last executing test programs: 5.169209934s ago: executing program 0 (id=12418): msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000001c0)=""/219) 5.039601231s ago: executing program 0 (id=12419): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000015000103000000000000003405"], 0x14}}, 0x0) 4.908823357s ago: executing program 0 (id=12420): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') readv(r1, &(0x7f0000001440)=[{&(0x7f0000000040)=""/20, 0x14}], 0x1) 4.702657678s ago: executing program 0 (id=12422): syz_usb_connect(0x3, 0x24, &(0x7f0000001040)={{0x12, 0x1, 0x200, 0x29, 0x63, 0x90, 0x10, 0x1a86, 0x752d, 0x2d4d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x1, 0x0, 0x0, 0xe9, 0x11, 0xbd}}]}}]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') fchdir(r0) openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x2802, 0x0) 4.66891696s ago: executing program 1 (id=12423): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) syz_emit_ethernet(0x6a, &(0x7f00000003c0)={@local, @remote, @val={@void, {0x9900, 0x4, 0x0, 0x4}}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x1, 0x8, 0x58, 0x65, 0x0, 0xd, 0x2f, 0x0, @local, @loopback}, {{0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x880b, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}, {0x8, 0x88be, 0x2, {{0x9, 0x1, 0x0, 0x3, 0x1, 0x0, 0x4, 0x2}, 0x1, {0x9}}}, {0x8, 0x22eb, 0x1, {{0x2, 0x2, 0xa, 0x1, 0x0, 0x1, 0x4, 0x1}, 0x2, {0x1, 0x3, 0x3, 0x17, 0x0, 0x0, 0x1, 0x1, 0x1}}}}}}}}, 0x0) 4.321728408s ago: executing program 1 (id=12424): mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='system.posix_acl_access\x00') lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.upper\x00') close_range(r1, 0xffffffffffffffff, 0x0) 2.92897216s ago: executing program 0 (id=12425): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x1}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) 1.638648435s ago: executing program 1 (id=12426): r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 1.179343539s ago: executing program 1 (id=12427): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="e4010000030e01"], 0x1e4}, 0x1, 0x0, 0x0, 0x82}, 0x800) 418.546209ms ago: executing program 1 (id=12428): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x0, {0x2, 0x0, 0x80, 0x4, 0x44, 0x0, 0x0, 0x6}, [@FRA_SRC={0x8, 0x2, @multicast1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40001}, 0x0) 150.636142ms ago: executing program 0 (id=12429): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a0000000200000001100000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = gettid() rt_sigaction(0x16, &(0x7f0000000080)={&(0x7f0000000440)="c4a23d0643b9f0430fc079fff3460f1ec9f081035c000000f30faed446a900000000660f7ed238c461915492db8876efa1efa12eb22d233333f30fa7d0", 0x90000000, 0x0}, 0x0, 0x8, &(0x7f0000000200)) rt_sigsuspend(&(0x7f0000000000), 0x8) tkill(r2, 0x16) 0s ago: executing program 1 (id=12430): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x9, 0x2, 0x401, 0x1, 0xcc7, 0xfff, 0x5c952399, 0x5, 0x3ff, 0x802, 0x1600, 0xfffffffe, 0x1, 0x9, 0xe1cb, 0x6, 0x4, 0x3, 0x396, 0x80000089, 0xfffffffd, 0x0, 0xfffffff5, 0xffffeadb, 0x3, 0x3c, 0x8, 0x4, 0x8000000, 0xdffffffa]}) kernel console output (not intermixed with test programs): 0x188) [ 8797.933137][T24375] r10:20008000 r9:dfc19f20 r8:00000000 r7:dfc19ce4 r6:00000000 r5:dfc19f20 [ 8797.933156][T24375] r4:857398c0 [ 8797.933171][T24375] [<81740914>] (tcp_sendmsg_fastopen) from [<81741494>] (tcp_sendmsg_locked+0x9f8/0xfd8) [ 8797.933230][T24375] r8:857398c0 r7:00000000 r6:00000000 r5:00000000 r4:00000000 [ 8797.933246][T24375] [<81740a9c>] (tcp_sendmsg_locked) from [<81741aa4>] (tcp_sendmsg+0x30/0x44) [ 8797.933305][T24375] r10:00000000 r9:dfc19dc4 r8:dfc19dc4 r7:00000000 r6:00000000 r5:dfc19f20 [ 8797.933325][T24375] r4:857398c0 [ 8797.933340][T24375] [<81741a74>] (tcp_sendmsg) from [<8181ca18>] (inet6_sendmsg+0x40/0x4c) [ 8797.933397][T24375] r7:00000000 r6:857398c0 r5:00000000 r4:dfc19f20 [ 8797.933414][T24375] [<8181c9d8>] (inet6_sendmsg) from [<81543320>] (__sock_sendmsg+0x44/0x78) [ 8797.933475][T24375] r7:00000000 r6:850d6f00 r5:dfc19f20 r4:00000000 [ 8797.933491][T24375] [<815432dc>] (__sock_sendmsg) from [<81544674>] (____sys_sendmsg+0x298/0x2cc) [ 8797.933553][T24375] r7:00000000 r6:850d6f00 r5:20008000 r4:dfc19f20 [ 8797.933570][T24375] [<815443dc>] (____sys_sendmsg) from [<8154663c>] (___sys_sendmsg+0x9c/0xd0) [ 8797.933638][T24375] r10:dfc19e24 r9:20000580 r8:20008000 r7:00000000 r6:850d6f00 r5:dfc19f20 [ 8797.933658][T24375] r4:00000000 [ 8797.933674][T24375] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 8797.933739][T24375] r10:00000128 r9:85618c00 r8:85fcc540 r7:20008000 r6:20000580 r5:85fcc541 [ 8797.933760][T24375] r4:00000004 [ 8797.933775][T24375] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 8797.933832][T24375] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 8797.933851][T24375] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8797.933895][T24375] Exception stack(0xdfc19fa8 to 0xdfc19ff0) [ 8797.933941][T24375] 9fa0: 00000000 00000000 00000004 20000580 20008000 00000000 [ 8797.933978][T24375] 9fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fa90bc [ 8797.934004][T24375] 9fe0: 76fa8ec0 76fa8eb0 0001948c 001322c0 [ 8798.001657][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 8798.002018][ T31] audit: type=1400 audit(13286105.575:113456): avc: denied { ioctl } for pid=24366 comm="syz.1.12141" path="socket:[142982]" dev="sockfs" ino=142982 ioctlcmd=0x128a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8798.261409][ T31] audit: type=1400 audit(13286105.845:113457): avc: denied { read } for pid=24377 comm="syz.0.12144" dev="nsfs" ino=4026532635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8798.281182][ T31] audit: type=1400 audit(13286105.845:113458): avc: denied { open } for pid=24377 comm="syz.0.12144" path="net:[4026532635]" dev="nsfs" ino=4026532635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8798.325983][ T31] audit: type=1400 audit(13286105.905:113459): avc: denied { create } for pid=24377 comm="syz.0.12144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8798.335057][ T31] audit: type=1400 audit(13286105.915:113460): avc: denied { write } for pid=24377 comm="syz.0.12144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8798.529011][ T31] audit: type=1400 audit(13286106.105:113461): avc: denied { write } for pid=24366 comm="syz.1.12141" path="socket:[142982]" dev="sockfs" ino=142982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8798.547795][ T31] audit: type=1400 audit(13286106.125:113462): avc: denied { write } for pid=24366 comm="syz.1.12141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8799.145709][ T31] audit: type=1400 audit(13286106.715:113463): avc: denied { ioctl } for pid=24366 comm="syz.1.12141" path="socket:[142982]" dev="sockfs" ino=142982 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8799.203785][ T31] audit: type=1400 audit(13286106.785:113464): avc: denied { allowed } for pid=24382 comm="syz.0.12146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 8799.217444][ T31] audit: type=1400 audit(13286106.795:113465): avc: denied { create } for pid=24382 comm="syz.0.12146" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 8803.014704][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 8803.015241][ T31] audit: type=1400 audit(13286110.585:113494): avc: denied { ioctl } for pid=24395 comm="syz.0.12151" path="socket:[143034]" dev="sockfs" ino=143034 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8803.516213][ T31] audit: type=1400 audit(13286111.095:113495): avc: denied { write } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8804.039834][ T31] audit: type=1400 audit(13286111.615:113496): avc: denied { create } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8804.048392][ T31] audit: type=1400 audit(13286111.625:113497): avc: denied { write } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8804.076354][ T31] audit: type=1400 audit(13286111.655:113498): avc: denied { create } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8804.099745][ T31] audit: type=1400 audit(13286111.675:113499): avc: denied { write } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8804.121078][ T31] audit: type=1400 audit(13286111.695:113500): avc: denied { getopt } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8804.156029][ T31] audit: type=1400 audit(13286111.735:113501): avc: denied { write } for pid=24395 comm="syz.0.12151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8804.168573][ T31] audit: type=1400 audit(13286111.745:113502): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8804.175890][ T31] audit: type=1400 audit(13286111.745:113503): avc: denied { read write open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8804.261735][T24407] FAULT_INJECTION: forcing a failure. [ 8804.261735][T24407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 8804.262339][T24407] CPU: 1 UID: 0 PID: 24407 Comm: syz.1.12152 Not tainted syzkaller #0 PREEMPT [ 8804.262433][T24407] Hardware name: ARM-Versatile Express [ 8804.262460][T24407] Call trace: [ 8804.262511][T24407] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8804.262645][T24407] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 8804.262667][T24407] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8804.262858][T24407] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8804.262932][T24407] r5:85619800 r4:8294f190 [ 8804.262998][T24407] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8804.263072][T24407] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 8804.263176][T24407] r8:76facf30 r7:00000000 r6:00000000 r5:dfc29f68 r4:00000002 [ 8804.263216][T24407] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 8804.263348][T24407] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 8804.263448][T24407] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 8804.263530][T24407] r10:00000001 r9:80608514 r8:00000002 r7:dfc29f68 r6:0000000f r5:76facf30 [ 8804.263564][T24407] r4:85619800 r3:dfc29e9f [ 8804.263583][T24407] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 8804.263658][T24407] r8:76facf30 r7:dfc29f68 r6:85619800 r5:0000000f r4:85f62300 [ 8804.263678][T24407] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 8804.263786][T24407] r10:00000003 r9:85619800 r8:8020029c r7:00000000 r6:00000000 r5:85f62300 [ 8804.263814][T24407] r4:85f62303 [ 8804.263869][T24407] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 8804.263942][T24407] r7:00000003 r6:00000004 r5:76facf30 r4:0000000f [ 8804.263960][T24407] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8804.264016][T24407] Exception stack(0xdfc29fa8 to 0xdfc29ff0) [ 8804.264061][T24407] 9fa0: 0000000f 76facf30 00000004 76facf30 0000000f 00000000 [ 8804.264107][T24407] 9fc0: 0000000f 76facf30 00000004 00000003 002e0000 00000000 00006364 76fad0bc [ 8804.264139][T24407] 9fe0: 00000158 76faced0 000d80f0 00130194 [ 8808.521443][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 8808.522928][ T31] audit: type=1400 audit(13286116.095:113563): avc: denied { read } for pid=24437 comm="syz.0.12161" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.525605][ T31] audit: type=1400 audit(13286116.105:113564): avc: denied { open } for pid=24437 comm="syz.0.12161" path="/dev/snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.579763][ T31] audit: type=1400 audit(13286116.155:113565): avc: denied { read } for pid=24437 comm="syz.0.12161" name="mouse0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.580767][ T31] audit: type=1400 audit(13286116.155:113566): avc: denied { read open } for pid=24437 comm="syz.0.12161" path="/dev/input/mouse0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.604911][ T31] audit: type=1400 audit(13286116.185:113567): avc: denied { ioctl } for pid=24437 comm="syz.0.12161" path="/dev/snapshot" dev="devtmpfs" ino=83 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.763422][ T31] audit: type=1400 audit(13286116.345:113568): avc: denied { read write } for pid=24439 comm="syz.0.12162" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.765601][ T31] audit: type=1400 audit(13286116.345:113569): avc: denied { open } for pid=24439 comm="syz.0.12162" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8808.769645][ T31] audit: type=1400 audit(13286116.345:113570): avc: denied { mounton } for pid=24439 comm="syz.0.12162" path="/435/file0" dev="tmpfs" ino=2281 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 8808.781099][ T31] audit: type=1400 audit(13286116.355:113571): avc: denied { mount } for pid=24439 comm="syz.0.12162" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 8808.841587][ T31] audit: type=1400 audit(13286116.425:113572): avc: denied { unmount } for pid=20074 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 8809.022371][T24448] FAULT_INJECTION: forcing a failure. [ 8809.022371][T24448] name failslab, interval 1, probability 0, space 0, times 0 [ 8809.022733][T24448] CPU: 1 UID: 0 PID: 24448 Comm: syz.0.12164 Not tainted syzkaller #0 PREEMPT [ 8809.022796][T24448] Hardware name: ARM-Versatile Express [ 8809.022811][T24448] Call trace: [ 8809.022835][T24448] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8809.022908][T24448] r7:00000d40 r6:00000000 r5:60000013 r4:82260500 [ 8809.022918][T24448] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8809.022962][T24448] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8809.022995][T24448] r5:85599800 r4:82917c00 [ 8809.023004][T24448] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8809.023037][T24448] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8809.023077][T24448] r8:85599800 r7:00000d40 r6:85f623e8 r5:00000021 r4:83001240 [ 8809.023087][T24448] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 8809.023115][T24448] [<80503b10>] (__kmalloc_noprof) from [<807c34dc>] (tomoyo_encode2+0x64/0xf0) [ 8809.023155][T24448] r10:00000fff r9:8309e400 r8:00000000 r7:834e16e8 r6:85f623e8 r5:83addffc [ 8809.023166][T24448] r4:83addfe6 [ 8809.023174][T24448] [<807c3478>] (tomoyo_encode2) from [<807c358c>] (tomoyo_encode+0x24/0x30) [ 8809.023211][T24448] r9:8309e400 r8:00000000 r7:834e16e8 r6:85f623e8 r5:00001000 r4:83addfe7 [ 8809.023220][T24448] [<807c3568>] (tomoyo_encode) from [<807c3618>] (tomoyo_realpath_from_path+0x80/0x17c) [ 8809.023302][T24448] r5:00001000 r4:83add000 [ 8809.023321][T24448] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 8809.023361][T24448] r10:85599800 r9:00000000 r8:85f623c0 r7:8040640a r6:00000004 r5:81cd6504 [ 8809.023374][T24448] r4:85f623e8 r3:826c0200 [ 8809.023384][T24448] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 8809.023423][T24448] r9:00000004 r8:85f623c0 r7:200001c0 r6:200001c0 r5:8040640a r4:85f623c0 [ 8809.023432][T24448] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 8809.023463][T24448] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 8809.023500][T24448] r7:200001c0 r6:85f623c1 r5:00000000 r4:8040640a [ 8809.023509][T24448] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8809.023536][T24448] Exception stack(0xdf9d5fa8 to 0xdf9d5ff0) [ 8809.023557][T24448] 5fa0: 00000000 00000000 00000004 8040640a 200001c0 00000000 [ 8809.023578][T24448] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fa90bc [ 8809.023593][T24448] 5fe0: 76fa8ec0 76fa8eb0 0001948c 001322c0 [ 8809.023615][T24448] r10:00000036 r9:85599800 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 8809.023626][T24448] r4:00000000 [ 8809.041012][T24448] ERROR: Out of memory at tomoyo_realpath_from_path. [ 8809.696284][T24466] FAULT_INJECTION: forcing a failure. [ 8809.696284][T24466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 8809.699664][T24466] CPU: 1 UID: 0 PID: 24466 Comm: syz.0.12169 Not tainted syzkaller #0 PREEMPT [ 8809.699782][T24466] Hardware name: ARM-Versatile Express [ 8809.699808][T24466] Call trace: [ 8809.699845][T24466] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8809.699994][T24466] r7:df98de20 r6:00000000 r5:60000013 r4:82260500 [ 8809.700013][T24466] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8809.700064][T24466] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8809.700111][T24466] r5:8561a400 r4:8294f190 [ 8809.700124][T24466] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8809.700174][T24466] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 8809.700232][T24466] r8:00000004 r7:df98de20 r6:200001c0 r5:00000000 r4:df98df20 [ 8809.700246][T24466] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 8809.700290][T24466] [<809727c0>] (should_fail_usercopy) from [<815464c0>] (copy_msghdr_from_user+0x50/0x130) [ 8809.700343][T24466] [<81546470>] (copy_msghdr_from_user) from [<81546618>] (___sys_sendmsg+0x78/0xd0) [ 8809.700403][T24466] r8:00000004 r7:00000000 r6:83664a00 r5:df98df20 r4:df98de64 [ 8809.700417][T24466] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 8809.700474][T24466] r10:00000128 r9:8561a400 r8:85f62a80 r7:00000004 r6:200001c0 r5:85f62a81 [ 8809.700492][T24466] r4:00000003 [ 8809.700505][T24466] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 8809.700554][T24466] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 8809.700568][T24466] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8809.700624][T24466] Exception stack(0xdf98dfa8 to 0xdf98dff0) [ 8809.700659][T24466] dfa0: 00000000 00000000 00000003 200001c0 00000004 00000000 [ 8809.700691][T24466] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fa90bc [ 8809.700714][T24466] dfe0: 76fa8ec0 76fa8eb0 0001948c 001322c0 [ 8810.972112][T24490] FAULT_INJECTION: forcing a failure. [ 8810.972112][T24490] name failslab, interval 1, probability 0, space 0, times 0 [ 8810.972613][T24490] CPU: 0 UID: 0 PID: 24490 Comm: syz.0.12179 Not tainted syzkaller #0 PREEMPT [ 8810.972741][T24490] Hardware name: ARM-Versatile Express [ 8810.972773][T24490] Call trace: [ 8810.972830][T24490] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8810.973018][T24490] r7:00000d40 r6:00000000 r5:60000013 r4:82260500 [ 8810.973043][T24490] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8810.973098][T24490] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8810.973273][T24490] r5:8559ec00 r4:82917c00 [ 8810.973377][T24490] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8810.973484][T24490] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8810.973606][T24490] r8:8559ec00 r7:00000d40 r6:84da67a8 r5:00000021 r4:83001240 [ 8810.973674][T24490] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 8810.973845][T24490] [<80503b10>] (__kmalloc_noprof) from [<807c34dc>] (tomoyo_encode2+0x64/0xf0) [ 8810.974173][T24490] r10:00000fff r9:8309e400 r8:00000000 r7:834e16e8 r6:84da67a8 r5:84dd4ffc [ 8810.974297][T24490] r4:84dd4fe6 [ 8810.974386][T24490] [<807c3478>] (tomoyo_encode2) from [<807c358c>] (tomoyo_encode+0x24/0x30) [ 8810.974500][T24490] r9:8309e400 r8:00000000 r7:834e16e8 r6:84da67a8 r5:00001000 r4:84dd4fe7 [ 8810.974665][T24490] [<807c3568>] (tomoyo_encode) from [<807c3618>] (tomoyo_realpath_from_path+0x80/0x17c) [ 8810.974978][T24490] r5:00001000 r4:84dd4000 [ 8810.975085][T24490] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 8810.975469][T24490] r10:8559ec00 r9:00000000 r8:84da6780 r7:8040640a r6:00000004 r5:81cd6504 [ 8810.975504][T24490] r4:84da67a8 r3:826c0200 [ 8810.975524][T24490] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 8810.975704][T24490] r9:00000004 r8:84da6780 r7:00000000 r6:00000000 r5:8040640a r4:84da6780 [ 8810.975770][T24490] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 8810.976008][T24490] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 8810.976131][T24490] r7:00000000 r6:84da6781 r5:00000000 r4:8040640a [ 8810.976153][T24490] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8810.976523][T24490] Exception stack(0xdfa21fa8 to 0xdfa21ff0) [ 8810.976747][T24490] 1fa0: 00000000 00000000 00000004 8040640a 00000000 00000000 [ 8810.977093][T24490] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fa90bc [ 8810.977539][T24490] 1fe0: 76fa8ec0 76fa8eb0 0001948c 001322c0 [ 8810.977756][T24490] r10:00000036 r9:8559ec00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 8810.977812][T24490] r4:00000000 [ 8810.982081][T24490] ERROR: Out of memory at tomoyo_realpath_from_path. [ 8814.633860][ T31] kauditd_printk_skb: 163 callbacks suppressed [ 8814.634194][ T31] audit: type=1400 audit(13286122.215:113736): avc: denied { create } for pid=24518 comm="syz.0.12187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8814.682846][ T31] audit: type=1400 audit(13286122.265:113737): avc: denied { ioctl } for pid=24518 comm="syz.0.12187" path="socket:[143297]" dev="sockfs" ino=143297 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8814.687560][ T31] audit: type=1400 audit(13286122.265:113738): avc: denied { bind } for pid=24518 comm="syz.0.12187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8814.698062][ T31] audit: type=1400 audit(13286122.275:113739): avc: denied { create } for pid=24518 comm="syz.0.12187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8814.708434][ T31] audit: type=1400 audit(13286122.285:113740): avc: denied { create } for pid=24518 comm="syz.0.12187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8814.718147][ T31] audit: type=1400 audit(13286122.295:113741): avc: denied { setopt } for pid=24518 comm="syz.0.12187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8814.728057][ T31] audit: type=1400 audit(13286122.305:113742): avc: denied { connect } for pid=24518 comm="syz.0.12187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8815.228665][ T31] audit: type=1400 audit(13286122.805:113743): avc: denied { ioctl } for pid=24518 comm="syz.0.12187" path="socket:[144185]" dev="sockfs" ino=144185 ioctlcmd=0x4142 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8815.409708][ T31] audit: type=1400 audit(13286122.985:113744): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8815.413477][ T31] audit: type=1400 audit(13286122.995:113745): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8815.518905][T24522] fuse: Bad value for 'fd' [ 8815.717696][T24524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24524 comm=syz.1.12189 [ 8819.910728][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 8819.911243][ T31] audit: type=1400 audit(13286127.485:113795): avc: denied { create } for pid=24538 comm="syz.1.12192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8819.914301][ T31] audit: type=1400 audit(13286127.495:113796): avc: denied { write } for pid=24538 comm="syz.1.12192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8819.924344][ T31] audit: type=1400 audit(13286127.505:113797): avc: denied { create } for pid=24538 comm="syz.1.12192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8819.933301][ T31] audit: type=1400 audit(13286127.515:113798): avc: denied { getopt } for pid=24538 comm="syz.1.12192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8819.947883][ T31] audit: type=1400 audit(13286127.525:113799): avc: denied { read } for pid=24538 comm="syz.1.12192" dev="nsfs" ino=4026532933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8819.948268][ T31] audit: type=1400 audit(13286127.525:113800): avc: denied { read open } for pid=24538 comm="syz.1.12192" path="uts:[4026532933]" dev="nsfs" ino=4026532933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8819.957218][ T31] audit: type=1400 audit(13286127.535:113801): avc: denied { write } for pid=24538 comm="syz.1.12192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8820.474343][ T31] audit: type=1400 audit(13286128.055:113802): avc: denied { create } for pid=24540 comm="syz.0.12193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8820.491226][ T31] audit: type=1400 audit(13286128.065:113803): avc: denied { write } for pid=24540 comm="syz.0.12193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8820.687751][ T31] audit: type=1400 audit(13286128.265:113804): avc: denied { read write } for pid=24548 comm="syz.0.12195" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8824.703866][ C0] vkms_vblank_simulate: vblank timer overrun [ 8825.134640][ C0] vkms_vblank_simulate: vblank timer overrun [ 8825.171097][ C0] vkms_vblank_simulate: vblank timer overrun [ 8825.348258][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 8825.348748][ T31] audit: type=1400 audit(13286132.925:113873): avc: denied { write } for pid=24571 comm="syz.1.12204" path="socket:[144401]" dev="sockfs" ino=144401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8825.896587][ T31] audit: type=1400 audit(13286133.475:113874): avc: denied { read } for pid=24575 comm="syz.0.12205" name="usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8825.906359][ T31] audit: type=1400 audit(13286133.485:113875): avc: denied { read open } for pid=24575 comm="syz.0.12205" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8826.052608][ T31] audit: type=1400 audit(13286133.625:113876): avc: denied { create } for pid=24581 comm="syz.0.12206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8826.092785][ T31] audit: type=1400 audit(13286133.665:113877): avc: denied { setopt } for pid=24581 comm="syz.0.12206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8826.149974][ T31] audit: type=1400 audit(13286133.735:113878): avc: denied { associate } for pid=24581 comm="syz.0.12206" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 8826.179006][ T31] audit: type=1400 audit(13286133.755:113879): avc: denied { connect } for pid=24581 comm="syz.0.12206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8826.462122][ T31] audit: type=1400 audit(13286134.035:113880): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8826.462503][ T31] audit: type=1400 audit(13286134.045:113881): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8826.467660][ T31] audit: type=1400 audit(13286134.045:113882): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8826.604565][T24584] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24584 comm=syz.1.12207 [ 8826.607100][ C0] vkms_vblank_simulate: vblank timer overrun [ 8829.899317][T24600] FAULT_INJECTION: forcing a failure. [ 8829.899317][T24600] name failslab, interval 1, probability 0, space 0, times 0 [ 8829.899705][T24600] CPU: 0 UID: 0 PID: 24600 Comm: syz.1.12209 Not tainted syzkaller #0 PREEMPT [ 8829.899808][T24600] Hardware name: ARM-Versatile Express [ 8829.899834][T24600] Call trace: [ 8829.899880][T24600] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8829.900095][T24600] r7:00000820 r6:00000000 r5:60000013 r4:82260500 [ 8829.900118][T24600] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8829.900172][T24600] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8829.900226][T24600] r5:85958000 r4:82917c00 [ 8829.900243][T24600] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8829.900301][T24600] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8829.900366][T24600] r8:85958000 r7:00000820 r6:8480a098 r5:00000017 r4:83001240 [ 8829.900385][T24600] [<8051f1ac>] (should_failslab) from [<80504860>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 8829.900439][T24600] [<805047c0>] (__kmalloc_node_track_caller_noprof) from [<8049b670>] (kmemdup_noprof+0x28/0x44) [ 8829.900504][T24600] r10:00000126 r9:84030404 r8:dfae9d54 r7:84128000 r6:8480a098 r5:dfae9d4c [ 8829.900524][T24600] r4:00000017 [ 8829.900541][T24600] [<8049b648>] (kmemdup_noprof) from [<807a1f40>] (sidtab_sid2str_get+0x54/0xa4) [ 8829.900604][T24600] r7:84128000 r6:dfae9d54 r5:dfae9d4c r4:8330c0c0 [ 8829.900622][T24600] [<807a1eec>] (sidtab_sid2str_get) from [<807a9448>] (sidtab_entry_to_string+0x34/0x94) [ 8829.900691][T24600] r7:84128000 r6:8330c0c0 r5:dfae9d4c r4:0000005f [ 8829.900709][T24600] [<807a9414>] (sidtab_entry_to_string) from [<807a95c0>] (security_sid_to_context_core+0x118/0x17c) [ 8829.900776][T24600] r9:dfae9e74 r8:84128000 r7:84030404 r6:dfae9d54 r5:dfae9d4c r4:0000005f [ 8829.900795][T24600] [<807a94a8>] (security_sid_to_context_core) from [<807ac5d4>] (security_sid_to_context+0x1c/0x24) [ 8829.900860][T24600] r8:8078c6f8 r7:8078d6fc r6:85958000 r5:833375e0 r4:dfae9de0 [ 8829.900879][T24600] [<807ac5b8>] (security_sid_to_context) from [<8078d744>] (avc_audit_post_callback+0x48/0x2f4) [ 8829.900949][T24600] [<8078d6fc>] (avc_audit_post_callback) from [<807b4b90>] (common_lsm_audit+0x104/0x148) [ 8829.901021][T24600] r10:00000126 r9:dfae9e74 r8:8078c6f8 r7:8078d6fc r6:dfae9e74 r5:833375e0 [ 8829.901044][T24600] r4:859587f0 [ 8829.901061][T24600] [<807b4a8c>] (common_lsm_audit) from [<8078dc08>] (slow_avc_audit+0xbc/0x114) [ 8829.901127][T24600] r8:00000048 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 8829.901145][T24600] [<8078db4c>] (slow_avc_audit) from [<8078e68c>] (avc_has_perm+0xd8/0xe8) [ 8829.901198][T24600] r5:00000000 r4:00010000 [ 8829.901216][T24600] [<8078e5b4>] (avc_has_perm) from [<80794aa4>] (sock_has_perm+0xd0/0xfc) [ 8829.901283][T24600] r9:85958000 r8:85958000 r7:8581dd80 r6:00010000 r5:857b9400 r4:00000000 [ 8829.901688][T24600] [<807949d4>] (sock_has_perm) from [<8079516c>] (selinux_socket_setsockopt+0x24/0x40) [ 8829.901904][T24600] r8:00000008 r7:85191900 r6:0000000d r5:00000001 r4:85191900 [ 8829.901959][T24600] [<80795148>] (selinux_socket_setsockopt) from [<80787b50>] (security_socket_setsockopt+0x1d8/0x1e4) [ 8829.902193][T24600] r7:85191900 r6:0000000d r5:00000001 r4:85191900 [ 8829.902379][T24600] [<80787978>] (security_socket_setsockopt) from [<81542b0c>] (do_sock_setsockopt+0x34/0xc8) [ 8829.902463][T24600] r7:85191900 r6:0000000d r5:00000001 r4:00000001 [ 8829.902477][T24600] [<81542ad8>] (do_sock_setsockopt) from [<81546100>] (__sys_setsockopt+0x7c/0xc4) [ 8829.902565][T24600] r8:00000000 r7:84da6c00 r6:84da6c01 r5:0000000d r4:00000001 [ 8829.902679][T24600] [<81546084>] (__sys_setsockopt) from [<81546164>] (sys_setsockopt+0x1c/0x24) [ 8829.902960][T24600] r8:8020029c r7:00000126 r6:00130270 r5:00000000 r4:00000008 [ 8829.903288][T24600] [<81546148>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8829.903739][T24600] Exception stack(0xdfae9fa8 to 0xdfae9ff0) [ 8829.903854][T24600] 9fa0: 00000008 00000000 00000004 00000001 0000000d 20001d40 [ 8829.903883][T24600] 9fc0: 00000008 00000000 00130270 00000126 002e0000 00000000 00006364 76fad0bc [ 8829.903904][T24600] 9fe0: 76facec0 76faceb0 0001948c 001322c0 [ 8830.418973][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 8830.419255][ T31] audit: type=1400 audit(13286137.995:113929): avc: denied { read } for pid=24603 comm="syz.1.12211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8830.495248][ T31] audit: type=1400 audit(13286138.075:113930): avc: denied { create } for pid=24609 comm="syz.0.12212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8830.510850][ T31] audit: type=1400 audit(13286138.085:113931): avc: denied { setopt } for pid=24609 comm="syz.0.12212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8830.511194][ T31] audit: type=1400 audit(13286138.085:113932): avc: denied { read } for pid=24603 comm="syz.1.12211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8830.511515][ T31] audit: type=1400 audit(13286138.085:113933): avc: denied { connect } for pid=24609 comm="syz.0.12212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8830.533031][ T31] audit: type=1400 audit(13286138.115:113934): avc: denied { ioctl } for pid=24603 comm="syz.1.12211" path="/dev/vcsu" dev="devtmpfs" ino=14 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8830.538483][ T31] audit: type=1400 audit(13286138.115:113935): avc: denied { ioctl } for pid=24603 comm="syz.1.12211" path="socket:[144309]" dev="sockfs" ino=144309 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8830.548501][ T31] audit: type=1400 audit(13286138.125:113936): avc: denied { ioctl } for pid=24603 comm="syz.1.12211" path="socket:[144309]" dev="sockfs" ino=144309 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8830.555794][ T31] audit: type=1400 audit(13286138.135:113937): avc: denied { module_request } for pid=24603 comm="syz.1.12211" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8830.652561][ T31] audit: type=1400 audit(13286138.235:113938): avc: denied { sys_module } for pid=24603 comm="syz.1.12211" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8835.439802][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 8835.442311][ T31] audit: type=1400 audit(13286143.015:114093): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8835.444221][ T31] audit: type=1400 audit(13286143.025:114094): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8835.445882][ T31] audit: type=1400 audit(13286143.025:114095): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8835.507852][ T31] audit: type=1400 audit(13286143.085:114096): avc: denied { create } for pid=24662 comm="syz.1.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8835.538729][ T31] audit: type=1400 audit(13286143.115:114097): avc: denied { create } for pid=24662 comm="syz.1.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 8835.548169][ T31] audit: type=1400 audit(13286143.125:114098): avc: denied { accept } for pid=24662 comm="syz.1.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 8835.558106][ T31] audit: type=1400 audit(13286143.135:114099): avc: denied { setopt } for pid=24662 comm="syz.1.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8835.562808][ T31] audit: type=1400 audit(13286143.145:114100): avc: denied { connect } for pid=24662 comm="syz.1.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8835.778713][ T31] audit: type=1400 audit(13286143.355:114101): avc: denied { write } for pid=24647 comm="syz.0.12218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8836.069042][ T31] audit: type=1400 audit(13286143.645:114102): avc: denied { write } for pid=24662 comm="syz.1.12222" path="socket:[144522]" dev="sockfs" ino=144522 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8840.503106][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 8840.506673][ T31] audit: type=1400 audit(13286148.085:114177): avc: denied { read } for pid=24689 comm="syz.0.12232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.672402][ T31] audit: type=1400 audit(13286148.255:114178): avc: denied { create } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.679572][ T31] audit: type=1400 audit(13286148.255:114179): avc: denied { create } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.681916][ T31] audit: type=1400 audit(13286148.255:114180): avc: denied { write } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.684893][ T31] audit: type=1400 audit(13286148.265:114181): avc: denied { read } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.709031][ T31] audit: type=1400 audit(13286148.285:114182): avc: denied { write } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.726977][ T31] audit: type=1400 audit(13286148.305:114183): avc: denied { write } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.727456][ T31] audit: type=1400 audit(13286148.305:114184): avc: denied { module_request } for pid=24694 comm="syz.0.12233" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8840.872684][ T31] audit: type=1400 audit(13286148.455:114185): avc: denied { read } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8840.877424][ T31] audit: type=1400 audit(13286148.455:114186): avc: denied { write } for pid=24694 comm="syz.0.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8841.634807][T24703] FAULT_INJECTION: forcing a failure. [ 8841.634807][T24703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 8841.637363][T24703] CPU: 0 UID: 0 PID: 24703 Comm: syz.0.12234 Not tainted syzkaller #0 PREEMPT [ 8841.637500][T24703] Hardware name: ARM-Versatile Express [ 8841.637522][T24703] Call trace: [ 8841.637562][T24703] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8841.637659][T24703] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 8841.637682][T24703] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8841.637729][T24703] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8841.637779][T24703] r5:83c9ec00 r4:8294f190 [ 8841.637793][T24703] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8841.637844][T24703] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 8841.637901][T24703] r8:76fa8f30 r7:00000000 r6:00000000 r5:dfbb5f68 r4:00000002 [ 8841.637916][T24703] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 8841.637961][T24703] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 8841.638014][T24703] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 8841.638078][T24703] r10:00000001 r9:80608514 r8:00000002 r7:dfbb5f68 r6:0000000f r5:76fa8f30 [ 8841.638098][T24703] r4:83c9ec00 r3:dfbb5e9f [ 8841.638112][T24703] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 8841.638171][T24703] r8:76fa8f30 r7:dfbb5f68 r6:83c9ec00 r5:0000000f r4:84da6d80 [ 8841.638186][T24703] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 8841.638247][T24703] r10:00000003 r9:83c9ec00 r8:8020029c r7:00000000 r6:00000000 r5:84da6d80 [ 8841.638265][T24703] r4:84da6d83 [ 8841.638308][T24703] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 8841.638367][T24703] r7:00000003 r6:00000007 r5:76fa8f30 r4:0000000f [ 8841.638381][T24703] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8841.638424][T24703] Exception stack(0xdfbb5fa8 to 0xdfbb5ff0) [ 8841.638485][T24703] 5fa0: 0000000f 76fa8f30 00000007 76fa8f30 0000000f 00000000 [ 8841.638522][T24703] 5fc0: 0000000f 76fa8f30 00000007 00000003 002e0000 00000000 00006364 76fa90bc [ 8841.638547][T24703] 5fe0: 00000158 76fa8ed0 000d80f0 00130194 [ 8845.511070][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 8845.515609][ T31] audit: type=1400 audit(13286153.085:114218): avc: denied { create } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.526957][ T31] audit: type=1400 audit(13286153.105:114219): avc: denied { create } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.532841][ T31] audit: type=1400 audit(13286153.115:114220): avc: denied { write } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.538125][ T31] audit: type=1400 audit(13286153.115:114221): avc: denied { read } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.561565][ T31] audit: type=1400 audit(13286153.145:114222): avc: denied { write } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.598650][ T31] audit: type=1400 audit(13286153.175:114223): avc: denied { write } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.603290][ T31] audit: type=1400 audit(13286153.175:114224): avc: denied { module_request } for pid=24716 comm="syz.0.12238" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8845.738444][ T31] audit: type=1400 audit(13286153.315:114225): avc: denied { read } for pid=24716 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8845.744613][ T31] audit: type=1400 audit(13286153.325:114226): avc: denied { module_request } for pid=24716 comm="syz.0.12238" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8845.875645][ T31] audit: type=1400 audit(13286153.455:114227): avc: denied { sys_module } for pid=24716 comm="syz.0.12238" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8850.592009][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 8850.592412][ T31] audit: type=1400 audit(13286158.165:114280): avc: denied { create } for pid=24743 comm="syz.1.12244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8850.675444][ T31] audit: type=1400 audit(13286158.255:114281): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8850.681064][ T31] audit: type=1400 audit(13286158.255:114282): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8850.681530][ T31] audit: type=1400 audit(13286158.255:114283): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8850.747837][ T31] audit: type=1400 audit(13286158.325:114284): avc: denied { create } for pid=24745 comm="syz.1.12245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8850.769652][ T31] audit: type=1400 audit(13286158.345:114285): avc: denied { read } for pid=24745 comm="syz.1.12245" dev="nsfs" ino=4026532795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8850.773638][ T31] audit: type=1400 audit(13286158.355:114286): avc: denied { read open } for pid=24745 comm="syz.1.12245" path="ipc:[4026532795]" dev="nsfs" ino=4026532795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8850.798122][ T31] audit: type=1400 audit(13286158.375:114287): avc: denied { write } for pid=24745 comm="syz.1.12245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8850.806374][ T31] audit: type=1400 audit(13286158.385:114288): avc: denied { ioctl } for pid=24740 comm="syz.0.12243" path="socket:[144657]" dev="sockfs" ino=144657 ioctlcmd=0x6416 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8850.834060][ T31] audit: type=1400 audit(13286158.415:114289): avc: denied { setopt } for pid=24745 comm="syz.1.12245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8855.493550][T24772] FAULT_INJECTION: forcing a failure. [ 8855.493550][T24772] name failslab, interval 1, probability 0, space 0, times 0 [ 8855.493958][T24772] CPU: 1 UID: 0 PID: 24772 Comm: syz.0.12250 Not tainted syzkaller #0 PREEMPT [ 8855.494058][T24772] Hardware name: ARM-Versatile Express [ 8855.494090][T24772] Call trace: [ 8855.494134][T24772] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8855.494258][T24772] r7:00000c40 r6:00000000 r5:60000013 r4:82260500 [ 8855.494307][T24772] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8855.494494][T24772] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8855.494623][T24772] r5:85f86000 r4:82917c00 [ 8855.494693][T24772] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8855.494780][T24772] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8855.494888][T24772] r8:85f86000 r7:00000c40 r6:84da6268 r5:00001000 r4:830016c0 [ 8855.494978][T24772] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 8855.495294][T24772] [<80503b10>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 8855.495402][T24772] r10:85f86000 r9:8309f800 r8:00000000 r7:85084cc0 r6:84da6268 r5:00001000 [ 8855.495869][T24772] r4:00000000 [ 8855.496089][T24772] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 8855.496234][T24772] r10:85f86000 r9:00000000 r8:84da6240 r7:00001267 r6:00000004 r5:81cd6504 [ 8855.496448][T24772] r4:84da6268 r3:826c0200 [ 8855.496476][T24772] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 8855.496660][T24772] r9:00000004 r8:84da6240 r7:00000000 r6:00000000 r5:00001267 r4:84da6240 [ 8855.497104][T24772] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 8855.497307][T24772] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 8855.497633][T24772] r7:00000000 r6:84da6241 r5:00000000 r4:00001267 [ 8855.497738][T24772] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8855.497801][T24772] Exception stack(0xdfba5fa8 to 0xdfba5ff0) [ 8855.497982][T24772] 5fa0: 00000000 00000000 00000004 00001267 00000000 00000000 [ 8855.498291][T24772] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f460bc [ 8855.498472][T24772] 5fe0: 76f45ec0 76f45eb0 0001948c 001322c0 [ 8855.498774][T24772] r10:00000036 r9:85f86000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 8855.498849][T24772] r4:00000000 [ 8855.499345][T24772] ERROR: Out of memory at tomoyo_realpath_from_path. [ 8855.645895][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 8855.646431][ T31] audit: type=1400 audit(13286163.225:114365): avc: denied { prog_load } for pid=24773 comm="syz.1.12252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 8855.657553][ T31] audit: type=1400 audit(13286163.235:114366): avc: denied { bpf } for pid=24773 comm="syz.1.12252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 8855.694269][ T31] audit: type=1400 audit(13286163.275:114367): avc: denied { create } for pid=24773 comm="syz.1.12252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8855.698986][ T31] audit: type=1400 audit(13286163.275:114368): avc: denied { getopt } for pid=24773 comm="syz.1.12252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8855.713353][ T31] audit: type=1400 audit(13286163.295:114369): avc: denied { create } for pid=24773 comm="syz.1.12252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 8855.728370][ T31] audit: type=1400 audit(13286163.305:114370): avc: denied { write } for pid=24773 comm="syz.1.12252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 8855.787945][ T31] audit: type=1400 audit(13286163.365:114371): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8855.791902][ T31] audit: type=1400 audit(13286163.365:114372): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8855.792099][ T31] audit: type=1400 audit(13286163.365:114373): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8855.859422][ T31] audit: type=1400 audit(13286163.435:114374): avc: denied { create } for pid=24775 comm="syz.1.12253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8860.883241][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 8860.886521][ T31] audit: type=1400 audit(13286168.465:114418): avc: denied { ioctl } for pid=24800 comm="syz.1.12262" path="socket:[144741]" dev="sockfs" ino=144741 ioctlcmd=0xab00 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8861.141573][ T31] audit: type=1400 audit(13286168.725:114419): avc: denied { write } for pid=24793 comm="syz.0.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8861.157576][ T31] audit: type=1400 audit(13286168.735:114420): avc: denied { write } for pid=24793 comm="syz.0.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8861.162004][ T31] audit: type=1400 audit(13286168.735:114421): avc: denied { write } for pid=24793 comm="syz.0.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8861.378897][ T31] audit: type=1400 audit(13286168.955:114422): avc: denied { create } for pid=24811 comm="syz.0.12264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 8861.397171][ T31] audit: type=1400 audit(13286168.975:114424): avc: denied { create } for pid=24811 comm="syz.0.12264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 8861.401454][ T31] audit: type=1400 audit(13286168.975:114423): avc: denied { write } for pid=24800 comm="syz.1.12262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8861.401860][ T31] audit: type=1400 audit(13286168.975:114425): avc: denied { setopt } for pid=24811 comm="syz.0.12264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 8861.412127][ T31] audit: type=1400 audit(13286168.985:114426): avc: denied { create } for pid=24811 comm="syz.0.12264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8861.424020][ T31] audit: type=1400 audit(13286169.005:114427): avc: denied { setopt } for pid=24811 comm="syz.0.12264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8865.947896][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 8865.949608][ T31] audit: type=1400 audit(13286173.525:114503): avc: denied { ioctl } for pid=24833 comm="syz.0.12272" path="socket:[145629]" dev="sockfs" ino=145629 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8866.183019][ T31] audit: type=1400 audit(13286173.765:114504): avc: denied { write } for pid=24840 comm="syz.1.12273" name="amidi2" dev="devtmpfs" ino=743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8866.187136][ T31] audit: type=1400 audit(13286173.765:114505): avc: denied { open } for pid=24840 comm="syz.1.12273" path="/dev/amidi2" dev="devtmpfs" ino=743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8866.195682][ T31] audit: type=1400 audit(13286173.775:114506): avc: denied { ioctl } for pid=24840 comm="syz.1.12273" path="/dev/amidi2" dev="devtmpfs" ino=743 ioctlcmd=0x5720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8866.216627][ T31] audit: type=1400 audit(13286173.795:114507): avc: denied { write } for pid=24840 comm="syz.1.12273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8866.456428][ T31] audit: type=1400 audit(13286174.035:114508): avc: denied { ioctl } for pid=24833 comm="syz.0.12272" path="socket:[145629]" dev="sockfs" ino=145629 ioctlcmd=0x6607 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8867.825918][ T31] audit: type=1400 audit(13286175.405:114509): avc: denied { read } for pid=24847 comm="syz.0.12275" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8867.829270][ T31] audit: type=1400 audit(13286175.405:114510): avc: denied { open } for pid=24847 comm="syz.0.12275" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8867.843131][ T31] audit: type=1400 audit(13286175.425:114511): avc: denied { ioctl } for pid=24847 comm="syz.0.12275" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x6432 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8867.848103][ T31] audit: type=1400 audit(13286175.425:114512): avc: denied { create } for pid=24847 comm="syz.0.12275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8868.545992][T24857] tmpfs: Unknown parameter '' [ 8870.789002][T24879] FAULT_INJECTION: forcing a failure. [ 8870.789002][T24879] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 8870.793540][T24879] CPU: 0 UID: 0 PID: 24879 Comm: syz.1.12287 Not tainted syzkaller #0 PREEMPT [ 8870.793718][T24879] Hardware name: ARM-Versatile Express [ 8870.793754][T24879] Call trace: [ 8870.793806][T24879] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8870.793926][T24879] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 8870.793950][T24879] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8870.794010][T24879] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8870.794076][T24879] r5:8595bc00 r4:8294f190 [ 8870.794096][T24879] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8870.794161][T24879] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 8870.794352][T24879] r8:76facf30 r7:00000000 r6:00000000 r5:dfd11f68 r4:00000002 [ 8870.794376][T24879] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 8870.794471][T24879] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 8870.794553][T24879] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 8870.794632][T24879] r10:00000001 r9:80608514 r8:00000002 r7:dfd11f68 r6:0000000f r5:76facf30 [ 8870.794704][T24879] r4:8595bc00 r3:dfd11e9f [ 8870.794728][T24879] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 8870.794809][T24879] r8:76facf30 r7:dfd11f68 r6:8595bc00 r5:0000000f r4:84da6180 [ 8870.794831][T24879] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 8870.794906][T24879] r10:00000003 r9:8595bc00 r8:8020029c r7:00000000 r6:00000000 r5:84da6180 [ 8870.794931][T24879] r4:84da6183 [ 8870.794950][T24879] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 8870.795018][T24879] r7:00000003 r6:00000004 r5:76facf30 r4:0000000f [ 8870.795037][T24879] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8870.795091][T24879] Exception stack(0xdfd11fa8 to 0xdfd11ff0) [ 8870.795133][T24879] 1fa0: 0000000f 76facf30 00000004 76facf30 0000000f 00000000 [ 8870.795177][T24879] 1fc0: 0000000f 76facf30 00000004 00000003 002e0000 00000000 00006364 76fad0bc [ 8870.795209][T24879] 1fe0: 00000158 76faced0 000d80f0 00130194 [ 8871.437885][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 8871.451378][ T31] audit: type=1400 audit(13286179.015:114598): avc: denied { ioctl } for pid=24880 comm="syz.1.12288" path="socket:[144852]" dev="sockfs" ino=144852 ioctlcmd=0xf506 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8871.472877][ T31] audit: type=1400 audit(13286179.055:114599): avc: denied { read } for pid=24880 comm="syz.1.12288" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8871.473971][ T31] audit: type=1400 audit(13286179.055:114600): avc: denied { open } for pid=24880 comm="syz.1.12288" path="net:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8871.477150][ T31] audit: type=1400 audit(13286179.055:114601): avc: denied { create } for pid=24880 comm="syz.1.12288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8871.485273][ T31] audit: type=1400 audit(13286179.065:114602): avc: denied { write } for pid=24880 comm="syz.1.12288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8871.976539][ T31] audit: type=1400 audit(13286179.555:114603): avc: denied { read append } for pid=24882 comm="syz.0.12289" name="sequencer" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8871.979433][ T31] audit: type=1400 audit(13286179.555:114604): avc: denied { open } for pid=24882 comm="syz.0.12289" path="/dev/sequencer" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8871.996086][ T31] audit: type=1400 audit(13286179.575:114605): avc: denied { ioctl } for pid=24882 comm="syz.0.12289" path="/dev/sequencer" dev="devtmpfs" ino=722 ioctlcmd=0x2103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8872.008872][ T31] audit: type=1400 audit(13286179.585:114606): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8872.016234][ T31] audit: type=1400 audit(13286179.595:114607): avc: denied { read write open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8872.122445][T18245] hid (null): unknown global tag 0xd [ 8872.124964][T18245] hid (null): global environment stack underflow [ 8872.125161][T18245] hid (null): unknown global tag 0xd [ 8872.125289][T18245] hid (null): invalid report_count 21688 [ 8872.129607][T18245] hid-generic 0000:000E:10001.0002: unknown global tag 0xd [ 8872.129861][T18245] hid-generic 0000:000E:10001.0002: item 0 0 1 13 parsing failed [ 8872.130826][T18245] hid-generic 0000:000E:10001.0002: probe with driver hid-generic failed with error -22 [ 8876.507578][T24925] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24925 comm=syz.0.12302 [ 8876.582232][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 8876.582573][ T31] audit: type=1400 audit(13286184.165:114679): avc: denied { read write } for pid=24926 comm="syz.0.12303" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8876.582820][ T31] audit: type=1400 audit(13286184.165:114680): avc: denied { read write open } for pid=24926 comm="syz.0.12303" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8876.584075][ T31] audit: type=1400 audit(13286184.165:114681): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8876.586396][ T31] audit: type=1400 audit(13286184.165:114682): avc: denied { read write open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8876.591564][ T31] audit: type=1400 audit(13286184.165:114683): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8876.624234][ T31] audit: type=1400 audit(13286184.205:114684): avc: denied { associate } for pid=24926 comm="syz.0.12303" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 8876.628261][ T31] audit: type=1400 audit(13286184.205:114685): avc: denied { setattr } for pid=24926 comm="syz.0.12303" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8876.646970][ T31] audit: type=1400 audit(13286184.225:114686): avc: denied { create } for pid=24926 comm="syz.0.12303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8876.647859][ T31] audit: type=1400 audit(13286184.225:114687): avc: denied { write } for pid=24926 comm="syz.0.12303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8876.648122][ T31] audit: type=1400 audit(13286184.225:114688): avc: denied { module_request } for pid=24926 comm="syz.0.12303" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8882.781042][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 8882.781603][ T31] audit: type=1400 audit(13286190.355:114725): avc: denied { create } for pid=24950 comm="syz.0.12312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8882.789344][ T31] audit: type=1400 audit(13286190.365:114726): avc: denied { create } for pid=24950 comm="syz.0.12312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 8882.805295][ T31] audit: type=1400 audit(13286190.385:114727): avc: denied { read } for pid=24950 comm="syz.0.12312" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8882.805804][ T31] audit: type=1400 audit(13286190.385:114728): avc: denied { open } for pid=24950 comm="syz.0.12312" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8882.812554][ T31] audit: type=1400 audit(13286190.395:114729): avc: denied { ioctl } for pid=24950 comm="syz.0.12312" path="/dev/loop-control" dev="devtmpfs" ino=632 ioctlcmd=0x640e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8882.828733][ T31] audit: type=1400 audit(13286190.405:114730): avc: denied { read append } for pid=24950 comm="syz.0.12312" name="dsp1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:auditd_exec_t:s0" [ 8882.831774][ T31] audit: type=1400 audit(13286190.405:114731): avc: denied { open } for pid=24950 comm="syz.0.12312" path="/dev/dsp1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:auditd_exec_t:s0" [ 8882.833315][ T31] audit: type=1400 audit(13286190.405:114732): avc: denied { ioctl } for pid=24950 comm="syz.0.12312" path="/dev/dsp1" dev="devtmpfs" ino=732 ioctlcmd=0x4d0f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:auditd_exec_t:s0" [ 8882.835245][ T31] audit: type=1400 audit(13286190.405:114733): avc: denied { create } for pid=24950 comm="syz.0.12312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8882.836416][ T31] audit: type=1400 audit(13286190.405:114734): avc: denied { write } for pid=24950 comm="syz.0.12312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8886.349030][T24969] FAULT_INJECTION: forcing a failure. [ 8886.349030][T24969] name failslab, interval 1, probability 0, space 0, times 0 [ 8886.350580][T24969] CPU: 0 UID: 0 PID: 24969 Comm: syz.0.12317 Not tainted syzkaller #0 PREEMPT [ 8886.350669][T24969] Hardware name: ARM-Versatile Express [ 8886.350687][T24969] Call trace: [ 8886.350713][T24969] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8886.350785][T24969] r7:00000c40 r6:00000000 r5:60000013 r4:82260500 [ 8886.350796][T24969] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8886.350827][T24969] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8886.350860][T24969] r5:85958000 r4:82917c00 [ 8886.350869][T24969] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8886.350902][T24969] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8886.350951][T24969] r8:85958000 r7:00000c40 r6:84da6628 r5:00001000 r4:830016c0 [ 8886.350961][T24969] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 8886.350990][T24969] [<80503b10>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 8886.351030][T24969] r10:85958000 r9:8309f800 r8:00000000 r7:85089b28 r6:84da6628 r5:00001000 [ 8886.351041][T24969] r4:00000000 [ 8886.351050][T24969] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 8886.351087][T24969] r10:85958000 r9:00000000 r8:84da6600 r7:00005421 r6:00000004 r5:81cd6504 [ 8886.351100][T24969] r4:84da6628 r3:826c0200 [ 8886.351109][T24969] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 8886.351147][T24969] r9:00000004 r8:84da6600 r7:20002340 r6:20002340 r5:00005421 r4:84da6600 [ 8886.351157][T24969] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 8886.351186][T24969] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 8886.351221][T24969] r7:20002340 r6:84da6601 r5:00000000 r4:00005421 [ 8886.351230][T24969] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8886.351257][T24969] Exception stack(0xdfd65fa8 to 0xdfd65ff0) [ 8886.351279][T24969] 5fa0: 00000000 00000000 00000004 00005421 20002340 00000000 [ 8886.351303][T24969] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fa90bc [ 8886.351318][T24969] 5fe0: 76fa8ec0 76fa8eb0 0001948c 001322c0 [ 8886.351340][T24969] r10:00000036 r9:85958000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 8886.351351][T24969] r4:00000000 [ 8886.368039][T24969] ERROR: Out of memory at tomoyo_realpath_from_path. [ 8887.897880][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 8887.898239][ T31] audit: type=1400 audit(13286195.475:114809): avc: denied { create } for pid=24985 comm="syz.0.12320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8887.921739][ T31] audit: type=1400 audit(13286195.505:114810): avc: denied { setopt } for pid=24985 comm="syz.0.12320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8887.925899][ T31] audit: type=1400 audit(13286195.505:114811): avc: denied { connect } for pid=24985 comm="syz.0.12320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8888.437200][ T31] audit: type=1400 audit(13286196.015:114812): avc: denied { ioctl } for pid=24985 comm="syz.0.12320" path="socket:[145028]" dev="sockfs" ino=145028 ioctlcmd=0x3b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8888.611955][ T31] audit: type=1400 audit(13286196.195:114813): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8888.612344][ T31] audit: type=1400 audit(13286196.195:114814): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8888.623856][ T31] audit: type=1400 audit(13286196.195:114815): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8888.748476][ T31] audit: type=1400 audit(13286196.325:114816): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8888.755390][ T31] audit: type=1400 audit(13286196.325:114817): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8888.759806][ T31] audit: type=1400 audit(13286196.325:114818): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8892.460964][T25015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=617 sclass=netlink_route_socket pid=25015 comm=syz.1.12325 [ 8892.983220][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 8892.983636][ T31] audit: type=1400 audit(13286200.565:114868): avc: denied { read } for pid=25004 comm="syz.1.12325" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8892.983960][ T31] audit: type=1400 audit(13286200.565:114869): avc: denied { read open } for pid=25004 comm="syz.1.12325" path="net:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8892.997875][ T31] audit: type=1400 audit(13286200.575:114870): avc: denied { create } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8893.005304][ T31] audit: type=1400 audit(13286200.585:114871): avc: denied { write } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8893.014932][ T31] audit: type=1400 audit(13286200.595:114872): avc: denied { create } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8893.018663][ T31] audit: type=1400 audit(13286200.595:114873): avc: denied { write } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8893.024047][ T31] audit: type=1400 audit(13286200.605:114874): avc: denied { read } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8893.033743][ T31] audit: type=1400 audit(13286200.615:114875): avc: denied { write } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8893.039028][ T31] audit: type=1400 audit(13286200.615:114876): avc: denied { write } for pid=25004 comm="syz.1.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8893.623158][ T31] audit: type=1400 audit(13286201.205:114877): avc: denied { read } for pid=25017 comm="syz.0.12329" name="nbd0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8898.128208][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 8898.129331][ T31] audit: type=1400 audit(13286205.705:114936): avc: denied { create } for pid=25043 comm="syz.1.12337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8898.194028][ T31] audit: type=1400 audit(13286205.775:114937): avc: denied { create } for pid=25043 comm="syz.1.12337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8898.254236][ T31] audit: type=1400 audit(13286205.835:114938): avc: denied { ioctl } for pid=25043 comm="syz.1.12337" path="socket:[145120]" dev="sockfs" ino=145120 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8898.313869][ T31] audit: type=1400 audit(13286205.895:114939): avc: denied { ioctl } for pid=25038 comm="syz.0.12335" path="socket:[145097]" dev="sockfs" ino=145097 ioctlcmd=0x128a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8898.524473][ T31] audit: type=1400 audit(13286206.105:114940): avc: denied { bind } for pid=25043 comm="syz.1.12337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8898.799625][ T31] audit: type=1400 audit(13286206.375:114941): avc: denied { write } for pid=25043 comm="syz.1.12337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8898.831854][ T31] audit: type=1400 audit(13286206.405:114942): avc: denied { setopt } for pid=25038 comm="syz.0.12335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8898.856907][ T31] audit: type=1400 audit(13286206.425:114943): avc: denied { create } for pid=25043 comm="syz.1.12337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8898.888323][ T31] audit: type=1400 audit(13286206.465:114944): avc: denied { ioctl } for pid=25043 comm="syz.1.12337" path="socket:[145121]" dev="sockfs" ino=145121 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8899.082564][ T31] audit: type=1400 audit(13286206.665:114945): avc: denied { bind } for pid=25043 comm="syz.1.12337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8903.134577][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 8903.135423][ T31] audit: type=1400 audit(13286210.715:114992): avc: denied { ioctl } for pid=25065 comm="syz.1.12342" path="socket:[145156]" dev="sockfs" ino=145156 ioctlcmd=0x64ad scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8903.154600][ T31] audit: type=1400 audit(13286210.735:114993): avc: denied { create } for pid=25068 comm="syz.0.12343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8903.163993][ T31] audit: type=1400 audit(13286210.745:114994): avc: denied { ioctl } for pid=25068 comm="syz.0.12343" path="socket:[145939]" dev="sockfs" ino=145939 ioctlcmd=0x7201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8903.170815][ T31] audit: type=1400 audit(13286210.745:114995): avc: denied { setopt } for pid=25068 comm="syz.0.12343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8903.174194][ T31] audit: type=1400 audit(13286210.755:114996): avc: denied { connect } for pid=25068 comm="syz.0.12343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8903.695192][ T31] audit: type=1400 audit(13286211.275:114997): avc: denied { write } for pid=25068 comm="syz.0.12343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8904.195501][ T31] audit: type=1400 audit(13286211.775:114998): avc: denied { ioctl } for pid=25068 comm="syz.0.12343" path="socket:[145939]" dev="sockfs" ino=145939 ioctlcmd=0x128a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8904.709170][ T31] audit: type=1400 audit(13286212.285:114999): avc: denied { write } for pid=25068 comm="syz.0.12343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8905.070859][ T31] audit: type=1400 audit(13286212.645:115000): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8905.071589][ T31] audit: type=1400 audit(13286212.645:115001): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8908.190637][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 8908.190970][ T31] audit: type=1400 audit(13286215.755:115028): avc: denied { read } for pid=25084 comm="syz.1.12346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8908.205445][ T31] audit: type=1400 audit(13286215.785:115029): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8908.207621][ T31] audit: type=1400 audit(13286215.785:115030): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8908.227241][ T31] audit: type=1400 audit(13286215.805:115031): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8908.329136][ T31] audit: type=1400 audit(13286215.905:115032): avc: denied { read } for pid=25087 comm="syz.1.12347" name="ubi_ctrl" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8908.329528][ T31] audit: type=1400 audit(13286215.905:115033): avc: denied { open } for pid=25087 comm="syz.1.12347" path="/dev/ubi_ctrl" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8908.344087][ T31] audit: type=1400 audit(13286215.925:115034): avc: denied { ioctl } for pid=25087 comm="syz.1.12347" path="/dev/ubi_ctrl" dev="devtmpfs" ino=674 ioctlcmd=0x64c1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8908.354526][ T31] audit: type=1400 audit(13286215.935:115035): avc: denied { ioctl } for pid=25087 comm="syz.1.12347" path="/dev/ubi_ctrl" dev="devtmpfs" ino=674 ioctlcmd=0x9403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8908.425308][ T31] audit: type=1400 audit(13286216.005:115036): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8908.425925][ T31] audit: type=1400 audit(13286216.005:115037): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8913.532934][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 8913.533449][ T31] audit: type=1400 audit(13286221.105:115117): avc: denied { setopt } for pid=25117 comm="syz.0.12358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8914.044302][ T31] audit: type=1400 audit(13286221.625:115118): avc: denied { ioctl } for pid=25117 comm="syz.0.12358" path="socket:[146019]" dev="sockfs" ino=146019 ioctlcmd=0x54a5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8914.157523][ T31] audit: type=1400 audit(13286221.735:115119): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8914.161878][ T31] audit: type=1400 audit(13286221.735:115120): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8914.164847][ T31] audit: type=1400 audit(13286221.745:115121): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8914.257731][ T31] audit: type=1400 audit(13286221.835:115122): avc: denied { create } for pid=25123 comm="syz.1.12359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8914.267743][ T31] audit: type=1400 audit(13286221.845:115123): avc: denied { setopt } for pid=25123 comm="syz.1.12359" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8914.268316][ T31] audit: type=1400 audit(13286221.845:115124): avc: denied { create } for pid=25123 comm="syz.1.12359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8914.268595][ T31] audit: type=1400 audit(13286221.845:115125): avc: denied { write } for pid=25123 comm="syz.1.12359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8914.268846][ T31] audit: type=1400 audit(13286221.845:115126): avc: denied { read } for pid=25123 comm="syz.1.12359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8914.891963][T19613] usb 2-1: new low-speed USB device number 86 using dummy_hcd [ 8915.080976][T19613] usb 2-1: Invalid ep0 maxpacket: 64 [ 8915.211742][T19613] usb 2-1: new low-speed USB device number 87 using dummy_hcd [ 8915.461630][T19613] usb 2-1: Invalid ep0 maxpacket: 64 [ 8915.463718][T19613] usb usb2-port1: attempt power cycle [ 8915.830915][T19613] usb 2-1: new low-speed USB device number 88 using dummy_hcd [ 8915.863809][T19613] usb 2-1: Invalid ep0 maxpacket: 64 [ 8915.990835][T19613] usb 2-1: new low-speed USB device number 89 using dummy_hcd [ 8916.019232][T19613] usb 2-1: Invalid ep0 maxpacket: 64 [ 8916.021024][T19613] usb usb2-port1: unable to enumerate USB device [ 8917.358675][T25135] SELinux: Context system_u:object_r:systemd_unit_file_t:s0 is not valid (left unmapped). [ 8920.585989][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 8920.586345][ T31] audit: type=1400 audit(13286228.165:115169): avc: denied { create } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8920.596866][ T31] audit: type=1400 audit(13286228.175:115170): avc: denied { setopt } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8920.606718][ T31] audit: type=1400 audit(13286228.185:115171): avc: denied { connect } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8921.117398][ T31] audit: type=1400 audit(13286228.695:115172): avc: denied { create } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8921.123078][ T31] audit: type=1400 audit(13286228.695:115173): avc: denied { ioctl } for pid=25140 comm="syz.0.12363" path="socket:[146040]" dev="sockfs" ino=146040 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8921.126923][ T31] audit: type=1400 audit(13286228.705:115174): avc: denied { write } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8921.130591][ T31] audit: type=1400 audit(13286228.705:115175): avc: denied { bind } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8921.137074][ T31] audit: type=1400 audit(13286228.715:115176): avc: denied { write } for pid=25140 comm="syz.0.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8921.656667][ T31] audit: type=1400 audit(13286229.225:115177): avc: denied { ioctl } for pid=25140 comm="syz.0.12363" path="socket:[146037]" dev="sockfs" ino=146037 ioctlcmd=0x4802 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8922.269507][ T31] audit: type=1400 audit(13286229.845:115178): avc: denied { read } for pid=25143 comm="syz.0.12364" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8924.882707][T25158] FAULT_INJECTION: forcing a failure. [ 8924.882707][T25158] name failslab, interval 1, probability 0, space 0, times 0 [ 8924.884417][T25158] CPU: 1 UID: 0 PID: 25158 Comm: syz.1.12367 Not tainted syzkaller #0 PREEMPT [ 8924.884502][T25158] Hardware name: ARM-Versatile Express [ 8924.884517][T25158] Call trace: [ 8924.884551][T25158] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8924.884622][T25158] r7:8561bc00 r6:00000000 r5:60000013 r4:82260500 [ 8924.884632][T25158] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8924.884661][T25158] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8924.884689][T25158] r5:8561bc00 r4:82917c00 [ 8924.884696][T25158] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8924.884728][T25158] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8924.884764][T25158] r8:00000000 r7:8561bc00 r6:00000cc0 r5:8309f000 r4:830a7a80 [ 8924.884773][T25158] [<8051f1ac>] (should_failslab) from [<805034f4>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 8924.884804][T25158] [<805034a4>] (kmem_cache_alloc_lru_noprof) from [<80749268>] (debugfs_alloc_inode+0x24/0x28) [ 8924.884843][T25158] r10:00000000 r9:81d0cd1c r8:8561bc00 r7:81ccf048 r6:81ccea34 r5:8309f000 [ 8924.884853][T25158] r4:850774c8 [ 8924.884861][T25158] [<80749244>] (debugfs_alloc_inode) from [<80579d28>] (alloc_inode+0x24/0xcc) [ 8924.884890][T25158] [<80579d04>] (alloc_inode) from [<80579de0>] (new_inode+0x10/0x68) [ 8924.884919][T25158] r7:81ccf048 r6:82ad2c04 r5:00008100 r4:850774c8 [ 8924.884926][T25158] [<80579dd0>] (new_inode) from [<8074a068>] (__debugfs_create_file+0xb0/0x208) [ 8924.884960][T25158] r9:81d0cd1c r8:8561bc00 r7:81ccf048 r6:82ad2c04 r5:00008100 r4:850774c8 [ 8924.884969][T25158] [<80749fb8>] (__debugfs_create_file) from [<8074a1f0>] (debugfs_create_file_full+0x30/0x38) [ 8924.885005][T25158] r10:8561bc00 r9:00000001 r8:00000001 r7:81914360 r6:00000001 r5:00000001 [ 8924.885014][T25158] r4:8580cb4c [ 8924.885022][T25158] [<8074a1c0>] (debugfs_create_file_full) from [<8097aa3c>] (ref_tracker_dir_debugfs+0xe4/0x188) [ 8924.885049][T25158] [<8097a958>] (ref_tracker_dir_debugfs) from [<81572d80>] (alloc_netdev_mqs+0xc0/0x498) [ 8924.885081][T25158] r5:00000001 r4:8580c800 [ 8924.885089][T25158] [<81572cc0>] (alloc_netdev_mqs) from [<819128e0>] (vlan_ioctl_handler+0x3a8/0x4a0) [ 8924.885125][T25158] r10:8561bc00 r9:00000001 r8:8567b000 r7:84dbc9c0 r6:00000002 r5:00000002 [ 8924.885135][T25158] r4:00000000 [ 8924.885143][T25158] [<81912538>] (vlan_ioctl_handler) from [<81544bdc>] (sock_ioctl+0x1f8/0x600) [ 8924.885179][T25158] r9:00000004 r8:8480f0c0 r7:83664280 r6:84dbc9c0 r5:20000040 r4:82c1e618 [ 8924.885187][T25158] [<815449e4>] (sock_ioctl) from [<8056cd80>] (sys_ioctl+0x130/0xba0) [ 8924.885222][T25158] r9:00000004 r8:8480f0c0 r7:20000040 r6:8480f0c1 r5:00000000 r4:00008983 [ 8924.885231][T25158] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8924.885256][T25158] Exception stack(0xdfe95fa8 to 0xdfe95ff0) [ 8924.885276][T25158] 5fa0: 00000000 00000000 00000004 00008983 20000040 00000000 [ 8924.885295][T25158] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fad0bc [ 8924.885309][T25158] 5fe0: 76facec0 76faceb0 0001948c 001322c0 [ 8924.885327][T25158] r10:00000036 r9:8561bc00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 8924.885337][T25158] r4:00000000 [ 8924.908473][T25158] debugfs: out of free dentries, can not create file 'netdev@8580cb4c' [ 8925.705637][T25165] FAULT_INJECTION: forcing a failure. [ 8925.705637][T25165] name failslab, interval 1, probability 0, space 0, times 0 [ 8925.706098][T25165] CPU: 0 UID: 0 PID: 25165 Comm: syz.0.12369 Not tainted syzkaller #0 PREEMPT [ 8925.706196][T25165] Hardware name: ARM-Versatile Express [ 8925.706222][T25165] Call trace: [ 8925.706311][T25165] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8925.706847][T25165] r7:85618000 r6:00000000 r5:60000013 r4:82260500 [ 8925.707126][T25165] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8925.707308][T25165] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8925.707420][T25165] r5:85618000 r4:82917c00 [ 8925.707491][T25165] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8925.707898][T25165] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8925.708063][T25165] r8:00000000 r7:85618000 r6:00000cc0 r5:8309d800 r4:830a2c00 [ 8925.708467][T25165] [<8051f1ac>] (should_failslab) from [<805034f4>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 8925.708828][T25165] [<805034a4>] (kmem_cache_alloc_lru_noprof) from [<80579d6c>] (alloc_inode+0x68/0xcc) [ 8925.709495][T25165] r10:8309d800 r9:81c210c0 r8:00000000 r7:84dbaca0 r6:81c21008 r5:8309d800 [ 8925.709585][T25165] r4:830b1250 [ 8925.709608][T25165] [<80579d04>] (alloc_inode) from [<8059069c>] (path_from_stashed+0xc0/0x204) [ 8925.710028][T25165] r7:84dbaca0 r6:84dbaca0 r5:dff15e84 r4:830b1250 [ 8925.710107][T25165] [<805905dc>] (path_from_stashed) from [<805a3008>] (open_namespace+0x44/0xbc) [ 8925.710372][T25165] r10:85618000 r9:00000004 r8:84da6840 r7:85191900 r6:85618000 r5:00000000 [ 8925.710534][T25165] r4:0000894c [ 8925.710558][T25165] [<805a2fc4>] (open_namespace) from [<805a309c>] (open_related_ns+0x1c/0x20) [ 8925.710617][T25165] r6:84dbac40 r5:00000000 r4:0000894c [ 8925.710639][T25165] [<805a3080>] (open_related_ns) from [<81544d60>] (sock_ioctl+0x37c/0x600) [ 8925.710704][T25165] [<815449e4>] (sock_ioctl) from [<8056cd80>] (sys_ioctl+0x130/0xba0) [ 8925.710832][T25165] r9:00000004 r8:84da6840 r7:00000000 r6:84da6841 r5:00000000 r4:0000894c [ 8925.710857][T25165] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8925.710911][T25165] Exception stack(0xdff15fa8 to 0xdff15ff0) [ 8925.710955][T25165] 5fa0: 00000000 00000000 00000004 0000894c 00000000 00000000 [ 8925.710992][T25165] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fa90bc [ 8925.711021][T25165] 5fe0: 76fa8ec0 76fa8eb0 0001948c 001322c0 [ 8925.711062][T25165] r10:00000036 r9:85618000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 8925.711084][T25165] r4:00000000 [ 8925.977896][T25170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=25170 comm=syz.0.12371 [ 8926.024331][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 8926.025999][ T31] audit: type=1400 audit(13286233.605:115217): avc: denied { read open } for pid=25169 comm="syz.0.12371" path="net:[4026532635]" dev="nsfs" ino=4026532635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 8926.084384][ T31] audit: type=1400 audit(13286233.665:115218): avc: denied { ioctl } for pid=25161 comm="syz.1.12368" path="socket:[145269]" dev="sockfs" ino=145269 ioctlcmd=0x8934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8926.289696][ T31] audit: type=1400 audit(13286233.865:115219): avc: denied { create } for pid=25174 comm="syz.0.12373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8926.306375][ T31] audit: type=1400 audit(13286233.885:115220): avc: denied { getopt } for pid=25174 comm="syz.0.12373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8926.309780][ T31] audit: type=1400 audit(13286233.885:115221): avc: denied { write } for pid=25174 comm="syz.0.12373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8926.328553][ T31] audit: type=1400 audit(13286233.905:115222): avc: denied { write } for pid=25174 comm="syz.0.12373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8926.579491][ T31] audit: type=1400 audit(13286234.155:115223): avc: denied { ioctl } for pid=25161 comm="syz.1.12368" path="socket:[145269]" dev="sockfs" ino=145269 ioctlcmd=0x4b3a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8926.847179][ T31] audit: type=1400 audit(13286234.425:115224): avc: denied { write } for pid=25174 comm="syz.0.12373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8927.094446][ T31] audit: type=1400 audit(13286234.675:115225): avc: denied { ioctl } for pid=25161 comm="syz.1.12368" path="socket:[145269]" dev="sockfs" ino=145269 ioctlcmd=0x4b6c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8927.357458][ T31] audit: type=1400 audit(13286234.935:115226): avc: denied { read } for pid=25174 comm="syz.0.12373" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8931.404238][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 8931.408456][ T31] audit: type=1400 audit(13286238.985:115256): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8931.415693][ T31] audit: type=1400 audit(13286238.995:115257): avc: denied { read write open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8931.433205][ T31] audit: type=1400 audit(13286239.015:115258): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8932.548576][ T31] audit: type=1400 audit(13286240.125:115259): avc: denied { read } for pid=25194 comm="syz.1.12377" name="usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8932.552398][ T31] audit: type=1400 audit(13286240.125:115260): avc: denied { open } for pid=25194 comm="syz.1.12377" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8932.604596][ T31] audit: type=1400 audit(13286240.185:115261): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8932.606691][ T31] audit: type=1400 audit(13286240.185:115262): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8932.620734][ T31] audit: type=1400 audit(13286240.185:115263): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8932.766067][ T31] audit: type=1400 audit(13286240.345:115264): avc: denied { create } for pid=25198 comm="syz.1.12378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8932.790750][ T31] audit: type=1400 audit(13286240.355:115265): avc: denied { setopt } for pid=25198 comm="syz.1.12378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8936.161083][T25211] FAULT_INJECTION: forcing a failure. [ 8936.161083][T25211] name failslab, interval 1, probability 0, space 0, times 0 [ 8936.162986][T25211] CPU: 1 UID: 0 PID: 25211 Comm: syz.0.12381 Not tainted syzkaller #0 PREEMPT [ 8936.163121][T25211] Hardware name: ARM-Versatile Express [ 8936.163149][T25211] Call trace: [ 8936.163174][T25211] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 8936.163245][T25211] r7:00000c40 r6:00000000 r5:60000013 r4:82260500 [ 8936.163256][T25211] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 8936.163284][T25211] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 8936.163337][T25211] r5:8320e000 r4:82917c00 [ 8936.163365][T25211] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 8936.163461][T25211] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 8936.163550][T25211] r8:8320e000 r7:00000c40 r6:8480f328 r5:00001000 r4:830016c0 [ 8936.163566][T25211] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 8936.163593][T25211] [<80503b10>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 8936.163628][T25211] r10:8480f300 r9:85b8b800 r8:00000000 r7:85028660 r6:8480f328 r5:00001000 [ 8936.163638][T25211] r4:00000000 [ 8936.163646][T25211] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf9c8>] (tomoyo_check_open_permission+0x150/0x1c0) [ 8936.163679][T25211] r10:8480f300 r9:00000002 r8:8481e480 r7:0011b441 r6:00000000 r5:8480f328 [ 8936.163690][T25211] r4:00000001 r3:00000001 [ 8936.163698][T25211] [<807bf878>] (tomoyo_check_open_permission) from [<807c447c>] (tomoyo_file_open+0x34/0x38) [ 8936.163730][T25211] r9:00000000 r8:8480f328 r7:00000000 r6:85019900 r5:81cce1f4 r4:8480f300 [ 8936.163739][T25211] [<807c4448>] (tomoyo_file_open) from [<80780948>] (security_file_open+0x54/0x194) [ 8936.163771][T25211] r5:81cce1f4 r4:8480f300 [ 8936.163789][T25211] [<807808f4>] (security_file_open) from [<8054dec0>] (do_dentry_open+0xe4/0x4d0) [ 8936.163823][T25211] r5:81cce1f4 r4:8480f300 [ 8936.163831][T25211] [<8054dddc>] (do_dentry_open) from [<8054fe04>] (vfs_open+0x2c/0xe8) [ 8936.163862][T25211] r9:00000000 r8:dff45e58 r7:00000000 r6:8480f328 r5:8291edac r4:8480f300 [ 8936.163872][T25211] [<8054fdd8>] (vfs_open) from [<805688f0>] (path_openat+0x30c/0x1150) [ 8936.163901][T25211] r6:dff45f20 r5:8291edac r4:0011b441 [ 8936.163910][T25211] [<805685e4>] (path_openat) from [<805697e0>] (do_filp_open+0xac/0x148) [ 8936.163940][T25211] r10:00000142 r9:83ac9000 r8:00000000 r7:dff45e58 r6:dff45f20 r5:8320e000 [ 8936.163950][T25211] r4:ffffff9c [ 8936.163958][T25211] [<80569734>] (do_filp_open) from [<80550364>] (do_sys_openat2+0x90/0xe0) [ 8936.163990][T25211] r9:8320e000 r8:8020029c r7:ffffff9c r6:dff45f58 r5:83ac9000 r4:00000006 [ 8936.163998][T25211] [<805502d4>] (do_sys_openat2) from [<8055078c>] (sys_openat+0x98/0xd4) [ 8936.164028][T25211] r7:00000142 r6:00000000 r5:76fa8ab0 r4:ffffff9c [ 8936.164036][T25211] [<805506f4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8936.164060][T25211] Exception stack(0xdff45fa8 to 0xdff45ff0) [ 8936.164080][T25211] 5fa0: 0011b441 76fa8ab0 ffffff9c 76fa8ab0 0011b441 00000000 [ 8936.164098][T25211] 5fc0: 0011b441 76fa8ab0 00000000 00000142 00000000 00000000 00006364 76fa90bc [ 8936.164111][T25211] 5fe0: 81010301 76fa8a68 000d80f0 001300b8 [ 8936.164124][T25211] r5:76fa8ab0 r4:0011b441 [ 8936.181423][T25211] ERROR: Out of memory at tomoyo_realpath_from_path. [ 8936.502354][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 8936.507095][ T31] audit: type=1400 audit(13286244.085:115307): avc: denied { module_request } for pid=25210 comm="syz.1.12380" kmod="net-pf-2-proto-160" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8936.714173][ T31] audit: type=1400 audit(13286244.295:115308): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8936.721259][ T31] audit: type=1400 audit(13286244.295:115309): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8936.721588][ T31] audit: type=1400 audit(13286244.295:115310): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8936.789641][ T31] audit: type=1400 audit(13286244.365:115311): avc: denied { create } for pid=25219 comm="syz.1.12383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8936.795594][ T31] audit: type=1400 audit(13286244.375:115312): avc: denied { getopt } for pid=25219 comm="syz.1.12383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8936.801860][ T31] audit: type=1400 audit(13286244.385:115313): avc: denied { write } for pid=25219 comm="syz.1.12383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8936.806162][ T31] audit: type=1400 audit(13286244.385:115314): avc: denied { write } for pid=25219 comm="syz.1.12383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8936.826796][ T31] audit: type=1400 audit(13286244.405:115315): avc: denied { write } for pid=25219 comm="syz.1.12383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8937.337502][ T31] audit: type=1400 audit(13286244.915:115316): avc: denied { write } for pid=25219 comm="syz.1.12383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8941.619438][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 8941.619826][ T31] audit: type=1400 audit(13286249.195:115349): avc: denied { write } for pid=25235 comm="syz.1.12387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8943.173018][ T31] audit: type=1400 audit(13286250.755:115350): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8943.190934][ T31] audit: type=1400 audit(13286250.755:115351): avc: denied { read write open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8943.191341][ T31] audit: type=1400 audit(13286250.775:115352): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8943.231275][ T31] audit: type=1400 audit(13286250.805:115353): avc: denied { create } for pid=25244 comm="syz.0.12393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8943.239817][ T31] audit: type=1400 audit(13286250.815:115354): avc: denied { read append } for pid=25244 comm="syz.0.12393" name="mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8943.241468][ T31] audit: type=1400 audit(13286250.815:115355): avc: denied { read append open } for pid=25244 comm="syz.0.12393" path="/dev/input/mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8943.269046][ T31] audit: type=1400 audit(13286250.845:115356): avc: denied { read write } for pid=25244 comm="syz.0.12393" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8943.269534][ T31] audit: type=1400 audit(13286250.845:115357): avc: denied { read write open } for pid=25244 comm="syz.0.12393" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8943.279106][ T31] audit: type=1400 audit(13286250.855:115358): avc: denied { mounton } for pid=25244 comm="syz.0.12393" path="/550/file0" dev="tmpfs" ino=2886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 8947.113208][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 8947.114157][ T31] audit: type=1400 audit(13286254.695:115388): avc: denied { write } for pid=25257 comm="syz.1.12391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8947.245985][ T31] audit: type=1400 audit(13286254.825:115389): avc: denied { read write } for pid=25264 comm="syz.0.12392" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8947.247962][ T31] audit: type=1400 audit(13286254.825:115390): avc: denied { open } for pid=25264 comm="syz.0.12392" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8947.261731][ T31] audit: type=1400 audit(13286254.845:115391): avc: denied { setattr } for pid=25264 comm="syz.0.12392" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8947.379193][ T31] audit: type=1400 audit(13286254.955:115392): avc: denied { create } for pid=25266 comm="syz.0.12394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8947.392642][ T31] audit: type=1400 audit(13286254.965:115393): avc: denied { setopt } for pid=25266 comm="syz.0.12394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8947.405264][ T31] audit: type=1400 audit(13286254.985:115394): avc: denied { connect } for pid=25266 comm="syz.0.12394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8947.922087][ T31] audit: type=1400 audit(13286255.505:115395): avc: denied { write } for pid=25266 comm="syz.0.12394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8948.422261][ T31] audit: type=1400 audit(13286256.005:115396): avc: denied { read } for pid=25266 comm="syz.0.12394" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8948.425704][ T31] audit: type=1400 audit(13286256.005:115397): avc: denied { read open } for pid=25266 comm="syz.0.12394" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8952.187629][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 8952.192357][ T31] audit: type=1400 audit(13286259.765:115436): avc: denied { write } for pid=25279 comm="syz.0.12396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8952.502004][ T31] audit: type=1400 audit(13286260.085:115437): avc: denied { ioctl } for pid=25283 comm="syz.1.12397" path="socket:[146277]" dev="sockfs" ino=146277 ioctlcmd=0x4c0a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8953.013513][ T31] audit: type=1400 audit(13286260.595:115438): avc: denied { ioctl } for pid=25283 comm="syz.1.12397" path="socket:[146277]" dev="sockfs" ino=146277 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8953.526157][ T31] audit: type=1400 audit(13286261.105:115439): avc: denied { write } for pid=25283 comm="syz.1.12397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8953.856106][ T31] audit: type=1400 audit(13286261.435:115440): avc: denied { read write } for pid=25289 comm="syz.0.12398" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8953.858326][ T31] audit: type=1400 audit(13286261.435:115441): avc: denied { open } for pid=25289 comm="syz.0.12398" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8953.881674][ T31] audit: type=1400 audit(13286261.465:115442): avc: denied { setattr } for pid=25289 comm="syz.0.12398" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8953.990884][ T31] audit: type=1400 audit(13286261.565:115443): avc: denied { create } for pid=25291 comm="syz.0.12399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8954.026810][ T31] audit: type=1400 audit(13286261.605:115444): avc: denied { getopt } for pid=25291 comm="syz.0.12399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8954.029765][ T31] audit: type=1400 audit(13286261.605:115445): avc: denied { write } for pid=25291 comm="syz.0.12399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8957.245820][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 8957.246263][ T31] audit: type=1400 audit(13286264.825:115467): avc: denied { create } for pid=25302 comm="syz.0.12401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8957.265777][ T31] audit: type=1400 audit(13286264.845:115468): avc: denied { read } for pid=25302 comm="syz.0.12401" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8957.267181][ T31] audit: type=1400 audit(13286264.845:115469): avc: denied { open } for pid=25302 comm="syz.0.12401" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8957.285892][ T31] audit: type=1400 audit(13286264.865:115470): avc: denied { ioctl } for pid=25302 comm="syz.0.12401" path="/dev/loop-control" dev="devtmpfs" ino=632 ioctlcmd=0x3b84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8957.298480][ T31] audit: type=1400 audit(13286264.875:115471): avc: denied { read } for pid=25302 comm="syz.0.12401" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 8957.299968][ T31] audit: type=1400 audit(13286264.875:115472): avc: denied { read open } for pid=25302 comm="syz.0.12401" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 8957.316207][ T31] audit: type=1400 audit(13286264.895:115473): avc: denied { ioctl } for pid=25302 comm="syz.0.12401" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 8957.332978][ T31] audit: type=1400 audit(13286264.915:115474): avc: denied { ioctl } for pid=25302 comm="syz.0.12401" path="socket:[145384]" dev="sockfs" ino=145384 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8957.398312][ T31] audit: type=1400 audit(13286264.975:115475): avc: denied { bind } for pid=25302 comm="syz.0.12401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8957.406853][ T31] audit: type=1400 audit(13286264.985:115476): avc: denied { write } for pid=25302 comm="syz.0.12401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8962.369371][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 8962.380803][ T31] audit: type=1400 audit(13286269.945:115516): avc: denied { read } for pid=25316 comm="syz.0.12405" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8962.381207][ T31] audit: type=1400 audit(13286269.945:115517): avc: denied { open } for pid=25316 comm="syz.0.12405" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8962.381502][ T31] audit: type=1400 audit(13286269.955:115518): avc: denied { create } for pid=25316 comm="syz.0.12405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8962.386016][ T31] audit: type=1400 audit(13286269.965:115519): avc: denied { write } for pid=25316 comm="syz.0.12405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8962.398385][ T31] audit: type=1400 audit(13286269.975:115520): avc: denied { write } for pid=25316 comm="syz.0.12405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8962.588879][ T31] audit: type=1400 audit(13286270.165:115521): avc: denied { read } for pid=25318 comm="syz.1.12406" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8962.592441][ T31] audit: type=1400 audit(13286270.165:115522): avc: denied { open } for pid=25318 comm="syz.1.12406" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8962.606711][ T31] audit: type=1400 audit(13286270.185:115523): avc: denied { ioctl } for pid=25318 comm="syz.1.12406" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x64c1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8962.609852][ T31] audit: type=1400 audit(13286270.185:115524): avc: denied { ioctl } for pid=25318 comm="syz.1.12406" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x64c2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8962.623454][ T31] audit: type=1400 audit(13286270.205:115525): avc: denied { ioctl } for pid=25318 comm="syz.1.12406" path="socket:[146452]" dev="sockfs" ino=146452 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8967.393981][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 8967.394414][ T31] audit: type=1400 audit(13286274.975:115547): avc: denied { create } for pid=25336 comm="syz.1.12410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.414341][ T31] audit: type=1400 audit(13286274.995:115548): avc: denied { getopt } for pid=25336 comm="syz.1.12410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.418122][ T31] audit: type=1400 audit(13286274.995:115549): avc: denied { write } for pid=25336 comm="syz.1.12410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.426029][ T31] audit: type=1400 audit(13286275.005:115550): avc: denied { write } for pid=25336 comm="syz.1.12410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.443327][ T31] audit: type=1400 audit(13286275.025:115551): avc: denied { write } for pid=25336 comm="syz.1.12410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.858672][ T31] audit: type=1400 audit(13286275.435:115552): avc: denied { create } for pid=25338 comm="syz.0.12411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.882502][ T31] audit: type=1400 audit(13286275.465:115553): avc: denied { getopt } for pid=25338 comm="syz.0.12411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.887779][ T31] audit: type=1400 audit(13286275.465:115554): avc: denied { write } for pid=25338 comm="syz.0.12411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.901228][ T31] audit: type=1400 audit(13286275.475:115555): avc: denied { write } for pid=25338 comm="syz.0.12411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8967.955036][ T31] audit: type=1400 audit(13286275.535:115556): avc: denied { write } for pid=25336 comm="syz.1.12410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8972.459356][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 8972.461270][ T31] audit: type=1400 audit(13286280.035:115593): avc: denied { write } for pid=25349 comm="syz.1.12413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8973.683123][ T31] audit: type=1400 audit(13286281.265:115594): avc: denied { create } for pid=25356 comm="syz.0.12415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8973.704243][ T31] audit: type=1400 audit(13286281.285:115595): avc: denied { setopt } for pid=25356 comm="syz.0.12415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8973.709169][ T31] audit: type=1400 audit(13286281.285:115596): avc: denied { connect } for pid=25356 comm="syz.0.12415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8973.991127][ T31] audit: type=1400 audit(13286281.565:115597): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8974.001744][ T31] audit: type=1400 audit(13286281.575:115598): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8974.002452][ T31] audit: type=1400 audit(13286281.575:115599): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8974.075164][ T31] audit: type=1400 audit(13286281.655:115600): avc: denied { create } for pid=25358 comm="syz.1.12416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8974.095088][ T31] audit: type=1400 audit(13286281.675:115601): avc: denied { getopt } for pid=25358 comm="syz.1.12416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8974.099450][ T31] audit: type=1400 audit(13286281.675:115602): avc: denied { write } for pid=25358 comm="syz.1.12416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8977.471389][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 8977.471688][ T31] audit: type=1400 audit(13286285.045:115631): avc: denied { read write } for pid=21604 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8977.487941][ T31] audit: type=1400 audit(13286285.055:115632): avc: denied { open } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8977.488275][ T31] audit: type=1400 audit(13286285.065:115633): avc: denied { ioctl } for pid=21604 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8977.640939][ T31] audit: type=1400 audit(13286285.215:115634): avc: denied { create } for pid=25377 comm="syz.1.12423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 8977.674253][ T31] audit: type=1400 audit(13286285.255:115635): avc: denied { read write } for pid=25376 comm="syz.0.12422" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8977.678215][ T31] audit: type=1400 audit(13286285.255:115636): avc: denied { open } for pid=25376 comm="syz.0.12422" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8977.678668][ T31] audit: type=1400 audit(13286285.255:115637): avc: denied { ioctl } for pid=25376 comm="syz.0.12422" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8977.678882][ T31] audit: type=1400 audit(13286285.255:115638): avc: denied { setopt } for pid=25377 comm="syz.1.12423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 8977.688325][ T31] audit: type=1400 audit(13286285.265:115639): avc: denied { ioctl } for pid=25376 comm="syz.0.12422" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8977.709785][ T31] audit: type=1400 audit(13286285.285:115640): avc: denied { ioctl } for pid=25376 comm="syz.0.12422" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8978.410891][T19613] usb 1-1: new high-speed USB device number 87 using dummy_hcd [ 8978.562833][T19613] usb 1-1: Using ep0 maxpacket: 16 [ 8978.574089][T19613] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 8978.574431][T19613] usb 1-1: config 0 has no interface number 0 [ 8978.608128][T19613] usb 1-1: New USB device found, idVendor=1a86, idProduct=752d, bcdDevice=2d.4d [ 8978.608330][T19613] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 8978.608440][T19613] usb 1-1: Product: syz [ 8978.608521][T19613] usb 1-1: Manufacturer: syz [ 8978.608610][T19613] usb 1-1: SerialNumber: syz [ 8978.643508][T19613] usb 1-1: config 0 descriptor?? [ 8978.702838][T19613] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 8978.797844][T19613] snd-usb-audio 1-1:0.1: probe with driver snd-usb-audio failed with error -2 [ 8979.054824][T19613] usb 1-1: USB disconnect, device number 87 [ 8982.503168][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 8982.503514][ T31] audit: type=1400 audit(13286290.085:115691): avc: denied { ioctl } for pid=25416 comm="syz.1.12430" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 8982.534786][T25417] 8<--- cut here --- [ 8982.534989][T25417] Unable to handle kernel paging request at virtual address fee04f2a when write [ 8982.535101][T25417] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 8982.536078][T25417] Internal error: Oops: a06 [#1] SMP ARM [ 8982.538684][T25417] Modules linked in: [ 8982.539119][T25417] CPU: 0 UID: 0 PID: 25417 Comm: syz.1.12430 Not tainted syzkaller #0 PREEMPT [ 8982.539486][T25417] Hardware name: ARM-Versatile Express [ 8982.539742][T25417] PC is at subdev_8255_io+0x60/0x6c [ 8982.540278][T25417] LR is at subdev_8255_io+0x4c/0x6c [ 8982.540743][T25417] pc : [<813b8b60>] lr : [<813b8b4c>] psr: 60000013 [ 8982.541738][T25417] sp : e03e5cb8 ip : e03e5cb8 fp : e03e5cd4 [ 8982.542503][T25417] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 8982.542995][T25417] r7 : 00004f27 r6 : 0000009b r5 : 84178480 r4 : 00004f2a [ 8982.543315][T25417] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 84178480 [ 8982.543732][T25417] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 8982.544072][T25417] Control: 30c5387d Table: 832d9880 DAC: fffffffd [ 8982.544378][T25417] Register r0 information: slab kmalloc-192 start 84178480 pointer offset 0 size 192 [ 8982.545481][T25417] Register r1 information: non-paged memory [ 8982.546064][T25417] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 8982.546784][T25417] Register r3 information: non-paged memory [ 8982.547071][T25417] Register r4 information: non-paged memory [ 8982.547331][T25417] Register r5 information: slab kmalloc-192 start 84178480 pointer offset 0 size 192 [ 8982.547777][T25417] Register r6 information: non-paged memory [ 8982.548023][T25417] Register r7 information: non-paged memory [ 8982.548266][T25417] Register r8 information: non-paged memory [ 8982.548508][T25417] Register r9 information: NULL pointer [ 8982.548742][T25417] Register r10 information: NULL pointer [ 8982.548998][T25417] Register r11 information: 2-page vmalloc region starting at 0xe03e4000 allocated at kernel_clone+0xac/0x3ec [ 8982.549463][T25417] Register r12 information: 2-page vmalloc region starting at 0xe03e4000 allocated at kernel_clone+0xac/0x3ec [ 8982.549953][T25417] Process syz.1.12430 (pid: 25417, stack limit = 0xe03e4000) [ 8982.550859][T25417] Stack: (0xe03e5cb8 to 0xe03e6000) [ 8982.551149][T25417] 5ca0: 813b8b00 84178480 [ 8982.551734][T25417] 5cc0: 00004f27 00004f27 e03e5cf4 e03e5cd8 813b8838 813b8b0c 00004f27 80503b1c [ 8982.552082][T25417] 5ce0: 8412d000 8412d000 e03e5d14 e03e5cf8 813b8bf8 813b87ec 8412d000 84178480 [ 8982.552413][T25417] 5d00: e03e5da4 00004f27 e03e5d54 e03e5d18 813b8dec 813b8b78 82ae3da0 85449700 [ 8982.552710][T25417] 5d20: 828215b0 00000000 00000000 829d0144 84178480 841784c4 e03e5d90 84178480 [ 8982.553039][T25417] 5d40: 00000000 82b16f40 e03e5d8c e03e5d58 813a7cf4 813b8d3c 200000c0 00000000 [ 8982.553381][T25417] 5d60: e03e5d7c 200000c0 84178480 b5403587 200000c0 85f81800 40946400 00000003 [ 8982.553694][T25417] 5d80: e03e5e4c e03e5d90 813a3840 813a7bf8 35353238 00000000 00000000 00000000 [ 8982.554077][T25417] 5da0: 00000000 00004f27 00000009 00000002 00000401 00000001 00000cc7 00000fff [ 8982.554425][T25417] 5dc0: 5c952399 00000005 000003ff 00000802 00001600 fffffffe 00000001 00000009 [ 8982.554747][T25417] 5de0: 0000e1cb 00000006 00000004 00000003 00000396 80000089 fffffffd 00000000 [ 8982.555083][T25417] 5e00: fffffff5 ffffeadb 00000003 0000003c 00000008 00000004 08000000 dffffffa [ 8982.555408][T25417] 5e20: 00000000 ec6bb78d 00000000 8480f300 84178480 200000c0 200000c0 85f81800 [ 8982.555727][T25417] 5e40: e03e5f14 e03e5e50 813a480c 813a374c 00000000 00000000 00000000 ec6bb78d [ 8982.556063][T25417] 5e60: 00000000 00000000 8247054c 0000005f 83d5fc58 841784b0 83e01f3c 85f81800 [ 8982.556387][T25417] 5e80: e03e5ee4 e03e5e90 80797a5c 8078ddc0 00000064 00000001 00000000 e03e5eac [ 8982.556701][T25417] 5ea0: 84900cd0 8342db28 00006400 0000000b e03e5ea0 00000000 00000000 ec6bb78d [ 8982.557030][T25417] 5ec0: 8480f300 40946400 200000c0 200000c0 8480f300 00000003 e03e5ef4 e03e5ee8 [ 8982.557347][T25417] 5ee0: 80797b7c ec6bb78d e03e5f14 40946400 00000000 8480f301 200000c0 8480f300 [ 8982.557664][T25417] 5f00: 00000003 85f81800 e03e5fa4 e03e5f18 8056cd80 813a423c ecac8b10 85f81800 [ 8982.557999][T25417] 5f20: e03e5f3c e03e5f30 81a39d78 81a39c48 e03e5f54 e03e5f40 8025e490 8028ef64 [ 8982.558352][T25417] 5f40: e03e5fb0 40000000 e03e5f84 e03e5f58 802229ec 8025e44c 00000000 8281cddc [ 8982.558713][T25417] 5f60: e03e5fb0 0014c820 ecac8b10 80222940 00000000 ec6bb78d e03e5fac 00000000 [ 8982.559048][T25417] 5f80: 00000000 002f6308 00000036 8020029c 85f81800 00000036 00000000 e03e5fa8 [ 8982.559373][T25417] 5fa0: 80200060 8056cc5c 00000000 00000000 00000003 40946400 200000c0 00000000 [ 8982.559697][T25417] 5fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76fad0bc [ 8982.560096][T25417] 5fe0: 76facec0 76faceb0 0001948c 001322c0 60000010 00000003 00000000 00000000 [ 8982.560539][T25417] Call trace: [ 8982.560870][T25417] [<813b8b00>] (subdev_8255_io) from [<813b8838>] (subdev_8255_do_config+0x58/0x60) [ 8982.561327][T25417] r7:00004f27 r6:00004f27 r5:84178480 r4:813b8b00 [ 8982.561596][T25417] [<813b87e0>] (subdev_8255_do_config) from [<813b8bf8>] (subdev_8255_io_init+0x8c/0x9c) [ 8982.561976][T25417] r4:8412d000 [ 8982.562152][T25417] [<813b8b6c>] (subdev_8255_io_init) from [<813b8dec>] (dev_8255_attach+0xbc/0x114) [ 8982.562572][T25417] r7:00004f27 r6:e03e5da4 r5:84178480 r4:8412d000 [ 8982.562852][T25417] [<813b8d30>] (dev_8255_attach) from [<813a7cf4>] (comedi_device_attach+0x108/0x250) [ 8982.563257][T25417] r10:82b16f40 r9:00000000 r8:84178480 r7:e03e5d90 r6:841784c4 r5:84178480 [ 8982.563579][T25417] r4:829d0144 [ 8982.563734][T25417] [<813a7bec>] (comedi_device_attach) from [<813a3840>] (do_devconfig_ioctl+0x100/0x220) [ 8982.564138][T25417] r10:00000003 r9:40946400 r8:85f81800 r7:200000c0 r6:b5403587 r5:84178480 [ 8982.564438][T25417] r4:200000c0 [ 8982.564582][T25417] [<813a3740>] (do_devconfig_ioctl) from [<813a480c>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 8982.564972][T25417] r8:85f81800 r7:200000c0 r6:200000c0 r5:84178480 r4:8480f300 [ 8982.565239][T25417] [<813a4230>] (comedi_unlocked_ioctl) from [<8056cd80>] (sys_ioctl+0x130/0xba0) [ 8982.565604][T25417] r10:85f81800 r9:00000003 r8:8480f300 r7:200000c0 r6:8480f301 r5:00000000 [ 8982.565913][T25417] r4:40946400 [ 8982.566056][T25417] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 8982.566402][T25417] Exception stack(0xe03e5fa8 to 0xe03e5ff0) [ 8982.566638][T25417] 5fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 8982.566965][T25417] 5fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76fad0bc [ 8982.567279][T25417] 5fe0: 76facec0 76faceb0 0001948c 001322c0 [ 8982.567507][T25417] r10:00000036 r9:85f81800 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 8982.567823][T25417] r4:00000000 [ 8982.568206][T25417] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 8982.568866][T25417] ---[ end trace 0000000000000000 ]--- [ 8982.569591][T25417] Kernel panic - not syncing: Fatal exception [ 8982.572473][T25417] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:39:51 Registers: info registers vcpu 0 CPU#0 R00=84c5c840 R01=00000020 R02=eb827000 R03=00000000 R04=841e0037 R05=84c5c840 R06=80a795fc R07=841e0042 R08=82826ef8 R09=00000000 R10=00007c91 R11=e03e591c R12=00000002 R13=e03e5910 R14=829590c4 R15=80a79654 PSR=80000193 N--- A S svc32 s00=6d726570 s01=69737369 d00=697373696d726570 s02=733a725f s03=64617379 d01=64617379733a725f s04=20745f6d s05=6e6f6374 d02=6e6f637420745f6d s06=74786574 s07=7379733d d03=7379733d74786574 s08=5f6d6574 s09=626f3a75 d04=626f3a755f6d6574 s10=7463656a s11=643a725f d05=643a725f7463656a s12=63697665 s13=20745f65 d06=20745f6563697665 s14=616c6374 s15=633d7373 d07=633d7373616c6374 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=002e0000 R09=00000000 R10=00006364 R11=76fad0bc R12=200002d0 R13=200002d0 R14=0001969c R15=0001969c PSR=20000010 --C- A S usr32 s00=7420745f s01=746e6f63 d00=746e6f637420745f s02=632f7665 s03=64656d6f d01=64656d6f632f7665 s04=20223369 s05=3d766564 d02=3d76656420223369 s06=76656422 s07=66706d74 d03=66706d7476656422 s08=69202273 s09=373d6f6e d04=373d6f6e69202273 s10=69203331 s11=6c74636f d05=6c74636f69203331 s12=3d646d63 s13=34367830 d06=343678303d646d63 s14=73203030 s15=746e6f63 d07=746e6f6373203030 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000