6c6702f7b8775ca1bfabbbcf4019f7bccf07f1c211531dfc66a7a1df79e92a20dd1cbe1b22e1209e7e3ecb9d3c2450fc22a57bfe09bd735f61c361cdac2488ae0adc7885edc0712655daaf535e1de96ccbe7869d531d8bf3db512fbd17c772332a3f8cf1e052ee0202eb99a36a0f8d7219888acbb57090cdaf3b28e1e62e8fc2ec237bdf18592a7afe4d8390dcb5e7fcc31bf4f797e6f5710070902265cc2e8c459b7da1451046abd6c8c5b02c0be2d2f505a65376266563ac7b59ef3b4e2570a6cb0bd94d46ad861317c743ce1de12bfa2295a98cdded4414d87a1580b1e4675bbdf73a22cac4a1d8d456d089e0b60cbfd16158f073bd1dac481db49fa5d8801d0fb0844b4afec1bab4e61fa0f381fa667880a1cd8163953be7b591cc9dfd7f91902370b783ae8a0f3c7cbefa7d229a37c00f523529e159b11d2e240629b64af2d11404773e991207a722c320221ce23baed7cbe40a440c5680814b122cfba9092fe03478f85adcbdeacb76d6cbf2491eafae98327b278e267821a0e1cd06ef90cb0328e246c19d8c63b9332291a89bc9f989effc675c79a870ac024756c6f5a7e32babd69625d61487ae7399490b70dd0fade7d70ad9b0757300a2dde77abaff4f63a0303853589d44efa968e10d36561f04408ad0cc227fc6b2f904cead189a0fcca9b2e6cbde5498652e0b3bc9d8b7921474403718feb5cc750dc70f5a9b1a0ae2c642015b6a1a8ab0572182b4e39e0c869cbdc60c9465f5d564d18ba2f5b3bc3e05a458744077430c5ea031ee02dd8f0a65d7dd8d90dd9b8717f77d202239a5778719423fb2aec7ca86eb07c39de65a34b988d65377a7473e9145f16d79593e96903330bbf3a8024fc15519d9baa0fae2018786f4b1846fca355ff0fccf65cccad1896309a5ccf2056dd542c929850cc91cd655962360fe316557ab3fb378328f77a07d9da24447d3fa2020b382ed2e808ec9529a01273434c64b0b7c35a06a019e4ab51cdc9c0f266ab25b6984338a0ba910d1060283b636c5d7e8a3f969c1ee1c99b54bba7ff3679fbeecbb70349f076480a867cc4ee4cacaea39c80f642533599486d2ffb77b8c9109a9d25fa0b06e58eca764f7d56469eb9547036bbea9d5c3d35b4c1fbc3d39a372c2b7ad184965cad3819c8928f1588d00949949c0c4c93d30ac7f6665247c0108bd89dff3aafe780ac66febfacc8c6a3cc387d09da6de700487a80e2c8d56df94d7ebd3e1d9e06411a6c5f7eb6da41c6f52997b5ad47ba985261103fdf12eb4a2828b248f652ef00b6abccab2eb161b878b9dbc0aa911405b6f67adda83c16187748d7b524ffe6381f489f432d592e6171bd9ccb2cd52f977143f57fbf2ab0b823d449ae55f02440972334344cda01837b93afa4f46a2fdefe27e92764cf9596780846de2e3b1ea83e62ee43b1c05aee675e25363504addfaa68e7c53ed685413f5ba951f120d0a646e474872c81e5a887464c19f8460ae814ffff24cb51dd2dca28d597ab2ea60949f8dbbe67f263e722fdb51bce4e328a19f5ff1218e1f63b8da6d40dbd5490964499b2522ea323310634893ead661407966207a66ab13adfcf1a725ed14339c46011c0e0401f2386b47cd9f902fdf84bc85e74d3ae7cc544e4d65670a554a537712c6ee9f75191631d2a4c4da06fc38423b1d5b828d7201235b2974164f52aa16bee70ee509250752f4fdd6b9f8d021943df8320682a6f80ff0d67ab7a4ceea807bd5b3b7b6380b0c7f0caa67b0208ba71317f0355a3b755af0e2c007186389438615df80b7b25104a733fc90625b62682198733c0f1625dfaa08cf81e3df043094b7b5a098b3b36f803b5b0f10a057bf814ae3579932c0a5f208985bab3d817f975283b8838ae5cb709be72b58df7425e059fdbf4e0ee51b3da01fe0b44963c1196baee5ec5909ad80d9d1660f3edd90374952a0bf8b3bece2c2f944593f4de7de5e05ded096b8f4f05d65dfc2e806f78220d84b3db564fb12f4e5e8f5eab316591f004e9374cce8e787263bc3827affe6793c130b8621d3bbb2a86fd87f070ea21718281ee7aec4bb3bb71af4bf5721cecd139c4be8c9df4ec8dfb09a5cf1d86a25d39faa9f064a997c214f334e4410917fc3b4d67ada8d87a38c0f86b02bf653dddaeb5b75b300f8bcfd792858bef8ab23e063421939c59212964c9ed5dd56e215db58cef53d31a966bb8ce4ed56287fecb3a85ba435e0b41b20ba1164b9c9f2c49fa0f7b17a89e0ec47eefe992d63ee29c8c0a1ece2664fee8edadd43636a54c48519b4fcf55b0d9103602b92441a5f85cf8c5e406d0f5815f8f37309934bd78fbc2acf0a03b051b4528db4f7c09de7d0aabafca3736b8259c818ca338ca6754e0747717c2794d664a1cacc1e9c52764a308e6df73d975638630b74cce6c49b1bac16454e96852c4f9d8ed118e86d2f1c8dc33bccd4a07be128db5e80f5684ddcc1158e744411acde590f902f0987cfb750bb5bfeed53bff076868986b566d7701f48ddfcacbd325c8d930bcef26713bf60585d5c991e2a6cc33ccbc27f7ddfba18f998497c2eb378cc8f2cc07a1b4f141c5e0fb6f52e18242e505bcf6dd20e33a469d056a0b4fd5e72d0da9d0bcce1e2f9e9dc7d1c7b6cb0f3604287eca", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x90, 0x0, 0x0, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, {0x40, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x80000, 0x120, 0x6000, 0x2, 0x0, 0x0, 0x902}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$mouse(&(0x7f0000000140), 0x9, 0x400) ioctl$VT_RELDISP(r2, 0x5605) write$FUSE_INIT(r0, &(0x7f0000000440)={0x50, 0x0, r1, {0x7, 0x29, 0x0, 0x14c0348, 0x0, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}}, 0x50) r3 = openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x1) fstat64(r3, 0x0) sendmsg$NFT_MSG_GETRULE(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)={0x364, 0x7, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NFTA_RULE_EXPRESSIONS={0x64, 0x4, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @ct={{0x7}, @void}}, {0x54, 0x1, 0x0, 0x1, @reject={{0xb}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x2}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0xff}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x72}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x2}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x81}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_EXPRESSIONS={0x298, 0x4, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_OP={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x3e}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0x1}]}}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @counter={{0xc}, @void}}, {0x22c, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x21c, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0xa3, 0x3, "8f47dfb78627c6b3f6aa4f062ada50807ddd40fec5948eb55b11e5cfd0e7021f2e7eba039a2fe1d34215bf66d9b2b1e7bfd980b1a4d5b1724f87bac351efc5909bcd84ed1df8179ffc0d3b5e3568c746d598ab295c5d9ffeaa6edb66a9cb4249ed8bd179f51685382d44cbbac554701ab68b3058dce64cb4a3492ac28a391172bc7d8995d9d7101dbf28f3d666ddff13eb4008db020302102b4c6dac7dab43"}, @NFTA_MATCH_INFO={0xa3, 0x3, "444ad087d501fee17e616d0ad095b2ebf249b573e4a6acfa9e558aa72a83dd4286640af77a5f25c012eae78a932c9f81c8aa3f00da7d04a10618750366619a7476cd822847637dc7b2435ba1080f2cabf15f4e73fa7603ab6a6bf37a98b1a343350c917f3db4fd0e6c8a1b44ab7baf34f9559082a3529b93837070d2172af651a6bc031d7f9dfa9efdc8da8315fbdef2bfaff489923d6b38a94ec56403890e"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MATCH_NAME={0xc, 0x1, 'iprange\x00'}, @NFTA_MATCH_INFO={0x5a, 0x3, "947216f36a668eedbf7f80954fc1625eb16dffccf7ee8c3c1b5000705c3adedce759df5f1117b736d2e643ce10edf98d22c3cf33c420cfd7e0c01f8ab7bd2783d8e74d106c6c477043b06ca00a4b3a0374358d6334fe"}, @NFTA_MATCH_INFO={0x3b, 0x3, "91e19e91544e38e25b96eb37044e0d96e079c74b331cc5cc682af611882a718419bb5faf22e0b76cd0e9e26c06ff5d3d9399bcb63416c8"}, @NFTA_MATCH_NAME={0xe, 0x1, 'connlimit\x00'}, @NFTA_MATCH_NAME={0x9, 0x1, 'dscp\x00'}]}}}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, 0x364}, 0x1, 0x0, 0x0, 0x4000811}, 0x20000000) 610.700449ms ago: executing program 0 (id=6114): r0 = getpgrp(0x0) r1 = syz_pidfd_open(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = pidfd_getfd(r1, r2, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004}, 0x804c410) 442.692597ms ago: executing program 0 (id=6115): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETVERSION(r1, 0x40047602, &(0x7f0000000000)=0x8) (async) write$binfmt_elf32(r0, 0x0, 0x0) (async) recvmmsg$unix(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x10}}], 0x1, 0x0, 0x0) dup3(r1, r2, 0x0) (async) ioctl$SIOCGETSGCNT_IN6(r2, 0x8912, &(0x7f00000014c0)={@mcast2, @mcast1}) 360.656601ms ago: executing program 0 (id=6116): r0 = socket(0x10, 0x1, 0x1) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xc0543}, 0x18) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) r2 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x5452, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000540)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r5 = ioctl$NS_GET_PARENT(r4, 0x5450, 0x0) ioctl$EXT4_IOC_SETFSUUID(r5, 0x5451, 0x0) r6 = accept4(r3, 0x0, 0x0, 0x800) sendmsg$NL80211_CMD_DEL_KEY(r6, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x24040051}, 0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = signalfd4(0xffffffffffffffff, &(0x7f0000001780)={[0x8]}, 0x8, 0x800) dup3(r7, r8, 0x0) r9 = getpid() ioctl$F2FS_IOC_GET_FEATURES(r4, 0x8004f50c, &(0x7f0000000340)) r10 = syz_pidfd_open(r9, 0x0) r11 = socket$nl_audit(0x10, 0x3, 0x9) r12 = pidfd_getfd(r10, r11, 0x0) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r12, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x24000080}, 0x40000) getsockopt$sock_int(r6, 0x1, 0xc, &(0x7f0000000380), &(0x7f00000003c0)=0x4) write$FUSE_GETXATTR(r8, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) 256.817947ms ago: executing program 0 (id=6117): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES8, @ANYBLOB="080028a0700025023b2cc1f7ab286058e06348000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 168.352122ms ago: executing program 0 (id=6118): r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup3(r1, r0, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) bind$netlink(r3, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfc, 0x10000000}, 0xc) r4 = openat$vcsa(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = eventfd2(0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r5, 0x5421, &(0x7f00000000c0)) close(r4) write$P9_RREADLINK(r4, 0x0, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1800) write$P9_RSETATTR(r2, &(0x7f0000000280)={0x7, 0x1b, 0x2}, 0x7) close(r6) socket$nl_route(0x10, 0x3, 0x0) openat$fb0(0xffffff9c, &(0x7f0000000240), 0x4080, 0x0) r7 = dup(r0) write$fb(r7, &(0x7f00000002c0)="a94d311575e7bd8200000000", 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="7c000000030705000000000000000000000000095400078008000140000000be080001400000000108000240004a4b235b14aa320c77b6da134600000808000240000000050800014000000005080002400000000208000240ffffffff08000240000000a8080001400000000208000240000540000000325c9a981f12b8a592c4f9b720c00efe7e56d7ec93782a1475756c816465dded01fa"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 0s ago: executing program 0 (id=6119): r0 = socket$inet_smc(0x2b, 0x1, 0x0) syncfs(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r2, 0xb, {0x2, 0x1, 0x1}, 0x1}, 0x18) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={0x0, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, @ethernet={0x1}, @l2tp={0x2, 0x0, @broadcast, 0x1}, 0xbed8, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)='syzkaller0\x00', 0x2, 0x3, 0x9c}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000500)={0x0, 0x5, 0xc8}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000600)={0x0, @multicast2, @remote}, &(0x7f0000000640)=0xfffffffffffffcdf) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0x5, 0x10000, 0x10, @private1, @local, 0x20, 0x80c9, 0x4, 0x3}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000008c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000740)={0x140, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x140}}, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x104, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_EEE_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x4000}, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@empty, @in=@multicast1, 0x4e21, 0x1ff, 0x4e21, 0x7, 0x2, 0x80, 0x0, 0x87, r2, r5}, {0x1, 0x3, 0x9, 0x68, 0x6, 0x6, 0x0, 0xa}, {0x101, 0xfffffffffffffff9, 0x9, 0x100}, 0x4, 0x6e6bbe, 0x1, 0x1, 0x4, 0x2}, {{@in6=@empty, 0x4d2, 0x6c}, 0x2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3506, 0x3, 0x3, 0x6, 0x0, 0x8, 0x6}}, 0xe8) kernel console output (not intermixed with test programs): id=25060 comm="syz-executor" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2480.248578][ T31] audit: type=1400 audit(2480.160:11552): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2483.499647][T28016] fuse: Bad value for 'fd' [ 2485.209905][ T31] kauditd_printk_skb: 121 callbacks suppressed [ 2485.210092][ T31] audit: type=1400 audit(2485.130:11674): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.215826][ T31] audit: type=1400 audit(2485.130:11675): avc: denied { recv } for pid=26837 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.271030][ T31] audit: type=1400 audit(2485.190:11676): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.271257][ T31] audit: type=1400 audit(2485.190:11677): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.273672][ T31] audit: type=1400 audit(2485.190:11678): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.279156][ T31] audit: type=1400 audit(2485.200:11679): avc: denied { recv } for pid=2841 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.286684][ T31] audit: type=1400 audit(2485.200:11680): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.286939][ T31] audit: type=1400 audit(2485.200:11681): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.347217][ T31] audit: type=1400 audit(2485.260:11682): avc: denied { read write } for pid=25060 comm="syz-executor" name="loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2485.348953][ T31] audit: type=1400 audit(2485.270:11683): avc: denied { open } for pid=25060 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2485.809065][T28031] random: crng reseeded on system resumption [ 2491.186885][ T31] kauditd_printk_skb: 307 callbacks suppressed [ 2491.187264][ T31] audit: type=1400 audit(2491.100:11991): avc: denied { write } for pid=28081 comm="syz.1.5820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2491.307162][ T31] audit: type=1400 audit(2491.220:11992): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.360369][ T31] audit: type=1400 audit(2491.280:11993): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.362455][ T31] audit: type=1400 audit(2491.280:11994): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.365572][ T31] audit: type=1400 audit(2491.280:11995): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.374555][ T31] audit: type=1400 audit(2491.290:11996): avc: denied { recv } for pid=26747 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.376659][ T31] audit: type=1400 audit(2491.290:11997): avc: denied { recv } for pid=26747 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.405611][ T31] audit: type=1400 audit(2491.300:11998): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.406126][ T31] audit: type=1400 audit(2491.300:11999): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2491.603100][ T31] audit: type=1400 audit(2491.520:12000): avc: denied { read write } for pid=25060 comm="syz-executor" name="loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2492.027058][T28091] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28091 comm=syz.0.5825 [ 2492.720802][T28096] fuse: Unknown parameter 'fd0x0000000000000004' [ 2494.507124][T28109] FAULT_INJECTION: forcing a failure. [ 2494.507124][T28109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2494.569493][T28109] CPU: 0 UID: 0 PID: 28109 Comm: syz.1.5831 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2494.569650][T28109] Hardware name: ARM-Versatile Express [ 2494.569677][T28109] Call trace: [ 2494.569718][T28109] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2494.569878][T28109] r7:00000000 r6:00000000 r5:60000013 r4:82260088 [ 2494.569901][T28109] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2494.569955][T28109] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2494.570013][T28109] r5:84f69800 r4:8294f150 [ 2494.570031][T28109] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2494.570094][T28109] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 2494.570157][T28109] r8:76f92f30 r7:00000000 r6:00000000 r5:dfafdf68 r4:00000002 [ 2494.570175][T28109] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 2494.570229][T28109] [<80971e80>] (should_fail_usercopy) from [<8058e684>] (simple_read_from_buffer+0x80/0x13c) [ 2494.570315][T28109] [<8058e604>] (simple_read_from_buffer) from [<806085a4>] (proc_fail_nth_read+0xb8/0x108) [ 2494.570385][T28109] r10:00000001 r9:806084ec r8:00000002 r7:dfafdf68 r6:0000000f r5:76f92f30 [ 2494.570409][T28109] r4:84f69800 r3:dfafde9f [ 2494.570426][T28109] [<806084ec>] (proc_fail_nth_read) from [<80553568>] (vfs_read+0x98/0x320) [ 2494.570499][T28109] r8:76f92f30 r7:dfafdf68 r6:84f69800 r5:0000000f r4:85a37300 [ 2494.570518][T28109] [<805534d0>] (vfs_read) from [<80554210>] (ksys_read+0x74/0xe8) [ 2494.570583][T28109] r10:00000003 r9:84f69800 r8:8020029c r7:00000000 r6:00000000 r5:85a37300 [ 2494.570603][T28109] r4:85a37303 [ 2494.570620][T28109] [<8055419c>] (ksys_read) from [<80554294>] (sys_read+0x10/0x14) [ 2494.570683][T28109] r7:00000003 r6:00000006 r5:76f92f30 r4:0000000f [ 2494.570701][T28109] [<80554284>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2494.570752][T28109] Exception stack(0xdfafdfa8 to 0xdfafdff0) [ 2494.570786][T28109] dfa0: 0000000f 76f92f30 00000006 76f92f30 0000000f 00000000 [ 2494.570820][T28109] dfc0: 0000000f 76f92f30 00000006 00000003 002e0000 00000000 00006364 76f930bc [ 2494.570846][T28109] dfe0: 00000158 76f92ed0 000d80f4 00130194 [ 2495.275212][T28111] fuse: Unknown parameter 'fd0x0000000000000004' [ 2496.066204][T28116] FAULT_INJECTION: forcing a failure. [ 2496.066204][T28116] name failslab, interval 1, probability 0, space 0, times 0 [ 2496.066601][T28116] CPU: 1 UID: 0 PID: 28116 Comm: syz.1.5833 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2496.066698][T28116] Hardware name: ARM-Versatile Express [ 2496.066725][T28116] Call trace: [ 2496.066770][T28116] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2496.066874][T28116] r7:00000c40 r6:00000000 r5:60000013 r4:82260088 [ 2496.066895][T28116] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2496.067020][T28116] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2496.067147][T28116] r5:841ee000 r4:82917bc0 [ 2496.067347][T28116] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2496.067816][T28116] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 2496.067908][T28116] r8:841ee000 r7:00000c40 r6:84976628 r5:00001000 r4:830016c0 [ 2496.067928][T28116] [<8051f3f4>] (should_failslab) from [<80503df4>] (__kmalloc_noprof+0x9c/0x458) [ 2496.067983][T28116] [<80503d58>] (__kmalloc_noprof) from [<807c337c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 2496.068083][T28116] r10:841ee000 r9:83318000 r8:00000000 r7:834d0550 r6:84976628 r5:00001000 [ 2496.068107][T28116] r4:00000000 [ 2496.068126][T28116] [<807c3340>] (tomoyo_realpath_from_path) from [<807bf4c0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 2496.068197][T28116] r10:841ee000 r9:00000000 r8:84976600 r7:50009417 r6:00000004 r5:81cd6504 [ 2496.068221][T28116] r4:84976628 r3:826c0200 [ 2496.068241][T28116] [<807bf3f4>] (tomoyo_path_number_perm) from [<807c3da0>] (tomoyo_file_ioctl+0x1c/0x20) [ 2496.068312][T28116] r9:00000004 r8:84976600 r7:00000000 r6:00000000 r5:50009417 r4:84976600 [ 2496.068333][T28116] [<807c3d84>] (tomoyo_file_ioctl) from [<807705f4>] (security_file_ioctl+0x64/0x1e4) [ 2496.068387][T28116] [<80770590>] (security_file_ioctl) from [<8056cd78>] (sys_ioctl+0x4c/0xba0) [ 2496.068445][T28116] r7:00000000 r6:84976601 r5:00000000 r4:50009417 [ 2496.068462][T28116] [<8056cd2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2496.068514][T28116] Exception stack(0xdfb01fa8 to 0xdfb01ff0) [ 2496.068552][T28116] 1fa0: 00000000 00000000 00000004 50009417 00000000 00000000 [ 2496.068587][T28116] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f930bc [ 2496.068614][T28116] 1fe0: 76f92ec0 76f92eb0 0001948c 001322c0 [ 2496.068651][T28116] r10:00000036 r9:841ee000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 2496.068675][T28116] r4:00000000 [ 2496.195411][ T31] kauditd_printk_skb: 183 callbacks suppressed [ 2496.195832][ T31] audit: type=1400 audit(2496.110:12184): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.196078][ T31] audit: type=1400 audit(2496.110:12185): avc: denied { recv } for pid=26242 comm="syz-executor" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.242171][ T31] audit: type=1400 audit(2496.160:12186): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.242817][ T31] audit: type=1400 audit(2496.160:12187): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.246191][ T31] audit: type=1400 audit(2496.160:12188): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.258164][ T31] audit: type=1400 audit(2496.170:12189): avc: denied { recv } for pid=28121 comm="syz.0.5837" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.264539][ T31] audit: type=1400 audit(2496.180:12190): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.265013][ T31] audit: type=1400 audit(2496.180:12191): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2496.274103][ T31] audit: type=1400 audit(2496.190:12192): avc: denied { allowed } for pid=28121 comm="syz.0.5837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2496.284526][ T31] audit: type=1400 audit(2496.200:12193): avc: denied { create } for pid=28121 comm="syz.0.5837" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2496.315512][T28116] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2501.495315][ T31] kauditd_printk_skb: 288 callbacks suppressed [ 2501.495772][ T31] audit: type=1400 audit(2501.410:12480): avc: denied { execmem } for pid=28178 comm="syz.1.5861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2501.636802][ T31] audit: type=1400 audit(2501.550:12481): avc: denied { create } for pid=28178 comm="syz.1.5861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2501.659985][ T31] audit: type=1400 audit(2501.580:12482): avc: denied { ioctl } for pid=28178 comm="syz.1.5861" path="socket:[68520]" dev="sockfs" ino=68520 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2501.662164][ T31] audit: type=1400 audit(2501.580:12483): avc: denied { module_request } for pid=28178 comm="syz.1.5861" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2501.791766][ T31] audit: type=1400 audit(2501.710:12484): avc: denied { sys_module } for pid=28178 comm="syz.1.5861" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2501.793530][ T31] audit: type=1400 audit(2501.710:12485): avc: denied { module_request } for pid=28178 comm="syz.1.5861" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2501.930759][ T31] audit: type=1400 audit(2501.850:12486): avc: denied { bind } for pid=28178 comm="syz.1.5861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2502.166806][ T31] audit: type=1400 audit(2502.080:12487): avc: denied { write } for pid=28178 comm="syz.1.5861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2502.268847][ T31] audit: type=1400 audit(2502.190:12488): avc: denied { write } for pid=28178 comm="syz.1.5861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2502.353966][ T31] audit: type=1400 audit(2502.270:12489): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.541358][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 2506.541736][ T31] audit: type=1400 audit(2506.460:12608): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.562204][ T31] audit: type=1400 audit(2506.470:12609): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.590807][ T31] audit: type=1400 audit(2506.510:12610): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.608674][ T31] audit: type=1400 audit(2506.510:12611): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.609237][ T31] audit: type=1400 audit(2506.510:12612): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.609515][ T31] audit: type=1400 audit(2506.520:12613): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.622604][ T31] audit: type=1400 audit(2506.540:12614): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.626771][ T31] audit: type=1400 audit(2506.540:12615): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.683054][ T31] audit: type=1400 audit(2506.600:12616): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2506.699387][ T31] audit: type=1400 audit(2506.620:12617): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.559972][ T31] kauditd_printk_skb: 252 callbacks suppressed [ 2511.560270][ T31] audit: type=1400 audit(2511.480:12870): avc: denied { recv } for pid=28257 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.563458][ T31] audit: type=1400 audit(2511.480:12871): avc: denied { recv } for pid=28257 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.578811][ T31] audit: type=1400 audit(2511.490:12872): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.579302][ T31] audit: type=1400 audit(2511.490:12873): avc: denied { ioctl } for pid=25060 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=1040 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2511.598447][ T31] audit: type=1400 audit(2511.510:12874): avc: denied { recv } for pid=28257 comm="syz.0.5894" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.618294][ T31] audit: type=1400 audit(2511.520:12875): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.618701][ T31] audit: type=1400 audit(2511.520:12876): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.625632][ T31] audit: type=1400 audit(2511.540:12877): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.641605][ T31] audit: type=1400 audit(2511.560:12878): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.641952][ T31] audit: type=1400 audit(2511.560:12879): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2511.942918][T28264] FAULT_INJECTION: forcing a failure. [ 2511.942918][T28264] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2511.943155][T28264] CPU: 1 UID: 0 PID: 28264 Comm: syz.0.5896 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2511.943212][T28264] Hardware name: ARM-Versatile Express [ 2511.943226][T28264] Call trace: [ 2511.943249][T28264] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2511.943322][T28264] r7:00000001 r6:00000000 r5:60000013 r4:82260088 [ 2511.943331][T28264] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2511.943361][T28264] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2511.943391][T28264] r5:841eec00 r4:8294f150 [ 2511.943398][T28264] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2511.943430][T28264] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 2511.943464][T28264] r8:00000000 r7:00000001 r6:82465858 r5:20000140 r4:20000140 [ 2511.943472][T28264] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 2511.943615][T28264] [<80971e80>] (should_fail_usercopy) from [<80977f68>] (strncpy_from_user+0x20/0x1a0) [ 2511.943705][T28264] [<80977f48>] (strncpy_from_user) from [<80562c34>] (getname_flags.part.0+0x44/0x18c) [ 2511.943789][T28264] r10:00000015 r9:841eec00 r8:00000000 r7:00000001 r6:82465858 r5:20000140 [ 2511.943927][T28264] r4:8335c000 [ 2511.944071][T28264] [<80562bf0>] (getname_flags.part.0) from [<80567bb4>] (getname_flags+0x3c/0x50) [ 2511.944267][T28264] r9:841eec00 r8:00000000 r7:85648280 r6:ffffff9c r5:00000001 r4:20000140 [ 2511.944399][T28264] [<80567b78>] (getname_flags) from [<8056816c>] (user_path_at+0x2c/0x64) [ 2511.944491][T28264] r5:00000001 r4:dfc0df6c [ 2511.944904][T28264] [<80568140>] (user_path_at) from [<80586890>] (sys_mount+0x158/0x260) [ 2511.944940][T28264] r6:84b79b00 r5:00000000 r4:00000000 [ 2511.944955][T28264] [<80586738>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2511.945032][T28264] Exception stack(0xdfc0dfa8 to 0xdfc0dff0) [ 2511.945110][T28264] dfa0: 00000000 00000000 200000c0 20000140 20000180 00081000 [ 2511.945364][T28264] dfc0: 00000000 00000000 00130270 00000015 002e0000 00000000 00006364 76fa10bc [ 2511.945465][T28264] dfe0: 76fa0ec0 76fa0eb0 0001948c 001322c0 [ 2511.945561][T28264] r10:00000015 r9:841eec00 r8:8020029c r7:00000015 r6:00130270 r5:00000000 [ 2511.945615][T28264] r4:00000000 [ 2516.568309][ T31] kauditd_printk_skb: 264 callbacks suppressed [ 2516.568776][ T31] audit: type=1400 audit(2516.480:13142): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.569054][ T31] audit: type=1400 audit(2516.480:13143): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.584776][ T31] audit: type=1400 audit(2516.500:13144): avc: denied { recv } for pid=28310 comm="syz.0.5912" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.599216][ T31] audit: type=1400 audit(2516.520:13145): avc: denied { create } for pid=28310 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2516.603867][ T31] audit: type=1400 audit(2516.520:13146): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.604068][ T31] audit: type=1400 audit(2516.520:13147): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.613981][ T31] audit: type=1400 audit(2516.530:13148): avc: denied { ioctl } for pid=28310 comm="syz.0.5912" path="socket:[69789]" dev="sockfs" ino=69789 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2516.627268][ T31] audit: type=1400 audit(2516.540:13149): avc: denied { write } for pid=28310 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 2516.653925][ T31] audit: type=1400 audit(2516.570:13150): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2516.657009][ T31] audit: type=1400 audit(2516.570:13151): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.613908][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 2521.614553][ T31] audit: type=1400 audit(2521.530:13215): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.614713][ T31] audit: type=1400 audit(2521.530:13216): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.620100][ T31] audit: type=1400 audit(2521.540:13217): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.638601][ T31] audit: type=1400 audit(2521.540:13218): avc: denied { recv } for pid=26816 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.639078][ T31] audit: type=1400 audit(2521.550:13219): avc: denied { recv } for pid=26816 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.669399][ T31] audit: type=1400 audit(2521.580:13220): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.669787][ T31] audit: type=1400 audit(2521.580:13221): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2521.794523][ T31] audit: type=1400 audit(2521.710:13222): avc: denied { read } for pid=28331 comm="syz.0.5917" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2521.825456][ T31] audit: type=1400 audit(2521.740:13223): avc: denied { open } for pid=28331 comm="syz.0.5917" path="net:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2521.825878][ T31] audit: type=1400 audit(2521.740:13224): avc: denied { create } for pid=28331 comm="syz.0.5917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2524.184179][T28347] FAULT_INJECTION: forcing a failure. [ 2524.184179][T28347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2524.185613][T28347] CPU: 0 UID: 0 PID: 28347 Comm: syz.0.5921 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2524.185700][T28347] Hardware name: ARM-Versatile Express [ 2524.185715][T28347] Call trace: [ 2524.185760][T28347] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2524.185863][T28347] r7:00000000 r6:00000000 r5:60000013 r4:82260088 [ 2524.185883][T28347] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2524.185917][T28347] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2524.185948][T28347] r5:84040000 r4:8294f150 [ 2524.185956][T28347] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2524.185990][T28347] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 2524.186025][T28347] r8:76fa0f30 r7:00000000 r6:00000000 r5:dfcd5f68 r4:00000002 [ 2524.186033][T28347] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 2524.186062][T28347] [<80971e80>] (should_fail_usercopy) from [<8058e684>] (simple_read_from_buffer+0x80/0x13c) [ 2524.186098][T28347] [<8058e604>] (simple_read_from_buffer) from [<806085a4>] (proc_fail_nth_read+0xb8/0x108) [ 2524.186212][T28347] r10:00000001 r9:806084ec r8:00000002 r7:dfcd5f68 r6:0000000f r5:76fa0f30 [ 2524.186224][T28347] r4:84040000 r3:dfcd5e9f [ 2524.186234][T28347] [<806084ec>] (proc_fail_nth_read) from [<80553568>] (vfs_read+0x98/0x320) [ 2524.186294][T28347] r8:76fa0f30 r7:dfcd5f68 r6:84040000 r5:0000000f r4:84976600 [ 2524.186304][T28347] [<805534d0>] (vfs_read) from [<80554210>] (ksys_read+0x74/0xe8) [ 2524.186376][T28347] r10:00000003 r9:84040000 r8:8020029c r7:00000000 r6:00000000 r5:84976600 [ 2524.186387][T28347] r4:84976603 [ 2524.186399][T28347] [<8055419c>] (ksys_read) from [<80554294>] (sys_read+0x10/0x14) [ 2524.186434][T28347] r7:00000003 r6:00000004 r5:76fa0f30 r4:0000000f [ 2524.186442][T28347] [<80554284>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2524.186471][T28347] Exception stack(0xdfcd5fa8 to 0xdfcd5ff0) [ 2524.186490][T28347] 5fa0: 0000000f 76fa0f30 00000004 76fa0f30 0000000f 00000000 [ 2524.186507][T28347] 5fc0: 0000000f 76fa0f30 00000004 00000003 002e0000 00000000 00006364 76fa10bc [ 2524.186520][T28347] 5fe0: 00000158 76fa0ed0 000d80f4 00130194 [ 2527.193634][ T31] kauditd_printk_skb: 155 callbacks suppressed [ 2527.194181][ T31] audit: type=1400 audit(2527.110:13380): avc: denied { read } for pid=28357 comm="syz.1.5925" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2527.327075][ T31] audit: type=1400 audit(2527.240:13381): avc: denied { read open } for pid=28357 comm="syz.1.5925" path="net:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2527.471211][ T31] audit: type=1400 audit(2527.390:13382): avc: denied { create } for pid=28357 comm="syz.1.5925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2527.585427][ T31] audit: type=1400 audit(2527.500:13383): avc: denied { ioctl } for pid=28357 comm="syz.1.5925" path="socket:[69866]" dev="sockfs" ino=69866 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2527.758237][ T31] audit: type=1400 audit(2527.660:13384): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2527.760747][ T31] audit: type=1400 audit(2527.660:13385): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2527.762038][ T31] audit: type=1400 audit(2527.670:13386): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2527.765351][ T31] audit: type=1400 audit(2527.670:13387): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2527.767820][ T31] audit: type=1400 audit(2527.670:13388): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2527.769387][ T31] audit: type=1400 audit(2527.670:13389): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.214337][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 2532.214629][ T31] audit: type=1400 audit(2532.130:13419): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.214867][ T31] audit: type=1400 audit(2532.130:13420): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.218970][ T31] audit: type=1400 audit(2532.130:13421): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.228755][ T31] audit: type=1400 audit(2532.140:13422): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.233909][ T31] audit: type=1400 audit(2532.150:13423): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.244670][ T31] audit: type=1400 audit(2532.160:13424): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.254688][ T31] audit: type=1400 audit(2532.170:13425): avc: denied { recv } for pid=26793 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.262476][ T31] audit: type=1400 audit(2532.180:13426): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.265422][ T31] audit: type=1400 audit(2532.180:13427): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2532.281574][ T31] audit: type=1400 audit(2532.200:13428): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2537.263072][ T31] kauditd_printk_skb: 276 callbacks suppressed [ 2537.263479][ T31] audit: type=1400 audit(2537.180:13706): avc: denied { read write } for pid=28412 comm="syz.0.5944" name="sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2537.290443][ T31] audit: type=1400 audit(2537.210:13707): avc: denied { ioctl open } for pid=28412 comm="syz.0.5944" path="/dev/sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2537.359726][ T31] audit: type=1400 audit(2537.270:13708): avc: denied { read } for pid=28392 comm="syz.1.5941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2537.363901][ T31] audit: type=1400 audit(2537.270:13709): avc: denied { write } for pid=28392 comm="syz.1.5941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2537.363995][ T31] audit: type=1400 audit(2537.270:13710): avc: denied { module_request } for pid=28392 comm="syz.1.5941" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2537.383724][ T31] audit: type=1400 audit(2537.300:13711): avc: denied { ioctl } for pid=28412 comm="syz.0.5944" path="/dev/sequencer2" dev="devtmpfs" ino=721 ioctlcmd=0x54d2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2537.408329][ T31] audit: type=1400 audit(2537.170:13705): avc: denied { read write } for pid=28392 comm="syz.1.5941" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2537.408561][ T31] audit: type=1400 audit(2537.320:13712): avc: denied { read open } for pid=28392 comm="syz.1.5941" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2537.588273][ T31] audit: type=1400 audit(2537.500:13713): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2537.588663][ T31] audit: type=1400 audit(2537.500:13714): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2542.916739][ T31] kauditd_printk_skb: 106 callbacks suppressed [ 2542.917201][ T31] audit: type=1400 audit(2542.830:13821): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2542.917883][ T31] audit: type=1400 audit(2542.830:13822): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2542.941209][ T31] audit: type=1400 audit(2542.840:13823): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2542.944160][ T31] audit: type=1400 audit(2542.840:13824): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2542.990188][ T31] audit: type=1400 audit(2542.890:13825): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2542.990561][ T31] audit: type=1400 audit(2542.900:13826): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2543.000475][ T31] audit: type=1400 audit(2542.920:13827): avc: denied { execmem } for pid=28434 comm="syz.1.5951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2543.020465][ T31] audit: type=1400 audit(2542.940:13828): avc: denied { recv } for pid=28434 comm="syz.1.5951" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2543.025350][ T31] audit: type=1400 audit(2542.940:13829): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2543.037394][ T31] audit: type=1400 audit(2542.940:13830): avc: denied { create } for pid=28434 comm="syz.1.5951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2544.678465][T21517] usb 2-1: new high-speed USB device number 108 using dummy_hcd [ 2544.828540][T21517] usb 2-1: Using ep0 maxpacket: 8 [ 2544.869732][T21517] usb 2-1: config 179 has an invalid interface number: 65 but max is 0 [ 2544.871371][T21517] usb 2-1: config 179 has no interface number 0 [ 2544.872198][T21517] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 2544.873442][T21517] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 2544.876167][T21517] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 2544.881784][T21517] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 2544.882188][T21517] usb 2-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 2544.882409][T21517] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 2544.882573][T21517] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2544.962567][T28444] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2545.384232][T28440] FAULT_INJECTION: forcing a failure. [ 2545.384232][T28440] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2545.384555][T28440] CPU: 1 UID: 0 PID: 28440 Comm: syz.0.5953 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2545.384650][T28440] Hardware name: ARM-Versatile Express [ 2545.384676][T28440] Call trace: [ 2545.384794][T28440] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2545.384905][T28440] r7:200005c0 r6:00000000 r5:60000113 r4:82260088 [ 2545.384960][T28440] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2545.385048][T28440] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2545.385102][T28440] r5:841e8c00 r4:8294f150 [ 2545.385140][T28440] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2545.385203][T28440] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 2545.385275][T28440] r8:00000000 r7:200005c0 r6:84d1a3a3 r5:00000000 r4:00000000 [ 2545.385294][T28440] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 2545.385474][T28440] [<80971e80>] (should_fail_usercopy) from [<808b57ec>] (_copy_from_iter+0x6c/0x7c8) [ 2545.385534][T28440] [<808b5780>] (_copy_from_iter) from [<818fe5b8>] (isotp_sendmsg+0x254/0x820) [ 2545.385655][T28440] r10:dfa41f20 r9:84d1a3a3 r8:dfa41f30 r7:00000014 r6:84d18000 r5:84d1a000 [ 2545.385750][T28440] r4:00000000 [ 2545.385798][T28440] [<818fe364>] (isotp_sendmsg) from [<81541c3c>] (__sock_sendmsg+0x44/0x78) [ 2545.385973][T28440] r10:00000000 r9:dfa41dc4 r8:dfa41dc4 r7:00000000 r6:83594f00 r5:dfa41f20 [ 2545.386105][T28440] r4:00000000 [ 2545.386161][T28440] [<81541bf8>] (__sock_sendmsg) from [<81542f90>] (____sys_sendmsg+0x298/0x2cc) [ 2545.386290][T28440] r7:00000000 r6:83594f00 r5:00000000 r4:dfa41f20 [ 2545.386356][T28440] [<81542cf8>] (____sys_sendmsg) from [<81544f58>] (___sys_sendmsg+0x9c/0xd0) [ 2545.386427][T28440] r10:dfa41e24 r9:20000d40 r8:00000000 r7:00000000 r6:83594f00 r5:dfa41f20 [ 2545.386448][T28440] r4:00000000 [ 2545.386538][T28440] [<81544ebc>] (___sys_sendmsg) from [<815453f0>] (__sys_sendmsg+0x8c/0xe0) [ 2545.386647][T28440] r10:00000128 r9:841e8c00 r8:85a37480 r7:00000000 r6:20000d40 r5:85a37481 [ 2545.386672][T28440] r4:00000003 [ 2545.386688][T28440] [<81545364>] (__sys_sendmsg) from [<81545458>] (sys_sendmsg+0x14/0x18) [ 2545.386817][T28440] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 2545.386937][T28440] [<81545444>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2545.387024][T28440] Exception stack(0xdfa41fa8 to 0xdfa41ff0) [ 2545.387101][T28440] 1fa0: 00000000 00000000 00000003 20000d40 00000000 00000000 [ 2545.387232][T28440] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fa10bc [ 2545.387300][T28440] 1fe0: 76fa0ec0 76fa0eb0 0001948c 001322c0 [ 2548.274185][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 2548.274572][ T31] audit: type=1400 audit(2548.190:13906): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.299124][ T31] audit: type=1400 audit(2548.220:13907): avc: denied { recv } for pid=26948 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.322476][ T31] audit: type=1400 audit(2548.240:13908): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.322827][ T31] audit: type=1400 audit(2548.240:13909): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.338588][ T31] audit: type=1400 audit(2548.250:13910): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.348398][ T31] audit: type=1400 audit(2548.260:13911): avc: denied { recv } for pid=26837 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.359184][ T31] audit: type=1400 audit(2548.270:13912): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.359795][ T31] audit: type=1400 audit(2548.280:13913): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2548.368405][ T31] audit: type=1400 audit(2548.280:13914): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2548.368786][ T31] audit: type=1400 audit(2548.280:13915): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2549.500052][T28465] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28465 comm=syz.1.5954 [ 2553.299683][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 2553.300105][ T31] audit: type=1400 audit(2553.220:14014): avc: denied { bind } for pid=28473 comm="syz.0.5963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2553.336423][ T31] audit: type=1400 audit(2553.250:14015): avc: denied { write } for pid=28473 comm="syz.0.5963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2553.365299][ T31] audit: type=1400 audit(2553.280:14016): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.379768][ T31] audit: type=1400 audit(2553.300:14017): avc: denied { recv } for pid=2928 comm="syslogd" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.413410][ T31] audit: type=1400 audit(2553.330:14018): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.413790][ T31] audit: type=1400 audit(2553.330:14019): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.425966][ T31] audit: type=1400 audit(2553.340:14020): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.445746][ T31] audit: type=1400 audit(2553.350:14021): avc: denied { recv } for pid=17544 comm="kworker/u9:4" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.451189][ T31] audit: type=1400 audit(2553.360:14022): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2553.458192][ T31] audit: type=1400 audit(2553.360:14023): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2558.341564][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 2558.341999][ T31] audit: type=1400 audit(2558.260:14068): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2558.342208][ T31] audit: type=1400 audit(2558.260:14069): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2558.351616][ T31] audit: type=1400 audit(2558.270:14070): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2558.390435][ T31] audit: type=1400 audit(2558.280:14071): avc: denied { recv } for pid=2932 comm="klogd" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2558.393135][ T31] audit: type=1400 audit(2558.290:14072): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2558.396946][ T31] audit: type=1400 audit(2558.290:14073): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2558.399443][ T31] audit: type=1400 audit(2558.290:14074): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2558.479466][ T31] audit: type=1400 audit(2558.340:14075): avc: denied { execmem } for pid=28486 comm="syz.0.5968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2558.480525][ T31] audit: type=1400 audit(2558.350:14076): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2558.482415][ T31] audit: type=1400 audit(2558.350:14077): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2559.014547][T28491] FAULT_INJECTION: forcing a failure. [ 2559.014547][T28491] name failslab, interval 1, probability 0, space 0, times 0 [ 2559.021346][T28491] CPU: 1 UID: 0 PID: 28491 Comm: syz.0.5969 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2559.021492][T28491] Hardware name: ARM-Versatile Express [ 2559.021509][T28491] Call trace: [ 2559.021578][T28491] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2559.021685][T28491] r7:00000820 r6:00000000 r5:60000013 r4:82260088 [ 2559.021734][T28491] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2559.021853][T28491] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2559.021947][T28491] r5:84046000 r4:82917bc0 [ 2559.021963][T28491] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2559.022005][T28491] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 2559.022072][T28491] r8:84046000 r7:00000820 r6:84e93298 r5:00000017 r4:83001240 [ 2559.022081][T28491] [<8051f3f4>] (should_failslab) from [<80504aa8>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 2559.022108][T28491] [<80504a08>] (__kmalloc_node_track_caller_noprof) from [<8049b7a8>] (kmemdup_noprof+0x28/0x44) [ 2559.022178][T28491] r10:00000000 r9:85788004 r8:dfa8dbcc r7:83976000 r6:84e93298 r5:dfa8dbc4 [ 2559.022217][T28491] r4:00000017 [ 2559.022227][T28491] [<8049b780>] (kmemdup_noprof) from [<807a1ce8>] (sidtab_sid2str_get+0x54/0xa4) [ 2559.022298][T28491] r7:83976000 r6:dfa8dbcc r5:dfa8dbc4 r4:839700c0 [ 2559.022340][T28491] [<807a1c94>] (sidtab_sid2str_get) from [<807a91f0>] (sidtab_entry_to_string+0x34/0x94) [ 2559.022394][T28491] r7:83976000 r6:839700c0 r5:dfa8dbc4 r4:0000005f [ 2559.022404][T28491] [<807a91bc>] (sidtab_entry_to_string) from [<807a9368>] (security_sid_to_context_core+0x118/0x17c) [ 2559.022498][T28491] r9:dfa8dcec r8:83976000 r7:85788004 r6:dfa8dbcc r5:dfa8dbc4 r4:0000005f [ 2559.022510][T28491] [<807a9250>] (security_sid_to_context_core) from [<807ac37c>] (security_sid_to_context+0x1c/0x24) [ 2559.022546][T28491] r8:8078c4a0 r7:8078d4a4 r6:84046000 r5:8491c650 r4:dfa8dc58 [ 2559.022554][T28491] [<807ac360>] (security_sid_to_context) from [<8078d4ec>] (avc_audit_post_callback+0x48/0x2f4) [ 2559.022633][T28491] [<8078d4a4>] (avc_audit_post_callback) from [<807b4938>] (common_lsm_audit+0x104/0x148) [ 2559.022765][T28491] r10:00000000 r9:dfa8dcec r8:8078c4a0 r7:8078d4a4 r6:dfa8dcec r5:8491c650 [ 2559.022911][T28491] r4:840467f0 [ 2559.022989][T28491] [<807b4834>] (common_lsm_audit) from [<8078d9b0>] (slow_avc_audit+0xbc/0x114) [ 2559.023055][T28491] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 2559.023121][T28491] [<8078d8f4>] (slow_avc_audit) from [<8078e434>] (avc_has_perm+0xd8/0xe8) [ 2559.023167][T28491] r5:00000000 r4:00000004 [ 2559.023175][T28491] [<8078e35c>] (avc_has_perm) from [<8079484c>] (sock_has_perm+0xd0/0xfc) [ 2559.023262][T28491] r9:dfa8ddc4 r8:84046000 r7:85923500 r6:00000004 r5:85d88800 r4:00000000 [ 2559.023282][T28491] [<8079477c>] (sock_has_perm) from [<80794900>] (selinux_socket_sendmsg+0x18/0x1c) [ 2559.023391][T28491] r8:dfa8ddc4 r7:00000000 r6:00000014 r5:dfa8df20 r4:83595680 [ 2559.023407][T28491] [<807948e8>] (selinux_socket_sendmsg) from [<80786e84>] (security_socket_sendmsg+0x64/0x1e4) [ 2559.023489][T28491] [<80786e20>] (security_socket_sendmsg) from [<81541c14>] (__sock_sendmsg+0x1c/0x78) [ 2559.023551][T28491] r7:00000000 r6:83595680 r5:dfa8df20 r4:dfa8df20 [ 2559.023563][T28491] [<81541bf8>] (__sock_sendmsg) from [<81542f90>] (____sys_sendmsg+0x298/0x2cc) [ 2559.023653][T28491] r7:00000000 r6:83595680 r5:00000080 r4:dfa8df20 [ 2559.023670][T28491] [<81542cf8>] (____sys_sendmsg) from [<81544f58>] (___sys_sendmsg+0x9c/0xd0) [ 2559.023716][T28491] r10:dfa8de24 r9:20000dc0 r8:00000080 r7:00000000 r6:83595680 r5:dfa8df20 [ 2559.023725][T28491] r4:00000000 [ 2559.023732][T28491] [<81544ebc>] (___sys_sendmsg) from [<815453f0>] (__sys_sendmsg+0x8c/0xe0) [ 2559.023819][T28491] r10:00000128 r9:84046000 r8:85a37e40 r7:00000080 r6:20000dc0 r5:85a37e41 [ 2559.023836][T28491] r4:00000004 [ 2559.023852][T28491] [<81545364>] (__sys_sendmsg) from [<81545458>] (sys_sendmsg+0x14/0x18) [ 2559.023957][T28491] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 2559.023967][T28491] [<81545444>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2559.024040][T28491] Exception stack(0xdfa8dfa8 to 0xdfa8dff0) [ 2559.024073][T28491] dfa0: 00000000 00000000 00000004 20000dc0 00000080 00000000 [ 2559.024096][T28491] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fa10bc [ 2559.024110][T28491] dfe0: 76fa0ec0 76fa0eb0 0001948c 001322c0 [ 2559.424614][T22569] usb 2-1: USB disconnect, device number 108 [ 2559.424945][ C0] xpad 2-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 2559.425143][ C0] xpad 2-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 2563.719863][ T31] kauditd_printk_skb: 127 callbacks suppressed [ 2563.720112][ T31] audit: type=1400 audit(2563.640:14205): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2563.722839][ T31] audit: type=1400 audit(2563.640:14206): avc: denied { unmount } for pid=26242 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2563.752413][ T31] audit: type=1400 audit(2563.670:14207): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2563.756415][ T31] audit: type=1400 audit(2563.670:14208): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2563.760140][ T31] audit: type=1400 audit(2563.670:14209): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2563.763037][ T31] audit: type=1400 audit(2563.680:14210): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2563.771468][ T31] audit: type=1400 audit(2563.690:14211): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2563.771841][ T31] audit: type=1400 audit(2563.690:14212): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2563.776066][ T31] audit: type=1400 audit(2563.690:14213): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2563.779205][ T31] audit: type=1400 audit(2563.700:14214): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2564.098080][T21517] usb 1-1: new high-speed USB device number 125 using dummy_hcd [ 2564.248590][T21517] usb 1-1: Using ep0 maxpacket: 8 [ 2564.265919][T21517] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 2564.266187][T21517] usb 1-1: config 179 has no interface number 0 [ 2564.266496][T21517] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 2564.266569][T21517] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 2564.266619][T21517] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 2564.266659][T21517] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 2564.266726][T21517] usb 1-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 2564.266819][T21517] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 2564.266858][T21517] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2564.299597][T28521] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2568.273722][T28535] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28535 comm=syz.0.5976 [ 2568.783503][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 2568.783693][ T31] audit: type=1400 audit(2568.700:14266): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.783848][ T31] audit: type=1400 audit(2568.700:14267): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.791601][ T31] audit: type=1400 audit(2568.710:14268): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.804651][ T31] audit: type=1400 audit(2568.720:14269): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.816977][ T31] audit: type=1400 audit(2568.730:14270): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.884316][ T31] audit: type=1400 audit(2568.800:14271): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.885968][ T31] audit: type=1400 audit(2568.800:14272): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.955891][ T31] audit: type=1400 audit(2568.870:14273): avc: denied { read write } for pid=25060 comm="syz-executor" name="loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2568.976941][ T31] audit: type=1400 audit(2568.890:14274): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2568.979063][ T31] audit: type=1400 audit(2568.900:14275): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2573.915498][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 2573.916953][ T31] audit: type=1400 audit(2573.830:14326): avc: denied { read write } for pid=28547 comm="syz.1.5982" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2573.949670][ T31] audit: type=1400 audit(2573.870:14327): avc: denied { read open } for pid=28547 comm="syz.1.5982" path="/dev/rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2574.157203][ T31] audit: type=1400 audit(2574.070:14328): avc: denied { read write } for pid=28547 comm="syz.1.5982" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2574.220258][ T31] audit: type=1400 audit(2574.070:14329): avc: denied { open } for pid=28547 comm="syz.1.5982" path="/dev/uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2574.440188][ T31] audit: type=1400 audit(2574.360:14330): avc: denied { setattr } for pid=28547 comm="syz.1.5982" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2574.498426][ T31] audit: type=1400 audit(2574.410:14331): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2574.514066][ T31] audit: type=1400 audit(2574.430:14332): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2574.552346][ T31] audit: type=1400 audit(2574.470:14333): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2574.556674][ T31] audit: type=1400 audit(2574.470:14334): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2574.574466][ T31] audit: type=1400 audit(2574.490:14335): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2578.124278][T28556] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=28556 comm=syz.1.5984 [ 2578.344040][ C0] xpad 1-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 2578.344207][ C0] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 2578.344535][T24961] usb 1-1: USB disconnect, device number 125 [ 2578.919016][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 2578.920293][ T31] audit: type=1400 audit(2578.840:14399): avc: denied { open } for pid=25060 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2578.926325][ T31] audit: type=1400 audit(2578.840:14400): avc: denied { ioctl } for pid=25060 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=1040 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2579.300253][ T31] audit: type=1400 audit(2579.220:14401): avc: denied { create } for pid=28567 comm="syz.1.5986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2579.361025][ T31] audit: type=1400 audit(2579.280:14402): avc: denied { read } for pid=28567 comm="syz.1.5986" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2579.363063][ T31] audit: type=1400 audit(2579.280:14403): avc: denied { open } for pid=28567 comm="syz.1.5986" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2579.450574][ T31] audit: type=1400 audit(2579.370:14404): avc: denied { ioctl } for pid=28567 comm="syz.1.5986" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2579.480866][ T31] audit: type=1400 audit(2579.400:14405): avc: denied { create } for pid=28567 comm="syz.1.5986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2579.531738][ T31] audit: type=1400 audit(2579.450:14406): avc: denied { ioctl } for pid=28567 comm="syz.1.5986" path="socket:[69272]" dev="sockfs" ino=69272 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2579.602622][ T31] audit: type=1400 audit(2579.520:14407): avc: denied { read } for pid=28564 comm="syz.0.5985" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2579.604220][ T31] audit: type=1400 audit(2579.520:14408): avc: denied { open } for pid=28564 comm="syz.0.5985" path="net:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2584.994616][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 2584.994891][ T31] audit: type=1400 audit(2584.910:14438): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.013808][ T31] audit: type=1400 audit(2584.930:14439): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.052205][ T31] audit: type=1400 audit(2584.970:14440): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.054628][ T31] audit: type=1400 audit(2584.970:14441): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.058126][ T31] audit: type=1400 audit(2584.970:14442): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.062253][ T31] audit: type=1400 audit(2584.980:14443): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.068998][ T31] audit: type=1400 audit(2584.990:14444): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.071652][ T31] audit: type=1400 audit(2584.990:14445): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.095212][ T31] audit: type=1400 audit(2585.010:14446): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2585.303458][ T31] audit: type=1400 audit(2585.220:14447): avc: denied { read write } for pid=25060 comm="syz-executor" name="loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2590.079757][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 2590.080033][ T31] audit: type=1400 audit(2590.000:14507): avc: denied { read write } for pid=28586 comm="syz.0.5992" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2590.083054][ T31] audit: type=1400 audit(2590.000:14508): avc: denied { read open } for pid=28586 comm="syz.0.5992" path="/dev/rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2590.091982][ T31] audit: type=1400 audit(2590.010:14509): avc: denied { write } for pid=28586 comm="syz.0.5992" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2590.092319][ T31] audit: type=1400 audit(2590.010:14510): avc: denied { read write open } for pid=28586 comm="syz.0.5992" path="/dev/uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2590.109291][ T31] audit: type=1400 audit(2590.030:14511): avc: denied { setattr } for pid=28586 comm="syz.0.5992" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2590.127979][ T31] audit: type=1400 audit(2590.040:14512): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2590.134003][ T31] audit: type=1400 audit(2590.050:14514): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2590.134270][ T31] audit: type=1400 audit(2590.040:14513): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2590.134313][ T31] audit: type=1400 audit(2590.050:14515): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2590.134338][ T31] audit: type=1400 audit(2590.050:14516): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2594.906628][T28623] FAULT_INJECTION: forcing a failure. [ 2594.906628][T28623] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.910003][T28623] CPU: 1 UID: 0 PID: 28623 Comm: syz.0.6004 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2594.910131][T28623] Hardware name: ARM-Versatile Express [ 2594.910155][T28623] Call trace: [ 2594.910199][T28623] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2594.910322][T28623] r7:83b30c00 r6:00000000 r5:60000013 r4:82260088 [ 2594.910341][T28623] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2594.910392][T28623] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2594.910445][T28623] r5:83b30c00 r4:82917bc0 [ 2594.910461][T28623] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2594.910520][T28623] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 2594.910585][T28623] r8:00000000 r7:83b30c00 r6:00000dc0 r5:86c3f800 r4:83001240 [ 2594.910601][T28623] [<8051f3f4>] (should_failslab) from [<80502e24>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 2594.910648][T28623] [<80502dd8>] (__kmalloc_cache_noprof) from [<815f54c4>] (garp_init_applicant+0x4c/0x174) [ 2594.910713][T28623] r10:83b30c00 r9:00000000 r8:859ab580 r7:8281ab38 r6:854e8000 r5:86c3f800 [ 2594.910734][T28623] r4:824656d0 [ 2594.910750][T28623] [<815f5478>] (garp_init_applicant) from [<81912db8>] (vlan_gvrp_init_applicant+0x18/0x1c) [ 2594.910810][T28623] r7:854e8000 r6:86c3fec0 r5:86c3f800 r4:00000000 [ 2594.910826][T28623] [<81912da0>] (vlan_gvrp_init_applicant) from [<819104bc>] (register_vlan_dev+0xd4/0x294) [ 2594.910873][T28623] [<819103e8>] (register_vlan_dev) from [<81910a6c>] (vlan_ioctl_handler+0x3f0/0x49c) [ 2594.910932][T28623] r10:83b30c00 r9:00000001 r8:854e8000 r7:85aaac40 r6:00000000 r5:86c3f800 [ 2594.910952][T28623] r4:00000000 [ 2594.910966][T28623] [<8191067c>] (vlan_ioctl_handler) from [<815434f8>] (sock_ioctl+0x1f8/0x600) [ 2594.911032][T28623] r9:00000004 r8:85a37300 r7:83595400 r6:85aaac40 r5:20000300 r4:82c1e5d8 [ 2594.911049][T28623] [<81543300>] (sock_ioctl) from [<8056ce5c>] (sys_ioctl+0x130/0xba0) [ 2594.911114][T28623] r9:00000004 r8:85a37300 r7:20000300 r6:85a37301 r5:00000000 r4:00008983 [ 2594.911131][T28623] [<8056cd2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2594.911182][T28623] Exception stack(0xdfaf5fa8 to 0xdfaf5ff0) [ 2594.911217][T28623] 5fa0: 00000000 00000000 00000004 00008983 20000300 00000000 [ 2594.911259][T28623] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fa10bc [ 2594.911286][T28623] 5fe0: 76fa0ec0 76fa0eb0 0001948c 001322c0 [ 2594.911320][T28623] r10:00000036 r9:83b30c00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 2594.911341][T28623] r4:00000000 [ 2595.090109][ T31] kauditd_printk_skb: 179 callbacks suppressed [ 2595.090383][ T31] audit: type=1400 audit(2595.010:14696): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2595.095618][ T31] audit: type=1400 audit(2595.010:14697): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2595.192481][ T31] audit: type=1400 audit(2595.110:14698): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2595.206544][ T31] audit: type=1400 audit(2595.120:14699): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2595.216022][ T31] audit: type=1400 audit(2595.130:14700): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2595.218707][ T31] audit: type=1400 audit(2595.130:14701): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2595.218815][ T31] audit: type=1400 audit(2595.130:14702): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2595.241455][ T31] audit: type=1400 audit(2595.160:14703): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2595.241758][ T31] audit: type=1400 audit(2595.160:14704): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2595.258355][ T31] audit: type=1400 audit(2595.170:14705): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2600.120455][ T31] kauditd_printk_skb: 125 callbacks suppressed [ 2600.121483][ T31] audit: type=1400 audit(2600.040:14831): avc: denied { create } for pid=28655 comm="syz.1.6015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2600.171117][ T31] audit: type=1400 audit(2600.090:14832): avc: denied { ioctl } for pid=28655 comm="syz.1.6015" path="socket:[70476]" dev="sockfs" ino=70476 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2600.206103][ T31] audit: type=1400 audit(2600.120:14833): avc: denied { bind } for pid=28655 comm="syz.1.6015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2600.211296][ T31] audit: type=1400 audit(2600.130:14834): avc: denied { create } for pid=28651 comm="syz.0.6014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2600.219137][ T31] audit: type=1400 audit(2600.140:14835): avc: denied { create } for pid=28651 comm="syz.0.6014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2600.228698][ T31] audit: type=1400 audit(2600.140:14836): avc: denied { allowed } for pid=28651 comm="syz.0.6014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2600.228995][ T31] audit: type=1400 audit(2600.140:14837): avc: denied { create } for pid=28651 comm="syz.0.6014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2600.266652][ T31] audit: type=1400 audit(2600.180:14838): avc: denied { create } for pid=28651 comm="syz.0.6014" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2600.723746][ T31] audit: type=1400 audit(2600.640:14839): avc: denied { write } for pid=28655 comm="syz.1.6015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2602.152498][ T31] audit: type=1400 audit(2602.070:14840): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.605137][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 2605.605703][ T31] audit: type=1400 audit(2605.510:14932): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.606101][ T31] audit: type=1400 audit(2605.520:14933): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.648264][ T31] audit: type=1400 audit(2605.560:14934): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.648670][ T31] audit: type=1400 audit(2605.560:14935): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.649073][ T31] audit: type=1400 audit(2605.560:14936): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.655208][ T31] audit: type=1400 audit(2605.570:14937): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.663928][ T31] audit: type=1400 audit(2605.580:14938): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.664522][ T31] audit: type=1400 audit(2605.580:14939): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2605.725452][ T31] audit: type=1400 audit(2605.640:14940): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2605.725769][ T31] audit: type=1400 audit(2605.640:14941): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2606.636653][T28687] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28687 comm=syz.0.6025 [ 2610.629822][ T31] kauditd_printk_skb: 239 callbacks suppressed [ 2610.630352][ T31] audit: type=1400 audit(2610.550:15181): avc: denied { write } for pid=28713 comm="syz.1.6037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2610.630648][ T31] audit: type=1400 audit(2610.550:15182): avc: denied { read } for pid=28713 comm="syz.1.6037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2610.770401][ T31] audit: type=1400 audit(2610.690:15183): avc: denied { write } for pid=28713 comm="syz.1.6037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2610.881933][ T31] audit: type=1400 audit(2610.800:15184): avc: denied { read } for pid=28713 comm="syz.1.6037" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2610.894515][ T31] audit: type=1400 audit(2610.800:15185): avc: denied { open } for pid=28713 comm="syz.1.6037" path="net:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2610.903564][ T31] audit: type=1400 audit(2610.800:15186): avc: denied { create } for pid=28713 comm="syz.1.6037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2611.000830][ T31] audit: type=1400 audit(2610.920:15187): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2611.015121][ T31] audit: type=1400 audit(2610.930:15188): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2611.024895][ T31] audit: type=1400 audit(2610.940:15189): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2611.028889][ T31] audit: type=1400 audit(2610.940:15190): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2611.718552][T25562] usb 1-1: new high-speed USB device number 126 using dummy_hcd [ 2611.896931][T25562] usb 1-1: config 1 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 129, changing to 11 [ 2611.897270][T25562] usb 1-1: config 1 interface 0 altsetting 9 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2611.898102][T25562] usb 1-1: config 1 interface 0 has no altsetting 0 [ 2611.951580][T25562] usb 1-1: New USB device found, idVendor=05ac, idProduct=0267, bcdDevice= 0.40 [ 2611.952630][T25562] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2611.953568][T25562] usb 1-1: Product: syz [ 2611.954298][T25562] usb 1-1: Manufacturer:  [ 2611.955061][T25562] usb 1-1: SerialNumber: syz [ 2612.205577][T25562] usbhid 1-1:1.0: can't add hid device: -71 [ 2612.206689][T25562] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 2612.221406][T25562] usb 1-1: USB disconnect, device number 126 [ 2612.815660][T28749] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2613.071639][T28756] fuse: Bad value for 'rootmode' [ 2615.738326][T21096] usb 2-1: new high-speed USB device number 109 using dummy_hcd [ 2615.789488][ T31] kauditd_printk_skb: 265 callbacks suppressed [ 2615.789766][ T31] audit: type=1400 audit(2615.710:15454): avc: denied { ioctl } for pid=28772 comm="syz.1.6054" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2615.800077][ T31] audit: type=1400 audit(2615.720:15455): avc: denied { ioctl } for pid=28772 comm="syz.1.6054" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2615.802133][ T31] audit: type=1400 audit(2615.720:15456): avc: denied { ioctl } for pid=28772 comm="syz.1.6054" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2615.904060][ T31] audit: type=1400 audit(2615.820:15457): avc: denied { create } for pid=28769 comm="syz.0.6053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2615.921703][ T31] audit: type=1400 audit(2615.840:15458): avc: denied { read } for pid=28769 comm="syz.0.6053" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2615.923823][ T31] audit: type=1400 audit(2615.840:15459): avc: denied { open } for pid=28769 comm="syz.0.6053" path="net:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2615.929000][ T31] audit: type=1400 audit(2615.850:15460): avc: denied { create } for pid=28769 comm="syz.0.6053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2615.940797][ T31] audit: type=1400 audit(2615.860:15461): avc: denied { ioctl } for pid=28772 comm="syz.1.6054" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2615.948661][ T31] audit: type=1400 audit(2615.870:15462): avc: denied { ioctl } for pid=28772 comm="syz.1.6054" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2615.954319][T21096] usb 2-1: config 6 has an invalid interface number: 211 but max is 2 [ 2615.954536][T21096] usb 2-1: config 6 has an invalid interface number: 76 but max is 2 [ 2615.954590][T21096] usb 2-1: config 6 has an invalid interface number: 231 but max is 2 [ 2615.954621][T21096] usb 2-1: config 6 has an invalid interface number: 56 but max is 2 [ 2615.954661][T21096] usb 2-1: config 6 has an invalid interface number: 8 but max is 2 [ 2615.954800][T21096] usb 2-1: config 6 contains an unexpected descriptor of type 0x1, skipping [ 2615.954848][T21096] usb 2-1: config 6 has an invalid descriptor of length 89, skipping remainder of the config [ 2615.954880][T21096] usb 2-1: config 6 has 5 interfaces, different from the descriptor's value: 3 [ 2615.954946][T21096] usb 2-1: config 6 has no interface number 0 [ 2615.954994][T21096] usb 2-1: config 6 has no interface number 1 [ 2615.955023][T21096] usb 2-1: config 6 has no interface number 2 [ 2615.955046][T21096] usb 2-1: config 6 has no interface number 3 [ 2615.955067][T21096] usb 2-1: config 6 has no interface number 4 [ 2615.955175][T21096] usb 2-1: config 6 interface 211 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 14 [ 2615.955270][T21096] usb 2-1: too many endpoints for config 6 interface 76 altsetting 244: 63, using maximum allowed: 30 [ 2615.955363][T21096] usb 2-1: config 6 interface 76 altsetting 244 endpoint 0x5 has invalid maxpacket 1024, setting to 64 [ 2615.955434][T21096] usb 2-1: config 6 interface 76 altsetting 244 endpoint 0x7 has invalid wMaxPacketSize 0 [ 2615.955528][T21096] usb 2-1: config 6 interface 76 altsetting 244 has a duplicate endpoint with address 0x3, skipping [ 2615.955589][T21096] usb 2-1: config 6 interface 76 altsetting 244 has a duplicate endpoint with address 0xD, skipping [ 2615.955624][T21096] usb 2-1: config 6 interface 76 altsetting 244 has a duplicate endpoint with address 0x7, skipping [ 2615.955657][T21096] usb 2-1: config 6 interface 76 altsetting 244 has a duplicate endpoint with address 0x5, skipping [ 2615.955693][T21096] usb 2-1: config 6 interface 76 altsetting 244 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 2615.955731][T21096] usb 2-1: config 6 interface 76 altsetting 244 has 13 endpoint descriptors, different from the interface descriptor's value: 63 [ 2615.955778][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0x7, skipping [ 2615.955811][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0xC, skipping [ 2615.955874][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0xF, skipping [ 2615.955921][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0xB, skipping [ 2615.955965][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0x7, skipping [ 2615.956008][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0x9, skipping [ 2615.956046][T21096] usb 2-1: config 6 interface 231 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 2615.956077][T21096] usb 2-1: config 6 interface 231 altsetting 0 endpoint 0xA has invalid maxpacket 1511, setting to 64 [ 2615.956113][T21096] usb 2-1: config 6 interface 231 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 2615.956142][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0x7, skipping [ 2615.956173][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0xC, skipping [ 2615.956223][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0x3, skipping [ 2615.956277][T21096] usb 2-1: config 6 interface 231 altsetting 0 has a duplicate endpoint with address 0x1, skipping [ 2615.956310][T21096] usb 2-1: config 6 interface 231 altsetting 0 has 14 endpoint descriptors, different from the interface descriptor's value: 13 [ 2615.956347][T21096] usb 2-1: too many endpoints for config 6 interface 56 altsetting 14: 53, using maximum allowed: 30 [ 2615.956387][T21096] usb 2-1: config 6 interface 56 altsetting 14 has 0 endpoint descriptors, different from the interface descriptor's value: 53 [ 2615.956429][T21096] usb 2-1: config 6 interface 8 altsetting 243 has a duplicate endpoint with address 0xF, skipping [ 2615.956461][T21096] usb 2-1: config 6 interface 8 altsetting 243 has a duplicate endpoint with address 0xB, skipping [ 2615.956512][T21096] usb 2-1: config 6 interface 8 altsetting 243 has a duplicate endpoint with address 0x7, skipping [ 2615.956548][T21096] usb 2-1: config 6 interface 8 altsetting 243 has 3 endpoint descriptors, different from the interface descriptor's value: 9 [ 2615.956617][T21096] usb 2-1: config 6 interface 211 has no altsetting 0 [ 2615.956664][T21096] usb 2-1: config 6 interface 76 has no altsetting 0 [ 2615.956705][T21096] usb 2-1: config 6 interface 56 has no altsetting 0 [ 2615.956735][T21096] usb 2-1: config 6 interface 8 has no altsetting 0 [ 2616.209279][ T31] audit: type=1400 audit(2616.000:15463): avc: denied { ioctl } for pid=28772 comm="syz.1.6054" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2616.259483][T21096] usb 2-1: Dual-Role OTG device on HNP port [ 2616.260346][T21096] usb 2-1: New USB device found, idVendor=0c45, idProduct=6019, bcdDevice=b3.27 [ 2616.260388][T21096] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2616.260408][T21096] usb 2-1: Product: ে藯閺罫畱뻲銁ᕎ팔䅦荇ﱓ⪰澎䓻矖㷟ᛕꌙ⚎芦㳅ꎛ玦镁崬〄⍕烢攋墪䤔滮鯥牟뒜幚 [ 2616.260424][T21096] usb 2-1: Manufacturer: ᠌ [ 2616.260442][T21096] usb 2-1: SerialNumber: ఁ [ 2617.323063][T21096] usb 2-1: USB disconnect, device number 109 [ 2618.414211][T28809] FAULT_INJECTION: forcing a failure. [ 2618.414211][T28809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2618.415134][T28809] CPU: 1 UID: 0 PID: 28809 Comm: syz.1.6056 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2618.415200][T28809] Hardware name: ARM-Versatile Express [ 2618.415214][T28809] Call trace: [ 2618.415234][T28809] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2618.415316][T28809] r7:20000040 r6:00000000 r5:60000013 r4:82260088 [ 2618.415326][T28809] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2618.415353][T28809] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2618.415381][T28809] r5:84043000 r4:8294f150 [ 2618.415389][T28809] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2618.415418][T28809] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 2618.415450][T28809] r8:20000040 r7:20000040 r6:00001000 r5:84b87740 r4:00000002 [ 2618.415458][T28809] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 2618.415486][T28809] [<80971e80>] (should_fail_usercopy) from [<8049c5d8>] (vmemdup_user+0x40/0x16c) [ 2618.415515][T28809] [<8049c598>] (vmemdup_user) from [<8058bfa8>] (setxattr_copy+0x58/0x90) [ 2618.415550][T28809] r9:84043000 r8:20000040 r7:00000003 r6:00001000 r5:00000000 r4:dfc25e48 [ 2618.415559][T28809] [<8058bf50>] (setxattr_copy) from [<8058c1b4>] (path_setxattrat+0x7c/0x17c) [ 2618.415587][T28809] r5:00000000 r4:20000000 [ 2618.415594][T28809] [<8058c138>] (path_setxattrat) from [<8058c4b4>] (sys_fsetxattr+0x30/0x38) [ 2618.415625][T28809] r8:8020029c r7:000000e4 r6:00130270 r5:00000000 r4:00000001 [ 2618.415633][T28809] [<8058c484>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2618.415658][T28809] Exception stack(0xdfc25fa8 to 0xdfc25ff0) [ 2618.415675][T28809] 5fa0: 00000001 00000000 00000003 20000000 20000040 00000002 [ 2618.415690][T28809] 5fc0: 00000001 00000000 00130270 000000e4 002e0000 00000000 00006364 76f930bc [ 2618.415703][T28809] 5fe0: 76f92ec0 76f92eb0 0001948c 001322c0 [ 2620.944650][ T31] kauditd_printk_skb: 94 callbacks suppressed [ 2620.945678][ T31] audit: type=1400 audit(2620.860:15558): avc: denied { read } for pid=28810 comm="syz.1.6060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2621.119010][ T31] audit: type=1400 audit(2621.030:15559): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.121237][ T31] audit: type=1400 audit(2621.040:15560): avc: denied { recv } for pid=28807 comm="syz.0.6059" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.161378][ T31] audit: type=1400 audit(2621.080:15561): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.161727][ T31] audit: type=1400 audit(2621.080:15562): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.173503][ T31] audit: type=1400 audit(2621.090:15563): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.176560][ T31] audit: type=1400 audit(2621.090:15564): avc: denied { recv } for pid=28807 comm="syz.0.6059" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.188986][ T31] audit: type=1400 audit(2621.100:15565): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.189361][ T31] audit: type=1400 audit(2621.100:15566): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2621.385599][ T31] audit: type=1400 audit(2621.300:15567): avc: denied { read write } for pid=25060 comm="syz-executor" name="loop1" dev="devtmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2625.962667][ T31] kauditd_printk_skb: 127 callbacks suppressed [ 2625.963017][ T31] audit: type=1400 audit(2625.880:15695): avc: denied { write } for pid=28820 comm="syz.1.6064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2625.968647][ T31] audit: type=1400 audit(2625.880:15696): avc: denied { write } for pid=28820 comm="syz.1.6064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2625.982262][ T31] audit: type=1400 audit(2625.900:15697): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.987061][ T31] audit: type=1400 audit(2625.900:15698): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.994292][ T31] audit: type=1400 audit(2625.910:15699): avc: denied { recv } for pid=26816 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2625.996780][ T31] audit: type=1400 audit(2625.910:15700): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2626.001782][ T31] audit: type=1400 audit(2625.920:15701): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2626.002174][ T31] audit: type=1400 audit(2625.920:15702): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2626.023090][ T31] audit: type=1400 audit(2625.930:15703): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2626.023495][ T31] audit: type=1400 audit(2625.930:15704): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2627.100621][T28850] FAULT_INJECTION: forcing a failure. [ 2627.100621][T28850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2627.101019][T28850] CPU: 0 UID: 0 PID: 28850 Comm: syz.1.6071 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2627.101123][T28850] Hardware name: ARM-Versatile Express [ 2627.101145][T28850] Call trace: [ 2627.101185][T28850] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2627.101404][T28850] r7:00000000 r6:00000000 r5:60000013 r4:82260088 [ 2627.101447][T28850] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 2627.101527][T28850] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2627.101636][T28850] r5:83a0d400 r4:82917c14 [ 2627.101695][T28850] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 2627.101791][T28850] [<80971c40>] (should_fail_ex) from [<8051f4f0>] (should_fail_alloc_page+0x68/0x74) [ 2627.102069][T28850] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:dfd09900 [ 2627.102158][T28850] [<8051f488>] (should_fail_alloc_page) from [<804ed7a0>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 2627.102279][T28850] [<804ed70c>] (prepare_alloc_pages.constprop.0) from [<804f5cc8>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 2627.102319][T28850] r10:00000000 r9:00000000 r8:83a0d400 r7:00000000 r6:00140cca r5:83a0d400 [ 2627.102331][T28850] r4:00000000 r3:dfd09900 [ 2627.102338][T28850] [<804f5c1c>] (__alloc_frozen_pages_noprof) from [<804f6d60>] (__folio_alloc_noprof+0x14/0x6c) [ 2627.102450][T28850] r10:00000000 r9:85b5ba00 r8:00000000 r7:00000000 r6:20019000 r5:83a0d400 [ 2627.102529][T28850] r4:00000015 [ 2627.102606][T28850] [<804f6d4c>] (__folio_alloc_noprof) from [<804c778c>] (handle_mm_fault+0xcf8/0x14dc) [ 2627.102800][T28850] r5:83a0d400 r4:00000015 [ 2627.102826][T28850] [<804c6a94>] (handle_mm_fault) from [<804b8fe0>] (__get_user_pages+0x254/0x6f0) [ 2627.102908][T28850] r10:00000018 r9:20019000 r8:83a0d400 r7:00000000 r6:00000015 r5:85b5ba00 [ 2627.103143][T28850] r4:00290001 [ 2627.103218][T28850] [<804b8d8c>] (__get_user_pages) from [<804ba428>] (__gup_longterm_locked+0xf0/0xb54) [ 2627.103321][T28850] r10:86878f28 r9:00290001 r8:dfd09b8c r7:868a56c0 r6:00000001 r5:868a5744 [ 2627.103331][T28850] r4:00000000 [ 2627.103340][T28850] [<804ba338>] (__gup_longterm_locked) from [<804bb574>] (gup_fast_fallback+0x6e8/0x8bc) [ 2627.103527][T28850] r10:20001000 r9:00000000 r8:00000025 r7:00000000 r6:00000000 r5:20001000 [ 2627.103664][T28850] r4:ffefd008 [ 2627.103726][T28850] [<804bae8c>] (gup_fast_fallback) from [<804bb85c>] (pin_user_pages_fast+0x50/0x60) [ 2627.103960][T28850] r10:00000001 r9:dfd09c88 r8:dfd09c84 r7:20001000 r6:00000025 r5:20001000 [ 2627.104006][T28850] r4:86878f28 [ 2627.104029][T28850] [<804bb80c>] (pin_user_pages_fast) from [<808b1d0c>] (iov_iter_extract_pages+0xfc/0x7e0) [ 2627.104081][T28850] r6:00000200 r5:dfd09ed8 r4:00024000 [ 2627.104123][T28850] [<808b1c10>] (iov_iter_extract_pages) from [<8083076c>] (bio_iov_iter_get_pages+0xd8/0x44c) [ 2627.104164][T28850] r10:82a053ea r9:dfd09d00 r8:86878e00 r7:00000000 r6:dfd09ed8 r5:00000001 [ 2627.104174][T28850] r4:dfd09ed8 [ 2627.104181][T28850] [<80830694>] (bio_iov_iter_get_pages) from [<8082bf60>] (__blkdev_direct_IO_simple+0x10c/0x28c) [ 2627.104250][T28850] r10:83a0d400 r9:dfd09cd0 r8:86878e00 r7:00000000 r6:dfd09ed8 r5:00000001 [ 2627.104267][T28850] r4:dfd09e60 [ 2627.104275][T28850] [<8082be54>] (__blkdev_direct_IO_simple) from [<8082c390>] (blkdev_direct_IO+0x2b0/0x72c) [ 2627.104310][T28850] r10:00020000 r9:00000000 r8:83a0d400 r7:83485540 r6:dfd09ed8 r5:00024000 [ 2627.104320][T28850] r4:dfd09e60 [ 2627.104327][T28850] [<8082c0e0>] (blkdev_direct_IO) from [<8082cc68>] (blkdev_read_iter+0xd8/0x194) [ 2627.104359][T28850] r10:00020000 r9:00000000 r8:834857a8 r7:dfd09ed8 r6:00024000 r5:dfd09e60 [ 2627.104369][T28850] r4:00000000 [ 2627.104376][T28850] [<8082cb90>] (blkdev_read_iter) from [<80551814>] (do_iter_readv_writev+0x130/0x214) [ 2627.104412][T28850] r9:83a0d400 r8:00000000 r7:dfd09f88 r6:00000009 r5:84976d80 r4:00000000 [ 2627.104420][T28850] [<805516e4>] (do_iter_readv_writev) from [<80551cfc>] (vfs_readv+0x180/0x290) [ 2627.104454][T28850] r10:00000188 r9:00000002 r8:00000001 r7:dfd09f88 r6:84976d80 r5:00000000 [ 2627.104488][T28850] r4:8082cb90 [ 2627.104497][T28850] [<80551b7c>] (vfs_readv) from [<80551fe4>] (do_preadv+0x90/0xf0) [ 2627.104533][T28850] r9:83a0d400 r8:8020029c r7:20000000 r6:00000002 r5:84976d80 r4:84976d81 [ 2627.104541][T28850] [<80551f54>] (do_preadv) from [<805546b8>] (sys_preadv2+0x2c/0x44) [ 2627.104573][T28850] r7:00000188 r6:00130270 r5:00000009 r4:00000000 [ 2627.104581][T28850] [<8055468c>] (sys_preadv2) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2627.104607][T28850] Exception stack(0xdfd09fa8 to 0xdfd09ff0) [ 2627.104625][T28850] 9fa0: 00000000 00000009 00000003 20000000 00000002 00000000 [ 2627.104641][T28850] 9fc0: 00000000 00000009 00130270 00000188 002e0000 00000000 00006364 76f930bc [ 2627.104653][T28850] 9fe0: 76f92ec0 76f92eb0 0001948c 001322c0 [ 2630.982196][ T31] kauditd_printk_skb: 242 callbacks suppressed [ 2630.982473][ T31] audit: type=1400 audit(2630.900:15945): avc: denied { read } for pid=28856 comm="syz.1.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2631.012203][ T31] audit: type=1400 audit(2630.930:15946): avc: denied { write } for pid=28856 comm="syz.1.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2631.013823][ T31] audit: type=1400 audit(2630.930:15947): avc: denied { module_request } for pid=28856 comm="syz.1.6074" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2631.021824][ T31] audit: type=1400 audit(2630.940:15948): avc: denied { ioctl } for pid=28856 comm="syz.1.6074" path="socket:[69603]" dev="sockfs" ino=69603 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2631.026045][ T31] audit: type=1400 audit(2630.940:15949): avc: denied { module_request } for pid=28856 comm="syz.1.6074" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2631.034646][ T31] audit: type=1400 audit(2630.950:15950): avc: denied { write } for pid=28856 comm="syz.1.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2631.120708][ T31] audit: type=1400 audit(2631.040:15951): avc: denied { write } for pid=28856 comm="syz.1.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2631.209726][ T31] audit: type=1400 audit(2631.130:15952): avc: denied { sys_module } for pid=28856 comm="syz.1.6074" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2631.229939][ T31] audit: type=1400 audit(2631.150:15953): avc: denied { module_request } for pid=28856 comm="syz.1.6074" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2631.290415][ T31] audit: type=1400 audit(2631.210:15954): avc: denied { write } for pid=28856 comm="syz.1.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2632.766697][T28906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28906 comm=syz.0.6081 [ 2636.020037][ T31] kauditd_printk_skb: 208 callbacks suppressed [ 2636.020200][ T31] audit: type=1400 audit(2635.940:16163): avc: denied { sys_module } for pid=28926 comm="syz.1.6085" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2636.022157][ T31] audit: type=1400 audit(2635.940:16164): avc: denied { module_request } for pid=28926 comm="syz.1.6085" kmod="wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2636.149390][ T31] audit: type=1400 audit(2636.070:16165): avc: denied { write } for pid=28926 comm="syz.1.6085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2636.174852][ T31] audit: type=1400 audit(2636.090:16166): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2636.175149][ T31] audit: type=1400 audit(2636.090:16167): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2636.175605][ T31] audit: type=1400 audit(2636.090:16168): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2636.197097][ T31] audit: type=1400 audit(2636.100:16169): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2636.198084][ T31] audit: type=1400 audit(2636.100:16170): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2636.229309][ T31] audit: type=1400 audit(2636.150:16171): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2636.230291][ T31] audit: type=1400 audit(2636.150:16172): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2637.738559][T22569] usb 1-1: new high-speed USB device number 127 using dummy_hcd [ 2637.889168][T22569] usb 1-1: Using ep0 maxpacket: 16 [ 2637.898180][T22569] usb 1-1: config 7 has an invalid descriptor of length 0, skipping remainder of the config [ 2637.899653][T22569] usb 1-1: config 7 interface 0 altsetting 5 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2637.899822][T22569] usb 1-1: config 7 interface 0 altsetting 5 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2637.899918][T22569] usb 1-1: config 7 interface 0 altsetting 5 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 2637.900005][T22569] usb 1-1: config 7 interface 0 has no altsetting 0 [ 2637.900130][T22569] usb 1-1: New USB device found, idVendor=0458, idProduct=5010, bcdDevice= 0.00 [ 2637.900212][T22569] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2638.433863][T22569] input: HID 0458:5010 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:7.0/0003:0458:5010.0024/input/input33 [ 2638.451886][T22569] kye 0003:0458:5010.0024: input,hiddev0,hidraw0: USB HID v2.00 Device [HID 0458:5010] on usb-dummy_hcd.0-1/input0 [ 2638.664998][T21096] usb 1-1: USB disconnect, device number 127 [ 2640.254541][T28995] fuse: Unknown parameter 'zd' [ 2641.070195][ T31] kauditd_printk_skb: 167 callbacks suppressed [ 2641.074611][ T31] audit: type=1400 audit(2640.990:16340): avc: denied { read } for pid=28996 comm="syz.1.6092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2641.149693][ T31] audit: type=1400 audit(2641.070:16341): avc: denied { write } for pid=28996 comm="syz.1.6092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2641.204423][ T31] audit: type=1400 audit(2641.100:16342): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.204837][ T31] audit: type=1400 audit(2641.110:16343): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2641.205234][ T31] audit: type=1400 audit(2641.110:16344): avc: denied { read write open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2641.205321][ T31] audit: type=1400 audit(2641.110:16345): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2641.205375][ T31] audit: type=1400 audit(2641.120:16346): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.232002][ T31] audit: type=1400 audit(2641.150:16347): avc: denied { create } for pid=28996 comm="syz.1.6092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2641.239154][ T31] audit: type=1400 audit(2641.160:16348): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2641.248867][ T31] audit: type=1400 audit(2641.160:16349): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2643.663509][T29023] fuse: Unknown parameter '0x0000000000000007' [ 2643.684910][T29023] binder: Unknown parameter 'Q' [ 2646.096880][ T31] kauditd_printk_skb: 166 callbacks suppressed [ 2646.097190][ T31] audit: type=1400 audit(2646.010:16516): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.107063][ T31] audit: type=1400 audit(2646.020:16517): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.113585][ T31] audit: type=1400 audit(2646.030:16518): avc: denied { ioctl } for pid=29032 comm="syz.1.6103" path="socket:[70965]" dev="sockfs" ino=70965 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2646.141185][ T31] audit: type=1400 audit(2646.050:16519): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2646.141580][ T31] audit: type=1400 audit(2646.050:16520): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2646.142043][ T31] audit: type=1400 audit(2646.060:16521): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2646.142134][ T31] audit: type=1400 audit(2646.060:16522): avc: denied { recv } for pid=31 comm="kauditd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.142192][ T31] audit: type=1400 audit(2646.060:16523): avc: denied { recv } for pid=31 comm="kauditd" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.164264][ T31] audit: type=1400 audit(2646.080:16524): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2646.176991][ T31] audit: type=1400 audit(2646.090:16525): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.104826][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 2651.105946][ T31] audit: type=1400 audit(2651.020:16617): avc: denied { recv } for pid=26883 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.109051][ T31] audit: type=1400 audit(2651.030:16618): avc: denied { read write } for pid=26242 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2651.111458][ T31] audit: type=1400 audit(2651.030:16619): avc: denied { open } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2651.113273][ T31] audit: type=1400 audit(2651.030:16620): avc: denied { ioctl } for pid=26242 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1075 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2651.144834][ T31] audit: type=1400 audit(2651.060:16621): avc: denied { recv } for pid=26793 comm="syz.1.5527" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.146222][ T31] audit: type=1400 audit(2651.060:16622): avc: denied { recv } for pid=26793 comm="syz.1.5527" saddr=127.0.0.1 src=39658 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.152523][ T31] audit: type=1400 audit(2651.060:16623): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.153722][ T31] audit: type=1400 audit(2651.060:16624): avc: denied { recv } for pid=26837 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.155329][ T31] audit: type=1400 audit(2651.060:16625): avc: denied { recv } for pid=26837 comm="syz.1.5527" saddr=10.0.2.2 src=45628 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2651.155491][ T31] audit: type=1400 audit(2651.070:16626): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=39658 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2654.241759][T29070] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=29070 comm=syz.0.6116 [ 2654.500710][T29074] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=29074 comm=syz.0.6118 [ 2654.689105][T25562] ------------[ cut here ]------------ [ 2654.689734][T25562] WARNING: CPU: 1 PID: 25562 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 2654.692128][T25562] refcount_t: underflow; use-after-free. [ 2654.692540][T25562] Modules linked in: [ 2654.693307][T25562] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2654.694306][T25562] CPU: 1 UID: 0 PID: 25562 Comm: kworker/1:3 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 2654.694724][T25562] Hardware name: ARM-Versatile Express [ 2654.695125][T25562] Workqueue: md_misc mddev_delayed_delete [ 2654.695890][T25562] Call trace: [ 2654.696083][T25562] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2654.696450][T25562] r7:00000000 r6:8281f77c r5:00000000 r4:82260088 [ 2654.696708][T25562] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 2654.697684][T25562] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 2654.698434][T25562] r5:00000000 r4:82a77d18 [ 2654.698569][T25562] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 2654.698790][T25562] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 2654.699020][T25562] r7:808bae58 [ 2654.699153][T25562] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 2654.699417][T25562] r3:8280c684 r2:00000001 r1:82246a9c r0:8224e518 [ 2654.699723][T25562] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 2654.700117][T25562] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 2654.700608][T25562] r8:00000009 r7:822b8b2c r6:dff41e54 r5:83b2e000 r4:00000000 [ 2654.700881][T25562] [<80254bd0>] (warn_slowpath_fmt) from [<808bae58>] (refcount_warn_saturate+0x13c/0x174) [ 2654.701229][T25562] r10:830e4270 r9:83264045 r8:83b2e000 r7:ddde2d40 r6:83264000 r5:856ada1c [ 2654.701582][T25562] r4:856ad850 [ 2654.701703][T25562] [<808bad1c>] (refcount_warn_saturate) from [<81a11208>] (kobject_put+0x158/0x1f4) [ 2654.702054][T25562] [<81a110b0>] (kobject_put) from [<81169660>] (mddev_delayed_delete+0x14/0x18) [ 2654.702508][T25562] r7:ddde2d40 r6:83264000 r5:856ada1c r4:85408a80 [ 2654.702683][T25562] [<8116964c>] (mddev_delayed_delete) from [<8027a3bc>] (process_one_work+0x1b4/0x4f4) [ 2654.702994][T25562] [<8027a208>] (process_one_work) from [<8027b004>] (worker_thread+0x1fc/0x3d8) [ 2654.703331][T25562] r10:61c88647 r9:83b2e000 r8:85408aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2654.703899][T25562] r4:85408a80 [ 2654.704005][T25562] [<8027ae08>] (worker_thread) from [<80281fec>] (kthread+0x12c/0x280) [ 2654.704381][T25562] r10:00000000 r9:85408a80 r8:8027ae08 r7:df965e60 r6:85408a00 r5:83b2e000 [ 2654.704769][T25562] r4:00000001 [ 2654.704945][T25562] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2654.705337][T25562] Exception stack(0xdff41fb0 to 0xdff41ff8) [ 2654.705685][T25562] 1fa0: 00000000 00000000 00000000 00000000 [ 2654.706142][T25562] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2654.706554][T25562] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2654.706810][T25562] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 2654.707123][T25562] r4:8593acc0 [ 2654.708644][T25562] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:59:19 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000004 R03=81a38650 R04=00000006 R05=828f7848 R06=00000000 R07=828f7840 R08=83b31800 R09=00000028 R10=828f7848 R11=df801a3c R12=df801a40 R13=df801a30 R14=8033d954 R15=81a38660 PSR=60010093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=060110ae d01=060110ae00000000 s04=05880800 s05=003f9803 d02=003f980305880800 s06=a0030208 s07=0008003f d03=0008003fa0030208 s08=003fa803 s09=b0030008 d04=b0030008003fa803 s10=8008003f s11=0159a420 d05=0159a4208008003f s12=10080606 s13=02010000 d06=0201000010080606 s14=08003f80 s15=40800302 d07=4080030208003f80 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=e79b79d0 s33=29b2683f d16=29b2683fe79b79d0 s34=011bf2e4 s35=ecae573b d17=ecae573b011bf2e4 s36=87c2220a s37=1cf2ed55 d18=1cf2ed5587c2220a s38=284af5f4 s39=86ae1042 d19=86ae1042284af5f4 s40=f0a54729 s41=d34ca91b d20=d34ca91bf0a54729 s42=3de327fe s43=6de8a8ff d21=6de8a8ff3de327fe s44=a1afb8f4 s45=b3113c8f d22=b3113c8fa1afb8f4 s46=7c332098 s47=3613714c d23=3613714c7c332098 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=bd4a16c3 s53=2319ece0 d26=2319ece0bd4a16c3 s54=6b14508b s55=d9bde4d1 d27=d9bde4d16b14508b s56=def01d0c s57=52c73e77 d28=52c73e77def01d0c s58=c264cbb9 s59=00b83c44 d29=00b83c44c264cbb9 s60=fc61b6a5 s61=af74465e d30=af74465efc61b6a5 s62=22394119 s63=0f188c5b d31=0f188c5b22394119 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000002 R01=eb933030 R02=829591c0 R03=00000030 R04=84b08840 R05=dff41bbc R06=00000f01 R07=00000000 R08=82826ee0 R09=00000000 R10=000038b8 R11=dff41b58 R12=82959084 R13=dff41b3c R14=00000008 R15=80a79260 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000