last executing test programs: 42m36.211932003s ago: executing program 1 (id=1416): r0 = socket(0x10, 0x803, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=@newtfilter={0x98, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x0, 0xe}, {}, {0x7, 0xe}}, [@filter_kind_options=@f_u32={{0x8}, {0x6c, 0x2, [@TCA_U32_ACT={0x54, 0x7, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xf, 0x3}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x6, 0x9, 0x20000000, 0x1, 0xd6}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, @TCA_U32_SEL={0x14, 0x5, {0x8, 0x7, 0x1, 0x3d3f, 0x0, 0xfff, 0x3, 0x58f}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x24048084) 42m36.011712087s ago: executing program 1 (id=1417): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000400000000000000000000008500000005000000850000007d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 42m35.84049987s ago: executing program 1 (id=1418): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@bridge_delneigh={0x38, 0x1e, 0x1, 0x70bd2f, 0x25dfdbfc, {0xa, 0x0, 0x0, 0x0, 0x0, 0x8}, [@NDA_DST_IPV6={0x14, 0x1, @rand_addr=' \x01\x00'}, @NDA_PORT={0x6, 0x6, 0x4e20}]}, 0x38}}, 0x20000000) 42m35.648951944s ago: executing program 1 (id=1419): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x151, 0x0, 0x0, 0x0, 0x40, 0x419, 0x600, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x40, 0x1, "", [{{0x9, 0x4, 0x0, 0xb, 0x1, 0x3, 0x0, 0x6, 0x0, {0x9, 0x21, 0x28, 0x2, 0x1, {0x22, 0x28}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xb3, 0x9, 0x9}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4048090}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x371, {0x9}}}, &(0x7f0000000080)={0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0}) 42m33.966807386s ago: executing program 1 (id=1420): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x16, 0x0, 0x0) 42m33.518807944s ago: executing program 1 (id=1421): socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) 41m47.916919019s ago: executing program 32 (id=1421): socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) 3m8.849690564s ago: executing program 2 (id=6266): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x24088004}, 0x20004804) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x40, 0x1, 0x7, 0x401, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x40}}, 0x20000000) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x800) close_range(r0, 0xffffffffffffffff, 0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 2m54.510633617s ago: executing program 2 (id=6271): r0 = socket(0x15, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000804) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x2000c810}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x10004005}, 0x4000004) r2 = socket(0x10, 0x3, 0x9) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000000)={0xa, {0x1, 0x4, 0x8}}, 0xa) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8000, 0x50, 0x6, 0x3, {{0x14, 0x4, 0x3, 0x6, 0x50, 0x67, 0x0, 0x1, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x16}, @local, {[@timestamp_prespec={0x44, 0xc, 0xe, 0x3, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}]}, @end, @noop, @generic={0x86, 0xb, "a0f79272fffb85ecad"}, @end, @rr={0x7, 0x7, 0x69, [@private=0xa010102]}, @noop, @ssrr={0x89, 0x17, 0x18, [@dev={0xac, 0x14, 0x14, 0x33}, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @multicast1, @local]}]}}}}}) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000009c0)={&(0x7f00000006c0)=@getsadinfo={0x2e0, 0x23, 0x400, 0x70bd2b, 0x25dfdbfb, 0x0, [@policy={0xac, 0x7, {{@in=@broadcast, @in6=@private2, 0x4e21, 0x15d, 0x4e23, 0x6, 0xa, 0x80, 0xa0, 0x3b, r3, 0xee01}, {0x2, 0x1, 0x7000000, 0x0, 0x9, 0x5, 0x101, 0x9}, {0x5, 0x4, 0x1, 0x2}, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0x3}}, @algo_comp={0xfa, 0x3, {{'lzjh\x00'}, 0x590, "a2325517ac9af3c989b16634a6853313e016a91b2bb124db81511ec65714c883052e4c209efc454fe9dbb230638898aa6e8303740520c9e79268ce8a73371f575236a0675dd49a4dc01c2bef75d747cbdb860c922cd7e0bfbd82e18c3451cac511919e27788aafcbbccd1d7799671ccf3a1229d5559e88b4a10b7032f9445a20328a614b5754f07af24a752e0e66109c4980db5fc9caf6b394babc15820834d7fa7939e0056be7ba0698f65836241bbd1653"}}, @XFRMA_IF_ID={0x8, 0x1f, 0x3}, @algo_crypt={0x10d, 0x2, {{'ecb(des3_ede)\x00'}, 0x628, "401071e5f221cbe174d1564a29134dbfe830cd0859b78a84064ee6afcd792024b1ec61af0a070a7eb2a5d985d391daf10c12a3e7c80a56bc14f14254dd58f10d66aa0aea72ba81c2e54b649b6988de1bf131d21f44ccba8a0147b38deaac8490e8ea28813c3b1d9c63d1eb63284dff0f51c207c9ac0edd317bb7e86e0e655448d85a758c07cb873d72f3af374f17759432ab24ad71a5e9149bc55f773e8e1597902e586006210f50ef5943f611f98d60f487759d47032b7f63043b34d0ad3527b1758f2f09"}}, @lastused={0xc, 0xf, 0x1de}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x48010}, 0x40010) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000480)={&(0x7f00000001c0), 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x88, r4, 0x100, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x240040a0) 2m49.64056458s ago: executing program 2 (id=6274): ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) r0 = socket(0x29, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080), 0x3, 0x268040) close(r1) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)={0x80, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY={0x14, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "2938554ae24191793ecda734a1"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_SEQ={0x11, 0xa, "1a1424cecc9edd17c49dea7fb7"}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x80}}, 0x48800) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000804) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="10002bbd7000fbdbdf2510000000080001007063690011000200303030303a30303a31302e300000000008000b00ff010000060011000300000008001300010000000500140001000000080001007063690011000200303030303a30303a31302e300000000008000b0003000000060011000400000008001300a76500000500140001000000080001007063690011000200303030303a30303a31302e300000000008000b008100000006001100bc2b000008001300a56c000005001400000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00010000000600110004000000080013004108000005001400000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00bb00000006001100ff0f000008001300050000000500140001000000"], 0x148}, 0x1, 0x0, 0x0, 0x4008095}, 0x40800) 2m45.811655932s ago: executing program 2 (id=6276): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) r3 = inotify_init1(0x0) dup3(r2, r3, 0x0) signalfd(r3, &(0x7f0000008f00), 0x8) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x5451, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="384af3b5", @ANYRES16=r4, @ANYBLOB="100026bd7000fcdbdf250c0000000c009900100000003300000004000b000a00060008021100000100000500080001000000"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x40000c5) sendmsg$AUDIT_SET(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x3e9, 0x200, 0x70bd2b, 0x25dfdbfc, {0x31, 0x0, 0x2, 0x0, 0x5, 0x0, 0xffffffff, 0x8, 0x0, 0x8, 0xc1}, ["", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000001}, 0x48004) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 2m41.079058942s ago: executing program 2 (id=6277): sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000ec0), 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x2c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) 2m39.340416255s ago: executing program 2 (id=6279): r0 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x0, 0x0, 0xe, 0x29, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000140)='smb3\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x2, 0x6, 0x580, 0x0, 0x310, 0x0, 0x0, 0x1d8, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x6, 0x0, {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @remote}, [0x0, 0xff, 0xff000000, 0xff000000], [0x0, 0xffffff00, 0xffffff00, 0xffffffff], 'gretap0\x00', 'batadv_slave_0\x00', {}, {0xff}, 0x2b, 0x5, 0x1, 0x18}, 0x0, 0xd0, 0xf8, 0x0, {0x7a00000010000000}, [@inet=@rpfilter={{0x28}, {0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0xfc, 0x6}}}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0xb4}, @initdev={0xfe, 0x88, '\x00', 0xfd, 0x0}, [0xff], [0xffffff00], '\x00', 'bond_slave_0\x00', {}, {0xff}}, 0x0, 0xf0, 0x138, 0x48000000, {}, [@common=@dst={{0x48}, {0xff, 0x4, 0x0, [0x1, 0x7a, 0xfffd, 0x3f4, 0x0, 0x3, 0x5, 0x0, 0x8, 0x30, 0xe5, 0x4, 0x1, 0x6, 0x0, 0x1], 0x6}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, 'ip6gre0\x00', {0x4}}}}, {{@ipv6={@remote, @dev={0xfe, 0x80, '\x00', 0xd}, [0x0, 0xffff00, 0xffffffff], [0xffffff00, 0xffffff00, 0xffffff00, 0xff000000], 'nr0\x00', 'vxcan1\x00', {}, {}, 0x62, 0x5, 0x3, 0x20}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0xf}}}, {{@ipv6={@mcast1, @private0, [0xff000000, 0xffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffff00, 0xff, 0xff000000], 'pim6reg1\x00', 'hsr0\x00', {}, {}, 0x6c, 0x80, 0x5, 0x61}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) bind$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x10) 1m53.791441929s ago: executing program 33 (id=6279): r0 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x0, 0x0, 0xe, 0x29, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000140)='smb3\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x2, 0x6, 0x580, 0x0, 0x310, 0x0, 0x0, 0x1d8, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x6, 0x0, {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @remote}, [0x0, 0xff, 0xff000000, 0xff000000], [0x0, 0xffffff00, 0xffffff00, 0xffffffff], 'gretap0\x00', 'batadv_slave_0\x00', {}, {0xff}, 0x2b, 0x5, 0x1, 0x18}, 0x0, 0xd0, 0xf8, 0x0, {0x7a00000010000000}, [@inet=@rpfilter={{0x28}, {0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0xfc, 0x6}}}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0xb4}, @initdev={0xfe, 0x88, '\x00', 0xfd, 0x0}, [0xff], [0xffffff00], '\x00', 'bond_slave_0\x00', {}, {0xff}}, 0x0, 0xf0, 0x138, 0x48000000, {}, [@common=@dst={{0x48}, {0xff, 0x4, 0x0, [0x1, 0x7a, 0xfffd, 0x3f4, 0x0, 0x3, 0x5, 0x0, 0x8, 0x30, 0xe5, 0x4, 0x1, 0x6, 0x0, 0x1], 0x6}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, 'ip6gre0\x00', {0x4}}}}, {{@ipv6={@remote, @dev={0xfe, 0x80, '\x00', 0xd}, [0x0, 0xffff00, 0xffffffff], [0xffffff00, 0xffffff00, 0xffffff00, 0xff000000], 'nr0\x00', 'vxcan1\x00', {}, {}, 0x62, 0x5, 0x3, 0x20}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0xf}}}, {{@ipv6={@mcast1, @private0, [0xff000000, 0xffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffff00, 0xff, 0xff000000], 'pim6reg1\x00', 'hsr0\x00', {}, {}, 0x6c, 0x80, 0x5, 0x61}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) bind$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x10) 22.420448464s ago: executing program 0 (id=6397): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x80}, 0x0) recvfrom(r2, &(0x7f0000000280)=""/90, 0xfffffffffffffe4a, 0x500, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r3) sendmsg$ETHTOOL_MSG_RINGS_GET(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0}, 0x40040) r4 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, 0x0) connect$unix(r3, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 20.149223678s ago: executing program 0 (id=6403): syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000000)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e00000000000000000018000280080002001100000004000100080004"], 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x8090) 19.190498906s ago: executing program 0 (id=6404): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r7, {0x4, 0x5}, {}, {0x7, 0x5}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20048081}, 0xc0) r8 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r9, {0xc, 0xc}, {0x0, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) 15.580689585s ago: executing program 0 (id=6410): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x5c}}, 0x0) 13.051599772s ago: executing program 0 (id=6411): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x2, 0x1, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0}) 12.091959031s ago: executing program 0 (id=6412): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) 1.760346587s ago: executing program 3 (id=6420): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000100)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, &(0x7f0000000800)={@flat=@weak_handle, @ptr={0x70742a85, 0x0, 0x0, 0x0, 0x1, 0x3a}, @fda={0x66646185, 0x9, 0x1, 0xd8}}, 0x0}, 0x400}], 0x0, 0x0, 0x0}) 1.421425973s ago: executing program 3 (id=6421): socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f80), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_STATION(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000540)=ANY=[@ANYBLOB="d8000000", @ANYRES16=r2, @ANYBLOB="cf0400000000000000001300000008000300", @ANYRES32=r3, @ANYBLOB="0600130084e000000a00060008021100000100000600100080050000060012"], 0xd8}, 0x1, 0x0, 0x0, 0x80c1}, 0x0) 689.812057ms ago: executing program 3 (id=6422): r0 = openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x300000d, 0x1) writev(r0, &(0x7f0000001ac0)=[{&(0x7f0000000ac0)='9', 0x1}], 0x1) 559.78265ms ago: executing program 3 (id=6423): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) 350.333973ms ago: executing program 3 (id=6424): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000001001000001000000000000000000000010"], 0x28}, 0xfc40) r0 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev, 0x2}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0x28}, 0xb440) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2140) 0s ago: executing program 3 (id=6425): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) prlimit64(r0, 0xf, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_clone(0x2080, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) kernel console output (not intermixed with test programs): oot:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2616.098348][T24825] FAULT_INJECTION: forcing a failure. [ 2616.098348][T24825] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.106443][T24825] CPU: 1 UID: 0 PID: 24825 Comm: syz.2.5691 Tainted: G L syzkaller #0 PREEMPT [ 2616.106621][T24825] Tainted: [L]=SOFTLOCKUP [ 2616.106645][T24825] Hardware name: ARM-Versatile Express [ 2616.106669][T24825] Call trace: [ 2616.106713][T24825] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2616.106817][T24825] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2616.106837][T24825] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2616.106905][T24825] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2616.106971][T24825] r7:864e8000 r6:00000000 r5:864e8000 r4:82b17e08 [ 2616.106992][T24825] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2616.107053][T24825] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2616.107129][T24825] r8:ffffffff r7:864e8000 r6:830060c0 r5:00400cc0 r4:00000044 [ 2616.107192][T24825] [<8054ef68>] (should_failslab) from [<8052d988>] (__kvmalloc_node_noprof+0xa0/0x57c) [ 2616.107256][T24825] [<8052d8e8>] (__kvmalloc_node_noprof) from [<805ab548>] (alloc_fdtable+0xac/0x128) [ 2616.107355][T24825] r10:82c7bd34 r9:00000000 r8:83896e00 r7:838be118 r6:838be118 r5:855ba680 [ 2616.107377][T24825] r4:00000100 [ 2616.107393][T24825] [<805ab49c>] (alloc_fdtable) from [<805ac8fc>] (dup_fd+0x320/0x38c) [ 2616.107446][T24825] r5:000000e0 r4:838be100 [ 2616.107480][T24825] [<805ac5dc>] (dup_fd) from [<8024dc74>] (copy_process+0x810/0x1c8c) [ 2616.107580][T24825] r10:83fabd40 r9:00000000 r8:00000000 r7:864e8000 r6:00000000 r5:eb355f30 [ 2616.107611][T24825] r4:0d104200 [ 2616.107630][T24825] [<8024d464>] (copy_process) from [<8024f244>] (kernel_clone+0xbc/0x438) [ 2616.107697][T24825] r10:864e8000 r9:864e8000 r8:00000000 r7:00100000 r6:00000000 r5:eb355f30 [ 2616.107718][T24825] r4:0d104200 [ 2616.107734][T24825] [<8024f188>] (kernel_clone) from [<8024f970>] (sys_clone+0x78/0x9c) [ 2616.107799][T24825] r10:00000078 r9:864e8000 r8:8020029c r7:00000000 r6:00000000 r5:ffffffff [ 2616.107823][T24825] r4:00000000 [ 2616.107869][T24825] [<8024f8f8>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2616.107929][T24825] Exception stack(0xeb355fa8 to 0xeb355ff0) [ 2616.107968][T24825] 5fa0: 00000000 ffffffff 0d104200 00000000 ffffffff 00000000 [ 2616.108001][T24825] 5fc0: 00000000 ffffffff 00000000 00000078 003462d8 00000000 00000001 76fd80dc [ 2616.108027][T24825] 5fe0: 76fd7e60 76fd7e50 00019380 001307a0 [ 2616.108055][T24825] r7:00000078 r6:00000000 r5:ffffffff r4:00000000 [ 2621.363177][T24854] fuse: Unknown parameter 'grouphid' [ 2622.424831][ T28] audit: type=1400 audit(2878.301:791): avc: denied { execute } for pid=24853 comm="syz.2.5699" name="file0" dev="tmpfs" ino=1525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2645.369342][ T28] audit: type=1400 audit(2901.241:792): avc: denied { setopt } for pid=24958 comm="syz.0.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2648.641036][ T28] audit: type=1400 audit(2904.511:793): avc: denied { setopt } for pid=24968 comm="syz.0.5735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2651.960216][ T28] audit: type=1400 audit(2907.831:794): avc: denied { read } for pid=24980 comm="syz.0.5739" path="socket:[63275]" dev="sockfs" ino=63275 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2652.644990][ T28] audit: type=1400 audit(2908.521:795): avc: denied { accept } for pid=24982 comm="syz.0.5740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 2652.773972][ T28] audit: type=1400 audit(2908.651:796): avc: denied { ioctl } for pid=24985 comm="syz.0.5741" path="socket:[63288]" dev="sockfs" ino=63288 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2653.221252][ T28] audit: type=1400 audit(2909.091:797): avc: denied { read } for pid=24985 comm="syz.0.5741" path="socket:[63288]" dev="sockfs" ino=63288 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2658.173307][T25014] FAULT_INJECTION: forcing a failure. [ 2658.173307][T25014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2658.175698][T25014] CPU: 0 UID: 0 PID: 25014 Comm: syz.2.5749 Tainted: G L syzkaller #0 PREEMPT [ 2658.175789][T25014] Tainted: [L]=SOFTLOCKUP [ 2658.175810][T25014] Hardware name: ARM-Versatile Express [ 2658.175834][T25014] Call trace: [ 2658.175876][T25014] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2658.175999][T25014] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2658.176020][T25014] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2658.176074][T25014] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2658.176136][T25014] r7:20000740 r6:00000000 r5:848055c0 r4:82b4ee88 [ 2658.176155][T25014] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2658.176219][T25014] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2658.176286][T25014] r8:00000000 r7:20000740 r6:000000e8 r5:00000000 r4:ec5e9f30 [ 2658.176306][T25014] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2658.176364][T25014] [<809cd408>] (should_fail_usercopy) from [<80905170>] (_copy_from_iter+0x64/0x7c4) [ 2658.176424][T25014] [<8090510c>] (_copy_from_iter) from [<819be1f0>] (isotp_sendmsg+0x268/0x86c) [ 2658.176502][T25014] r10:00000000 r9:87998000 r8:ec5e9f20 r7:000000e8 r6:00000000 r5:8799a000 [ 2658.176525][T25014] r4:000000e8 [ 2658.176544][T25014] [<819bdf88>] (isotp_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 2658.176622][T25014] r10:00000800 r9:00000000 r8:ec5e9dcc r7:00000000 r6:85890cc0 r5:ec5e9f20 [ 2658.176646][T25014] r4:00000000 [ 2658.176665][T25014] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2658.176732][T25014] r7:00000000 r6:00000000 r5:85890cc0 r4:ec5e9f20 [ 2658.176751][T25014] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2658.176820][T25014] r10:00000128 r9:20000700 r8:00000800 r7:00000000 r6:85890cc0 r5:ec5e9f20 [ 2658.176842][T25014] r4:00000000 [ 2658.176858][T25014] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2658.176933][T25014] r9:848055c0 r8:84f8d480 r7:00000800 r6:20000700 r5:84f8d481 r4:00000003 [ 2658.176972][T25014] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2658.177037][T25014] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2658.177059][T25014] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2658.177112][T25014] Exception stack(0xec5e9fa8 to 0xec5e9ff0) [ 2658.177152][T25014] 9fa0: 00000000 00000000 00000003 20000700 00000800 00000000 [ 2658.177188][T25014] 9fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76fd80dc [ 2658.177216][T25014] 9fe0: 76fd7e88 76fd7e78 00018e58 001307a0 [ 2666.247813][ T28] audit: type=1400 audit(2922.121:798): avc: denied { ioctl } for pid=25038 comm="syz.2.5757" path="socket:[62284]" dev="sockfs" ino=62284 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2670.214008][ T28] audit: type=1400 audit(2926.091:799): avc: denied { write } for pid=25056 comm="syz.2.5763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2670.346876][ T28] audit: type=1400 audit(2926.221:800): avc: denied { read write } for pid=21325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2670.347273][ T28] audit: type=1400 audit(2926.221:801): avc: denied { open } for pid=21325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2670.347564][ T28] audit: type=1400 audit(2926.221:802): avc: denied { ioctl } for pid=21325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=803 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2670.722764][ T28] audit: type=1400 audit(2926.591:803): avc: denied { read } for pid=25061 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2670.784029][ T28] audit: type=1400 audit(2926.661:804): avc: denied { open } for pid=25061 comm="syz.0.5765" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2670.853689][ T28] audit: type=1400 audit(2926.731:805): avc: denied { write } for pid=25061 comm="syz.0.5765" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2670.881156][ T28] audit: type=1400 audit(2926.751:806): avc: denied { execmem } for pid=25061 comm="syz.0.5765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2670.888478][ T28] audit: type=1400 audit(2926.761:807): avc: denied { ioctl } for pid=25061 comm="syz.0.5765" path="/dev/sequencer" dev="devtmpfs" ino=721 ioctlcmd=0x5413 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2671.254066][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 2671.254636][ T28] audit: type=1400 audit(2927.131:813): avc: denied { append } for pid=25064 comm="syz.0.5767" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2671.349575][ T28] audit: type=1400 audit(2927.221:814): avc: denied { read } for pid=25063 comm="syz.2.5766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2671.507739][ T28] audit: type=1400 audit(2927.381:815): avc: denied { create } for pid=25068 comm="syz.0.5768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2671.516753][ T28] audit: type=1400 audit(2927.391:816): avc: denied { create } for pid=25063 comm="syz.2.5766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2672.757103][ T28] audit: type=1400 audit(2928.631:817): avc: denied { mounton } for pid=25072 comm="syz.0.5769" path="/506/file0" dev="tmpfs" ino=2650 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2672.766887][ T28] audit: type=1400 audit(2928.641:818): avc: denied { mount } for pid=25072 comm="syz.0.5769" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2673.488914][ T28] audit: type=1400 audit(2929.361:819): avc: denied { create } for pid=25072 comm="syz.0.5769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2673.493019][ T28] audit: type=1400 audit(2929.371:820): avc: denied { write } for pid=25072 comm="syz.0.5769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2673.585457][ T28] audit: type=1400 audit(2929.461:821): avc: denied { unmount } for pid=21325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2673.817209][ T28] audit: type=1400 audit(2929.691:822): avc: denied { read } for pid=25079 comm="syz.0.5771" dev="nsfs" ino=4026532652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2678.276495][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 2678.276840][ T28] audit: type=1400 audit(2934.151:828): avc: denied { create } for pid=25096 comm="syz.0.5777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2678.795195][T25099] random: crng reseeded on system resumption [ 2682.812668][T25114] FAULT_INJECTION: forcing a failure. [ 2682.812668][T25114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2682.813139][T25114] CPU: 1 UID: 0 PID: 25114 Comm: syz.2.5784 Tainted: G L syzkaller #0 PREEMPT [ 2682.813251][T25114] Tainted: [L]=SOFTLOCKUP [ 2682.813272][T25114] Hardware name: ARM-Versatile Express [ 2682.813303][T25114] Call trace: [ 2682.813343][T25114] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2682.813445][T25114] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2682.813463][T25114] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2682.813513][T25114] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2682.813571][T25114] r7:00000077 r6:00000000 r5:86359880 r4:82b4ee88 [ 2682.813586][T25114] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2682.813645][T25114] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2682.813707][T25114] r8:00000000 r7:00000077 r6:76fd7b80 r5:00000000 r4:ecaf5fb0 [ 2682.813729][T25114] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2682.813787][T25114] [<809cd408>] (should_fail_usercopy) from [<8022a290>] (restore_sigframe+0x48/0x210) [ 2682.813844][T25114] [<8022a248>] (restore_sigframe) from [<8022a498>] (sys_sigreturn+0x40/0x60) [ 2682.813906][T25114] r7:00000077 r6:0012f1a4 r5:00000000 r4:ecaf5fb0 [ 2682.813927][T25114] [<8022a458>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2682.813988][T25114] Exception stack(0xecaf5fa8 to 0xecaf5ff0) [ 2682.814028][T25114] 5fa0: 00000000 00000000 00000011 200019c0 20000804 00000000 [ 2682.814059][T25114] 5fc0: 00000000 00000000 0012f1a4 00000077 003462d8 00000000 00000001 76fd80dc [ 2682.814084][T25114] 5fe0: 76fd7e88 76fd7b80 000f3910 000f3918 [ 2682.814109][T25114] r5:00000000 r4:00000000 [ 2684.723378][ T28] audit: type=1400 audit(2940.601:829): avc: denied { create } for pid=25123 comm="syz.2.5788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2684.736112][ T28] audit: type=1400 audit(2940.611:830): avc: denied { ioctl } for pid=25123 comm="syz.2.5788" path="socket:[62375]" dev="sockfs" ino=62375 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2684.854293][ T28] audit: type=1400 audit(2940.731:831): avc: denied { getopt } for pid=25123 comm="syz.2.5788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2686.235797][T25134] FAULT_INJECTION: forcing a failure. [ 2686.235797][T25134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2686.237431][T25134] CPU: 0 UID: 0 PID: 25134 Comm: syz.0.5792 Tainted: G L syzkaller #0 PREEMPT [ 2686.237562][T25134] Tainted: [L]=SOFTLOCKUP [ 2686.237585][T25134] Hardware name: ARM-Versatile Express [ 2686.237608][T25134] Call trace: [ 2686.237649][T25134] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2686.237750][T25134] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2686.237770][T25134] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2686.237822][T25134] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2686.237879][T25134] r7:ecf99da4 r6:00000000 r5:85126200 r4:82b4ee88 [ 2686.237900][T25134] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2686.237958][T25134] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2686.238034][T25134] r8:85e5ac00 r7:ecf99da4 r6:ecf99db4 r5:00000000 r4:20000040 [ 2686.238051][T25134] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2686.238107][T25134] [<809cd408>] (should_fail_usercopy) from [<815ea358>] (sk_getsockopt+0xd64/0x10cc) [ 2686.238170][T25134] [<815e95f8>] (sk_getsockopt) from [<815df4c4>] (do_sock_getsockopt+0x1f8/0x2f8) [ 2686.238236][T25134] r10:00000000 r9:00000000 r8:00000000 r7:81e6b060 r6:00000019 r5:00000001 [ 2686.238259][T25134] r4:8355dbc0 [ 2686.238277][T25134] [<815df2cc>] (do_sock_getsockopt) from [<815e1944>] (__sys_getsockopt+0x94/0xdc) [ 2686.238344][T25134] r10:00000127 r9:85126200 r8:8671ab00 r7:ecf99f50 r6:00000019 r5:ecf99f58 [ 2686.238367][T25134] r4:8671ab01 [ 2686.238383][T25134] [<815e18b0>] (__sys_getsockopt) from [<815e19a8>] (sys_getsockopt+0x1c/0x24) [ 2686.238447][T25134] r8:8020029c r7:00000127 r6:0012f1a4 r5:00000000 r4:20000040 [ 2686.238467][T25134] [<815e198c>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2686.238518][T25134] Exception stack(0xecf99fa8 to 0xecf99ff0) [ 2686.238556][T25134] 9fa0: 20000040 00000000 00000003 00000001 00000019 00000000 [ 2686.238591][T25134] 9fc0: 20000040 00000000 0012f1a4 00000127 003462d8 00000000 00000001 76f700dc [ 2686.238617][T25134] 9fe0: 76f6fe88 76f6fe78 00018e58 001307a0 [ 2687.227390][ T28] audit: type=1400 audit(2943.101:832): avc: denied { read } for pid=25143 comm="syz.2.5796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2690.278200][ T28] audit: type=1400 audit(2946.151:833): avc: denied { write } for pid=25160 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2690.282685][ T28] audit: type=1400 audit(2946.151:834): avc: denied { open } for pid=25160 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2690.320550][ T28] audit: type=1400 audit(2946.181:835): avc: denied { search } for pid=25160 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.340030][ T28] audit: type=1400 audit(2946.211:836): avc: denied { search } for pid=25160 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.340605][ T28] audit: type=1400 audit(2946.211:837): avc: denied { search } for pid=25160 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.340913][ T28] audit: type=1400 audit(2946.211:838): avc: denied { search } for pid=25160 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.389211][ T28] audit: type=1400 audit(2946.261:839): avc: denied { read open } for pid=25161 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.413032][ T28] audit: type=1400 audit(2946.281:840): avc: denied { getattr } for pid=25161 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.516223][ T28] audit: type=1400 audit(2946.391:841): avc: denied { add_name } for pid=25160 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2690.522087][ T28] audit: type=1400 audit(2946.391:842): avc: denied { create } for pid=25160 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2694.387051][T25190] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=25190 comm=syz.0.5815 [ 2696.695193][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 2696.695643][ T28] audit: type=1400 audit(2952.571:860): avc: denied { ioctl } for pid=25205 comm="syz.0.5821" path="socket:[64547]" dev="sockfs" ino=64547 ioctlcmd=0x4525 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2698.994229][ T28] audit: type=1400 audit(2954.871:861): avc: denied { nlmsg_read } for pid=25213 comm="syz.0.5826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2699.495180][ T28] audit: type=1400 audit(2955.371:862): avc: denied { ioctl } for pid=25213 comm="syz.0.5826" path="socket:[64555]" dev="sockfs" ino=64555 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2699.632259][ T28] audit: type=1400 audit(2955.511:863): avc: denied { sys_module } for pid=25213 comm="syz.0.5826" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2699.747735][ T28] audit: type=1400 audit(2955.621:864): avc: denied { nlmsg_tty_audit } for pid=25213 comm="syz.0.5826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2701.323978][ T28] audit: type=1400 audit(2957.201:865): avc: denied { unlink } for pid=21325 comm="syz-executor" name="file1" dev="tmpfs" ino=2801 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2703.165133][ T28] audit: type=1400 audit(2959.041:866): avc: denied { create } for pid=25233 comm="syz.0.5831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2709.264335][ T28] audit: type=1400 audit(2965.141:867): avc: denied { write } for pid=25245 comm="syz.2.5836" name="arp" dev="proc" ino=4026532831 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2709.402437][T25248] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2709.405102][T25248] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2715.194659][ T28] audit: type=1400 audit(2971.061:868): avc: denied { setopt } for pid=25267 comm="syz.2.5843" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2715.492171][ T28] audit: type=1400 audit(2971.361:869): avc: denied { create } for pid=25271 comm="syz.0.5845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2715.545654][T25272] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 2715.546155][T25272] audit: out of memory in audit_log_start [ 2715.565752][ T28] audit: type=1400 audit(2971.441:870): avc: denied { read } for pid=25267 comm="syz.2.5843" dev="nsfs" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2715.568430][ T28] audit: type=1400 audit(2971.441:871): avc: denied { open } for pid=25267 comm="syz.2.5843" path="net:[4026532662]" dev="nsfs" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2715.584100][ T28] audit: type=1400 audit(2971.461:872): avc: denied { module_request } for pid=25267 comm="syz.2.5843" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2715.652141][ T28] audit: type=1400 audit(2971.521:873): avc: denied { read write } for pid=21325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2715.711861][ T28] audit: type=1400 audit(2971.581:874): avc: denied { open } for pid=21325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2715.712039][ T28] audit: type=1400 audit(2971.581:875): avc: denied { ioctl } for pid=21325 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=803 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2720.694104][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 2720.694306][ T28] audit: type=1400 audit(2976.571:895): avc: denied { accept } for pid=25292 comm="syz.2.5853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 2721.314507][T25306] fuse: Bad value for 'fd' [ 2721.314518][ T28] audit: type=1400 audit(2977.191:896): avc: denied { mounton } for pid=25305 comm="syz.0.5859" path="/556/file0" dev="tmpfs" ino=2912 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2724.262230][T25311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=25311 comm=syz.0.5860 [ 2724.890450][ T28] audit: type=1400 audit(2980.761:897): avc: denied { create } for pid=25315 comm="syz.0.5862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2725.752214][ T28] audit: type=1400 audit(2981.621:898): avc: denied { create } for pid=25319 comm="syz.0.5864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2725.896848][ T28] audit: type=1400 audit(2981.771:899): avc: denied { read } for pid=25319 comm="syz.0.5864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2727.313267][ T28] audit: type=1400 audit(2983.191:900): avc: denied { create } for pid=25321 comm="syz.0.5865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2727.317210][ T28] audit: type=1400 audit(2983.191:901): avc: denied { write } for pid=25321 comm="syz.0.5865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2727.319714][ T28] audit: type=1400 audit(2983.191:902): avc: denied { getopt } for pid=25321 comm="syz.0.5865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2727.324772][ T28] audit: type=1400 audit(2983.201:903): avc: denied { create } for pid=25321 comm="syz.0.5865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2727.350280][ T28] audit: type=1400 audit(2983.221:904): avc: denied { getopt } for pid=25321 comm="syz.0.5865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2727.499156][ T28] audit: type=1400 audit(2983.371:905): avc: denied { sys_module } for pid=25321 comm="syz.0.5865" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2727.893754][ T28] audit: type=1400 audit(2983.771:906): avc: denied { ioctl } for pid=25321 comm="syz.0.5865" path="socket:[64857]" dev="sockfs" ino=64857 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2729.164720][ T28] audit: type=1400 audit(2985.041:907): avc: denied { write } for pid=25328 comm="syz.0.5866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2734.253801][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 2734.255995][ T28] audit: type=1400 audit(2990.131:909): avc: denied { create } for pid=25339 comm="syz.2.5870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2734.464647][ T28] audit: type=1400 audit(2990.341:910): avc: denied { write } for pid=25339 comm="syz.2.5870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2734.553580][ T28] audit: type=1400 audit(2990.431:911): avc: denied { ioctl } for pid=25339 comm="syz.2.5870" path="socket:[63916]" dev="sockfs" ino=63916 ioctlcmd=0xaf22 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2735.086085][T25340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25340 comm=syz.2.5870 [ 2736.394431][ T28] audit: type=1400 audit(2992.271:912): avc: denied { read } for pid=25348 comm="syz.0.5874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2737.411874][T25351] FAULT_INJECTION: forcing a failure. [ 2737.411874][T25351] name failslab, interval 1, probability 0, space 0, times 0 [ 2737.412269][T25351] CPU: 0 UID: 0 PID: 25351 Comm: syz.0.5874 Tainted: G L syzkaller #0 PREEMPT [ 2737.412359][T25351] Tainted: [L]=SOFTLOCKUP [ 2737.412380][T25351] Hardware name: ARM-Versatile Express [ 2737.412404][T25351] Call trace: [ 2737.412442][T25351] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2737.412542][T25351] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 2737.412564][T25351] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2737.412614][T25351] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2737.412674][T25351] r7:00000820 r6:00000000 r5:863d0c40 r4:82b17e08 [ 2737.412691][T25351] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2737.412751][T25351] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2737.412818][T25351] r8:00000000 r7:00000820 r6:00000000 r5:00000000 r4:830e4c00 [ 2737.412837][T25351] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 2737.412895][T25351] [<8052c290>] (kmem_cache_alloc_noprof) from [<815f3290>] (skb_clone+0x60/0x1c8) [ 2737.412992][T25351] r10:00000000 r9:828d438e r8:00000000 r7:85710000 r6:865f4000 r5:862e1840 [ 2737.413016][T25351] r4:00000820 [ 2737.413034][T25351] [<815f3230>] (skb_clone) from [<80de61c4>] (vxcan_xmit+0x5c/0x194) [ 2737.413103][T25351] r7:85710000 r6:865f4000 r5:00000000 r4:862e1840 [ 2737.413123][T25351] [<80de6168>] (vxcan_xmit) from [<81615ba8>] (dev_hard_start_xmit+0xf4/0x32c) [ 2737.413192][T25351] r7:00000000 r6:81d867a0 r5:865f4000 r4:862e1840 [ 2737.413214][T25351] [<81615ab4>] (dev_hard_start_xmit) from [<81616abc>] (__dev_queue_xmit+0xb98/0x1260) [ 2737.413285][T25351] r10:00000000 r9:00000000 r8:828d438c r7:865f4000 r6:00000000 r5:85db3140 [ 2737.413310][T25351] r4:862e1840 [ 2737.413327][T25351] [<81615f24>] (__dev_queue_xmit) from [<819ac08c>] (can_send+0x104/0x378) [ 2737.413433][T25351] r10:00000000 r9:879a0000 r8:862e1840 r7:862b1bc0 r6:862d8b40 r5:879a0000 [ 2737.413463][T25351] r4:862e1840 [ 2737.413481][T25351] [<819abf88>] (can_send) from [<819be374>] (isotp_sendmsg+0x3ec/0x86c) [ 2737.413549][T25351] r9:879a0000 r8:862e1840 r7:00000000 r6:865f4000 r5:879a2000 r4:0000002c [ 2737.413569][T25351] [<819bdf88>] (isotp_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 2737.413661][T25351] r10:00008000 r9:00000000 r8:edbb1dcc r7:00000000 r6:8590acc0 r5:edbb1f20 [ 2737.413685][T25351] r4:00000000 [ 2737.413703][T25351] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2737.413766][T25351] r7:00000000 r6:00000000 r5:8590acc0 r4:edbb1f20 [ 2737.413784][T25351] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2737.413848][T25351] r10:00000128 r9:20000380 r8:00008000 r7:00000000 r6:8590acc0 r5:edbb1f20 [ 2737.413871][T25351] r4:00000000 [ 2737.413888][T25351] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2737.413961][T25351] r9:863d0c40 r8:8389cb00 r7:00008000 r6:20000380 r5:8389cb01 r4:00000003 [ 2737.413981][T25351] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2737.414034][T25351] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2737.414052][T25351] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2737.414095][T25351] Exception stack(0xedbb1fa8 to 0xedbb1ff0) [ 2737.414134][T25351] 1fa0: 00000000 00000000 00000003 20000380 00008000 00000000 [ 2737.414171][T25351] 1fc0: 00000000 00000000 0012f1a4 00000128 00346378 00000000 003d0f00 76f4f0dc [ 2737.414201][T25351] 1fe0: 76f4ee88 76f4ee78 00018e58 001307a0 [ 2738.012203][ T28] audit: type=1400 audit(2993.881:913): avc: denied { setopt } for pid=25352 comm="syz.2.5876" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2738.092103][ T28] audit: type=1400 audit(2993.961:914): avc: denied { setattr } for pid=25352 comm="syz.2.5876" name="RAW" dev="sockfs" ino=64914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2738.116336][ T28] audit: type=1400 audit(2993.991:915): avc: denied { create } for pid=25352 comm="syz.2.5876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2738.119069][ T28] audit: type=1400 audit(2993.991:916): avc: denied { ioctl } for pid=25352 comm="syz.2.5876" path="socket:[64915]" dev="sockfs" ino=64915 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2741.417061][T25364] FAULT_INJECTION: forcing a failure. [ 2741.417061][T25364] name failslab, interval 1, probability 0, space 0, times 0 [ 2741.418593][T25364] CPU: 0 UID: 0 PID: 25364 Comm: syz.0.5880 Tainted: G L syzkaller #0 PREEMPT [ 2741.418707][T25364] Tainted: [L]=SOFTLOCKUP [ 2741.418730][T25364] Hardware name: ARM-Versatile Express [ 2741.418753][T25364] Call trace: [ 2741.418795][T25364] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2741.418892][T25364] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2741.418917][T25364] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2741.418973][T25364] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2741.419034][T25364] r7:00000000 r6:00000000 r5:840bd5c0 r4:82b17e08 [ 2741.419053][T25364] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2741.419112][T25364] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2741.419190][T25364] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000019 [ 2741.419210][T25364] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 2741.419271][T25364] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 2741.419343][T25364] r10:00000fff r9:83804800 r8:00000000 r7:834ab7f8 r6:867256a8 r5:85109ffd [ 2741.419365][T25364] r4:85109fef [ 2741.419385][T25364] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 2741.419453][T25364] r9:83804800 r8:00000000 r7:834ab7f8 r6:867256a8 r5:00001000 r4:85109ff0 [ 2741.419474][T25364] [<8080b324>] (tomoyo_encode) from [<8080b3d4>] (tomoyo_realpath_from_path+0x80/0x16c) [ 2741.419541][T25364] r5:00001000 r4:85109000 [ 2741.419559][T25364] [<8080b354>] (tomoyo_realpath_from_path) from [<8080785c>] (tomoyo_path_perm+0xe4/0x200) [ 2741.419630][T25364] r10:000000c5 r9:840bd5c0 r8:00000001 r7:00000000 r6:00000005 r5:00000000 [ 2741.419655][T25364] r4:00000000 r3:00000000 [ 2741.419674][T25364] [<80807778>] (tomoyo_path_perm) from [<8080bbd8>] (tomoyo_inode_getattr+0x1c/0x20) [ 2741.419737][T25364] r8:8020029c r7:86725680 r6:867256a8 r5:edc41eb8 r4:867256a8 [ 2741.419756][T25364] [<8080bbbc>] (tomoyo_inode_getattr) from [<807c3bcc>] (security_inode_getattr+0x64/0x198) [ 2741.419812][T25364] [<807c3b68>] (security_inode_getattr) from [<80589128>] (vfs_fstat+0x30/0x8c) [ 2741.419865][T25364] r5:edc41eb8 r4:86725681 [ 2741.419883][T25364] [<805890f8>] (vfs_fstat) from [<8058923c>] (__do_sys_fstat64+0x40/0x7c) [ 2741.419940][T25364] r7:000000c5 r6:0012f1a4 r5:20000040 r4:00000003 [ 2741.419957][T25364] [<805891fc>] (__do_sys_fstat64) from [<80589458>] (sys_fstat64+0x10/0x14) [ 2741.420009][T25364] r5:00000000 r4:00000000 [ 2741.420027][T25364] [<80589448>] (sys_fstat64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2741.420072][T25364] Exception stack(0xedc41fa8 to 0xedc41ff0) [ 2741.420106][T25364] 1fa0: 00000000 00000000 00000003 20000040 00000000 00000000 [ 2741.420137][T25364] 1fc0: 00000000 00000000 0012f1a4 000000c5 003462d8 00000000 00000001 76f700dc [ 2741.420171][T25364] 1fe0: 76f6fe88 76f6fe78 00018e58 001307a0 [ 2741.478355][T25364] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2742.112453][ T28] audit: type=1400 audit(2997.981:917): avc: denied { bpf } for pid=25367 comm="syz.2.5882" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2744.394751][T25377] FAULT_INJECTION: forcing a failure. [ 2744.394751][T25377] name failslab, interval 1, probability 0, space 0, times 0 [ 2744.396074][T25377] CPU: 0 UID: 0 PID: 25377 Comm: syz.0.5885 Tainted: G L syzkaller #0 PREEMPT [ 2744.396141][T25377] Tainted: [L]=SOFTLOCKUP [ 2744.396154][T25377] Hardware name: ARM-Versatile Express [ 2744.396172][T25377] Call trace: [ 2744.396193][T25377] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2744.396249][T25377] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2744.396258][T25377] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2744.396284][T25377] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2744.396319][T25377] r7:00000820 r6:00000000 r5:848055c0 r4:82b17e08 [ 2744.396338][T25377] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2744.396394][T25377] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2744.396432][T25377] r8:8654a400 r7:00000820 r6:00000000 r5:00000000 r4:830e4c00 [ 2744.396441][T25377] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 2744.396470][T25377] [<8052c290>] (kmem_cache_alloc_noprof) from [<815f3290>] (skb_clone+0x60/0x1c8) [ 2744.396507][T25377] r10:85577584 r9:85754580 r8:8654a400 r7:862d8a80 r6:860c4f00 r5:862d8a80 [ 2744.396518][T25377] r4:00000820 [ 2744.396526][T25377] [<815f3230>] (skb_clone) from [<8171343c>] (__netlink_deliver_tap+0x1e4/0x27c) [ 2744.396559][T25377] r7:862d8a80 r6:860c4f00 r5:8654a464 r4:860c4800 [ 2744.396567][T25377] [<81713258>] (__netlink_deliver_tap) from [<81715460>] (netlink_unicast+0x35c/0x380) [ 2744.396600][T25377] r10:85577584 r9:85ce0000 r8:862d8a80 r7:85754580 r6:00000014 r5:8654a464 [ 2744.396610][T25377] r4:8654a400 [ 2744.396617][T25377] [<81715104>] (netlink_unicast) from [<8171564c>] (netlink_sendmsg+0x1c8/0x444) [ 2744.396649][T25377] r10:00000000 r9:00000000 r8:00000000 r7:85577400 r6:00000014 r5:862d8a80 [ 2744.396660][T25377] r4:edc45f20 [ 2744.396667][T25377] [<81715484>] (netlink_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 2744.396701][T25377] r10:00000040 r9:00000000 r8:edc45dcc r7:00000000 r6:8355c2c0 r5:edc45f20 [ 2744.396710][T25377] r4:00000000 [ 2744.396718][T25377] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2744.396748][T25377] r7:00000000 r6:00000000 r5:8355c2c0 r4:edc45f20 [ 2744.396757][T25377] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2744.396789][T25377] r10:00000128 r9:20000580 r8:00000040 r7:00000000 r6:8355c2c0 r5:edc45f20 [ 2744.396799][T25377] r4:00000000 [ 2744.396807][T25377] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2744.396837][T25377] r9:848055c0 r8:84ee2780 r7:00000040 r6:20000580 r5:84ee2781 r4:00000003 [ 2744.396847][T25377] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2744.396873][T25377] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2744.396882][T25377] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2744.396903][T25377] Exception stack(0xedc45fa8 to 0xedc45ff0) [ 2744.396927][T25377] 5fa0: 00000000 00000000 00000003 20000580 00000040 00000000 [ 2744.396944][T25377] 5fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f700dc [ 2744.396986][T25377] 5fe0: 76f6fe88 76f6fe78 00018e58 001307a0 [ 2745.033200][T25381] FAULT_INJECTION: forcing a failure. [ 2745.033200][T25381] name failslab, interval 1, probability 0, space 0, times 0 [ 2745.033483][T25381] CPU: 1 UID: 0 PID: 25381 Comm: syz.2.5887 Tainted: G L syzkaller #0 PREEMPT [ 2745.033539][T25381] Tainted: [L]=SOFTLOCKUP [ 2745.033549][T25381] Hardware name: ARM-Versatile Express [ 2745.033563][T25381] Call trace: [ 2745.033584][T25381] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2745.033641][T25381] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2745.033650][T25381] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2745.033720][T25381] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2745.033776][T25381] r7:00000000 r6:00000000 r5:840bd5c0 r4:82b17e08 [ 2745.033786][T25381] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2745.033847][T25381] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2745.033915][T25381] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000019 [ 2745.033959][T25381] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 2745.034019][T25381] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 2745.034085][T25381] r10:00000fff r9:83804800 r8:00000000 r7:85847550 r6:8671a328 r5:857e9ffd [ 2745.034125][T25381] r4:857e9fef [ 2745.034163][T25381] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 2745.034204][T25381] r9:83804800 r8:00000000 r7:85847550 r6:8671a328 r5:00001000 r4:857e9ff0 [ 2745.034248][T25381] [<8080b324>] (tomoyo_encode) from [<8080b3d4>] (tomoyo_realpath_from_path+0x80/0x16c) [ 2745.034289][T25381] r5:00001000 r4:857e9000 [ 2745.034336][T25381] [<8080b354>] (tomoyo_realpath_from_path) from [<8080785c>] (tomoyo_path_perm+0xe4/0x200) [ 2745.034385][T25381] r10:000000c5 r9:840bd5c0 r8:00000001 r7:00000000 r6:00000005 r5:00000000 [ 2745.034430][T25381] r4:00000000 r3:00000000 [ 2745.034466][T25381] [<80807778>] (tomoyo_path_perm) from [<8080bbd8>] (tomoyo_inode_getattr+0x1c/0x20) [ 2745.034537][T25381] r8:8020029c r7:8671a300 r6:8671a328 r5:ede19eb8 r4:8671a328 [ 2745.034572][T25381] [<8080bbbc>] (tomoyo_inode_getattr) from [<807c3bcc>] (security_inode_getattr+0x64/0x198) [ 2745.034612][T25381] [<807c3b68>] (security_inode_getattr) from [<80589128>] (vfs_fstat+0x30/0x8c) [ 2745.034671][T25381] r5:ede19eb8 r4:8671a301 [ 2745.034680][T25381] [<805890f8>] (vfs_fstat) from [<8058923c>] (__do_sys_fstat64+0x40/0x7c) [ 2745.034712][T25381] r7:000000c5 r6:0012f1a4 r5:200010c0 r4:00000003 [ 2745.034720][T25381] [<805891fc>] (__do_sys_fstat64) from [<80589458>] (sys_fstat64+0x10/0x14) [ 2745.034769][T25381] r5:00000000 r4:00000000 [ 2745.034781][T25381] [<80589448>] (sys_fstat64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2745.034872][T25381] Exception stack(0xede19fa8 to 0xede19ff0) [ 2745.035026][T25381] 9fa0: 00000000 00000000 00000003 200010c0 00000000 00000000 [ 2745.035107][T25381] 9fc0: 00000000 00000000 0012f1a4 000000c5 003462d8 00000000 00000001 76fd80dc [ 2745.035209][T25381] 9fe0: 76fd7e88 76fd7e78 00018e58 001307a0 [ 2745.076574][T25381] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2747.933856][ T28] audit: type=1400 audit(3003.811:918): avc: denied { bind } for pid=25391 comm="syz.0.5891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2747.936914][ T28] audit: type=1400 audit(3003.811:919): avc: denied { accept } for pid=25391 comm="syz.0.5891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2752.643865][ T28] audit: type=1400 audit(3008.521:920): avc: denied { name_bind } for pid=25407 comm="syz.2.5897" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2752.645824][ T28] audit: type=1400 audit(3008.521:921): avc: denied { node_bind } for pid=25407 comm="syz.2.5897" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2756.320920][ T28] audit: type=1400 audit(3012.191:922): avc: denied { create } for pid=25423 comm="syz.2.5902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2756.854450][ T28] audit: type=1400 audit(3012.731:923): avc: denied { create } for pid=25428 comm="syz.2.5903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2756.868946][ T28] audit: type=1400 audit(3012.741:924): avc: denied { create } for pid=25428 comm="syz.2.5903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2756.874867][ T28] audit: type=1400 audit(3012.751:925): avc: denied { write } for pid=25428 comm="syz.2.5903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2756.889167][T25429] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2576 sclass=netlink_xfrm_socket pid=25429 comm=syz.2.5903 [ 2765.353223][T25466] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25466 comm=syz.2.5917 [ 2774.143647][ T28] audit: type=1400 audit(3030.021:926): avc: denied { setopt } for pid=25504 comm="syz.2.5933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2774.343456][ T28] audit: type=1400 audit(3030.221:927): avc: denied { create } for pid=25504 comm="syz.2.5933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2777.590587][ T28] audit: type=1400 audit(3033.461:928): avc: denied { execute } for pid=25518 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2777.607387][ T28] audit: type=1400 audit(3033.481:929): avc: denied { execute_no_trans } for pid=25518 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2777.646726][ T28] audit: type=1400 audit(3033.521:930): avc: denied { execmem } for pid=25518 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2777.677581][ T28] audit: type=1400 audit(3033.551:931): avc: denied { mounton } for pid=25521 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2777.800124][T17608] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2777.886237][T17608] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2777.955336][T17608] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2778.017360][T17608] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2778.281171][T17608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2778.286674][T17608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2778.289609][T17608] bond0 (unregistering): Released all slaves [ 2778.382051][T17608] hsr_slave_0: left promiscuous mode [ 2778.383893][T17608] hsr_slave_1: left promiscuous mode [ 2778.402567][T17608] veth1_macvtap: left promiscuous mode [ 2778.402899][T17608] veth0_macvtap: left promiscuous mode [ 2778.403180][T17608] veth1_vlan: left promiscuous mode [ 2778.403293][T17608] veth0_vlan: left promiscuous mode [ 2779.196074][ T28] audit: type=1400 audit(3035.071:932): avc: denied { write } for pid=25544 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2779.203352][ T28] audit: type=1400 audit(3035.071:933): avc: denied { open } for pid=25544 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2779.592219][ T28] audit: type=1400 audit(3035.461:934): avc: denied { search } for pid=25547 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.594514][ T28] audit: type=1400 audit(3035.461:935): avc: denied { search } for pid=25547 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.600224][ T28] audit: type=1400 audit(3035.461:936): avc: denied { search } for pid=25547 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.606889][ T28] audit: type=1400 audit(3035.461:937): avc: denied { search } for pid=25547 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.623365][ T28] audit: type=1400 audit(3035.491:938): avc: denied { read open } for pid=25570 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.623779][ T28] audit: type=1400 audit(3035.491:939): avc: denied { getattr } for pid=25570 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.665796][ T28] audit: type=1400 audit(3035.541:940): avc: denied { add_name } for pid=25547 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2779.668083][ T28] audit: type=1400 audit(3035.541:941): avc: denied { create } for pid=25547 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2780.035223][ T2957] 8021q: adding VLAN 0 to HW filter on device eth5 [ 2781.358088][T25521] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2781.364196][T25521] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2781.473437][ T2957] 8021q: adding VLAN 0 to HW filter on device eth6 [ 2782.577960][T25521] hsr_slave_0: entered promiscuous mode [ 2782.579601][T25521] hsr_slave_1: entered promiscuous mode [ 2783.477612][T25521] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2783.496110][T25521] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 2783.499115][T25521] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2783.517024][T25521] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 2783.523830][T25521] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2783.545838][T25521] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 2783.548292][T25521] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2783.564179][T25521] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 2784.903115][T25521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2785.867947][T25864] FAULT_INJECTION: forcing a failure. [ 2785.867947][T25864] name failslab, interval 1, probability 0, space 0, times 0 [ 2785.868221][T25864] CPU: 1 UID: 0 PID: 25864 Comm: syz.2.5941 Tainted: G L syzkaller #0 PREEMPT [ 2785.868275][T25864] Tainted: [L]=SOFTLOCKUP [ 2785.868284][T25864] Hardware name: ARM-Versatile Express [ 2785.868297][T25864] Call trace: [ 2785.868318][T25864] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2785.868382][T25864] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2785.868392][T25864] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2785.868418][T25864] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2785.868448][T25864] r7:00000000 r6:00000000 r5:8317a4c0 r4:82b17e08 [ 2785.868455][T25864] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2785.868485][T25864] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2785.868561][T25864] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000021 [ 2785.868599][T25864] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 2785.868763][T25864] [<8052d190>] (__kmalloc_noprof) from [<8080b29c>] (tomoyo_encode2+0x64/0xec) [ 2785.869159][T25864] r10:00000fff r9:830c0000 r8:00000000 r7:834d67f8 r6:86391928 r5:857e9ffc [ 2785.869176][T25864] r4:857e9fe6 [ 2785.869427][T25864] [<8080b238>] (tomoyo_encode2) from [<8080b348>] (tomoyo_encode+0x24/0x30) [ 2785.869722][T25864] r9:830c0000 r8:00000000 r7:834d67f8 r6:86391928 r5:00001000 r4:857e9fe7 [ 2785.869795][T25864] [<8080b324>] (tomoyo_encode) from [<8080b3d4>] (tomoyo_realpath_from_path+0x80/0x16c) [ 2785.869828][T25864] r5:00001000 r4:857e9000 [ 2785.869835][T25864] [<8080b354>] (tomoyo_realpath_from_path) from [<80807458>] (tomoyo_path_number_perm+0xcc/0x22c) [ 2785.869871][T25864] r10:00000000 r9:00000004 r8:86391900 r7:40045532 r6:81cda174 r5:00000004 [ 2785.869899][T25864] r4:86391928 r3:828d1400 [ 2785.869934][T25864] [<8080738c>] (tomoyo_path_number_perm) from [<8080bdac>] (tomoyo_file_ioctl+0x1c/0x20) [ 2785.869997][T25864] r10:8317a4c0 r9:00000004 r8:86391900 r7:00000000 r6:00000000 r5:40045532 [ 2785.870090][T25864] r4:86391900 [ 2785.870155][T25864] [<8080bd90>] (tomoyo_file_ioctl) from [<807b6e34>] (security_file_ioctl+0x80/0x1d4) [ 2785.870584][T25864] [<807b6db4>] (security_file_ioctl) from [<8059c0b4>] (sys_ioctl+0x4c/0xb5c) [ 2785.870620][T25864] r7:00000000 r6:40045532 r5:86391901 r4:00000000 [ 2785.870763][T25864] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2785.870894][T25864] Exception stack(0xee851fa8 to 0xee851ff0) [ 2785.870920][T25864] 1fa0: 00000000 00000000 00000004 40045532 00000000 00000000 [ 2785.870938][T25864] 1fc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76fd80dc [ 2785.870978][T25864] 1fe0: 76fd7e88 76fd7e78 00018e58 001307a0 [ 2785.870998][T25864] r10:00000036 r9:8317a4c0 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 2785.871090][T25864] r4:00000000 [ 2786.009015][T25864] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2789.697490][T25521] veth0_vlan: entered promiscuous mode [ 2789.750093][T25521] veth1_vlan: entered promiscuous mode [ 2789.936273][T25521] veth0_macvtap: entered promiscuous mode [ 2789.959076][T25521] veth1_macvtap: entered promiscuous mode [ 2790.045973][T25913] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2790.046638][T25913] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2790.048622][T25913] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2790.051273][T25913] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2790.164391][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 2790.164619][ T28] audit: type=1400 audit(3046.031:950): avc: denied { mounton } for pid=25521 comm="syz-executor" path="/syzkaller.aIRucG/syz-tmp" dev="vda" ino=825 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2790.164753][ T28] audit: type=1400 audit(3046.031:951): avc: denied { mount } for pid=25521 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2790.201967][ T28] audit: type=1400 audit(3046.071:952): avc: denied { mount } for pid=25521 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2790.202193][ T28] audit: type=1400 audit(3046.071:953): avc: denied { mounton } for pid=25521 comm="syz-executor" path="/syzkaller.aIRucG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2790.202376][ T28] audit: type=1400 audit(3046.071:954): avc: denied { mounton } for pid=25521 comm="syz-executor" path="/syzkaller.aIRucG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=65691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2790.211934][ T28] audit: type=1400 audit(3046.081:955): avc: denied { unmount } for pid=25521 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2790.231662][ T28] audit: type=1400 audit(3046.101:956): avc: denied { mounton } for pid=25521 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2790.242723][ T28] audit: type=1400 audit(3046.101:957): avc: denied { mount } for pid=25521 comm="syz-executor" name="/" dev="gadgetfs" ino=2555 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2790.242945][ T28] audit: type=1400 audit(3046.101:958): avc: denied { mount } for pid=25521 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2790.243097][ T28] audit: type=1400 audit(3046.101:959): avc: denied { mounton } for pid=25521 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2790.502307][T25919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25919 comm=syz.0.5938 [ 2796.717079][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 2796.717323][ T28] audit: type=1400 audit(3052.591:962): avc: denied { setopt } for pid=25939 comm="syz.0.5950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2797.086139][ T28] audit: type=1400 audit(3052.961:963): avc: denied { write } for pid=25938 comm="syz.2.5949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2797.095490][ T28] audit: type=1400 audit(3052.971:964): avc: denied { read } for pid=25938 comm="syz.2.5949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2800.297321][T25964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25964 comm=syz.0.5956 [ 2802.712926][ T28] audit: type=1400 audit(3058.591:965): avc: denied { prog_load } for pid=25971 comm="syz.2.5959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2802.713748][ T28] audit: type=1400 audit(3058.591:966): avc: denied { perfmon } for pid=25971 comm="syz.2.5959" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2803.705300][ T28] audit: type=1400 audit(3059.581:967): avc: denied { unmount } for pid=22694 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2804.668800][ T28] audit: type=1400 audit(3060.541:968): avc: denied { ioctl } for pid=25978 comm="syz.2.5962" path="socket:[66623]" dev="sockfs" ino=66623 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2815.043007][ T28] audit: type=1400 audit(3070.921:969): avc: denied { getopt } for pid=26014 comm="syz.2.5974" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2815.448321][ T28] audit: type=1400 audit(3071.321:970): avc: denied { ioctl } for pid=26016 comm="syz.0.5976" path="socket:[65858]" dev="sockfs" ino=65858 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2821.623076][T26036] FAULT_INJECTION: forcing a failure. [ 2821.623076][T26036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2821.623596][T26036] CPU: 0 UID: 0 PID: 26036 Comm: syz.0.5982 Tainted: G L syzkaller #0 PREEMPT [ 2821.623688][T26036] Tainted: [L]=SOFTLOCKUP [ 2821.623710][T26036] Hardware name: ARM-Versatile Express [ 2821.623733][T26036] Call trace: [ 2821.623779][T26036] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2821.623927][T26036] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2821.623969][T26036] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2821.624106][T26036] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2821.624189][T26036] r7:00000000 r6:00000000 r5:833ebd40 r4:82b4ee88 [ 2821.624238][T26036] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2821.624380][T26036] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2821.624485][T26036] r8:00000000 r7:00000000 r6:000000b4 r5:20000200 r4:83890840 [ 2821.624504][T26036] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2821.624713][T26036] [<809cd408>] (should_fail_usercopy) from [<809d33a8>] (strncpy_from_user+0x20/0x1b0) [ 2821.624789][T26036] [<809d3388>] (strncpy_from_user) from [<805901d8>] (do_getname+0x4c/0x14c) [ 2821.624860][T26036] r10:8389084c r9:833ebd40 r8:00000000 r7:00000000 r6:20000200 r5:825238b8 [ 2821.624936][T26036] r4:83890840 [ 2821.625087][T26036] [<8059018c>] (do_getname) from [<80595d0c>] (getname_flags+0x14/0x18) [ 2821.625205][T26036] r10:00000142 r9:833ebd40 r8:8020029c r7:20000200 r6:ffffff9c r5:dfd61f50 [ 2821.625307][T26036] r4:00000000 r3:00000001 [ 2821.625389][T26036] [<80595cf8>] (getname_flags) from [<8057d908>] (do_sys_openat2+0x64/0xf0) [ 2821.625543][T26036] [<8057d8a4>] (do_sys_openat2) from [<8057dd0c>] (sys_openat+0x80/0xd0) [ 2821.625636][T26036] r7:00000142 r6:00000000 r5:20000200 r4:ffffff9c [ 2821.625731][T26036] [<8057dc8c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2821.625932][T26036] Exception stack(0xdfd61fa8 to 0xdfd61ff0) [ 2821.626106][T26036] 1fa0: 00000000 00000000 ffffff9c 20000200 00000002 00000000 [ 2821.626193][T26036] 1fc0: 00000000 00000000 0012f1a4 00000142 00346418 00000000 00000001 76ecf0dc [ 2821.626235][T26036] 1fe0: 76ecee88 76ecee78 00018e58 001307a0 [ 2821.626268][T26036] r6:0012f1a4 r5:00000000 r4:00000000 [ 2837.364656][ T28] audit: type=1400 audit(3093.241:971): avc: denied { getopt } for pid=26100 comm="syz.2.6009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2839.382617][ T28] audit: type=1400 audit(3095.251:972): avc: denied { lock } for pid=26111 comm="syz.0.6014" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2841.020645][ T28] audit: type=1400 audit(3096.891:973): avc: denied { setattr } for pid=26116 comm="syz.2.6016" name="" dev="pipefs" ino=66059 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2842.546312][T26126] FAULT_INJECTION: forcing a failure. [ 2842.546312][T26126] name failslab, interval 1, probability 0, space 0, times 0 [ 2842.553879][T26126] CPU: 1 UID: 0 PID: 26126 Comm: syz.0.6019 Tainted: G L syzkaller #0 PREEMPT [ 2842.553964][T26126] Tainted: [L]=SOFTLOCKUP [ 2842.553974][T26126] Hardware name: ARM-Versatile Express [ 2842.553986][T26126] Call trace: [ 2842.554015][T26126] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2842.554096][T26126] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2842.554107][T26126] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2842.554133][T26126] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2842.554162][T26126] r7:00000cc0 r6:00000000 r5:845e6200 r4:82b17e08 [ 2842.554170][T26126] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2842.554205][T26126] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2842.554241][T26126] r8:850cec88 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4480 [ 2842.554250][T26126] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 2842.554278][T26126] [<8052c290>] (kmem_cache_alloc_noprof) from [<80610908>] (locks_get_lock_context+0x44/0x1fc) [ 2842.554312][T26126] r10:845e6200 r9:00000001 r8:850cec88 r7:8252394c r6:00000001 r5:850cec88 [ 2842.554323][T26126] r4:ea6f1ef8 [ 2842.554331][T26126] [<806108c4>] (locks_get_lock_context) from [<80610c88>] (flock_lock_inode+0x3c/0x54c) [ 2842.554363][T26126] r10:845e6200 r9:00000001 r8:850cec88 r7:ea6f1f14 r6:855db281 r5:ea6f1e78 [ 2842.554374][T26126] r4:ea6f1ef8 r3:00000002 [ 2842.554382][T26126] [<80610c4c>] (flock_lock_inode) from [<8061232c>] (locks_lock_inode_wait+0x58/0x1ac) [ 2842.554415][T26126] r10:0000008f r9:00000001 r8:850cec88 r7:ea6f1f14 r6:855db281 r5:ea6f1ef8 [ 2842.554424][T26126] r4:00000002 [ 2842.554432][T26126] [<806122d4>] (locks_lock_inode_wait) from [<806125fc>] (__do_sys_flock+0x17c/0x1c8) [ 2842.554463][T26126] r9:00000001 r8:855db280 r7:845e6200 r6:855db281 r5:00000000 r4:00000002 [ 2842.554472][T26126] [<80612480>] (__do_sys_flock) from [<80613ea8>] (sys_flock+0x10/0x14) [ 2842.554503][T26126] r9:845e6200 r8:8020029c r7:0000008f r6:0012f1a4 r5:00000000 r4:00000000 [ 2842.554512][T26126] [<80613e98>] (sys_flock) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2842.554534][T26126] Exception stack(0xea6f1fa8 to 0xea6f1ff0) [ 2842.554553][T26126] 1fa0: 00000000 00000000 00000003 00000002 00000000 00000000 [ 2842.554571][T26126] 1fc0: 00000000 00000000 0012f1a4 0000008f 003462d8 00000000 00000001 76f110dc [ 2842.554584][T26126] 1fe0: 76f10e88 76f10e78 00018e58 001307a0 [ 2848.258652][ T28] audit: type=1400 audit(3104.131:974): avc: denied { getopt } for pid=26143 comm="syz.0.6026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2848.398587][ T28] audit: type=1400 audit(3104.271:975): avc: denied { mounton } for pid=26141 comm="syz.2.6025" path="/431/file0" dev="tmpfs" ino=2263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2848.401309][T26146] fuse: Bad value for 'fd' [ 2849.064913][ T28] audit: type=1400 audit(3104.941:976): avc: denied { create } for pid=26143 comm="syz.0.6026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2854.765010][T26166] FAULT_INJECTION: forcing a failure. [ 2854.765010][T26166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2854.766186][T26166] CPU: 1 UID: 0 PID: 26166 Comm: syz.2.6032 Tainted: G L syzkaller #0 PREEMPT [ 2854.766310][T26166] Tainted: [L]=SOFTLOCKUP [ 2854.766336][T26166] Hardware name: ARM-Versatile Express [ 2854.766361][T26166] Call trace: [ 2854.766400][T26166] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2854.766503][T26166] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2854.766525][T26166] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2854.766650][T26166] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2854.766721][T26166] r7:20000680 r6:00000000 r5:84808c40 r4:82b4ee88 [ 2854.766739][T26166] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2854.766797][T26166] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2854.766860][T26166] r8:00000000 r7:20000680 r6:00000014 r5:00000000 r4:ea915f30 [ 2854.766878][T26166] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2854.766931][T26166] [<809cd408>] (should_fail_usercopy) from [<80905170>] (_copy_from_iter+0x64/0x7c4) [ 2854.767000][T26166] [<8090510c>] (_copy_from_iter) from [<819be1f0>] (isotp_sendmsg+0x268/0x86c) [ 2854.767074][T26166] r10:00000000 r9:86b08000 r8:ea915f20 r7:00000014 r6:00000000 r5:86b0a000 [ 2854.767095][T26166] r4:00000014 [ 2854.767113][T26166] [<819bdf88>] (isotp_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 2854.767181][T26166] r10:00000001 r9:00000000 r8:ea915dcc r7:00000000 r6:8586c7c0 r5:ea915f20 [ 2854.767203][T26166] r4:00000000 [ 2854.767222][T26166] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2854.767286][T26166] r7:00000000 r6:00000000 r5:8586c7c0 r4:ea915f20 [ 2854.767304][T26166] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2854.767367][T26166] r10:00000128 r9:20000880 r8:00000001 r7:00000000 r6:8586c7c0 r5:ea915f20 [ 2854.767388][T26166] r4:00000000 [ 2854.767405][T26166] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2854.767629][T26166] r9:84808c40 r8:84ee4480 r7:00000001 r6:20000880 r5:84ee4481 r4:00000003 [ 2854.767705][T26166] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2854.767792][T26166] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2854.767811][T26166] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2854.767858][T26166] Exception stack(0xea915fa8 to 0xea915ff0) [ 2854.767899][T26166] 5fa0: 00000000 00000000 00000003 20000880 00000001 00000000 [ 2854.767934][T26166] 5fc0: 00000000 00000000 0012f1a4 00000128 00346378 00000000 00000001 76fb70dc [ 2854.767962][T26166] 5fe0: 76fb6e88 76fb6e78 00018e58 001307a0 [ 2859.703312][ T28] audit: type=1400 audit(3115.581:977): avc: denied { lock } for pid=26192 comm="syz.0.6042" path="socket:[66999]" dev="sockfs" ino=66999 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 2862.526347][ T28] audit: type=1400 audit(3118.401:978): avc: denied { create } for pid=26197 comm="syz.2.6043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2865.333477][T26206] FAULT_INJECTION: forcing a failure. [ 2865.333477][T26206] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2865.333771][T26206] CPU: 1 UID: 0 PID: 26206 Comm: syz.2.6045 Tainted: G L syzkaller #0 PREEMPT [ 2865.333829][T26206] Tainted: [L]=SOFTLOCKUP [ 2865.333847][T26206] Hardware name: ARM-Versatile Express [ 2865.333877][T26206] Call trace: [ 2865.333921][T26206] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2865.333980][T26206] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2865.333989][T26206] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2865.334018][T26206] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2865.334099][T26206] r7:00000000 r6:00000000 r5:84823d40 r4:82b4ee88 [ 2865.334139][T26206] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2865.334210][T26206] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2865.334259][T26206] r8:76fd7f08 r7:00000000 r6:00000000 r5:eab25f68 r4:00000002 [ 2865.334307][T26206] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2865.334363][T26206] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 2865.334422][T26206] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 2865.334475][T26206] r10:80643b14 r9:00000001 r8:00000002 r7:eab25f68 r6:0000000f r5:76fd7f08 [ 2865.334499][T26206] r4:84823d40 r3:eab25e9f [ 2865.334507][T26206] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 2865.334579][T26206] r8:84823d40 r7:eab25f68 r6:76fd7f08 r5:84f8d000 r4:0000000f [ 2865.334616][T26206] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 2865.334664][T26206] r10:00000003 r9:84823d40 r8:8020029c r7:00000000 r6:00000000 r5:84f8d000 [ 2865.334681][T26206] r4:84f8d003 [ 2865.334715][T26206] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 2865.334750][T26206] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 2865.334799][T26206] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2865.334826][T26206] Exception stack(0xeab25fa8 to 0xeab25ff0) [ 2865.334848][T26206] 5fa0: 00000000 00000000 00000005 76fd7f08 0000000f 00000000 [ 2865.334932][T26206] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fd80dc [ 2865.334959][T26206] 5fe0: 76fd7e58 76fd7e44 0010b9c4 001125a8 [ 2866.922546][T26214] SELinux: syz.0.6048 (26214) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2868.824151][ T28] audit: type=1400 audit(3124.701:979): avc: denied { create } for pid=26217 comm="syz.2.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 2874.942206][T26227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65525 sclass=netlink_route_socket pid=26227 comm=syz.2.6051 [ 2897.802620][ T28] audit: type=1400 audit(3153.671:980): avc: denied { read write } for pid=26271 comm="syz.0.6064" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:file_context_t:s0" [ 2897.803014][ T28] audit: type=1400 audit(3153.671:981): avc: denied { open } for pid=26271 comm="syz.0.6064" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:file_context_t:s0" [ 2902.983998][ T28] audit: type=1400 audit(3158.861:982): avc: denied { create } for pid=26276 comm="syz.0.6066" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2902.992670][ T28] audit: type=1400 audit(3158.861:983): avc: denied { mounton } for pid=26276 comm="syz.0.6066" path="/69/file0" dev="tmpfs" ino=382 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2903.724003][ T28] audit: type=1400 audit(3159.601:984): avc: denied { write } for pid=26276 comm="syz.0.6066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2907.094226][T26285] FAULT_INJECTION: forcing a failure. [ 2907.094226][T26285] name failslab, interval 1, probability 0, space 0, times 0 [ 2907.112108][T26285] CPU: 0 UID: 0 PID: 26285 Comm: syz.0.6068 Tainted: G L syzkaller #0 PREEMPT [ 2907.112237][T26285] Tainted: [L]=SOFTLOCKUP [ 2907.112250][T26285] Hardware name: ARM-Versatile Express [ 2907.112263][T26285] Call trace: [ 2907.112285][T26285] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2907.112372][T26285] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 2907.112388][T26285] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2907.112441][T26285] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2907.112473][T26285] r7:00000820 r6:00000000 r5:840c3d40 r4:82b17e08 [ 2907.112483][T26285] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2907.112537][T26285] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2907.112592][T26285] r8:862cdcc0 r7:00000820 r6:00000000 r5:00000000 r4:830e4e40 [ 2907.112602][T26285] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 2907.112631][T26285] [<8052c290>] (kmem_cache_alloc_noprof) from [<815fb1c8>] (__skb_ext_alloc+0x20/0x40) [ 2907.112692][T26285] r10:00000000 r9:879b8000 r8:862cdcc0 r7:00000000 r6:00000004 r5:862cdcc0 [ 2907.112713][T26285] r4:0000001c [ 2907.112732][T26285] [<815fb1a8>] (__skb_ext_alloc) from [<815fb2e0>] (skb_ext_add+0xf8/0x180) [ 2907.112776][T26285] [<815fb1e8>] (skb_ext_add) from [<819be254>] (isotp_sendmsg+0x2cc/0x86c) [ 2907.112819][T26285] r10:00000000 r9:879b8000 r8:862cdcc0 r7:0000001c r6:00000000 r5:879ba000 [ 2907.112831][T26285] r4:0000001c r3:840c3d40 [ 2907.112839][T26285] [<819bdf88>] (isotp_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 2907.112873][T26285] r10:00008000 r9:00000000 r8:eaf75dcc r7:00000000 r6:8586f6c0 r5:eaf75f20 [ 2907.112883][T26285] r4:00000000 [ 2907.112891][T26285] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2907.112923][T26285] r7:00000000 r6:00000000 r5:8586f6c0 r4:eaf75f20 [ 2907.112932][T26285] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2907.113003][T26285] r10:00000128 r9:20000380 r8:00008000 r7:00000000 r6:8586f6c0 r5:eaf75f20 [ 2907.113015][T26285] r4:00000000 [ 2907.113023][T26285] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2907.113056][T26285] r9:840c3d40 r8:8389db00 r7:00008000 r6:20000380 r5:8389db01 r4:00000003 [ 2907.113064][T26285] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2907.113096][T26285] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2907.113104][T26285] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2907.113125][T26285] Exception stack(0xeaf75fa8 to 0xeaf75ff0) [ 2907.113145][T26285] 5fa0: 00000000 00000000 00000003 20000380 00008000 00000000 [ 2907.113168][T26285] 5fc0: 00000000 00000000 0012f1a4 00000128 00346378 00000000 00000001 76ef00dc [ 2907.113183][T26285] 5fe0: 76eefe88 76eefe78 00018e58 001307a0 [ 2911.205776][ T28] audit: type=1400 audit(3167.081:985): avc: denied { create } for pid=26297 comm="syz.0.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2911.234304][ T28] audit: type=1400 audit(3167.111:986): avc: denied { ioctl } for pid=26297 comm="syz.0.6074" path="socket:[67148]" dev="sockfs" ino=67148 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2911.283955][ T28] audit: type=1400 audit(3167.161:987): avc: denied { write } for pid=26297 comm="syz.0.6074" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 2913.742376][T26303] FAULT_INJECTION: forcing a failure. [ 2913.742376][T26303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2913.742644][T26303] CPU: 1 UID: 0 PID: 26303 Comm: syz.2.6077 Tainted: G L syzkaller #0 PREEMPT [ 2913.742738][T26303] Tainted: [L]=SOFTLOCKUP [ 2913.742749][T26303] Hardware name: ARM-Versatile Express [ 2913.742761][T26303] Call trace: [ 2913.742782][T26303] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2913.742837][T26303] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2913.742845][T26303] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2913.742924][T26303] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2913.743029][T26303] r7:00000000 r6:00000000 r5:840c3d40 r4:82b4ee88 [ 2913.743062][T26303] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2913.743113][T26303] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2913.743190][T26303] r8:76fd7f08 r7:00000000 r6:00000000 r5:eb019f68 r4:00000002 [ 2913.743209][T26303] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2913.743257][T26303] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 2913.743300][T26303] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 2913.743352][T26303] r10:80643b14 r9:00000001 r8:00000002 r7:eb019f68 r6:0000000f r5:76fd7f08 [ 2913.743384][T26303] r4:840c3d40 r3:eb019e9f [ 2913.743432][T26303] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 2913.743504][T26303] r8:840c3d40 r7:eb019f68 r6:76fd7f08 r5:8389db00 r4:0000000f [ 2913.743513][T26303] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 2913.743565][T26303] r10:00000003 r9:840c3d40 r8:8020029c r7:00000000 r6:00000000 r5:8389db00 [ 2913.743603][T26303] r4:8389db03 [ 2913.743643][T26303] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 2913.743694][T26303] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 2913.743718][T26303] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2913.743750][T26303] Exception stack(0xeb019fa8 to 0xeb019ff0) [ 2913.743791][T26303] 9fa0: 00000000 00000000 00000005 76fd7f08 0000000f 00000000 [ 2913.743817][T26303] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fd80dc [ 2913.743861][T26303] 9fe0: 76fd7e58 76fd7e44 0010b9c4 001125a8 [ 2921.235551][ T28] audit: type=1400 audit(3177.111:988): avc: denied { create } for pid=26321 comm="syz.0.6085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2922.460442][ T28] audit: type=1400 audit(3178.331:989): avc: denied { execute } for pid=26325 comm="syz.0.6086" name="file0" dev="tmpfs" ino=440 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2928.307964][ T28] audit: type=1400 audit(3184.181:990): avc: denied { create } for pid=26332 comm="syz.0.6089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2928.325996][T26333] FAULT_INJECTION: forcing a failure. [ 2928.325996][T26333] name failslab, interval 1, probability 0, space 0, times 0 [ 2928.328577][T26333] CPU: 1 UID: 0 PID: 26333 Comm: syz.0.6089 Tainted: G L syzkaller #0 PREEMPT [ 2928.328653][T26333] Tainted: [L]=SOFTLOCKUP [ 2928.328663][T26333] Hardware name: ARM-Versatile Express [ 2928.328675][T26333] Call trace: [ 2928.328696][T26333] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2928.328753][T26333] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2928.328762][T26333] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2928.328788][T26333] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2928.328817][T26333] r7:00000dc0 r6:00000000 r5:83186200 r4:82b17e08 [ 2928.328825][T26333] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2928.328853][T26333] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 2928.328889][T26333] r8:0000000c r7:00000dc0 r6:00000000 r5:00000000 r4:83001240 [ 2928.328898][T26333] [<8054ef68>] (should_failslab) from [<80528ab0>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 2928.328934][T26333] [<80528a5c>] (__kmalloc_cache_noprof) from [<816982d0>] (garp_init_applicant+0xe0/0x174) [ 2928.329015][T26333] r10:83186200 r9:00000004 r8:86018280 r7:82a19ec8 r6:8571c800 r5:85ccf000 [ 2928.329027][T26333] r4:82523738 [ 2928.329035][T26333] [<816981f0>] (garp_init_applicant) from [<819d3ef4>] (vlan_gvrp_init_applicant+0x18/0x1c) [ 2928.329069][T26333] r7:8571c800 r6:85ccf700 r5:85ccf000 r4:00000000 [ 2928.329077][T26333] [<819d3edc>] (vlan_gvrp_init_applicant) from [<819d1698>] (register_vlan_dev+0xd4/0x294) [ 2928.329105][T26333] [<819d15c4>] (register_vlan_dev) from [<819d1c54>] (vlan_ioctl_handler+0x3fc/0x480) [ 2928.329136][T26333] r10:83186200 r9:00000001 r8:85daf000 r7:8571c800 r6:00000004 r5:85ccf000 [ 2928.329146][T26333] r4:00000000 [ 2928.329154][T26333] [<819d1858>] (vlan_ioctl_handler) from [<815e02ec>] (sock_ioctl+0xd4/0x4c0) [ 2928.329188][T26333] r9:00000003 r8:857a8380 r7:85daf000 r6:20000480 r5:8355fbc0 r4:82e331cc [ 2928.329198][T26333] [<815e0218>] (sock_ioctl) from [<8059c2ac>] (sys_ioctl+0x244/0xb5c) [ 2928.329231][T26333] r9:00000003 r8:857a8380 r7:20000480 r6:00008982 r5:857a8381 r4:00000000 [ 2928.329240][T26333] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2928.329262][T26333] Exception stack(0xeb1bdfa8 to 0xeb1bdff0) [ 2928.329282][T26333] dfa0: 00000000 00000000 00000003 00008982 20000480 00000000 [ 2928.329298][T26333] dfc0: 00000000 00000000 0012f1a4 00000036 003462d8 00000000 00000001 76f110dc [ 2928.329311][T26333] dfe0: 76f10e88 76f10e78 00018e58 001307a0 [ 2928.329328][T26333] r10:00000036 r9:83186200 r8:8020029c r7:00000036 r6:0012f1a4 r5:00000000 [ 2928.329337][T26333] r4:00000000 [ 2929.602421][ T28] audit: type=1400 audit(3185.471:991): avc: denied { setopt } for pid=26336 comm="syz.0.6091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2934.812313][T26344] FAULT_INJECTION: forcing a failure. [ 2934.812313][T26344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2934.822405][T26344] CPU: 1 UID: 0 PID: 26344 Comm: syz.2.6094 Tainted: G L syzkaller #0 PREEMPT [ 2934.822492][T26344] Tainted: [L]=SOFTLOCKUP [ 2934.822503][T26344] Hardware name: ARM-Versatile Express [ 2934.822515][T26344] Call trace: [ 2934.822536][T26344] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2934.822593][T26344] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 2934.822603][T26344] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2934.822630][T26344] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2934.822658][T26344] r7:00000000 r6:00000000 r5:83faa4c0 r4:82b4ee88 [ 2934.822667][T26344] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2934.822695][T26344] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2934.822734][T26344] r8:eb14deb8 r7:00000000 r6:76fd7f08 r5:00000001 r4:00000001 [ 2934.822755][T26344] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2934.822801][T26344] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 2934.822830][T26344] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 2934.822867][T26344] r8:80644e50 r7:eb14df68 r6:76fd7f08 r5:8672d980 r4:00000001 [ 2934.822877][T26344] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 2934.822936][T26344] r5:8672d980 r4:00000001 [ 2934.822961][T26344] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 2934.822997][T26344] r10:00000004 r9:83faa4c0 r8:8020029c r7:00000000 r6:00000002 r5:8672d980 [ 2934.823008][T26344] r4:8672d983 [ 2934.823015][T26344] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 2934.823045][T26344] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 2934.823053][T26344] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2934.823081][T26344] Exception stack(0xeb14dfa8 to 0xeb14dff0) [ 2934.823100][T26344] dfa0: 00000000 00000000 00000005 76fd7f08 00000001 00000000 [ 2934.823116][T26344] dfc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76fd80dc [ 2934.823129][T26344] dfe0: 76fd7e58 76fd7e44 0010b9c4 001125a8 [ 2936.496216][ T28] audit: type=1400 audit(3192.371:992): avc: denied { create } for pid=26349 comm="syz.2.6096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2943.002308][ T28] audit: type=1400 audit(3198.871:993): avc: granted { setsecparam } for pid=26364 comm="syz.0.6100" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 2944.175878][T26365] FAULT_INJECTION: forcing a failure. [ 2944.175878][T26365] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2944.177990][T26365] CPU: 1 UID: 0 PID: 26365 Comm: syz.0.6100 Tainted: G L syzkaller #0 PREEMPT [ 2944.178074][T26365] Tainted: [L]=SOFTLOCKUP [ 2944.178094][T26365] Hardware name: ARM-Versatile Express [ 2944.178119][T26365] Call trace: [ 2944.178158][T26365] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2944.178264][T26365] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2944.178284][T26365] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2944.178338][T26365] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2944.178399][T26365] r7:00000000 r6:00000000 r5:84823d40 r4:82b4ee88 [ 2944.178417][T26365] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2944.178477][T26365] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2944.178545][T26365] r8:eb349eb8 r7:00000000 r6:76f10f08 r5:00000001 r4:00000001 [ 2944.178562][T26365] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2944.178620][T26365] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 2944.178677][T26365] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 2944.178745][T26365] r8:80644e50 r7:eb349f68 r6:76f10f08 r5:857a8080 r4:00000001 [ 2944.178765][T26365] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 2944.178829][T26365] r5:857a8080 r4:00000001 [ 2944.178846][T26365] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 2944.178913][T26365] r10:00000004 r9:84823d40 r8:8020029c r7:00000000 r6:00000002 r5:857a8080 [ 2944.178934][T26365] r4:857a8083 [ 2944.178952][T26365] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 2944.179013][T26365] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 2944.179032][T26365] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2944.179086][T26365] Exception stack(0xeb349fa8 to 0xeb349ff0) [ 2944.179125][T26365] 9fa0: 00000000 00000000 00000006 76f10f08 00000001 00000000 [ 2944.179159][T26365] 9fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f110dc [ 2944.179186][T26365] 9fe0: 76f10e58 76f10e44 0010b9c4 001125a8 [ 2947.539173][T26376] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26376 comm=syz.2.6103 [ 2950.094431][ T28] audit: type=1400 audit(3205.971:994): avc: denied { allowed } for pid=26380 comm="syz.2.6106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2950.098689][ T28] audit: type=1400 audit(3205.971:995): avc: denied { create } for pid=26380 comm="syz.2.6106" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2963.275201][T26419] FAULT_INJECTION: forcing a failure. [ 2963.275201][T26419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2963.276566][T26419] CPU: 1 UID: 0 PID: 26419 Comm: syz.0.6119 Tainted: G L syzkaller #0 PREEMPT [ 2963.276656][T26419] Tainted: [L]=SOFTLOCKUP [ 2963.276679][T26419] Hardware name: ARM-Versatile Express [ 2963.276704][T26419] Call trace: [ 2963.276745][T26419] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2963.276845][T26419] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2963.276866][T26419] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2963.276917][T26419] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2963.277009][T26419] r7:00000000 r6:00000000 r5:83faa4c0 r4:82b4ee88 [ 2963.277027][T26419] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2963.277087][T26419] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2963.277155][T26419] r8:ebdb1eb8 r7:00000000 r6:76eeff08 r5:00000001 r4:00000001 [ 2963.277174][T26419] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2963.277231][T26419] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 2963.277290][T26419] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 2963.277356][T26419] r8:80644e50 r7:ebdb1f68 r6:76eeff08 r5:84f8ef80 r4:00000001 [ 2963.277376][T26419] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 2963.277439][T26419] r5:84f8ef80 r4:00000001 [ 2963.277458][T26419] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 2963.277525][T26419] r10:00000004 r9:83faa4c0 r8:8020029c r7:00000000 r6:00000002 r5:84f8ef80 [ 2963.277548][T26419] r4:84f8ef83 [ 2963.277566][T26419] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 2963.277630][T26419] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 2963.277652][T26419] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2963.277703][T26419] Exception stack(0xebdb1fa8 to 0xebdb1ff0) [ 2963.277740][T26419] 1fa0: 00000000 00000000 00000004 76eeff08 00000001 00000000 [ 2963.277776][T26419] 1fc0: 00000000 00000000 00000000 00000004 00346378 00000000 003d0f00 76ef00dc [ 2963.277801][T26419] 1fe0: 76eefe58 76eefe44 0010b9c4 001125a8 [ 2964.039998][T26421] FAULT_INJECTION: forcing a failure. [ 2964.039998][T26421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2964.040437][T26421] CPU: 0 UID: 0 PID: 26421 Comm: syz.0.6120 Tainted: G L syzkaller #0 PREEMPT [ 2964.040528][T26421] Tainted: [L]=SOFTLOCKUP [ 2964.040548][T26421] Hardware name: ARM-Versatile Express [ 2964.040574][T26421] Call trace: [ 2964.040618][T26421] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2964.040765][T26421] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2964.040816][T26421] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2964.040923][T26421] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2964.041040][T26421] r7:00000000 r6:00000000 r5:84808c40 r4:82b4ee88 [ 2964.041086][T26421] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2964.041200][T26421] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2964.041330][T26421] r8:ebdb1eb8 r7:00000000 r6:76f10f08 r5:00000001 r4:00000001 [ 2964.041502][T26421] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2964.041591][T26421] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 2964.041663][T26421] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 2964.041750][T26421] r8:80644e50 r7:ebdb1f68 r6:76f10f08 r5:8389ff00 r4:00000001 [ 2964.041770][T26421] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 2964.041827][T26421] r5:8389ff00 r4:00000001 [ 2964.041843][T26421] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 2964.041908][T26421] r10:00000004 r9:84808c40 r8:8020029c r7:00000000 r6:00000002 r5:8389ff00 [ 2964.041931][T26421] r4:8389ff03 [ 2964.042021][T26421] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 2964.042094][T26421] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 2964.042113][T26421] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2964.042160][T26421] Exception stack(0xebdb1fa8 to 0xebdb1ff0) [ 2964.042197][T26421] 1fa0: 00000000 00000000 00000005 76f10f08 00000001 00000000 [ 2964.042240][T26421] 1fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f110dc [ 2964.042267][T26421] 1fe0: 76f10e58 76f10e44 0010b9c4 001125a8 [ 2965.262354][T26423] FAULT_INJECTION: forcing a failure. [ 2965.262354][T26423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2965.263803][T26423] CPU: 1 UID: 0 PID: 26423 Comm: syz.2.6121 Tainted: G L syzkaller #0 PREEMPT [ 2965.263874][T26423] Tainted: [L]=SOFTLOCKUP [ 2965.263884][T26423] Hardware name: ARM-Versatile Express [ 2965.263896][T26423] Call trace: [ 2965.263916][T26423] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2965.264013][T26423] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2965.264037][T26423] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2965.264093][T26423] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2965.264155][T26423] r7:00000000 r6:00000000 r5:845e6e40 r4:82b4ee88 [ 2965.264175][T26423] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2965.264217][T26423] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2965.264249][T26423] r8:eb3a5eb8 r7:00000000 r6:76fd7f08 r5:00000001 r4:00000001 [ 2965.264256][T26423] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2965.264284][T26423] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 2965.264312][T26423] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 2965.264344][T26423] r8:80644e50 r7:eb3a5f68 r6:76fd7f08 r5:8389db00 r4:00000001 [ 2965.264352][T26423] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 2965.264382][T26423] r5:8389db00 r4:00000001 [ 2965.264390][T26423] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 2965.264430][T26423] r10:00000004 r9:845e6e40 r8:8020029c r7:00000000 r6:00000002 r5:8389db00 [ 2965.264440][T26423] r4:8389db03 [ 2965.264448][T26423] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 2965.264477][T26423] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 2965.264484][T26423] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2965.264507][T26423] Exception stack(0xeb3a5fa8 to 0xeb3a5ff0) [ 2965.264526][T26423] 5fa0: 00000000 00000000 00000004 76fd7f08 00000001 00000000 [ 2965.264542][T26423] 5fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76fd80dc [ 2965.264555][T26423] 5fe0: 76fd7e58 76fd7e44 0010b9c4 001125a8 [ 2966.606998][ T28] audit: type=1400 audit(3222.481:996): avc: denied { ioctl } for pid=26424 comm="syz.0.6122" path="socket:[67352]" dev="sockfs" ino=67352 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2967.122280][ T28] audit: type=1400 audit(3223.001:997): avc: denied { write } for pid=26424 comm="syz.0.6122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2968.934627][ T28] audit: type=1400 audit(3224.811:998): avc: denied { connect } for pid=26431 comm="syz.0.6124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2973.803799][T26443] FAULT_INJECTION: forcing a failure. [ 2973.803799][T26443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2973.805185][T26443] CPU: 1 UID: 0 PID: 26443 Comm: syz.0.6128 Tainted: G L syzkaller #0 PREEMPT [ 2973.805272][T26443] Tainted: [L]=SOFTLOCKUP [ 2973.805292][T26443] Hardware name: ARM-Versatile Express [ 2973.805315][T26443] Call trace: [ 2973.805354][T26443] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 2973.805451][T26443] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 2973.805470][T26443] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 2973.805520][T26443] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 2973.805575][T26443] r7:20000680 r6:00000000 r5:845e6e40 r4:82b4ee88 [ 2973.805592][T26443] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 2973.805650][T26443] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 2973.805713][T26443] r8:00000000 r7:20000680 r6:000004a8 r5:00000000 r4:ebfbdf30 [ 2973.805730][T26443] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 2973.805783][T26443] [<809cd408>] (should_fail_usercopy) from [<80905170>] (_copy_from_iter+0x64/0x7c4) [ 2973.805839][T26443] [<8090510c>] (_copy_from_iter) from [<819be1f0>] (isotp_sendmsg+0x268/0x86c) [ 2973.805948][T26443] r10:00000000 r9:86b20000 r8:ebfbdf20 r7:000004a8 r6:00000000 r5:86b22000 [ 2973.805970][T26443] r4:000004a8 [ 2973.805988][T26443] [<819bdf88>] (isotp_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 2973.806055][T26443] r10:00000000 r9:00000000 r8:ebfbddcc r7:00000000 r6:859bd1c0 r5:ebfbdf20 [ 2973.806076][T26443] r4:00000000 [ 2973.806093][T26443] [<815de788>] (__sock_sendmsg) from [<815df7fc>] (____sys_sendmsg+0x238/0x2c4) [ 2973.806151][T26443] r7:00000000 r6:00000000 r5:859bd1c0 r4:ebfbdf20 [ 2973.806169][T26443] [<815df5c4>] (____sys_sendmsg) from [<815dfbfc>] (___sys_sendmsg+0x9c/0xd0) [ 2973.806234][T26443] r10:00000128 r9:20000640 r8:00000000 r7:00000000 r6:859bd1c0 r5:ebfbdf20 [ 2973.806253][T26443] r4:00000000 [ 2973.806269][T26443] [<815dfb60>] (___sys_sendmsg) from [<815e1c60>] (__sys_sendmsg+0x8c/0xe0) [ 2973.806328][T26443] r9:845e6e40 r8:8637c780 r7:00000000 r6:20000640 r5:8637c781 r4:00000004 [ 2973.806346][T26443] [<815e1bd4>] (__sys_sendmsg) from [<815e1cc8>] (sys_sendmsg+0x14/0x18) [ 2973.806400][T26443] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 2973.806420][T26443] [<815e1cb4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2973.806462][T26443] Exception stack(0xebfbdfa8 to 0xebfbdff0) [ 2973.806499][T26443] dfa0: 00000000 00000000 00000004 20000640 00000000 00000000 [ 2973.806534][T26443] dfc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f110dc [ 2973.806558][T26443] dfe0: 76f10e88 76f10e78 00018e58 001307a0 [ 2981.218764][ T28] audit: type=1400 audit(3237.091:999): avc: denied { prog_run } for pid=26463 comm="syz.0.6133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2987.092549][ T28] audit: type=1400 audit(3242.961:1000): avc: denied { setopt } for pid=26472 comm="syz.2.6136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2991.296089][ T28] audit: type=1400 audit(3247.171:1001): avc: denied { read } for pid=26481 comm="syz.2.6138" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:root_t:s0" [ 2991.299604][ T28] audit: type=1400 audit(3247.171:1002): avc: denied { open } for pid=26481 comm="syz.2.6138" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:root_t:s0" [ 2993.514700][ T28] audit: type=1400 audit(3249.391:1003): avc: denied { setopt } for pid=26485 comm="syz.0.6139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2995.089540][ T28] audit: type=1400 audit(3250.961:1004): avc: denied { map } for pid=26491 comm="syz.0.6141" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2995.174816][ T28] audit: type=1400 audit(3251.041:1005): avc: denied { read write } for pid=26491 comm="syz.0.6141" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2997.326891][ T28] audit: type=1400 audit(3253.201:1006): avc: denied { map_create } for pid=26495 comm="syz.0.6142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3013.163059][ T28] audit: type=1400 audit(3269.031:1007): avc: denied { create } for pid=26534 comm="syz.0.6157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3013.298339][ T28] audit: type=1400 audit(3269.171:1008): avc: denied { setopt } for pid=26534 comm="syz.0.6157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3015.283696][ T28] audit: type=1400 audit(3271.161:1009): avc: denied { setattr } for pid=26545 comm="syz.0.6159" name="ALG" dev="sockfs" ino=68618 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3018.995127][T26555] FAULT_INJECTION: forcing a failure. [ 3018.995127][T26555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3019.112435][T26555] CPU: 1 UID: 0 PID: 26555 Comm: syz.2.6162 Tainted: G L syzkaller #0 PREEMPT [ 3019.112584][T26555] Tainted: [L]=SOFTLOCKUP [ 3019.112606][T26555] Hardware name: ARM-Versatile Express [ 3019.112631][T26555] Call trace: [ 3019.112674][T26555] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3019.112821][T26555] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3019.112860][T26555] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3019.112948][T26555] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3019.113036][T26555] r7:00000000 r6:00000000 r5:840c8c40 r4:82b4ee88 [ 3019.113055][T26555] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3019.113113][T26555] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 3019.113181][T26555] r8:76fd7f08 r7:00000000 r6:00000000 r5:dfd5df68 r4:00000002 [ 3019.113198][T26555] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 3019.113272][T26555] [<809cd408>] (should_fail_usercopy) from [<805bf58c>] (simple_read_from_buffer+0x80/0x140) [ 3019.113326][T26555] [<805bf50c>] (simple_read_from_buffer) from [<80643bcc>] (proc_fail_nth_read+0xb8/0x108) [ 3019.113389][T26555] r10:80643b14 r9:00000001 r8:00000002 r7:dfd5df68 r6:0000000f r5:76fd7f08 [ 3019.113412][T26555] r4:840c8c40 r3:dfd5de9f [ 3019.113429][T26555] [<80643b14>] (proc_fail_nth_read) from [<80580a20>] (vfs_read+0xc0/0x328) [ 3019.113499][T26555] r8:840c8c40 r7:dfd5df68 r6:76fd7f08 r5:84ee4f00 r4:0000000f [ 3019.113538][T26555] [<80580960>] (vfs_read) from [<805816b4>] (ksys_read+0x74/0xec) [ 3019.113609][T26555] r10:00000003 r9:840c8c40 r8:8020029c r7:00000000 r6:00000000 r5:84ee4f00 [ 3019.113632][T26555] r4:84ee4f03 [ 3019.113649][T26555] [<80581640>] (ksys_read) from [<8058173c>] (sys_read+0x10/0x14) [ 3019.113706][T26555] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 3019.113724][T26555] [<8058172c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3019.113771][T26555] Exception stack(0xdfd5dfa8 to 0xdfd5dff0) [ 3019.113828][T26555] dfa0: 00000000 00000000 00000003 76fd7f08 0000000f 00000000 [ 3019.113881][T26555] dfc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fd80dc [ 3019.113928][T26555] dfe0: 76fd7e58 76fd7e44 0010b9c4 001125a8 [ 3026.392742][T26581] fuse: Unknown parameter 'group_idJ' [ 3028.434483][T26586] fuse: Unknown parameter 'roo‹mode' [ 3046.592618][ T28] audit: type=1400 audit(3302.461:1010): avc: denied { write } for pid=26614 comm="syz.2.6183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3050.904252][ T28] audit: type=1400 audit(3306.781:1011): avc: denied { ioctl } for pid=26604 comm="syz.0.6180" path="socket:[67937]" dev="sockfs" ino=67937 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3067.960180][T26656] random: crng reseeded on system resumption [ 3075.243016][ T28] audit: type=1400 audit(3331.121:1012): avc: denied { read } for pid=26668 comm="syz.0.6199" path="socket:[68003]" dev="sockfs" ino=68003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3078.524497][T26673] FAULT_INJECTION: forcing a failure. [ 3078.524497][T26673] name failslab, interval 1, probability 0, space 0, times 0 [ 3078.525038][T26673] CPU: 0 UID: 0 PID: 26673 Comm: syz.2.6200 Tainted: G L syzkaller #0 PREEMPT [ 3078.525121][T26673] Tainted: [L]=SOFTLOCKUP [ 3078.525141][T26673] Hardware name: ARM-Versatile Express [ 3078.525179][T26673] Call trace: [ 3078.525225][T26673] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3078.525330][T26673] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 3078.525353][T26673] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3078.525407][T26673] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3078.525469][T26673] r7:00000cc0 r6:00000000 r5:833ebd40 r4:82b17e08 [ 3078.525491][T26673] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3078.525556][T26673] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 3078.525626][T26673] r8:00000000 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4a80 [ 3078.525645][T26673] [<8054ef68>] (should_failslab) from [<8052c2e4>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 3078.525721][T26673] [<8052c290>] (kmem_cache_alloc_noprof) from [<805901b8>] (do_getname+0x2c/0x14c) [ 3078.525792][T26673] r10:00000142 r9:833ebd40 r8:00000000 r7:00000000 r6:20000040 r5:825238b8 [ 3078.525814][T26673] r4:00000000 [ 3078.525830][T26673] [<8059018c>] (do_getname) from [<80595d0c>] (getname_flags+0x14/0x18) [ 3078.525917][T26673] r10:00000142 r9:833ebd40 r8:8020029c r7:20000040 r6:ffffff9c r5:ea61df50 [ 3078.525941][T26673] r4:00000000 r3:00000001 [ 3078.525957][T26673] [<80595cf8>] (getname_flags) from [<8057d908>] (do_sys_openat2+0x64/0xf0) [ 3078.526009][T26673] [<8057d8a4>] (do_sys_openat2) from [<8057dd0c>] (sys_openat+0x80/0xd0) [ 3078.526183][T26673] r7:00000142 r6:00000000 r5:20000040 r4:ffffff9c [ 3078.526237][T26673] [<8057dc8c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3078.526345][T26673] Exception stack(0xea61dfa8 to 0xea61dff0) [ 3078.526421][T26673] dfa0: 00000000 00000000 ffffff9c 20000040 00040083 00000110 [ 3078.526475][T26673] dfc0: 00000000 00000000 0012f1a4 00000142 003462d8 00000000 00000001 76fd80dc [ 3078.526547][T26673] dfe0: 76fd7e88 76fd7e78 00018e58 001307a0 [ 3078.526591][T26673] r6:0012f1a4 r5:00000000 r4:00000000 [ 3081.402272][T26681] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26681 comm=syz.2.6202 [ 3091.034134][ T28] audit: type=1400 audit(3346.911:1013): avc: denied { map_read map_write } for pid=26688 comm="syz.0.6205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3099.122460][T26702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26702 comm=syz.0.6211 [ 3109.824360][T26732] FAULT_INJECTION: forcing a failure. [ 3109.824360][T26732] name failslab, interval 1, probability 0, space 0, times 0 [ 3109.849284][T26732] CPU: 0 UID: 0 PID: 26732 Comm: syz.2.6221 Tainted: G L syzkaller #0 PREEMPT [ 3109.849435][T26732] Tainted: [L]=SOFTLOCKUP [ 3109.849480][T26732] Hardware name: ARM-Versatile Express [ 3109.849508][T26732] Call trace: [ 3109.849550][T26732] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3109.849651][T26732] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 3109.849675][T26732] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3109.849759][T26732] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3109.849821][T26732] r7:00000000 r6:00000000 r5:84808c40 r4:82b17e08 [ 3109.849839][T26732] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3109.849898][T26732] [<809cd1cc>] (should_fail_ex) from [<8054efd4>] (should_failslab+0x6c/0x94) [ 3109.849973][T26732] r8:eaaa1d28 r7:00000000 r6:83001240 r5:00000cc0 r4:0000000c [ 3109.849992][T26732] [<8054ef68>] (should_failslab) from [<8052d234>] (__kmalloc_noprof+0xa4/0x39c) [ 3109.850077][T26732] [<8052d190>] (__kmalloc_noprof) from [<817167b0>] (genl_family_rcv_msg_attrs_parse+0x64/0x118) [ 3109.850157][T26732] r10:825343dc r9:00000000 r8:eaaa1d28 r7:862578c0 r6:862cb0c0 r5:eaaa1cb8 [ 3109.850187][T26732] r4:00000004 [ 3109.850204][T26732] [<8171674c>] (genl_family_rcv_msg_attrs_parse) from [<817168d0>] (genl_family_rcv_msg_doit+0x6c/0x140) [ 3109.850273][T26732] r9:85eb4000 r8:eaaa1d28 r7:eaaa1cb8 r6:862cb0c0 r5:00000004 r4:862578c0 [ 3109.850293][T26732] [<81716864>] (genl_family_rcv_msg_doit) from [<81717160>] (genl_rcv_msg+0x240/0x3a8) [ 3109.850359][T26732] r10:00000002 r9:85eb4000 r8:862cb0c0 r7:eaaa1cb8 r6:00000001 r5:862578c0 [ 3109.850425][T26732] r4:825343dc [ 3109.850445][T26732] [<81716f20>] (genl_rcv_msg) from [<81715ba8>] (netlink_rcv_skb+0xc0/0x120) [ 3109.850508][T26732] r10:85edad84 r9:85eb4000 r8:862cb0c0 r7:862578c0 r6:81716f20 r5:862cb0c0 [ 3109.850527][T26732] r4:00000000 [ 3109.850544][T26732] [<81715ae8>] (netlink_rcv_skb) from [<8171673c>] (genl_rcv+0x28/0x38) [ 3109.850596][T26732] r7:8653a8c0 r6:00000024 r5:85d6f864 r4:862cb0c0 [ 3109.850613][T26732] [<81716714>] (genl_rcv) from [<81715374>] (netlink_unicast+0x270/0x380) [ 3109.850667][T26732] r5:85d6f864 r4:85d6f800 [ 3109.850685][T26732] [<81715104>] (netlink_unicast) from [<8171564c>] (netlink_sendmsg+0x1c8/0x444) [ 3109.850774][T26732] r10:00000000 r9:00000000 r8:00000000 r7:85edac00 r6:00000024 r5:862cb0c0 [ 3109.850796][T26732] r4:eaaa1e98 [ 3109.850811][T26732] [<81715484>] (netlink_sendmsg) from [<815de7cc>] (__sock_sendmsg+0x44/0x78) [ 3109.850877][T26732] r10:00000122 r9:8637fa00 r8:859bf940 r7:76fd6de4 r6:859bf940 r5:eaaa1e98 [ 3109.850898][T26732] r4:00000000 [ 3109.850913][T26732] [<815de788>] (__sock_sendmsg) from [<815e1588>] (__sys_sendto+0x110/0x160) [ 3109.851007][T26732] r7:76fd6de4 r6:8637fa00 r5:00000000 r4:00000000 [ 3109.851073][T26732] [<815e1478>] (__sys_sendto) from [<815e15f4>] (sys_sendto+0x1c/0x24) [ 3109.851142][T26732] r9:84808c40 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76fd6de4 [ 3109.851177][T26732] [<815e15d8>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3109.851227][T26732] Exception stack(0xeaaa1fa8 to 0xeaaa1ff0) [ 3109.851265][T26732] 1fa0: 76fd6de4 0000000c 00000003 76fd6e78 00000024 00000000 [ 3109.851314][T26732] 1fc0: 76fd6de4 0000000c 00000000 00000122 76fd6e9c 00000000 76fd6e78 76fd80dc [ 3109.851345][T26732] 1fe0: 76fd6d78 76fd6d64 0010b9c4 001125a8 [ 3133.164924][T26780] FAULT_INJECTION: forcing a failure. [ 3133.164924][T26780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3133.172378][T26780] CPU: 0 UID: 0 PID: 26780 Comm: syz.0.6238 Tainted: G L syzkaller #0 PREEMPT [ 3133.172562][T26780] Tainted: [L]=SOFTLOCKUP [ 3133.172599][T26780] Hardware name: ARM-Versatile Express [ 3133.172626][T26780] Call trace: [ 3133.172671][T26780] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3133.172784][T26780] r7:60000113 r6:60000113 r5:8231c350 r4:00000000 [ 3133.172807][T26780] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3133.172866][T26780] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3133.172930][T26780] r7:00000000 r6:00000000 r5:864e8c40 r4:82b4ee88 [ 3133.172951][T26780] [<8021e334>] (dump_stack) from [<809cd38c>] (should_fail_ex+0x1c0/0x224) [ 3133.173049][T26780] [<809cd1cc>] (should_fail_ex) from [<809cd404>] (should_fail+0x14/0x18) [ 3133.173118][T26780] r8:eae69eb8 r7:00000000 r6:76f10f08 r5:00000001 r4:00000001 [ 3133.173138][T26780] [<809cd3f0>] (should_fail) from [<809cd424>] (should_fail_usercopy+0x1c/0x20) [ 3133.173204][T26780] [<809cd408>] (should_fail_usercopy) from [<8090dc48>] (kstrtouint_from_user+0x54/0x13c) [ 3133.173268][T26780] [<8090dbf4>] (kstrtouint_from_user) from [<80644e90>] (proc_fail_nth_write+0x40/0xf0) [ 3133.173340][T26780] r8:80644e50 r7:eae69f68 r6:76f10f08 r5:84f8eb00 r4:00000001 [ 3133.173363][T26780] [<80644e50>] (proc_fail_nth_write) from [<805812c4>] (vfs_write+0xd4/0x450) [ 3133.173432][T26780] r5:84f8eb00 r4:00000001 [ 3133.173451][T26780] [<805811f0>] (vfs_write) from [<805817b4>] (ksys_write+0x74/0xec) [ 3133.173523][T26780] r10:00000004 r9:864e8c40 r8:8020029c r7:00000000 r6:00000002 r5:84f8eb00 [ 3133.173548][T26780] r4:84f8eb03 [ 3133.173566][T26780] [<80581740>] (ksys_write) from [<8058183c>] (sys_write+0x10/0x14) [ 3133.173631][T26780] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 3133.173651][T26780] [<8058182c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3133.173705][T26780] Exception stack(0xeae69fa8 to 0xeae69ff0) [ 3133.173747][T26780] 9fa0: 00000000 00000000 00000004 76f10f08 00000001 00000000 [ 3133.173845][T26780] 9fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76f110dc [ 3133.173900][T26780] 9fe0: 76f10e58 76f10e44 0010b9c4 001125a8 [ 3146.392064][T22536] usb 1-1: new high-speed USB device number 48 using dummy_hcd [ 3146.769957][T22536] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 3146.770938][T22536] usb 1-1: config 1 has no interface number 0 [ 3146.772737][T22536] usb 1-1: config 1 interface 7 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 3146.773045][T22536] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8 has invalid maxpacket 32 [ 3146.773213][T22536] usb 1-1: config 1 interface 7 altsetting 0 endpoint 0xE has an invalid bInterval 0, changing to 7 [ 3147.004036][T22536] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 3147.005603][T22536] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3147.006603][T22536] usb 1-1: Product: syz [ 3147.007287][T22536] usb 1-1: Manufacturer: syz [ 3147.007968][T22536] usb 1-1: SerialNumber: syz [ 3147.022459][T26805] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3147.025784][T26805] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3147.029764][T22536] usb 1-1: Expected 3 endpoints, found: 2 [ 3147.778986][T22536] usb 1-1: USB disconnect, device number 48 [ 3188.732196][ T28] audit: type=1400 audit(3444.601:1014): avc: denied { setopt } for pid=26869 comm="syz.0.6262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3189.206127][T26870] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26870 comm=syz.0.6262 [ 3203.972818][T26882] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26882 comm=syz.0.6267 [ 3215.743733][T26894] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26894 comm=syz.2.6271 [ 3216.482349][T26896] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26896 comm=syz.0.6272 [ 3228.784003][T26913] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26913 comm=syz.0.6278 [ 3229.373936][ T28] audit: type=1400 audit(3485.251:1015): avc: denied { bind } for pid=26914 comm="syz.2.6279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3229.423927][ T28] audit: type=1400 audit(3485.301:1016): avc: denied { connect } for pid=26914 comm="syz.2.6279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3241.472796][ T28] audit: type=1400 audit(3497.341:1017): avc: denied { read } for pid=26937 comm="syz.0.6285" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3241.517440][ T28] audit: type=1400 audit(3497.391:1018): avc: denied { open } for pid=26937 comm="syz.0.6285" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3241.704009][ T28] audit: type=1400 audit(3497.581:1019): avc: denied { ioctl } for pid=26937 comm="syz.0.6285" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3241.706675][ T28] audit: type=1400 audit(3497.581:1020): avc: denied { set_context_mgr } for pid=26937 comm="syz.0.6285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 3242.184598][ T28] audit: type=1400 audit(3498.061:1021): avc: denied { write } for pid=26937 comm="syz.0.6285" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3245.443865][ T28] audit: type=1400 audit(3501.321:1022): avc: denied { write } for pid=26941 comm="syz.0.6287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3276.946961][T26957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3276.963393][T26957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3278.185736][T26957] hsr_slave_0: entered promiscuous mode [ 3278.186903][T26957] hsr_slave_1: entered promiscuous mode [ 3278.190502][T26957] debugfs: 'hsr0' already exists in 'hsr' [ 3278.192708][T26957] Cannot create hsr debugfs directory [ 3278.569679][T26957] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 3278.576299][T26957] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 3278.579391][T26957] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 3278.588649][T26957] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 3278.593720][T26957] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 3278.607758][T26957] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 3278.610806][T26957] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 3278.619979][T26957] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 3279.475655][T26957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3282.464498][T26957] veth0_vlan: entered promiscuous mode [ 3282.479385][T26957] veth1_vlan: entered promiscuous mode [ 3282.598030][T26957] veth0_macvtap: entered promiscuous mode [ 3282.639290][T26957] veth1_macvtap: entered promiscuous mode [ 3282.765516][T11137] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3282.766406][T11137] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3282.766947][T11137] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3282.767150][T11137] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3283.253078][ T28] audit: type=1400 audit(3539.131:1023): avc: denied { bind } for pid=27269 comm="syz.3.6294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3283.747147][T21350] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3283.925295][T21350] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3284.134902][T21350] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3284.194997][T21350] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3284.764597][T21350] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3284.783327][T21350] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3284.789281][T21350] bond0 (unregistering): Released all slaves [ 3284.874255][T21350] hsr_slave_0: left promiscuous mode [ 3284.877783][T21350] hsr_slave_1: left promiscuous mode [ 3284.914251][T21350] veth1_macvtap: left promiscuous mode [ 3284.914564][T21350] veth0_macvtap: left promiscuous mode [ 3284.914971][T21350] veth1_vlan: left promiscuous mode [ 3284.915271][T21350] veth0_vlan: left promiscuous mode [ 3285.861000][ T2957] 8021q: adding VLAN 0 to HW filter on device eth5 [ 3286.894984][T27298] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6300'. [ 3287.283523][ T2957] 8021q: adding VLAN 0 to HW filter on device eth6 [ 3289.018390][ T2957] 8021q: adding VLAN 0 to HW filter on device eth7 [ 3290.276051][ T2957] 8021q: adding VLAN 0 to HW filter on device eth8 [ 3292.000874][T27341] netlink: 372 bytes leftover after parsing attributes in process `syz.0.6304'. [ 3302.084608][ T28] audit: type=1400 audit(3557.961:1024): avc: denied { nlmsg_write } for pid=27360 comm="syz.3.6310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3306.788678][T27398] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6312'. [ 3312.746567][T27420] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6321'. [ 3312.748368][T27420] netdevsim netdevsim3 netdevsim0: entered allmulticast mode [ 3312.903064][T27423] netlink: 'syz.3.6322': attribute type 1 has an invalid length. [ 3316.329844][ T28] audit: type=1400 audit(3572.201:1025): avc: denied { block_suspend } for pid=27432 comm="syz.3.6325" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3327.833750][ T28] audit: type=1400 audit(3583.701:1026): avc: denied { sqpoll } for pid=27457 comm="syz.0.6332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3333.324442][ T28] audit: type=1400 audit(3589.201:1027): avc: denied { name_bind } for pid=27509 comm="syz.3.6350" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3334.754559][T27520] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6354'. [ 3334.801000][T27520] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3334.854123][T27520] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3334.884627][T27520] bond0 (unregistering): Released all slaves [ 3335.220671][T22536] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 3335.223864][T22536] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 [ 3339.752539][ T28] audit: type=1400 audit(3595.621:1028): avc: denied { mounton } for pid=27556 comm="syz.3.6362" path="/proc/88/task" dev="proc" ino=70136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 3348.917760][T27593] netlink: 'syz.3.6373': attribute type 10 has an invalid length. [ 3348.924276][T27593] syz_tun: entered promiscuous mode [ 3351.467424][T27612] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3351.468435][T27612] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3352.696183][ T28] audit: type=1400 audit(3608.571:1029): avc: denied { write } for pid=27633 comm="syz.3.6382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3352.717180][T27635] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=27635 comm=syz.3.6382 [ 3367.040280][T27696] Driver unsupported XDP return value 0 on prog (id 11) dev N/A, expect packet loss! [ 3373.882999][ T28] audit: type=1400 audit(3629.611:1030): avc: denied { setopt } for pid=27721 comm="syz.0.6410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3381.213433][T27731] netlink: 'syz.3.6413': attribute type 1 has an invalid length. [ 3381.213966][T27731] netlink: 'syz.3.6413': attribute type 2 has an invalid length. [ 3382.534217][ T28] audit: type=1400 audit(3638.401:1031): avc: denied { write } for pid=27739 comm="syz.3.6417" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3382.542670][ T28] audit: type=1400 audit(3638.411:1032): avc: denied { open } for pid=27739 comm="syz.3.6417" path="/75/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3382.572359][T27740] 8000000.flash: buffer write error (status timeout) [ 3387.036129][ T28] audit: type=1400 audit(3642.911:1033): avc: denied { create } for pid=27759 comm="syz.3.6424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3390.070841][T27766] ------------[ cut here ]------------ [ 3390.071260][T27766] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#0: syz.3.6425/27766 [ 3390.073343][T27766] Modules linked in: [ 3390.074137][T27766] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3390.074604][T27766] CPU: 0 UID: 0 PID: 27766 Comm: syz.3.6425 Tainted: G L syzkaller #0 PREEMPT [ 3390.075060][T27766] Tainted: [L]=SOFTLOCKUP [ 3390.075248][T27766] Hardware name: ARM-Versatile Express [ 3390.075469][T27766] Call trace: [ 3390.075652][T27766] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3390.076016][T27766] r7:82a1e7b8 r6:00000000 r5:8231c350 r4:00000001 [ 3390.076268][T27766] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3390.076601][T27766] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3390.076950][T27766] r7:82a1e7b8 r6:00000000 r5:833dbd40 r4:82c7bd3c [ 3390.077234][T27766] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 3390.077544][T27766] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 3390.077877][T27766] r7:80265f80 [ 3390.078030][T27766] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 3390.078346][T27766] r3:82a0b544 r2:00000001 r1:82302e38 r0:8230a718 [ 3390.078722][T27766] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 3390.079127][T27766] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 3390.079486][T27766] r8:00000009 r7:8230b914 r6:dfb4debc r5:833dbd40 r4:00000000 [ 3390.079744][T27766] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 3390.080108][T27766] r10:833dc434 r9:00000000 r8:dfb4df68 r7:833dc610 r6:00000080 r5:833dbd40 [ 3390.080419][T27766] r4:833dbd40 [ 3390.080571][T27766] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 3390.080908][T27766] r8:dfb4df68 r7:833dc610 r6:850caa80 r5:833dbd40 r4:840c3d40 [ 3390.081203][T27766] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 3390.081675][T27766] r7:00000001 [ 3390.081834][T27766] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3390.082296][T27766] Exception stack(0xdfb4dfa8 to 0xdfb4dff0) [ 3390.082548][T27766] dfa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 3390.082886][T27766] dfc0: 00000000 00000000 00000000 00000001 00346418 00000000 003d0f00 76f800dc [ 3390.083214][T27766] dfe0: 76f7fe60 76f7fe50 000193b4 001307a0 [ 3390.085303][T27766] Rebooting in 86400 seconds..