last executing test programs: 5.391628253s ago: executing program 0 (id=1151): pipe2$9p(0x0, 0x80880) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, 0x0) 5.060482609s ago: executing program 0 (id=1153): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = dup(r0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f0000004480)={0x0, 0x0, &(0x7f0000004440)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000f8"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004000) 4.991511217s ago: executing program 1 (id=1154): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) close(r1) memfd_create(&(0x7f0000000640)='\xd4\xb4y\x05F%v\xd5\xb2\xe0P(p\xe2\xbd%\x02\xe1\x89|\xe0un\x00\x00\xad\xeb\x7ft\x92\xda\xce\x0f\x89=\xa9\xd8q\'\x00\x00\x00\x00J6h\x11\xc1g\x00\x00\x00\x00\x00\x00\x01\xa7\xfb\x16\xaa\x84\x05A\xa1B\xe1B\x12\xd6\xb7w\xd9\xc4`\x15\xf3\x90\x8e\xe5x\x80\x00>\x1c\xb1\xde\xf7\xebI;b\xd0[\xed2\x1b\xd0\x80u\x8bs\xc6\xd6/\xebT\xa1\xa2\'\x81!H8\x8c\x05\xdan\x12\xab2\x86\xa7\x97C\xa3\x05\xb0\xbf\x9fR2\xbc\xad\x1d\xe4\x14\xcf>\x18Li\xa9!\xb2\x98\n\xaa\x15\xb3\xa2AL\x1d\xfa/1o~\x84\xe1\x87\x80\xf8z}\x90\xfcJ\x11e@0xffffffffffffffff}) r8 = openat$zero(0xffffff9c, &(0x7f0000000080), 0x6a0903, 0x0) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x200000d9}, 0x400c0) connect$unix(r7, &(0x7f0000000280)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r9 = dup3(r6, r4, 0x0) r10 = accept4$packet(r9, 0x0, 0x0, 0x0) dup2(r4, r10) r11 = openat$vcs(0xffffff9c, &(0x7f0000000000), 0x42200, 0x0) read$dsp(r11, 0x0, 0x0) dup2(r3, r10) 4.539472886s ago: executing program 0 (id=1155): r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x146) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/216, 0xd8) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x3) r1 = openat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x48}, 0x18) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000240)={0x1, r0, 0x1}) utimensat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x77359400}}, 0x100) recvmsg$inet_nvme(r2, &(0x7f0000001480)={&(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/27, 0x1b}], 0x2, &(0x7f0000001400)=""/124, 0x7c}, 0x10000) (async) ioctl$XFS_IOC_SET_RESBLKS(r1, 0xc0105872, &(0x7f00000014c0)={0x7fff, 0xf}) ioctl$BTRFS_IOC_SEND(r1, 0x40489426, &(0x7f0000001540)={{}, 0x6, &(0x7f0000001500)=[0x1, 0x3, 0x3, 0x80000000, 0x7, 0x9], 0x8, 0x8, 0x1}) (async) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000003fc0)={@initdev, 0x0}, &(0x7f0000004000)=0x14) sendmmsg(r1, &(0x7f0000008380)=[{{&(0x7f00000015c0)=@hci={0x1f, 0x3, 0x3}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001640)="383a7d20a479b0e41576118abcb458bfbfb11e57bb8eef90b69221396304eec077fe98700efe8731f934a343b2f9e27d972c6c707bd2926837c30d0a9869479a281f209d5888240b08f86871f120e880253734448fb1095ba79e9457554c1d337b24a2236dd9238541b0df14083e2cd9f81302d2354b541f0ecb72311f5770437221ea1435bec5795c1a3870bf6d40d51d881b015d38b337836c30732511697cd1dfc7fd1dd21953ed333d980050be18", 0xb0}, {&(0x7f0000001700)="b529d45c4038f42d21f503258be7d2843ab0c3264da2ae1185ca242a7d7603e6e8d22f086662892d7e118f0cafb670fba98bdf3f1ca5b97fbc13797142957a80583adb1bbec3a5bca0c7cb80e08f4422967bf1d99b64bb8730b7c2881a1114d219bfe597cde98a8043c6a75fd8be67a10dc41731d923d0711606f24ff174869a8acfa28866878c958424b6f366d7a3c287258a899e7758df4aee90c1970d59480afda7508215f92c19fbc343d310202f461c278c25afb3ff1f5199217873d447", 0xc0}], 0x2}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001800)="9342e3804c85b2891cf19857fea37d5e4d6352ffebffd1e9755dc80089fed059fe3ed20a52a28d6cba6814bbf5f2b9946af74d7bed677c3ad5d6fcf8b096ca78750f19e9feeef135cd7c7df2b728211bbbff4f0871a47e5c5cf31f693e062d475f3bf3e98873953276c26787aecb1a6a90d39a9b2bd12c2927fb07f0acd59793afec361c653107f7a2a725faba2728130feea9cab6bc2c7f66433f50bd1d3f3cd047e71bdc71f175f2d2d4f5c1cb317d63971491bcf3958d17b85721", 0xbc}, {&(0x7f00000018c0)="7ab47925e9d4b809285afd7e5e650eee698593ed308773b92b64503c1719b0a49074ae1d7d41f9d28a7aed84ae8c66f82783e9cd538303852e78ead50cb743b8d0ed62233f5a99760b45562c83eb567d2100463bc6fee3b21ef998c42bbf36678b68e5cc9a99131ef287cde5ed0b92f639cbf05ebb8a78d9c2b04a191d169d904eebc0446aaf688c1e5e42af207df146a98d7d4d46c3f602f40802c8d112c5f4944dda56c04ce4c5697192b2e4e39b2065b71fa933bea5fbb134d4fb1bbe31374bddb5e40318fcb0f32745cd20439909d42caf3cf4", 0xd5}, {&(0x7f00000019c0)="c7adcb7c823bf21c563504f2ce559e8fb0b91706669d5fcc51c19a6c11985375d75dc501dd5c24555ffc7426214072649137a398973d8d515536c7f2962c6a338a8095d99a1d29b4aa0a4d5f6d1016b8dbc1df4116b27d6b2cc12b71a697520da4a439d31b7b76f0796a49902d2c416a273c3c0206e5da132ae6f3557331ce1f109614f9b4ea73e312a624fc2f2cd68674a61f234dc9378e46d657768e32a76d66fc8474366f218b2352c6b3a28e9b", 0xaf}, {&(0x7f0000001a80)="cd71a643c650906d3c", 0x9}], 0x4, &(0x7f0000001b00)=[{0xbc, 0x104, 0x2, "daeb71fe99cb757f1ee6a059c674902341f7a0d942bf1ece3bc739923be2b3f41ea48a29fcd64b11b6194890f00d77c5a2432b31d16b943786c9233e7eb70d127ee445993ae227337c442abe33ab5c0ed756850d6472d4fbeba3d880456ccaa72b8db483f4842e86ec9ac54cafa8778ee532961052f26c9c8c8c3e93446cd52100426ce458c83361d531a69094c1463dc399b31716293d961f1f0130ff34f2ba3c73a8464d1888c80076792f94e6"}, {0xdc, 0x102, 0x0, "82df945dea9ebb54c8a30cdc292c3af67a0e14735ec3d8dc68a6935483a2e501eac5e3373cfe6ec802f4f3d4b7870432e7548033019d68480f0c1f1a37a514ca10f4ded929eafb973df3917cb3fe582d822a78dfe762e51eae202737fc7c7d9479b7abcb19fcdb1b8c27c43b7356dd105509ac269eced8ecbf0e0245b474b00ec2003366a68d9ec5b1628795e03af8b396c97943bc70fdb7a0fb318b5c31e51b3b7f0cfbd0f99ff15cb2ad455948383e6c7e56bd63e08d305e4b36e8429980dfbac195e00ae1e0c36c9a169a284fa3"}, {0x8c, 0x0, 0xffffffff, "60195577fb0fa1ae28cb87de9c72c88b816cb5b8ee4f362567ce5f00447bd6e0badfa18e6026c577568cb83c0befc837a01bbf85530625772c9b78f0118b8f95a208935fc4760fe8ae90887783e7b50500659a5ac1c3ca06faeaba6a9b8a2e659a6b0a95a8d621279baf778ee1b3589c4d4678103c074cf7e5bf04fe267d"}, {0xc, 0xff, 0x4}, {0x70, 0x118, 0x2, "d203f23a99daf995518b21f1e39e526d1ac3440dda7ee396bf5afc3f85c2a5d4500cba179071daa96dde2e33eebced770278cc00f1c585acb81fd7a311f9cb56d2b10302dbd9d370611de1e8fc8bef0577167305a610919f17d4acd4e97532be8eaa36f9"}, {0x100c, 0x103, 0x0, "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"}, {0xcc, 0x88, 0x8, "d3d96f72eb93a67f4a77c3902555b8e3a931efa20c96912bd258f2beb5e1b6c030b465fc200725b7cc72c22d9ee2a656c5be5a71c796569ac0374db0f95741269ddd74a2c2dff8015b4347ff0600248bd1f06c62670a183a92784ac3c45724182a98183ce5b14f28a2d15312922aaf73246a6197db19ad2eb47e43c9b352689612cc8a1451ac5e42d415ba7bd3f1b82f010fc038ce251836962149f5fb10e07032f2f67deaed2a340f5a46f4b13a72c87bf0ae2725e81b434592a53cdd02c281"}, {0x100c, 0x88, 0x1, "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"}, {0x28, 0x29, 0x1, "2d928af10b211ecba02cab3bbc9942e6103c1fbc9707fe22bf8d5f16"}, {0xf0, 0x103, 0x506, "1a26c72230a2aec40fea522cdfba4fe429c4db854b67c9d464a6ecde31dac737e8dc486ac302fb6f3835217cb231d8502a32f9b22d9b489756026a2f511ba7e07ae9f5ba0f69b4bc993e4d92aa83578e0a64af053f0e23b2ca9b7edb7c3fe4256e593a0c44c000f8a2f0bacd775abbdd02d13a2488175de4b2f0d1c1ed94bf1cc5152a5f947d4983577a35f2adf2a8aa809408b6b7e0a9596d8e137a1dcbd1d4f419cd1a230272c72fc84e5d24cc13eda725159009b23899bb3b9daf4584feec9107fc627ade574a162f9cbc60e4024992a1b30a8893307bdddb1654c02fbfd9181f557c"}], 0x249c}}, {{&(0x7f0000004040)=@ll={0x11, 0x10, r3, 0x1, 0x6, 0x6, @broadcast}, 0x80, &(0x7f0000004180)=[{&(0x7f00000040c0)="0495a4e5adb8cba65ecbae550c9958ac46d6a472b3a6fd7ab801f1acb79c12835bf3a2dbd45d7dc772534302e3e5a59a6644184434211223bde8eb536bd99d4d1a8dadd57f07ab54566274350af0af06f21a5e7d0659b921b00eaa2c3b5564dfeaed845664ef349a047eb58166069e30685f4b4465324c9e0131a90af3a294a7e6f828c73592eb76a6168811fb932c01ed88a1cdf957c776f6136fbc553243341323938e375fd4477299ec329c698bbf8738c25c966d95e0d7d1bd", 0xbb}], 0x1}}, {{&(0x7f00000041c0)=@tipc=@name={0x1e, 0x2, 0x1, {{0x41, 0x2}, 0x4}}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004240)="3c5487a851c6256daa2f81fd9bfc25cf1826384c1081d84c1a34b0cb9fdb92e7d2346fa59527910cba038325173767bdd500413fc43cadcb9a649b6039e99d52b1702b29c80738b8c425ee573210e9c9e42e9c746614c1a7758a28022fec85e9f321c456fe4c1766f3af713912fa25bc57ceea9b8756409c6422d21b789217e4cf0099591ef918cceb827efc355a11f60fb9", 0x92}], 0x1, &(0x7f0000004340)=[{0xc4, 0x104, 0x7, "7dd63ed452e4127d1db55c7e98b45f45528bf89712164a436e150cd46c6125f1c5b72c6a4f7f33252587622c26fb527edf07fddfb2ee9fd2725dcd2d817fdead32950b7c7955af1d17746f671afc59d4250982552285bf1695e5d1d706a04a6bbeeeda32aacf979e29338cba72c76983d7ecaae39b226e92f6429e494e18befe989747ee86aa354dec39c25ac65ba88eca808e6f0d55dbac8ff94c0b7f879115bf08eb2fdefc2421b0142c054e6bc27dcece8f4c417d8837"}], 0xc4}}, {{&(0x7f0000004440)=@ethernet={0x6, @broadcast}, 0x80, &(0x7f0000004500)=[{&(0x7f00000044c0)="295329d5b1fe33534994fd8a09b4fdd19bddcd6426acf1f9deeeeb8c12d280406d", 0x21}], 0x1, &(0x7f0000004540)=[{0xb8, 0x10d, 0x8e, "bec9663b7feee111ae099314fe6ea4f3bc9b634a642671259d2271a5196a28469e30d819678407cb1ef0d81324c0ecca4b1a6a6237e09630e275be1e84adfd397fdea8123ad1288dd344e6e7cd374404c2a7f8d2ab370145b3d1c673dbc59a154f64127198c4064d77bab1694e4a4df4a9805b78ed8eb146feeaf0c7ba4c9d90f6f1aa83cde284bfb61a21bd072eb0a6f1ca8a11e33b4a5b682456cf264807cbba811a992b8324cd5e2fd252"}, {0x10c, 0x10b, 0x4000, "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"}, {0x34, 0x110, 0xda00, "db2d0cd8baec72aa2999b128a7e1ba91f104217570416407f05a0c9a9839807162f29e3f92dda4ec"}, {0xac, 0x1, 0x0, "b1b1f5a0070426d1f3a1e5dc68d3553e20a4af1cac4ebbde9e4eca6351d77c0436efe06daa2297af2edb4e29fc92e4d3af640f7f1529a56659211a45f7b9c2e5a9e42273e5993f434ff461fa930c0a50955035bf5bb5087ffaf039ed8a50aa69a8b87b287f16cd2b84938b3ddc9329a6912830a24d2056e052fd02e41c02b2138da18d98bf838134e1e8a3c64a2f2ec32849b18477836b63d9d675188c"}, {0x50, 0x10d, 0x9, "28f1a1c06b58a1a8ad34a8ad9bc60bf1aac3cafc91a44292079c4db6e77b95bfebb583529c81f99cd2cf04874ad33f25f64e41e402166adf52d7a4dc39657636411f988b"}, {0x18, 0x112, 0x62, "b28c63c391549d3dfaa8"}, {0xd8, 0x103, 0x3, "cae4cffc13fbe08347e2962fca8a4476729dd5cf52d79822793636cc690b75cd071b4370d1be5944170ab2c48d9056ee29093d8c2a30ad55763105231bd4b7a896e306a0f34cdbded1be0bfce7dc20dcadbdbc6da614811e875518a3421d57f3a5a811b8cbbaca212036f74d169c694b49ab6b6bd49c6ece381d6050a24999c1685e6caf0d2c4c89543c2404106e2f89b6f1acd8f2e61424261ff284f49247c3fbf356a1eb4344fbd28758b30e4df4fe66b3ed84c84bc2f75f4db3a1544a5d82d8d2923212238ff3ce3f"}, {0x10, 0x101, 0x4, "f5ab"}, {0xa4, 0x117, 0x5, "acdc2aea574f02fa1b8053e8f95978b55cbd7e34eca7df8437ceb5202db64b5cce231686b9ea1b560498ea2637f22351ff60692746eadc66781fe33cf052156d52a0a9ae893e49424c12e75f734ac506be0c3cb9e01322613572164c5dc710c7501ca87d1e08d49acd8719430acc0470f46f2aa351a4427ce6d6e4dcef89c1fc448013fb8e4ac49dcbd611f64290e7ba457c2415eeba"}], 0x498}}, {{&(0x7f0000004a00)=@x25, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000004a80)="48dc903f1a38acede361c2c7a9c463dfb822215259f14fc06eee7b685404d0291dc3fbfc6e431bd37fdb28727ee4cb354d4b9dbf49a4be6c7ae9558337a1d932dbf9dd9316f17b644580a393f4514c429fdb85a5bfb3b027b351c09db95f5a27b12cf13e2a3e5dc3cecf35d0a8b8761c22554c6e4c430a4cd408c57bda9b1ae40dfd662c6995547b4b42c060e3f8b3dc0011", 0x92}, {&(0x7f0000004b40)="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", 0x1000}, {&(0x7f0000005b40)="28df32e5cd7d623c5b3b461756be8be1ba7ae42549dc07bcc69e2a94016a35717eb50bd9b64dd7952555cfa6499be75628af8a8951", 0x35}, {&(0x7f0000005b80)="edda58f9b60a96f83092b20069dae20329abbdee4f8c878d746259a437ffb971232bc1059d8b2f762c63d16eac631b4237b5fbd34c0434be7f51b7dd898bff7eda8adf4a2b035ea525c50d", 0x4b}, {&(0x7f0000005c00)="3435595e63c2fe80113d815eefe9c14438b9f55860c5dc31a1db22de1a1159a0c16fc84f2f3f1992382857ff7c1c40b0d6525375cf80e406b5dbf982da184d18453eeac06577c8b22d4e4812106ac172ab54f183477cfaa6df71cb9e17f693825b4ad9aa6444ee307f2bf83cc611cc", 0x6f}, {&(0x7f0000005c80)="8ba97b715865f5d430f2b69d84a59732ca1a431a67fa6362c6edb78055f7455279b3805af21bdd60b6409a20b17ce8b3d0939a6b4b06454047d03683f141b44e9718684a94edba19c2cce4c147ab38cffc", 0x51}, {&(0x7f0000005d00)="ada423707ed57c56fd0c90183de08965ed7c1a7c3441d5238204c07cd762e22722b9dfba8e6f4cf7f629356f7e3ed8070ddb86e7fad2e02e2836b118b2013f023df694841df96597e05ad4faa74e82c847e49a7882853c5b8b798992b49f039a5083ef42b7371400950b4aeb9d1464871326f953689546e760e136bab0", 0x7d}, {&(0x7f0000005d80)="564e06ef2dca6be4ef4e47c923a17c2b71bf", 0x12}], 0x8, &(0x7f0000005e00)=[{0x94, 0x110, 0x1, "eed9c3fa1f78f82e5ae74bf42e59355305a7ee71f3925b101d749e8337ea0ae844ded0f386959cd8285949ac39fd9a7df86de477015d61d5e2703fdc51d3c33c6d905f4e3d597bbdf662eada1bbaf6a220423d53fc833c3a3e56cd0d3cb273c4a56806301852b3a281d4020f3c88213db48611d94b4fb0ba4ad45f49ec5384f8df24795dd5f61866"}, {0x38, 0x101, 0xfc, "5d6f9a490244cdbf5bc54de422a3f531ae96855c328b51819ef30afbf60dd3efc517cfface71c25dfea665"}], 0xcc}}, {{&(0x7f0000005f00)=@nfc={0x27, 0x0, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000007100)=[{&(0x7f0000005f80)="735f6010458f8c7115b4f42cb43b8d96532484a12887647bac83fc0154cf88cf48e4717222295765207a9e1cfe930987fba8babd7d89756d98e017c8f30e7851ce4bf0d6adba8acd4a94aced096fb425409f8797fa631245aa9a32bf136ecb96551b93ced41b3f36146fd11adb71725178be35b4c51e3b9150c1694c39494d0628991e99e52de41d0b5dda610b095026276b35da56cc3ca5afe974a03907300f4119b1c2a0d3deeafa02d914159038179be73d911ab56d41ead799732da61d3b43f91b56732d97780f5d0ef47b7b46a3", 0xd0}, {&(0x7f0000006080)="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", 0x1000}, {&(0x7f0000007080)}, {&(0x7f00000070c0)}], 0x4, &(0x7f0000007140)=[{0x7c, 0x104, 0x2, "43e233b8f2e18a833070f97ae6281e505cd2dee8ec28bc84b5f9f98a2b55270a356eaa6dc89cda3b2ea655d518c26cb82793df97418da915dc5ef90627a3048cf55f2529340566d339bf3d5654a9b3cd9e30083202b52b56af0243dd4d2a188595cb75ed6f06be3dd5ef123bf4e6"}], 0x7c}}, {{0x0, 0x0, &(0x7f0000007740)=[{&(0x7f00000071c0)="170cfc599ca2ed3f76abd9c35722a029b8843cb462e145ea47b34b480adfed309ff2a831975ee6570df41041276ef77099d81a4bab526224", 0x38}, {&(0x7f0000007200)="af1708607e97ef8f77d0b2819967f9b2ce7757ad0f0eeed687b0eff9384187c4c3df6fe88a6c43f489a128e9d2c3a1363778e3969f1b78bca2c469c0a666aee73ebbd541b8d6ecf49a510d315e2765f960c10f0ea6cb5cc42ab1455bd696cfa7a536a4e11b1da7a4c9269220b7fd384e84ee69eaf580dabdd9aa1f044f41f8a8dda27ad838fb2f2f9d989591f09b7d83a81b6e675ece6dcfcd6c9598b15a050aeddbf7e3d6195f0f98c2fa516f4b7b5a2f3568e4", 0xb4}, {&(0x7f00000072c0)="a2c5a544ee87bc5086897b385d880d567602f7c49861935ec9418296425da0a5c4c3647d71c08c929c6424029834953afbe14b3ffde23d93c1615232bbe66a38456647e93f05b1204b850344803788e21e8115a09a1cdd40203c69311cb83849e12c0df9097ac4e52162dba82e7f75168a5120ff98789f9424ffe06a697b32a988dbf55be0b41fbacc634991ec85fe55542f48512ad33cd60f5c87650a151944e0a934047f49cba80c9adc6a92d11ca50e0738976f539ca54271dc7cc20ec8c683bd318253a5b7b477b5abbf69cd5c85a9094c72edb7525472af864e4161ba49c1306ba9a6ac917a61d9f3", 0xeb}, {&(0x7f00000073c0)="66b5688e0ad023533f33744dcf0eb0d6b8a4e34009bb7438986accb6021350d050fa6f57bf9ecf19dde35bbbf825a62524e891a4a84c9ab124ff16f1d4612e83eb49baa0225d839863901f92c4492bcd3afc0e35a08996528cf0", 0x5a}, {&(0x7f0000007440)="5a64bd9c968ef5698ac78d2fc9a6e0517831ef3d4720f37127dc8f03e40e2cb2496933c434a37ecffa3880259ea979857bd1e604b1caed3265eadf2bebdc2edfce9a086edadb2039dcb2eda92ffcf4d14101855e18a0ff81aa752f10f0862764e7e4a104a9bcb05bb59de6427e7683f1897aa1bff22cbff731d0b1db616821e1c5072f52bc5025e61b541646eeecf09842", 0x91}, {&(0x7f0000007500)="19276d720d18546639922d85c807174daee4133e9c07cd118ada22e901646cb62bdf1ad365a6ba23e7d8abf2b129cd7d5c6e0ad329727270e6eebb20ed08d1aa0ed31a76c3ed", 0x46}, {&(0x7f0000007580)="c1fd35d05ea15554852a393a3d352fa7a7315f3cc0fcf0ba172635bb0edd9e6e7dfa8aa820452d4994d02ff2f8e1cde62095c77582a2a83e5c343a571283ddb6532119ae003f46b34918b80a896fedcc2690c2f4a70ad989f807fb40bbc513c203ce7b1eaf67210093162c30482772ed4c2e619ab50540b440220979e1630ef5b5ff385278", 0x85}, {&(0x7f0000007640)="9ab6a01cc75270302def59819f1cebe6d5c9aa643062cc63e0522c2009efb84a434cbf8faa70450061498b4a4039d9db974680c6d073d11352368184c85dd99a4870bf9de0552a759619938fdd205c2d571817bde6d3761e24b78d7bd28112c43318b243b9435f6558b528b5c0f2940119a08c26cf2a27e89c9a7a89", 0x7c}, {&(0x7f00000076c0)="5317208c647b40648434474c763119eb1784f1d3e0e6ceaf90819bf0009627b2594821f7590e4e1012bc4d093a7fd8e9118a9d8ba42b914c9a9d22a91846d29c18961bd20970ef6738714b47bfd42527d857f26452bc", 0x56}], 0x9, &(0x7f00000077c0)=[{0xe8, 0x10d, 0xffffffff, "1f563354c718a6ecea632f35349fc282d418d34dde89c558519ccfa9aaadd106112cb4d506776a41b5d189700cdd7cacca377e5cdf39c2b564518e64a4c4e3e5550076dd66cdfd070ea1833775b2a96ed65b212e40182653af14b4fbd12232b379a3cd072477830a26757a9aca1b34ccf146b09cfa007830e2c918deb3ceb5a42851eda21641081d92733e832a4a82f494a5c8873a7b2fe413aee526ffbbe13d161813d934ddda0e007f7ec18a2da5b8e179f6b1b90f538e7fc7cf2ac28edbaef8588ab36a9c556d4c5291741c879e133235e9beaeff3208fd"}], 0xe8}}, {{0x0, 0x0, &(0x7f0000008100)=[{&(0x7f00000078c0)="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", 0xfe}, {&(0x7f00000079c0)="73988e9fe664bf249dfe4ff7a88496283e8414d6d048ca174144f791bf715a007e07aa70821d4ebf4c41fe9ed6721370387bd7b2251eccd9a0c3968db1b9e5c36d8b4a223719ef11d52abe958b09522af0ea595b112d9add04192614d6ed72afbc1c39cb1dae899cd160c00d057bd2145b9c565802104c7221221766fbdebe9fff2c6dcb5dff7167c857436a392628cfe9b41087d955331fc8640dff84d65115c276445e43aab8a5dffb131c0eb793aebfbb7d53dab83104e6aa2d42a76cfd5317e869980dcb3e599958142c3deb28ca4e5cc3462a3ad86b7d72ea184ed97905f8", 0xe1}, {&(0x7f0000007ac0)="c1dec3ccad6235920ab5f4ff4193f30a10bd79cf3d038cd2b5f6259c0011b894834803024abe93b1f4a854d5873b20c91a1548d2d382254fb38ac1ac41515d49b3aa56cb97bf0581bf65293c7a75b9637fd5abcd871b6cc12cb1200bc9c22f414f7b8c192c3237b2144fcd17f85649f9216a21ec462d461b5d8920efa22b3f186bc3188bbe754c33f39607f525e5", 0x8e}, {&(0x7f0000007b80)="c30fb4167e635239a703be6a73d1748fb5feb5c08cdc773c703b362dd35a4c3b96eb8a9bc057a891d1cb788b221d25dbe4bd34afc167f100442b34dc434c3313bb53400dfa9c3c3375a32d451dcb9d27ba85c0f230408c272714f66c1b2dc11d8b306667cef178d238bd0a8ef6ac5322f7666cced149ef63516f3b7351a87105b1ec366fbe92707aed3c3121b534e986b0529597dce515eab40d9628325186cbcd40d8de0149d66be99a8f6a8d4d334ed67e06c11aaecc153edfd0d6ac9cb80359e23d665faf86a8cd610c938a85feac6c49957ba703ad42a060452246046f27be510b29b3dc5d12", 0xe8}, {&(0x7f0000007c80)="b087f62f5de18fbeeb9625ef9ff4b25e73b7020f6036db59cfb5060ca44e9785fccf55d4fd36825bf6151c39c54c183b3a4225f7935c8f9f78561a8d302233a8", 0x40}, {&(0x7f0000007cc0)="92652ba8c1b55956e2b2e4fbbb63e57e2f5376c2c24ed6d53ede73f4e851150f69e29d5824a1ce07a2b7068affc99c76cdad732da7e209963c6be6c71423d9e68ac18ef3f9beab382a9ffb07a6bf9e7d85a956172fd0dcd1cec6b46732b2b8afec1bbd56cb3282daa1270e9bfcec9f090ea1b8b5383fc41f8c81e808257e91cb5e520927d931f22e87c294b4e8eb2ed4776e2642fb78ab32fca58f43d8ac073b5d97c7258f9f9bf2ba3b9ccda29f879496bc263c86980779b9a3673d6057dadb87b82bc09bc9bd64d105672bb87bd0501145a5b4624110e5d87961a0f3b0d101b5b9b6017219d437c571ce8a11fab533d5a9a90309", 0xf5}, {&(0x7f0000007dc0)="49eae658e1fe698374721f75bbd1af092edcfd3a2cff0a7117fc8718efeffc75b36bd2d39ee7a2fdeaf36b0180389a09c9d4e66819cea3f6f72df1516fa30421414abbc4f4729b100582ac29ed33be80d3aca71cf5e77e262221ad198fb91554cafc6a7493c9dcc4596a678ac6f138cdd212f2e94375feecc2a76ffd64c6cfbf0e16cb3be11ab83c30c82779a769805146b396de7440ac53e9ea83708fa8236b00bf7f9e42df9881f66fd59310cdc19b954e14cbb7295578400f83fe954d320b6ca778ceee58d4701b470ebcd3627e1c646db1fe6592", 0xd6}, {&(0x7f0000007ec0)="55f9049f9d1394d0baa0f69545c8039ee8c4ab757df0dcfa17593277a04c89040f9cf467d1c85be093d2da1e9c80b4e042f33f7eb07a0f18ea4a2b7a2803d9ab33c42b9f6fad0d1b840d3deab3f63acef88b45038514eb15a71d314755e9b25d20cec5d0363ea7ae176c6b65e82377f32daf4d4884bf3de68e62f6fe369892a361124ba1434d4cb0f6df50de6ddd108b4dc96ecee810f706aef826d778480b17cf2d29d99cc7", 0xa6}, {&(0x7f0000007f80)="07db3a598467ce6000949f33ce727614a0cb057e9086e9a4f5ce5cb000bcbd2c7baa014e26361577dd7d2e3ae14d0afcc7265ee15d1e2b4c860464ec9f8f6249b5467d70d9", 0x45}, {&(0x7f0000008000)="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", 0xfd}], 0xa, &(0x7f0000008180)=[{0x88, 0x103, 0xff, "5c9be902fbca1500d736eaffb6258f73ca92ab3a4ea4b07ceac8be332be916284b47f238210c7b58fecc5ad503b1687a4610b047593b8ee5bd453b9654125b34f61bb9a4caca79c60f302a104b50cd4e174d5e7fc352dc56a28fa1657e8d3d2bb6aae18adb93fd08f1a339b378450b82bea3f0451f226b77f06504"}, {0x5c, 0x11, 0xffffffff, "98ec56c01ae7cffc3b14dcb0693fba73f372f8606cf840663fc9ee753dcb5e680036eb1abf4623acee9858693e72b6736b810ac9ebf82cd453cd48a1e4a11b55a7b8fe1409cc5643a8440dfaf4f6"}, {0x28, 0x117, 0xfff, "e26f275067e2c947b527dd6f90ff9621306055473b955a429c48"}, {0xf0, 0x1a, 0x8, "2afce9969afde4724e4b8acabba320f9b436a109aa55b038a8f53ade2d373d5f60bfcfb54f465da608c821fc6192c598715d374cbe272d75208ff1ddd18234758a191ff3fbe2a29a42ac6e8506de2f302a215ac6bfeb5f6140dc163bfa849b336b5b5e5d1025c8a24708a83c5a0925c230691a0544441b6472ef5ff0883e8dd9c327e3349c8dd72a98cbf961d0664bfe3f02b98eb43694736ef31a1d7bb67084d23d3329e3d2104a71ebb0fca5d5c44ea4219b87e07ea85f1ceab492ece2429898e8750e274652a534d14936652f25c577e1dafdd2a54fff090884631e3f86e238f5ce"}], 0x1fc}}], 0x9, 0x20000000) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f00000084c0)={0x2, 0x4, @status={[0x5, 0x100000000, 0x0, 0x0, 0xa, 0x7fffffff]}, [0x6, 0x5, 0x1, 0x0, 0x5, 0x4, 0x6, 0xf1, 0x8, 0x5, 0x0, 0x7fffffff, 0xe5, 0xff, 0xfff, 0x8, 0xff, 0x4, 0x2, 0x17ead0de, 0x1, 0x8001, 0x5, 0x5, 0x6, 0x1, 0x10, 0x5e, 0x77, 0x3ff, 0x3, 0x9, 0x2, 0x1, 0x7f, 0x0, 0x3, 0x2, 0x5, 0x7, 0x2, 0xa13, 0xfffffffffffffff8, 0x0, 0x27, 0x80, 0x9, 0x9, 0x85, 0xfffffffffffffff9, 0x4, 0x3, 0x0, 0x133, 0x200000000000, 0xffff, 0x5, 0x1, 0x7ff, 0x1, 0x4, 0x4, 0x8, 0x1000]}) (async) r4 = semget$private(0x0, 0x2, 0x132) (async) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000009000)={&(0x7f0000008f00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000008fc0)={&(0x7f0000008f40)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x8, 0x78}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x18081) r5 = shmget$private(0x0, 0x800000, 0x1, &(0x7f00007fd000/0x800000)=nil) shmctl$SHM_STAT(r5, 0xd, &(0x7f0000009040)) (async) mq_open(&(0x7f0000009080)='\x00', 0x40, 0x159, &(0x7f00000090c0)={0x26a9, 0x80000001, 0x17, 0x5}) (async) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x4) (async) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f0000009100)=""/188) (async) setxattr$trusted_overlay_origin(&(0x7f00000091c0)='./file0\x00', &(0x7f0000009200), &(0x7f0000009240), 0x2, 0xcbbfc8e19d9e0edd) (async) rt_sigpending(&(0x7f0000009280), 0x8) (async) ioctl$DRM_IOCTL_PANTHOR_BO_QUERY_INFO(r1, 0xc0106450, &(0x7f00000092c0)={0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_PANTHOR_BO_MMAP_OFFSET(r1, 0xc0106446, &(0x7f0000009300)={r6}) (async) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82187202, &(0x7f0000009340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r7 = msgget(0x1, 0x20) msgrcv(r7, &(0x7f0000009580)={0x0, ""/4}, 0x8, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000095c0)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x4, 0x8, 0x1, 0x9]}, &(0x7f0000009640)=0x50) (async) r8 = accept4$packet(r1, &(0x7f0000009680), &(0x7f00000096c0)=0x14, 0xc0800) getsockopt$packet_buf(r8, 0x107, 0x5, &(0x7f0000009700)=""/4096, &(0x7f000000a700)=0x1000) 2.320012378s ago: executing program 1 (id=1156): socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x541b, &(0x7f0000000280)={'sit0\x00', 0x0}) r1 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000001018610f4205ae06d6c011703010902240001010000000904690202ff5a"], 0x0) r2 = open$dir(&(0x7f0000000180)='.\x00', 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x0, 0xe5}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x40080) ioctl$FITRIM(r2, 0x5452, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r4, r5/1000+60000}}) syz_usb_control_io$rtl8150(r1, 0x0, 0x0) 1.830142941s ago: executing program 1 (id=1157): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000600)={0x0, 0xfffffffffffffee0, &(0x7f00000000c0)={0x0}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_SETVERSION(r1, 0x5452, &(0x7f00000000c0)=0x2000) socket$inet_icmp(0x2, 0x2, 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x3b}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x808}, 0x8010) 1.730193352s ago: executing program 0 (id=1158): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.kill\x00', 0x275a, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) close_range(r1, r1, 0x2) socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(r0, &(0x7f00000005c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r1, &(0x7f0000000580)={0x18, 0xfffffffffffffffe, r2, {0x104}}, 0x18) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r1, 0xf503, 0x0) 1.249933144s ago: executing program 0 (id=1159): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = dup(r0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f0000004480)={0x0, 0x0, &(0x7f0000004440)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00'], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004000) 1.140453186s ago: executing program 1 (id=1160): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000010803000000"], 0x14}}, 0x20040004) 770.341796ms ago: executing program 0 (id=1161): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x2, 0x3, 0x3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x5452, &(0x7f0000000080)={'gretap0\x00', 0x0}) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x2f0a00, 0x0) close(r2) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x4, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) r3 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESOCT=r2, @ANYRES16=r3, @ANYRESOCT=r2], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f00, 0x0, 0x4, 0x0, {{0x5, 0x4, 0x0, 0x0, 0xff18, 0x0, 0x0, 0x4, 0x2f, 0x0, @empty, @broadcast}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', r4, 0x47, 0x1, 0x7, 0x4, {{0x8, 0x4, 0x0, 0x1, 0x20, 0x65, 0x0, 0x5, 0x29, 0x0, @initdev={0xac, 0x1e, 0xd, 0x0}, @multicast2, {[@lsrr={0x83, 0xb, 0x4b, [@multicast2, @remote]}]}}}}}) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000001c0)={{r0}, 0x9, 0x9, 0x5}) 580.257907ms ago: executing program 1 (id=1162): r0 = syz_open_dev$audion(&(0x7f00000015c0), 0xaad, 0x200440) close(r0) socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14"], 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x240008c0) (fail_nth: 2) 0s ago: executing program 1 (id=1163): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() capset(&(0x7f0000000040)={0x7297bb1569ea3244, r1}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x88, 0xffffffff, 0x40}) r2 = syz_open_dev$audion(&(0x7f00000015c0), 0xaad, 0x200440) close(r2) socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DEVLINK_CMD_SB_POOL_GET(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24004810}, 0x40) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r5, 0x8902, &(0x7f0000000200)=r6) kernel console output (not intermixed with test programs): 9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 189.388554][ T4739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4739 comm=syz.1.418 [ 191.249391][ T4754] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4754 comm=syz.1.427 [ 191.347307][ T4756] FAULT_INJECTION: forcing a failure. [ 191.347307][ T4756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.358715][ T4756] CPU: 0 UID: 0 PID: 4756 Comm: syz.0.426 Not tainted syzkaller #0 PREEMPT [ 191.358788][ T4756] Hardware name: ARM-Versatile Express [ 191.358802][ T4756] Call trace: [ 191.358825][ T4756] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 191.358887][ T4756] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 191.358897][ T4756] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 191.358923][ T4756] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 191.358952][ T4756] r7:00000000 r6:00000000 r5:857c0c80 r4:82b4f188 [ 191.358960][ T4756] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 191.358986][ T4756] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 191.359013][ T4756] r8:76f47f08 r7:00000000 r6:00000000 r5:edd15f68 r4:00000002 [ 191.359021][ T4756] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 191.359051][ T4756] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 191.359109][ T4756] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 191.359214][ T4756] r10:8064c488 r9:00000001 r8:00000002 r7:edd15f68 r6:0000000f r5:76f47f08 [ 191.359243][ T4756] r4:857c0c80 r3:edd15e9f [ 191.359291][ T4756] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 191.359443][ T4756] r8:857c0c80 r7:edd15f68 r6:76f47f08 r5:86228f80 r4:0000000f [ 191.359484][ T4756] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 191.359605][ T4756] r10:00000003 r9:857c0c80 r8:8020029c r7:00000000 r6:00000000 r5:86228f80 [ 191.359676][ T4756] r4:86228f83 [ 191.359812][ T4756] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 191.359962][ T4756] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 191.360112][ T4756] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 191.360191][ T4756] Exception stack(0xedd15fa8 to 0xedd15ff0) [ 191.360234][ T4756] 5fa0: 00000000 00000000 00000003 76f47f08 0000000f 00000000 [ 191.360294][ T4756] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f480dc [ 191.360329][ T4756] 5fe0: 76f47e58 76f47e44 0010ba34 00112618 [ 192.268949][ T4766] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4766 comm=syz.1.432 [ 192.985939][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 192.986232][ T28] audit: type=1400 audit(192.890:1333): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 193.050213][ T28] audit: type=1400 audit(192.960:1334): avc: denied { create } for pid=4773 comm="syz.1.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 193.071290][ T28] audit: type=1400 audit(192.980:1335): avc: denied { create } for pid=4777 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 193.073415][ T28] audit: type=1400 audit(192.980:1336): avc: denied { create } for pid=4777 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 193.122918][ T28] audit: type=1400 audit(193.030:1337): avc: denied { create } for pid=4777 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 193.131569][ T28] audit: type=1400 audit(193.040:1338): avc: denied { read write } for pid=4777 comm="syz.0.438" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 193.132932][ T28] audit: type=1400 audit(193.040:1339): avc: denied { read write } for pid=4777 comm="syz.0.438" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 193.133933][ T28] audit: type=1400 audit(193.040:1340): avc: denied { read write } for pid=4777 comm="syz.0.438" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 193.134931][ T28] audit: type=1400 audit(193.040:1341): avc: denied { read write } for pid=4777 comm="syz.0.438" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 193.147181][ T28] audit: type=1400 audit(193.050:1342): avc: denied { read write } for pid=4777 comm="syz.0.438" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 193.539533][ T4784] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4784 comm=syz.1.439 [ 194.674350][ T4794] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4794 comm=syz.1.444 [ 195.258111][ T4803] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4803 comm=syz.1.449 [ 195.757532][ T4810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4810 comm=syz.1.452 [ 196.817635][ T4821] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4821 comm=syz.1.458 [ 198.030612][ T28] kauditd_printk_skb: 196 callbacks suppressed [ 198.031039][ T28] audit: type=1400 audit(197.940:1540): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 198.077518][ T28] audit: type=1400 audit(197.910:1539): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 198.208507][ T28] audit: type=1400 audit(198.120:1541): avc: denied { read } for pid=4839 comm="syz.1.467" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 198.221834][ T28] audit: type=1400 audit(198.130:1542): avc: denied { create } for pid=4839 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 198.300346][ T28] audit: type=1400 audit(198.210:1543): avc: denied { prog_load } for pid=4838 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 198.437812][ T28] audit: type=1400 audit(198.350:1544): avc: denied { create } for pid=4839 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 198.463843][ T28] audit: type=1400 audit(198.370:1545): avc: denied { create } for pid=4838 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 198.556009][ T28] audit: type=1400 audit(198.460:1546): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 198.669748][ T28] audit: type=1400 audit(198.580:1547): avc: denied { read write } for pid=4842 comm="syz.1.468" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 198.722335][ T28] audit: type=1400 audit(198.630:1548): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 202.211967][ T4891] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4891 comm=syz.0.491 [ 203.058295][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 203.058748][ T28] audit: type=1400 audit(202.960:1612): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 203.228445][ T28] audit: type=1400 audit(203.140:1613): avc: denied { create } for pid=4902 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 205.789095][ T28] audit: type=1400 audit(205.700:1614): avc: denied { read write } for pid=4902 comm="syz.1.497" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 206.933063][ T28] audit: type=1400 audit(206.840:1615): avc: denied { mounton } for pid=4902 comm="syz.1.497" path="/248/file0" dev="tmpfs" ino=1334 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 210.372477][ T28] audit: type=1400 audit(210.280:1616): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 211.829647][ T28] audit: type=1400 audit(211.720:1617): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 212.048467][ T28] audit: type=1400 audit(211.960:1618): avc: denied { create } for pid=4911 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 212.080421][ T28] audit: type=1400 audit(211.990:1619): avc: denied { create } for pid=4911 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 212.135466][ T28] audit: type=1400 audit(212.040:1620): avc: denied { read } for pid=4911 comm="syz.1.499" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 212.151039][ T28] audit: type=1400 audit(212.060:1621): avc: denied { create } for pid=4911 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 212.179864][ T28] audit: type=1400 audit(212.090:1622): avc: denied { read } for pid=4911 comm="syz.1.499" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 212.184896][ T28] audit: type=1400 audit(212.090:1623): avc: denied { create } for pid=4911 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 212.225312][ T28] audit: type=1400 audit(212.130:1624): avc: denied { create } for pid=4911 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 212.239701][ T28] audit: type=1400 audit(212.150:1625): avc: denied { create } for pid=4911 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 215.478354][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 215.478730][ T28] audit: type=1400 audit(215.380:1654): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 215.541328][ T28] audit: type=1400 audit(215.450:1655): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 215.592435][ T4934] FAULT_INJECTION: forcing a failure. [ 215.592435][ T4934] name failslab, interval 1, probability 0, space 0, times 0 [ 215.597508][ T4934] CPU: 1 UID: 0 PID: 4934 Comm: syz.1.510 Not tainted syzkaller #0 PREEMPT [ 215.597610][ T4934] Hardware name: ARM-Versatile Express [ 215.597638][ T4934] Call trace: [ 215.597686][ T4934] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 215.597794][ T4934] r7:60000113 r6:60000113 r5:8231e214 r4:00000000 [ 215.597815][ T4934] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 215.597871][ T4934] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 215.597930][ T4934] r7:830c0c00 r6:00000000 r5:85639900 r4:82b18108 [ 215.597954][ T4934] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 215.598014][ T4934] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 215.598082][ T4934] r8:85639900 r7:830c0c00 r6:00000cc0 r5:00000000 r4:830c4b40 [ 215.598103][ T4934] [<80554020>] (should_failslab) from [<8053174c>] (kmem_cache_alloc_lru_noprof+0x58/0x3c4) [ 215.598160][ T4934] [<805316f4>] (kmem_cache_alloc_lru_noprof) from [<805a6004>] (__d_alloc+0x30/0x218) [ 215.598236][ T4934] r10:830c0c00 r9:825258c0 r8:8379e600 r7:830c0c00 r6:830ed9d0 r5:00000000 [ 215.598259][ T4934] r4:ee5cde84 [ 215.598277][ T4934] [<805a5fd4>] (__d_alloc) from [<805a6268>] (d_alloc_anon+0x14/0x18) [ 215.598346][ T4934] r9:81c23d40 r8:8379e600 r7:856d2080 r6:830ed9d0 r5:856d20c4 r4:ee5cde84 [ 215.598365][ T4934] [<805a6254>] (d_alloc_anon) from [<805c7980>] (path_from_stashed+0x13c/0x29c) [ 215.598422][ T4934] [<805c7844>] (path_from_stashed) from [<805dc398>] (open_namespace+0x48/0xd4) [ 215.598521][ T4934] r10:85639900 r9:00000003 r8:85aaf880 r7:856d2000 r6:85639900 r5:00000000 [ 215.598553][ T4934] r4:0000894c [ 215.598574][ T4934] [<805dc350>] (open_namespace) from [<805dc440>] (open_related_ns+0x1c/0x20) [ 215.598636][ T4934] r6:00000005 r5:837e2040 r4:0000894c [ 215.598655][ T4934] [<805dc424>] (open_related_ns) from [<815eb7ec>] (sock_ioctl+0x350/0x4c0) [ 215.598723][ T4934] [<815eb49c>] (sock_ioctl) from [<805a1864>] (sys_ioctl+0x244/0xb5c) [ 215.598816][ T4934] r9:00000003 r8:85aaf880 r7:00000005 r6:0000894c r5:85aaf881 r4:00000000 [ 215.598839][ T4934] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 215.598891][ T4934] Exception stack(0xee5cdfa8 to 0xee5cdff0) [ 215.598934][ T4934] dfa0: 00000000 00000000 00000003 0000894c 00000005 00000000 [ 215.598971][ T4934] dfc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fab0dc [ 215.598999][ T4934] dfe0: 76faae88 76faae78 00018ebc 00130810 [ 215.599047][ T4934] r10:00000036 r9:85639900 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 215.599070][ T4934] r4:00000000 [ 215.718295][ T28] audit: type=1400 audit(215.630:1656): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 215.837084][ T28] audit: type=1400 audit(215.740:1657): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 215.842274][ T28] audit: type=1400 audit(215.750:1658): avc: denied { read } for pid=4937 comm="syz.1.512" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 215.911186][ T28] audit: type=1400 audit(215.820:1659): avc: denied { read } for pid=4937 comm="syz.1.512" name="usbmon0" dev="devtmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 215.952981][ T28] audit: type=1400 audit(215.860:1660): avc: denied { read open } for pid=4937 comm="syz.1.512" path="net:[4026532657]" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 216.004322][ T28] audit: type=1400 audit(215.910:1661): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 216.373273][ T28] audit: type=1400 audit(216.280:1662): avc: denied { create } for pid=4939 comm="syz.0.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 216.489133][ T28] audit: type=1400 audit(216.400:1663): avc: denied { read write } for pid=4939 comm="syz.0.513" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 217.539265][ T4950] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4950 comm=syz.0.518 [ 219.398098][ T4965] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4965 comm=syz.1.524 [ 220.570011][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 220.570438][ T28] audit: type=1400 audit(220.480:1703): avc: denied { read } for pid=4972 comm="syz.1.527" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 220.588270][ T28] audit: type=1400 audit(220.500:1704): avc: denied { create } for pid=4972 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 220.717914][ T28] audit: type=1400 audit(220.620:1705): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 220.869260][ T28] audit: type=1400 audit(220.780:1706): avc: denied { create } for pid=4974 comm="syz.0.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 220.992758][ T28] audit: type=1400 audit(220.900:1707): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 221.500338][ T28] audit: type=1400 audit(221.410:1708): avc: denied { read write } for pid=4976 comm="syz.1.530" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 221.566180][ T28] audit: type=1400 audit(221.470:1709): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 221.583108][ T28] audit: type=1400 audit(221.490:1710): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 221.728177][ T28] audit: type=1400 audit(221.640:1711): avc: denied { create } for pid=4980 comm="syz.1.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 222.036061][ T28] audit: type=1400 audit(221.940:1712): avc: denied { create } for pid=4982 comm="syz.0.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 224.558700][ T4996] FAULT_INJECTION: forcing a failure. [ 224.558700][ T4996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.558995][ T4996] CPU: 0 UID: 0 PID: 4996 Comm: syz.0.539 Not tainted syzkaller #0 PREEMPT [ 224.559047][ T4996] Hardware name: ARM-Versatile Express [ 224.559061][ T4996] Call trace: [ 224.559084][ T4996] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 224.559144][ T4996] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 224.559154][ T4996] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 224.559182][ T4996] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 224.559212][ T4996] r7:00000000 r6:00000000 r5:85639900 r4:82b4f188 [ 224.559221][ T4996] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 224.559248][ T4996] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 224.559275][ T4996] r8:76f47f08 r7:00000000 r6:00000000 r5:ee82df68 r4:00000002 [ 224.559283][ T4996] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 224.559318][ T4996] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 224.559480][ T4996] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 224.559605][ T4996] r10:8064c488 r9:00000001 r8:00000002 r7:ee82df68 r6:0000000f r5:76f47f08 [ 224.559657][ T4996] r4:85639900 r3:ee82de9f [ 224.559761][ T4996] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 224.559858][ T4996] r8:85639900 r7:ee82df68 r6:76f47f08 r5:85aaf880 r4:0000000f [ 224.559891][ T4996] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 224.559941][ T4996] r10:00000003 r9:85639900 r8:8020029c r7:00000000 r6:00000000 r5:85aaf880 [ 224.559993][ T4996] r4:85aaf883 [ 224.560120][ T4996] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 224.560301][ T4996] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 224.560512][ T4996] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 224.560665][ T4996] Exception stack(0xee82dfa8 to 0xee82dff0) [ 224.560922][ T4996] dfa0: 00000000 00000000 00000004 76f47f08 0000000f 00000000 [ 224.562140][ T4996] dfc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f480dc [ 224.562213][ T4996] dfe0: 76f47e58 76f47e44 0010ba34 00112618 [ 225.674088][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 225.674444][ T28] audit: type=1400 audit(225.580:1747): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.055884][ T28] audit: type=1400 audit(225.960:1748): avc: denied { create } for pid=5005 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 226.581323][ T28] audit: type=1400 audit(226.490:1749): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.791336][ T28] audit: type=1400 audit(226.700:1750): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 227.191866][ T5015] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5015 comm=syz.0.548 [ 227.294522][ T5019] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5019 comm=syz.0.548 [ 227.904542][ T28] audit: type=1400 audit(227.810:1751): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 228.068020][ T28] audit: type=1400 audit(227.980:1752): avc: denied { read write } for pid=5020 comm="syz.1.549" name="fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 228.101143][ T28] audit: type=1400 audit(228.010:1753): avc: denied { create } for pid=5020 comm="syz.1.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 228.120453][ T28] audit: type=1400 audit(228.030:1754): avc: denied { prog_load } for pid=5020 comm="syz.1.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 228.180655][ T28] audit: type=1400 audit(228.090:1755): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 228.594459][ T28] audit: type=1400 audit(228.500:1756): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 228.778309][ T5025] FAULT_INJECTION: forcing a failure. [ 228.778309][ T5025] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.781476][ T5025] CPU: 1 UID: 0 PID: 5025 Comm: syz.1.551 Not tainted syzkaller #0 PREEMPT [ 228.781579][ T5025] Hardware name: ARM-Versatile Express [ 228.781594][ T5025] Call trace: [ 228.781618][ T5025] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 228.781678][ T5025] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 228.781688][ T5025] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 228.781715][ T5025] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 228.781745][ T5025] r7:00000000 r6:00000000 r5:83e4d780 r4:82b4f188 [ 228.781752][ T5025] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 228.781778][ T5025] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 228.781805][ T5025] r8:00000000 r7:00000000 r6:000000b4 r5:20000000 r4:833416c0 [ 228.781812][ T5025] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 228.781833][ T5025] [<809d7488>] (should_fail_usercopy) from [<809dd428>] (strncpy_from_user+0x20/0x1b0) [ 228.781856][ T5025] [<809dd408>] (strncpy_from_user) from [<80595700>] (do_getname+0x4c/0x14c) [ 228.781891][ T5025] r10:833416cc r9:20000380 r8:00000000 r7:00000000 r6:20000000 r5:825258b8 [ 228.781900][ T5025] r4:833416c0 [ 228.781908][ T5025] [<805956b4>] (do_getname) from [<8059b2c4>] (getname_flags+0x14/0x18) [ 228.781941][ T5025] r10:00000002 r9:20000380 r8:ffffff9c r7:20000000 r6:00000100 r5:86220e40 [ 228.781951][ T5025] r4:00000018 r3:00000002 [ 228.781959][ T5025] [<8059b2b0>] (getname_flags) from [<805c26c4>] (path_setxattrat+0x184/0x1bc) [ 228.781985][ T5025] [<805c2540>] (path_setxattrat) from [<805c28c4>] (sys_lsetxattr+0x34/0x3c) [ 228.782017][ T5025] r10:000000e3 r9:83e4d780 r8:8020029c r7:000000e3 r6:0012f214 r5:00000000 [ 228.782026][ T5025] r4:20000040 [ 228.782034][ T5025] [<805c2890>] (sys_lsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 228.782060][ T5025] Exception stack(0xdfc41fa8 to 0xdfc41ff0) [ 228.782080][ T5025] 1fa0: 00000002 00000000 20000000 20000040 20000380 00000024 [ 228.782096][ T5025] 1fc0: 00000002 00000000 0012f214 000000e3 003462d8 00000000 00000001 76fab0dc [ 228.782109][ T5025] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 228.782120][ T5025] r4:00000002 [ 230.954237][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 230.957637][ T28] audit: type=1400 audit(230.860:1768): avc: denied { create } for pid=5035 comm="syz.0.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 231.044703][ T28] audit: type=1400 audit(230.950:1769): avc: denied { read } for pid=5035 comm="syz.0.556" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 231.052849][ T28] audit: type=1400 audit(230.960:1770): avc: denied { create } for pid=5035 comm="syz.0.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 231.063472][ T28] audit: type=1400 audit(230.970:1771): avc: denied { create } for pid=5035 comm="syz.0.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 231.315448][ T28] audit: type=1400 audit(231.220:1772): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 231.455744][ T28] audit: type=1400 audit(231.360:1773): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 232.003232][ T28] audit: type=1400 audit(231.910:1774): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 232.010221][ T28] audit: type=1400 audit(231.910:1775): avc: denied { create } for pid=5039 comm="syz.0.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 232.147321][ T28] audit: type=1400 audit(232.050:1776): avc: denied { create } for pid=5041 comm="syz.1.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 232.175248][ T28] audit: type=1400 audit(232.080:1777): avc: denied { read write } for pid=5041 comm="syz.1.559" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 233.355179][ T5054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5054 comm=syz.1.565 [ 234.987921][ T5068] netlink: 4 bytes leftover after parsing attributes in process `syz.1.571'. [ 236.132708][ T28] kauditd_printk_skb: 60 callbacks suppressed [ 236.133161][ T28] audit: type=1400 audit(236.040:1838): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 236.274829][ T28] audit: type=1400 audit(236.180:1839): avc: denied { read write } for pid=5079 comm="syz.1.576" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 236.289092][ T28] audit: type=1400 audit(236.200:1840): avc: denied { mounton } for pid=5079 comm="syz.1.576" path="/297/file0" dev="tmpfs" ino=1599 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 236.300318][ T5080] FAULT_INJECTION: forcing a failure. [ 236.300318][ T5080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 236.301793][ T5080] CPU: 1 UID: 0 PID: 5080 Comm: syz.1.576 Not tainted syzkaller #0 PREEMPT [ 236.301899][ T5080] Hardware name: ARM-Versatile Express [ 236.301927][ T5080] Call trace: [ 236.301972][ T5080] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 236.302088][ T5080] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 236.302110][ T5080] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 236.302166][ T5080] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 236.302230][ T5080] r7:00000000 r6:00000000 r5:84843200 r4:82b4f188 [ 236.302248][ T5080] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 236.302305][ T5080] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 236.302363][ T5080] r8:76faaf08 r7:00000000 r6:00000000 r5:e0169f68 r4:00000002 [ 236.302382][ T5080] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 236.302429][ T5080] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 236.302506][ T5080] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 236.302584][ T5080] r10:8064c488 r9:00000001 r8:00000002 r7:e0169f68 r6:0000000f r5:76faaf08 [ 236.302610][ T5080] r4:84843200 r3:e0169e9f [ 236.302629][ T5080] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 236.302703][ T5080] r8:84843200 r7:e0169f68 r6:76faaf08 r5:86222f00 r4:0000000f [ 236.302723][ T5080] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 236.302799][ T5080] r10:00000003 r9:84843200 r8:8020029c r7:00000000 r6:00000000 r5:86222f00 [ 236.302821][ T5080] r4:86222f03 [ 236.302838][ T5080] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 236.302904][ T5080] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 236.302923][ T5080] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 236.302972][ T5080] Exception stack(0xe0169fa8 to 0xe0169ff0) [ 236.303013][ T5080] 9fa0: 00000000 00000000 00000004 76faaf08 0000000f 00000000 [ 236.303058][ T5080] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fab0dc [ 236.303088][ T5080] 9fe0: 76faae58 76faae44 0010ba34 00112618 [ 236.337595][ T28] audit: type=1400 audit(236.250:1841): avc: denied { create } for pid=5075 comm="syz.0.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 236.361650][ T28] audit: type=1400 audit(236.270:1842): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 236.377668][ T28] audit: type=1400 audit(236.290:1843): avc: denied { create } for pid=5075 comm="syz.0.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 236.489913][ T28] audit: type=1400 audit(236.400:1844): avc: denied { create } for pid=5081 comm="syz.1.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 236.667953][ T28] audit: type=1400 audit(236.570:1845): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 236.918757][ T28] audit: type=1400 audit(236.830:1846): avc: denied { read write } for pid=5083 comm="syz.0.578" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 236.980813][ T28] audit: type=1400 audit(236.890:1847): avc: denied { prog_load } for pid=5083 comm="syz.0.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.099312][ T5085] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5085 comm=syz.0.578 [ 238.953919][ T5097] FAULT_INJECTION: forcing a failure. [ 238.953919][ T5097] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.964680][ T5097] CPU: 1 UID: 0 PID: 5097 Comm: syz.0.583 Not tainted syzkaller #0 PREEMPT [ 238.964827][ T5097] Hardware name: ARM-Versatile Express [ 238.964854][ T5097] Call trace: [ 238.964915][ T5097] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 238.965021][ T5097] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 238.965051][ T5097] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 238.965104][ T5097] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 238.965162][ T5097] r7:00000000 r6:00000000 r5:8563f080 r4:82b4f188 [ 238.965180][ T5097] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 238.965230][ T5097] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 238.965285][ T5097] r8:76f47f08 r7:00000000 r6:00000000 r5:ea511f68 r4:00000002 [ 238.965301][ T5097] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 238.965349][ T5097] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 238.965410][ T5097] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 238.965475][ T5097] r10:8064c488 r9:00000001 r8:00000002 r7:ea511f68 r6:0000000f r5:76f47f08 [ 238.965498][ T5097] r4:8563f080 r3:ea511e9f [ 238.965515][ T5097] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 238.965584][ T5097] r8:8563f080 r7:ea511f68 r6:76f47f08 r5:86222f00 r4:0000000f [ 238.965602][ T5097] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 238.965672][ T5097] r10:00000003 r9:8563f080 r8:8020029c r7:00000000 r6:00000000 r5:86222f00 [ 238.965692][ T5097] r4:86222f03 [ 238.965709][ T5097] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 238.965770][ T5097] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 238.965841][ T5097] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 238.965938][ T5097] Exception stack(0xea511fa8 to 0xea511ff0) [ 238.965978][ T5097] 1fa0: 00000000 00000000 00000004 76f47f08 0000000f 00000000 [ 238.966013][ T5097] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f480dc [ 238.966050][ T5097] 1fe0: 76f47e58 76f47e44 0010ba34 00112618 [ 241.185959][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 241.186322][ T28] audit: type=1400 audit(241.090:1888): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 241.478347][ T28] audit: type=1400 audit(241.390:1889): avc: denied { read write } for pid=5120 comm="syz.1.593" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 241.538762][ T28] audit: type=1400 audit(241.440:1890): avc: denied { mounton } for pid=5120 comm="syz.1.593" path="/305/file0" dev="tmpfs" ino=1643 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 241.719060][ T28] audit: type=1400 audit(241.630:1891): avc: denied { create } for pid=5120 comm="syz.1.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 241.721051][ T28] audit: type=1400 audit(241.630:1892): avc: denied { create } for pid=5120 comm="syz.1.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 241.737905][ T28] audit: type=1400 audit(241.650:1893): avc: denied { create } for pid=5120 comm="syz.1.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 241.775631][ T28] audit: type=1400 audit(241.680:1894): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 242.010275][ T28] audit: type=1400 audit(241.920:1895): avc: denied { create } for pid=5122 comm="syz.1.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 242.032892][ T28] audit: type=1400 audit(241.940:1896): avc: denied { create } for pid=5122 comm="syz.1.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 242.063859][ T28] audit: type=1400 audit(241.970:1897): avc: denied { create } for pid=5122 comm="syz.1.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 242.328723][ T5126] FAULT_INJECTION: forcing a failure. [ 242.328723][ T5126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.330681][ T5126] CPU: 1 UID: 0 PID: 5126 Comm: syz.1.595 Not tainted syzkaller #0 PREEMPT [ 242.330800][ T5126] Hardware name: ARM-Versatile Express [ 242.330829][ T5126] Call trace: [ 242.330879][ T5126] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 242.330978][ T5126] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 242.331002][ T5126] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 242.331058][ T5126] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 242.331114][ T5126] r7:200000c0 r6:00000000 r5:8563f080 r4:82b4f188 [ 242.331130][ T5126] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 242.331185][ T5126] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 242.331240][ T5126] r8:84860000 r7:200000c0 r6:ea661c90 r5:00000040 r4:00000040 [ 242.331259][ T5126] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 242.331302][ T5126] [<809d7488>] (should_fail_usercopy) from [<817f93e0>] (copy_to_sockptr_offset.constprop.0+0x60/0xf8) [ 242.331364][ T5126] [<817f9380>] (copy_to_sockptr_offset.constprop.0) from [<81801298>] (do_tcp_getsockopt+0x438/0x1198) [ 242.331432][ T5126] r8:84860000 r7:00000000 r6:ea661e44 r5:ea661c90 r4:ea661cd0 [ 242.331451][ T5126] [<81800e64>] (do_tcp_getsockopt) from [<8180207c>] (tcp_getsockopt+0x64/0x6c) [ 242.331525][ T5126] r10:200000c0 r9:00000000 r8:00000000 r7:815ed878 r6:00000023 r5:00000006 [ 242.331547][ T5126] r4:81802018 [ 242.331565][ T5126] [<81802018>] (tcp_getsockopt) from [<815ed8a0>] (sock_common_getsockopt+0x28/0x30) [ 242.331622][ T5126] r4:81802018 [ 242.331639][ T5126] [<815ed878>] (sock_common_getsockopt) from [<815ea7ac>] (do_sock_getsockopt+0x25c/0x2f8) [ 242.331702][ T5126] r4:8379d6c0 [ 242.331723][ T5126] [<815ea550>] (do_sock_getsockopt) from [<815eccb4>] (__sys_getsockopt+0x94/0xdc) [ 242.331790][ T5126] r10:00000127 r9:8563f080 r8:8621e580 r7:ea661f50 r6:00000023 r5:ea661f58 [ 242.331811][ T5126] r4:8621e581 [ 242.331827][ T5126] [<815ecc20>] (__sys_getsockopt) from [<815ecd18>] (sys_getsockopt+0x1c/0x24) [ 242.331888][ T5126] r8:8020029c r7:00000127 r6:0012f214 r5:00000000 r4:20001380 [ 242.331907][ T5126] [<815eccfc>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 242.331953][ T5126] Exception stack(0xea661fa8 to 0xea661ff0) [ 242.331994][ T5126] 1fa0: 20001380 00000000 00000004 00000006 00000023 200000c0 [ 242.332032][ T5126] 1fc0: 20001380 00000000 0012f214 00000127 003462d8 00000000 00000001 76fab0dc [ 242.332061][ T5126] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 243.000218][ T5132] FAULT_INJECTION: forcing a failure. [ 243.000218][ T5132] name failslab, interval 1, probability 0, space 0, times 0 [ 243.001456][ T5132] CPU: 0 UID: 0 PID: 5132 Comm: syz.1.598 Not tainted syzkaller #0 PREEMPT [ 243.001567][ T5132] Hardware name: ARM-Versatile Express [ 243.001598][ T5132] Call trace: [ 243.001646][ T5132] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 243.001750][ T5132] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 243.001768][ T5132] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 243.001840][ T5132] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 243.001907][ T5132] r7:00000dc0 r6:00000000 r5:83e4d780 r4:82b18108 [ 243.001927][ T5132] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 243.001981][ T5132] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 243.002055][ T5132] r8:8621e580 r7:00000dc0 r6:00000000 r5:00000000 r4:830c4480 [ 243.002076][ T5132] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 243.002129][ T5132] [<8053133c>] (kmem_cache_alloc_noprof) from [<807d0e08>] (security_file_alloc+0x30/0x184) [ 243.002203][ T5132] r10:e0169f18 r9:83e4d780 r8:8621e580 r7:84c8da80 r6:82ce90e8 r5:8621e580 [ 243.002241][ T5132] r4:8621e580 [ 243.002274][ T5132] [<807d0dd8>] (security_file_alloc) from [<80587c38>] (init_file+0x48/0xfc) [ 243.002348][ T5132] r7:84c8da80 r6:00020002 r5:82b1b250 r4:8621e580 [ 243.002367][ T5132] [<80587bf0>] (init_file) from [<80588488>] (alloc_empty_file+0x68/0x13c) [ 243.002427][ T5132] r7:84c8da80 r6:00020002 r5:82b1b250 r4:825258a8 [ 243.002445][ T5132] [<80588420>] (alloc_empty_file) from [<8059c8d8>] (path_openat+0x44/0x1214) [ 243.002534][ T5132] r8:e0169e50 r7:ffffff9c r6:e0169f18 r5:83e4d780 r4:83341480 [ 243.002554][ T5132] [<8059c894>] (path_openat) from [<8059db60>] (do_file_open+0xb8/0x150) [ 243.002620][ T5132] r10:00000142 r9:83e4d780 r8:00000001 r7:ffffff9c r6:e0169f18 r5:83e4d780 [ 243.002642][ T5132] r4:83341480 [ 243.002658][ T5132] [<8059daa8>] (do_file_open) from [<80582a70>] (do_sys_openat2+0x8c/0xf0) [ 243.002721][ T5132] r8:8020029c r7:0018aac8 r6:ffffff9c r5:83341480 r4:00000004 [ 243.002739][ T5132] [<805829e4>] (do_sys_openat2) from [<80582e4c>] (sys_openat+0x80/0xd0) [ 243.002807][ T5132] r7:00000142 r6:00000000 r5:0018aac8 r4:ffffff9c [ 243.002827][ T5132] [<80582dcc>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 243.002877][ T5132] Exception stack(0xe0169fa8 to 0xe0169ff0) [ 243.002935][ T5132] 9fa0: 00000000 00000000 ffffff9c 0018aac8 00020002 00000000 [ 243.002977][ T5132] 9fc0: 00000000 00000000 00000000 00000142 00000003 00000000 003d0f00 76fab0dc [ 243.003047][ T5132] 9fe0: 76fa8d68 76fa8d54 0010ba34 00112618 [ 243.003102][ T5132] r6:00000000 r5:00000000 r4:00000000 [ 244.448416][ T5148] FAULT_INJECTION: forcing a failure. [ 244.448416][ T5148] name failslab, interval 1, probability 0, space 0, times 0 [ 244.454605][ T5148] CPU: 1 UID: 0 PID: 5148 Comm: syz.0.605 Not tainted syzkaller #0 PREEMPT [ 244.454752][ T5148] Hardware name: ARM-Versatile Express [ 244.454780][ T5148] Call trace: [ 244.454829][ T5148] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 244.454941][ T5148] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 244.454963][ T5148] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 244.455020][ T5148] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 244.455082][ T5148] r7:00000cc0 r6:00000000 r5:857d1900 r4:82b18108 [ 244.455101][ T5148] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 244.455154][ T5148] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 244.455213][ T5148] r8:00001000 r7:00000cc0 r6:00000000 r5:00000000 r4:830016c0 [ 244.455234][ T5148] [<80554020>] (should_failslab) from [<8052db5c>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 244.455287][ T5148] [<8052db08>] (__kmalloc_cache_noprof) from [<805bc380>] (sys_mount+0x94/0x260) [ 244.455341][ T5148] r10:00000015 r9:857d1900 r8:8020029c r7:8613d000 r6:8621b900 r5:200001c0 [ 244.455351][ T5148] r4:200001c0 [ 244.455361][ T5148] [<805bc2ec>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 244.455415][ T5148] Exception stack(0xea7a9fa8 to 0xea7a9ff0) [ 244.455456][ T5148] 9fa0: 200001c0 00000000 20000080 20000140 20000180 00000010 [ 244.455477][ T5148] 9fc0: 200001c0 00000000 0012f214 00000015 003462d8 00000000 00000001 76f480dc [ 244.455490][ T5148] 9fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 244.455508][ T5148] r10:00000015 r9:857d1900 r8:8020029c r7:00000015 r6:0012f214 r5:00000000 [ 244.455518][ T5148] r4:200001c0 [ 246.200149][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 246.201205][ T28] audit: type=1400 audit(246.110:1932): avc: denied { create } for pid=5153 comm="syz.1.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 246.250433][ T28] audit: type=1400 audit(246.160:1933): avc: denied { read write } for pid=5153 comm="syz.1.608" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 246.288783][ T28] audit: type=1400 audit(246.200:1934): avc: denied { mounton } for pid=5153 comm="syz.1.608" path="/313/file0" dev="tmpfs" ino=1686 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 246.759223][ T28] audit: type=1400 audit(246.650:1935): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 246.847254][ T28] audit: type=1400 audit(246.750:1936): avc: denied { create } for pid=5155 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 246.847610][ T28] audit: type=1400 audit(246.750:1937): avc: denied { create } for pid=5155 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 246.896119][ T28] audit: type=1400 audit(246.800:1938): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 247.060435][ T28] audit: type=1400 audit(246.970:1939): avc: denied { create } for pid=5157 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 247.067282][ T28] audit: type=1400 audit(246.970:1940): avc: denied { create } for pid=5157 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 247.072889][ T28] audit: type=1400 audit(246.980:1941): avc: denied { create } for pid=5157 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 248.613947][ T5176] FAULT_INJECTION: forcing a failure. [ 248.613947][ T5176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 248.627531][ T5176] CPU: 1 UID: 0 PID: 5176 Comm: syz.0.616 Not tainted syzkaller #0 PREEMPT [ 248.627687][ T5176] Hardware name: ARM-Versatile Express [ 248.627716][ T5176] Call trace: [ 248.627763][ T5176] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 248.627933][ T5176] r7:60000113 r6:60000113 r5:8231e214 r4:00000000 [ 248.627959][ T5176] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 248.628018][ T5176] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 248.628082][ T5176] r7:00000000 r6:00000000 r5:8563f080 r4:82b4f188 [ 248.628126][ T5176] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 248.628187][ T5176] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 248.628248][ T5176] r8:76f47f08 r7:00000000 r6:00000000 r5:ea945f68 r4:00000002 [ 248.628266][ T5176] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 248.628316][ T5176] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 248.628368][ T5176] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 248.628443][ T5176] r10:8064c488 r9:00000001 r8:00000002 r7:ea945f68 r6:0000000f r5:76f47f08 [ 248.628468][ T5176] r4:8563f080 r3:ea945e9f [ 248.628486][ T5176] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 248.628560][ T5176] r8:8563f080 r7:ea945f68 r6:76f47f08 r5:86222b00 r4:0000000f [ 248.628582][ T5176] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 248.628653][ T5176] r10:00000003 r9:8563f080 r8:8020029c r7:00000000 r6:00000000 r5:86222b00 [ 248.628680][ T5176] r4:86222b03 [ 248.628698][ T5176] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 248.628764][ T5176] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 248.628784][ T5176] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 248.628835][ T5176] Exception stack(0xea945fa8 to 0xea945ff0) [ 248.628876][ T5176] 5fa0: 00000000 00000000 00000005 76f47f08 0000000f 00000000 [ 248.628913][ T5176] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f480dc [ 248.628941][ T5176] 5fe0: 76f47e58 76f47e44 0010ba34 00112618 [ 251.819486][ T28] kauditd_printk_skb: 75 callbacks suppressed [ 251.820032][ T28] audit: type=1400 audit(251.730:2015): avc: denied { create } for pid=5194 comm="syz.0.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 252.201860][ T28] audit: type=1400 audit(252.100:2016): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 252.408419][ T28] audit: type=1400 audit(252.320:2017): avc: denied { allowed } for pid=5197 comm="syz.1.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 252.620056][ T28] audit: type=1400 audit(252.530:2018): avc: denied { create } for pid=5197 comm="syz.1.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 252.750033][ T28] audit: type=1400 audit(252.660:2019): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 253.024868][ T28] audit: type=1400 audit(252.930:2020): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 253.286136][ T28] audit: type=1400 audit(253.190:2021): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 253.366537][ T28] audit: type=1400 audit(253.270:2022): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 253.620466][ T28] audit: type=1400 audit(253.530:2023): avc: denied { create } for pid=5204 comm="syz.0.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 253.724629][ T28] audit: type=1400 audit(253.630:2024): avc: denied { create } for pid=5204 comm="syz.0.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 255.239763][ T5220] FAULT_INJECTION: forcing a failure. [ 255.239763][ T5220] name failslab, interval 1, probability 0, space 0, times 0 [ 255.240246][ T5220] CPU: 0 UID: 0 PID: 5220 Comm: syz.1.637 Not tainted syzkaller #0 PREEMPT [ 255.240370][ T5220] Hardware name: ARM-Versatile Express [ 255.240410][ T5220] Call trace: [ 255.240457][ T5220] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 255.240631][ T5220] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 255.240659][ T5220] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 255.240721][ T5220] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 255.240790][ T5220] r7:00000000 r6:00000000 r5:855f8000 r4:82b18108 [ 255.240811][ T5220] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 255.240916][ T5220] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 255.241063][ T5220] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 255.241136][ T5220] [<80554020>] (should_failslab) from [<80532680>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 255.241257][ T5220] [<805325d8>] (__kmalloc_node_track_caller_noprof) from [<804c1860>] (kmemdup_noprof+0x28/0x44) [ 255.241387][ T5220] r10:00000119 r9:84435204 r8:ea749dc0 r7:85660000 r6:84f01458 r5:ea749db8 [ 255.241500][ T5220] r4:00000017 [ 255.241590][ T5220] [<804c1838>] (kmemdup_noprof) from [<807f3f54>] (sidtab_sid2str_get+0x54/0xa4) [ 255.241752][ T5220] r7:85660000 r6:ea749dc0 r5:ea749db8 r4:84d9d0c0 [ 255.241813][ T5220] [<807f3f00>] (sidtab_sid2str_get) from [<807fb4e4>] (sidtab_entry_to_string+0x34/0x94) [ 255.241917][ T5220] r7:85660000 r6:84d9d0c0 r5:ea749db8 r4:0000005f [ 255.241938][ T5220] [<807fb4b0>] (sidtab_entry_to_string) from [<807fb65c>] (security_sid_to_context_core+0x118/0x17c) [ 255.242008][ T5220] r9:00000000 r8:85660000 r7:84435204 r6:ea749dc0 r5:ea749db8 r4:0000005f [ 255.242077][ T5220] [<807fb544>] (security_sid_to_context_core) from [<807fe5b0>] (security_sid_to_context+0x1c/0x24) [ 255.242252][ T5220] r8:807de388 r7:807df100 r6:855f8000 r5:84e74a10 r4:ea749e48 [ 255.242383][ T5220] [<807fe594>] (security_sid_to_context) from [<807df180>] (avc_audit_post_callback+0x80/0x32c) [ 255.242469][ T5220] [<807df100>] (avc_audit_post_callback) from [<80806690>] (common_lsm_audit+0x108/0x14c) [ 255.242628][ T5220] r10:00000119 r9:00000000 r8:807de388 r7:807df100 r6:ea749e38 r5:84e74a10 [ 255.242711][ T5220] r4:855f8828 [ 255.242731][ T5220] [<80806588>] (common_lsm_audit) from [<807df644>] (slow_avc_audit+0xbc/0x114) [ 255.242871][ T5220] r8:0000002c r7:fffffff3 r6:0000005f r5:0000005f r4:0000005f [ 255.242903][ T5220] [<807df588>] (slow_avc_audit) from [<807e0098>] (avc_has_perm+0xe4/0xf4) [ 255.243073][ T5220] r5:0000005f r4:00000008 [ 255.243200][ T5220] [<807dffb4>] (avc_has_perm) from [<807e2e20>] (selinux_socket_create+0x168/0x1f4) [ 255.243300][ T5220] r9:856d2000 r8:807e2cb8 r7:00000000 r6:00000010 r5:0000002c r4:839295c8 [ 255.243373][ T5220] [<807e2cb8>] (selinux_socket_create) from [<807d7c44>] (security_socket_create+0x60/0x200) [ 255.243502][ T5220] r5:00000003 r4:00000010 [ 255.243561][ T5220] [<807d7be4>] (security_socket_create) from [<815e8984>] (__sock_create+0x68/0x22c) [ 255.243666][ T5220] r9:856d2000 r8:8020029c r7:00000010 r6:855f8000 r5:00000003 r4:00000010 [ 255.243685][ T5220] [<815e891c>] (__sock_create) from [<815ebab8>] (__sys_socket+0x94/0x118) [ 255.243836][ T5220] r10:00000119 r9:855f8000 r8:8020029c r7:00000119 r6:855f8000 r5:00000010 [ 255.243862][ T5220] r4:00000003 [ 255.243881][ T5220] [<815eba24>] (__sys_socket) from [<815ebb4c>] (sys_socket+0x10/0x14) [ 255.243968][ T5220] r6:ffffffff r5:200000c0 r4:76fa9e78 [ 255.244070][ T5220] [<815ebb3c>] (sys_socket) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 255.244136][ T5220] Exception stack(0xea749fa8 to 0xea749ff0) [ 255.244265][ T5220] 9fa0: 76fa9e78 200000c0 00000010 00000003 00000010 00000000 [ 255.244426][ T5220] 9fc0: 76fa9e78 200000c0 ffffffff 00000119 003462d8 00000000 00000001 76fab0dc [ 255.244513][ T5220] 9fe0: 00000000 76fa9e44 0001cc7c 001325dc [ 256.833892][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 256.834948][ T28] audit: type=1400 audit(256.740:2061): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 256.948148][ T28] audit: type=1400 audit(256.860:2062): avc: denied { create } for pid=5232 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 256.975443][ T28] audit: type=1400 audit(256.880:2063): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 257.123306][ T28] audit: type=1400 audit(257.030:2064): avc: denied { create } for pid=5234 comm="syz.1.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 257.292907][ T28] audit: type=1400 audit(257.200:2065): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 257.429526][ T28] audit: type=1400 audit(257.340:2066): avc: denied { create } for pid=5236 comm="syz.1.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 257.525235][ T28] audit: type=1400 audit(257.430:2067): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 257.684231][ T28] audit: type=1400 audit(257.590:2068): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 257.703090][ T28] audit: type=1400 audit(257.610:2069): avc: denied { read } for pid=5238 comm="syz.1.646" name="controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 257.742323][ T28] audit: type=1400 audit(257.650:2070): avc: denied { create } for pid=5238 comm="syz.1.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=0 [ 261.974170][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 261.975178][ T28] audit: type=1400 audit(261.880:2109): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.067301][ T28] audit: type=1400 audit(261.970:2110): avc: denied { create } for pid=5267 comm="syz.0.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.078626][ T28] audit: type=1400 audit(261.990:2111): avc: denied { read } for pid=5267 comm="syz.0.660" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 262.101890][ T28] audit: type=1400 audit(262.010:2112): avc: denied { read } for pid=5267 comm="syz.0.660" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 262.109142][ T28] audit: type=1400 audit(262.020:2113): avc: denied { create } for pid=5267 comm="syz.0.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.121840][ T28] audit: type=1400 audit(262.030:2114): avc: denied { create } for pid=5267 comm="syz.0.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=0 [ 262.149181][ T28] audit: type=1400 audit(262.060:2115): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 262.277783][ T28] audit: type=1400 audit(262.170:2116): avc: denied { read write } for pid=5269 comm="syz.0.661" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 262.462170][ T28] audit: type=1400 audit(262.370:2117): avc: denied { create } for pid=5269 comm="syz.0.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.500885][ T28] audit: type=1400 audit(262.410:2118): avc: denied { create } for pid=5269 comm="syz.0.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 263.507764][ T5278] ªªªªªª: renamed from vlan0 (while UP) [ 264.588886][ T5292] FAULT_INJECTION: forcing a failure. [ 264.588886][ T5292] name failslab, interval 1, probability 0, space 0, times 0 [ 264.589357][ T5292] CPU: 0 UID: 0 PID: 5292 Comm: syz.1.670 Not tainted syzkaller #0 PREEMPT [ 264.589448][ T5292] Hardware name: ARM-Versatile Express [ 264.589475][ T5292] Call trace: [ 264.589523][ T5292] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 264.589965][ T5292] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 264.590960][ T5292] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 264.591291][ T5292] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 264.591415][ T5292] r7:00000cc0 r6:00000000 r5:840b8c80 r4:82b18108 [ 264.591451][ T5292] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 264.591562][ T5292] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 264.591676][ T5292] r8:82a04d00 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4cc0 [ 264.591747][ T5292] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 264.591842][ T5292] [<8053133c>] (kmem_cache_alloc_noprof) from [<80588474>] (alloc_empty_file+0x54/0x13c) [ 264.591916][ T5292] r10:839b5800 r9:82342f9c r8:82a04d00 r7:84c9cc00 r6:00000002 r5:82b1b250 [ 264.591938][ T5292] r4:825258a8 [ 264.591982][ T5292] [<80588420>] (alloc_empty_file) from [<805885fc>] (alloc_file_pseudo+0xa0/0x104) [ 264.592080][ T5292] r8:830ed490 r7:840b8c80 r6:81c24904 r5:83443800 r4:00000002 [ 264.592149][ T5292] [<8058855c>] (alloc_file_pseudo) from [<805fc954>] (anon_inode_getfile_fmode+0x74/0xcc) [ 264.592246][ T5292] r10:82525738 r9:00000002 r8:82342f9c r7:8612a480 r6:83443800 r5:81c24904 [ 264.592283][ T5292] r4:82525940 [ 264.592303][ T5292] [<805fc8e0>] (anon_inode_getfile_fmode) from [<805f8150>] (sys_fanotify_init+0x2d4/0x4bc) [ 264.592416][ T5292] r9:00000000 r8:00000000 r7:00000002 r6:00000000 r5:8612a480 r4:00000006 [ 264.592506][ T5292] [<805f7e7c>] (sys_fanotify_init) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 264.592564][ T5292] Exception stack(0xeaeedfa8 to 0xeaeedff0) [ 264.593269][ T5292] dfa0: 00000000 00000000 00000200 00000000 00000000 00000000 [ 264.593311][ T5292] dfc0: 00000000 00000000 0012f214 0000016f 003462d8 00000000 00000001 76fab0dc [ 264.593340][ T5292] dfe0: 76faae88 76faae78 00018ebc 00130810 [ 264.593378][ T5292] r10:0000016f r9:840b8c80 r8:8020029c r7:0000016f r6:0012f214 r5:00000000 [ 264.593462][ T5292] r4:00000000 [ 264.736419][ T5294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5294 comm=syz.0.668 [ 265.349541][ T5299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5299 comm=syz.0.672 [ 267.108156][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 267.108531][ T28] audit: type=1400 audit(267.020:2171): avc: denied { execmem } for pid=5302 comm="syz.1.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 267.123812][ T28] audit: type=1400 audit(267.030:2172): avc: denied { execmem } for pid=5302 comm="syz.1.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 267.137053][ T28] audit: type=1400 audit(267.040:2173): avc: denied { create } for pid=5302 comm="syz.1.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 267.163155][ T28] audit: type=1400 audit(267.070:2174): avc: denied { create } for pid=5312 comm="syz.0.677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=0 [ 267.197380][ T28] audit: type=1400 audit(267.100:2175): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 267.296000][ T28] audit: type=1400 audit(267.200:2176): avc: denied { read } for pid=5312 comm="syz.0.677" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 267.307554][ T28] audit: type=1400 audit(267.200:2177): avc: denied { create } for pid=5312 comm="syz.0.677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.311150][ T28] audit: type=1400 audit(267.210:2178): avc: denied { read } for pid=5312 comm="syz.0.677" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 267.312844][ T28] audit: type=1400 audit(267.220:2179): avc: denied { create } for pid=5312 comm="syz.0.677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 267.342145][ T28] audit: type=1400 audit(267.250:2180): avc: denied { read write } for pid=5315 comm="syz.1.678" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 267.783197][ T5319] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5319 comm=syz.0.679 [ 268.959097][ T5330] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5330 comm=syz.1.685 [ 270.355774][ T5346] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5346 comm=syz.0.691 [ 270.596215][ T5352] FAULT_INJECTION: forcing a failure. [ 270.596215][ T5352] name failslab, interval 1, probability 0, space 0, times 0 [ 270.596465][ T5352] CPU: 0 UID: 0 PID: 5352 Comm: syz.1.694 Not tainted syzkaller #0 PREEMPT [ 270.596519][ T5352] Hardware name: ARM-Versatile Express [ 270.596534][ T5352] Call trace: [ 270.596558][ T5352] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 270.596689][ T5352] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 270.596701][ T5352] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 270.596731][ T5352] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 270.596760][ T5352] r7:00000000 r6:00000000 r5:83e4d780 r4:82b18108 [ 270.596787][ T5352] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 270.596820][ T5352] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 270.596851][ T5352] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 270.596859][ T5352] [<80554020>] (should_failslab) from [<80532680>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 270.596885][ T5352] [<805325d8>] (__kmalloc_node_track_caller_noprof) from [<804c1860>] (kmemdup_noprof+0x28/0x44) [ 270.596928][ T5352] r10:00000119 r9:84435204 r8:eb1d1dc0 r7:85660000 r6:84f01458 r5:eb1d1db8 [ 270.596938][ T5352] r4:00000017 [ 270.596946][ T5352] [<804c1838>] (kmemdup_noprof) from [<807f3f54>] (sidtab_sid2str_get+0x54/0xa4) [ 270.596978][ T5352] r7:85660000 r6:eb1d1dc0 r5:eb1d1db8 r4:84d9d0c0 [ 270.596986][ T5352] [<807f3f00>] (sidtab_sid2str_get) from [<807fb4e4>] (sidtab_entry_to_string+0x34/0x94) [ 270.597020][ T5352] r7:85660000 r6:84d9d0c0 r5:eb1d1db8 r4:0000005f [ 270.597028][ T5352] [<807fb4b0>] (sidtab_entry_to_string) from [<807fb65c>] (security_sid_to_context_core+0x118/0x17c) [ 270.597061][ T5352] r9:00000000 r8:85660000 r7:84435204 r6:eb1d1dc0 r5:eb1d1db8 r4:0000005f [ 270.597069][ T5352] [<807fb544>] (security_sid_to_context_core) from [<807fe5b0>] (security_sid_to_context+0x1c/0x24) [ 270.597113][ T5352] r8:807de388 r7:807df100 r6:83e4d780 r5:84ef1b98 r4:eb1d1e48 [ 270.597122][ T5352] [<807fe594>] (security_sid_to_context) from [<807df180>] (avc_audit_post_callback+0x80/0x32c) [ 270.597146][ T5352] [<807df100>] (avc_audit_post_callback) from [<80806690>] (common_lsm_audit+0x108/0x14c) [ 270.597179][ T5352] r10:00000119 r9:00000000 r8:807de388 r7:807df100 r6:eb1d1e38 r5:84ef1b98 [ 270.597188][ T5352] r4:83e4dfa8 [ 270.597196][ T5352] [<80806588>] (common_lsm_audit) from [<807df644>] (slow_avc_audit+0xbc/0x114) [ 270.597225][ T5352] r8:00000012 r7:fffffff3 r6:0000005f r5:0000005f r4:0000005f [ 270.597266][ T5352] [<807df588>] (slow_avc_audit) from [<807e0098>] (avc_has_perm+0xe4/0xf4) [ 270.597333][ T5352] r5:0000005f r4:00000008 [ 270.597343][ T5352] [<807dffb4>] (avc_has_perm) from [<807e2e20>] (selinux_socket_create+0x168/0x1f4) [ 270.597377][ T5352] r9:856d2000 r8:807e2cb8 r7:00000000 r6:00000002 r5:00000012 r4:8614a3c8 [ 270.597386][ T5352] [<807e2cb8>] (selinux_socket_create) from [<807d7c44>] (security_socket_create+0x60/0x200) [ 270.597418][ T5352] r5:00000003 r4:0000000a [ 270.597426][ T5352] [<807d7be4>] (security_socket_create) from [<815e8984>] (__sock_create+0x68/0x22c) [ 270.597465][ T5352] r9:856d2000 r8:8020029c r7:00000002 r6:83e4d780 r5:00000003 r4:0000000a [ 270.597474][ T5352] [<815e891c>] (__sock_create) from [<815ebab8>] (__sys_socket+0x94/0x118) [ 270.597509][ T5352] r10:00000119 r9:83e4d780 r8:8020029c r7:00000119 r6:83e4d780 r5:0000000a [ 270.597518][ T5352] r4:00000003 [ 270.597525][ T5352] [<815eba24>] (__sys_socket) from [<815ebb4c>] (sys_socket+0x10/0x14) [ 270.597556][ T5352] r6:0012f214 r5:00000000 r4:00000000 [ 270.597563][ T5352] [<815ebb3c>] (sys_socket) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 270.597602][ T5352] Exception stack(0xeb1d1fa8 to 0xeb1d1ff0) [ 270.597640][ T5352] 1fa0: 00000000 00000000 0000000a 00000003 00000002 00000000 [ 270.597673][ T5352] 1fc0: 00000000 00000000 0012f214 00000119 003462d8 00000000 00000001 76fab0dc [ 270.597694][ T5352] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 271.453408][ T5359] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5359 comm=syz.1.698 [ 272.177943][ T28] kauditd_printk_skb: 82 callbacks suppressed [ 272.178252][ T28] audit: type=1400 audit(271.960:2263): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 272.491413][ T28] audit: type=1400 audit(272.400:2264): avc: denied { create } for pid=5369 comm="syz.0.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 272.513714][ T28] audit: type=1400 audit(272.420:2265): avc: denied { create } for pid=5369 comm="syz.0.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 272.760425][ T28] audit: type=1400 audit(272.670:2266): avc: denied { read } for pid=5369 comm="syz.0.701" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.016342][ T28] audit: type=1400 audit(272.920:2267): avc: denied { read write } for pid=5369 comm="syz.0.701" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.037479][ T28] audit: type=1400 audit(272.940:2268): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.168819][ T28] audit: type=1400 audit(273.080:2269): avc: denied { read write } for pid=5373 comm="syz.1.702" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.199687][ T28] audit: type=1400 audit(273.110:2270): avc: denied { mounton } for pid=5373 comm="syz.1.702" path="/361/file0" dev="tmpfs" ino=1941 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 273.387148][ T28] audit: type=1400 audit(273.290:2271): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.565808][ T28] audit: type=1400 audit(273.470:2272): avc: denied { read write } for pid=5375 comm="syz.1.703" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.686332][ T5376] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5376 comm=syz.1.703 [ 275.041758][ T5386] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5386 comm=syz.1.708 [ 276.263339][ T5396] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5396 comm=syz.1.713 [ 276.939082][ T5405] FAULT_INJECTION: forcing a failure. [ 276.939082][ T5405] name failslab, interval 1, probability 0, space 0, times 0 [ 276.939553][ T5405] CPU: 0 UID: 0 PID: 5405 Comm: syz.0.717 Not tainted syzkaller #0 PREEMPT [ 276.939641][ T5405] Hardware name: ARM-Versatile Express [ 276.939668][ T5405] Call trace: [ 276.939714][ T5405] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 276.939820][ T5405] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 276.939841][ T5405] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 276.939896][ T5405] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 276.939959][ T5405] r7:00000cc0 r6:00000000 r5:8577be80 r4:82b18108 [ 276.939976][ T5405] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 276.940033][ T5405] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 276.940096][ T5405] r8:82a04d00 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4cc0 [ 276.940113][ T5405] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 276.940164][ T5405] [<8053133c>] (kmem_cache_alloc_noprof) from [<80588474>] (alloc_empty_file+0x54/0x13c) [ 276.940237][ T5405] r10:8577be80 r9:00000003 r8:82a04d00 r7:83924480 r6:00000000 r5:82b1b250 [ 276.940258][ T5405] r4:825258a8 [ 276.940274][ T5405] [<80588420>] (alloc_empty_file) from [<805826bc>] (dentry_open+0x28/0x68) [ 276.940333][ T5405] r8:8621e400 r7:856d1000 r6:8577be80 r5:ebec9e84 r4:00000007 [ 276.940350][ T5405] [<80582694>] (dentry_open) from [<805dc3c0>] (open_namespace+0x70/0xd4) [ 276.940410][ T5405] r5:00000000 r4:00000007 [ 276.940426][ T5405] [<805dc350>] (open_namespace) from [<805dc440>] (open_related_ns+0x1c/0x20) [ 276.940483][ T5405] r6:00000005 r5:834a2a40 r4:0000894c [ 276.940501][ T5405] [<805dc424>] (open_related_ns) from [<815eb7ec>] (sock_ioctl+0x350/0x4c0) [ 276.940568][ T5405] [<815eb49c>] (sock_ioctl) from [<805a1864>] (sys_ioctl+0x244/0xb5c) [ 276.940639][ T5405] r9:00000003 r8:8621e400 r7:00000005 r6:0000894c r5:8621e401 r4:00000000 [ 276.940657][ T5405] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 276.940706][ T5405] Exception stack(0xebec9fa8 to 0xebec9ff0) [ 276.940745][ T5405] 9fa0: 00000000 00000000 00000003 0000894c 00000005 00000000 [ 276.940785][ T5405] 9fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76f480dc [ 276.940813][ T5405] 9fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 276.940849][ T5405] r10:00000036 r9:8577be80 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 276.940870][ T5405] r4:00000000 [ 277.218383][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 277.219283][ T28] audit: type=1400 audit(277.130:2317): avc: denied { create } for pid=5403 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 277.231009][ T28] audit: type=1400 audit(277.140:2318): avc: denied { read append } for pid=5403 comm="syz.1.718" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 277.271140][ T28] audit: type=1400 audit(277.180:2319): avc: denied { create } for pid=5403 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 277.300574][ T28] audit: type=1400 audit(277.210:2320): avc: denied { create } for pid=5403 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 277.360140][ T28] audit: type=1400 audit(277.270:2321): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 277.507846][ T28] audit: type=1400 audit(277.420:2322): avc: denied { read write } for pid=5407 comm="syz.0.719" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 277.547858][ T28] audit: type=1400 audit(277.460:2323): avc: denied { listen } for pid=5408 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 277.559170][ T28] audit: type=1400 audit(277.470:2324): avc: denied { create } for pid=5407 comm="syz.0.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 277.577646][ T28] audit: type=1400 audit(277.490:2325): avc: denied { create } for pid=5407 comm="syz.0.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 277.580890][ T5409] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5409 comm=syz.0.719 [ 277.628953][ T28] audit: type=1400 audit(277.540:2326): avc: denied { read } for pid=5407 comm="syz.0.719" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 278.354706][ T5419] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5419 comm=syz.1.725 [ 279.700438][ T5432] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5432 comm=syz.1.731 [ 280.515285][ T5442] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5442 comm=syz.0.736 [ 280.768576][ T5444] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5444 comm=syz.1.737 [ 280.881543][ T5446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5446 comm=syz.0.738 [ 281.837619][ T5455] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5455 comm=syz.1.742 [ 282.059922][ T5458] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5458 comm=syz.1.744 [ 282.247713][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 282.248084][ T28] audit: type=1400 audit(282.160:2395): avc: denied { create } for pid=5459 comm="syz.1.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 282.273016][ T28] audit: type=1400 audit(282.180:2396): avc: denied { create } for pid=5459 comm="syz.1.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 282.361251][ T28] audit: type=1400 audit(282.270:2397): avc: denied { create } for pid=5461 comm="syz.0.745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 282.551508][ T28] audit: type=1400 audit(282.460:2398): avc: denied { read write } for pid=5459 comm="syz.1.746" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 282.594822][ T28] audit: type=1400 audit(282.500:2399): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 282.645327][ T28] audit: type=1400 audit(282.550:2400): avc: denied { create } for pid=5463 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 282.676527][ T28] audit: type=1400 audit(282.570:2401): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 282.989124][ T28] audit: type=1400 audit(282.900:2402): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 283.452493][ T28] audit: type=1400 audit(283.360:2403): avc: denied { create } for pid=5467 comm="syz.0.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 283.530112][ T28] audit: type=1400 audit(283.440:2404): avc: denied { create } for pid=5467 comm="syz.0.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 284.078733][ T5470] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5470 comm=syz.0.750 [ 284.752137][ T5474] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5474 comm=syz.0.752 [ 286.640037][ T5480] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5480 comm=syz.0.755 [ 287.265253][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 287.265766][ T28] audit: type=1400 audit(287.170:2432): avc: denied { read write } for pid=5490 comm="syz.1.761" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 287.280772][ T28] audit: type=1400 audit(287.190:2433): avc: denied { create } for pid=5490 comm="syz.1.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 287.294836][ T28] audit: type=1400 audit(287.200:2434): avc: denied { create } for pid=5490 comm="syz.1.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 287.429657][ T28] audit: type=1400 audit(287.340:2435): avc: denied { read open } for pid=5492 comm="syz.0.760" path="net:[4026532746]" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 287.451401][ T5491] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5491 comm=syz.1.761 [ 287.454702][ T28] audit: type=1400 audit(287.360:2436): avc: denied { read } for pid=5492 comm="syz.0.760" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 287.465278][ T28] audit: type=1400 audit(287.370:2437): avc: denied { execmem } for pid=5492 comm="syz.0.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 287.488271][ T28] audit: type=1400 audit(287.400:2438): avc: denied { read write } for pid=5492 comm="syz.0.760" name="uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 287.496244][ T28] audit: type=1400 audit(287.400:2439): avc: denied { read } for pid=5490 comm="syz.1.761" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 287.557643][ T28] audit: type=1400 audit(287.460:2440): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 287.649205][ T28] audit: type=1400 audit(287.560:2441): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 287.741395][ T5497] FAULT_INJECTION: forcing a failure. [ 287.741395][ T5497] name failslab, interval 1, probability 0, space 0, times 0 [ 287.741842][ T5497] CPU: 0 UID: 0 PID: 5497 Comm: syz.0.763 Not tainted syzkaller #0 PREEMPT [ 287.741933][ T5497] Hardware name: ARM-Versatile Express [ 287.741960][ T5497] Call trace: [ 287.742003][ T5497] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 287.742106][ T5497] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 287.742127][ T5497] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 287.742186][ T5497] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 287.742252][ T5497] r7:83849000 r6:00000000 r5:83e55780 r4:82b18108 [ 287.742271][ T5497] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 287.742336][ T5497] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 287.742404][ T5497] r8:83e55780 r7:83849000 r6:00000cc0 r5:00000000 r4:830c4b40 [ 287.742424][ T5497] [<80554020>] (should_failslab) from [<8053174c>] (kmem_cache_alloc_lru_noprof+0x58/0x3c4) [ 287.742513][ T5497] [<805316f4>] (kmem_cache_alloc_lru_noprof) from [<805a6004>] (__d_alloc+0x30/0x218) [ 287.742617][ T5497] r10:82ce6fc4 r9:825258c0 r8:834da550 r7:83849000 r6:8355e310 r5:ec359af0 [ 287.742643][ T5497] r4:834da550 [ 287.742662][ T5497] [<805a5fd4>] (__d_alloc) from [<805a6204>] (d_alloc+0x18/0x68) [ 287.742732][ T5497] r9:81d0f1ec r8:834da550 r7:ec359af0 r6:8355e310 r5:00060000 r4:834da550 [ 287.742752][ T5497] [<805a61ec>] (d_alloc) from [<80595900>] (lookup_one_qstr_excl+0x7c/0xcc) [ 287.742814][ T5497] r7:ec359af0 r6:8355e310 r5:00060000 r4:00000000 [ 287.742867][ T5497] [<80595884>] (lookup_one_qstr_excl) from [<8059b960>] (start_dirop+0x38/0x5c) [ 287.742942][ T5497] r9:81d0f1ec r8:83e55780 r7:00060000 r6:ec359af0 r5:8355e390 r4:834da550 [ 287.742965][ T5497] [<8059b928>] (start_dirop) from [<805c6090>] (simple_start_creating+0x70/0x94) [ 287.743035][ T5497] r7:ec359bd4 r6:82ce6fc4 r5:834da550 r4:ec359bd4 [ 287.743057][ T5497] [<805c6020>] (simple_start_creating) from [<8079a1f0>] (debugfs_start_creating.part.0+0x5c/0xf4) [ 287.743147][ T5497] r5:834da550 r4:00000000 [ 287.743173][ T5497] [<8079a194>] (debugfs_start_creating.part.0) from [<8079a510>] (__debugfs_create_file+0x90/0x1dc) [ 287.743247][ T5497] r7:81cd28d0 r6:000007b8 r5:00008100 r4:86015b74 [ 287.743266][ T5497] [<8079a480>] (__debugfs_create_file) from [<8079a68c>] (debugfs_create_file_full+0x30/0x38) [ 287.743337][ T5497] r10:00000000 r9:00000001 r8:81878adc r7:00000001 r6:000007b8 r5:00000001 [ 287.743358][ T5497] r4:86015b74 [ 287.743375][ T5497] [<8079a65c>] (debugfs_create_file_full) from [<809df2a8>] (ref_tracker_dir_debugfs+0xe4/0x184) [ 287.743432][ T5497] [<809df1c4>] (ref_tracker_dir_debugfs) from [<8161b6d0>] (alloc_netdev_mqs+0xc8/0x4b0) [ 287.743497][ T5497] r5:00000001 r4:86015800 [ 287.743515][ T5497] [<8161b608>] (alloc_netdev_mqs) from [<818676c0>] (__ip_tunnel_create+0x17c/0x28c) [ 287.743597][ T5497] r10:00000000 r9:85430f00 r8:00000073 r7:856d1000 r6:82a1734c r5:ec359ddc [ 287.743621][ T5497] r4:ec359ddc [ 287.743638][ T5497] [<81867544>] (__ip_tunnel_create) from [<81868680>] (ip_tunnel_ctl+0x1b8/0x2ec) [ 287.743705][ T5497] r8:85b37000 r7:856d1000 r6:000089f1 r5:ec359ddc r4:85430800 [ 287.743726][ T5497] [<818684c8>] (ip_tunnel_ctl) from [<8187ab6c>] (ipgre_tunnel_ctl+0x128/0x270) [ 287.743803][ T5497] r10:00000001 r9:81867d98 r8:81e7ce34 r7:000089f1 r6:85430800 r5:20000100 [ 287.743822][ T5497] r4:ec359ddc [ 287.743837][ T5497] [<8187aa44>] (ipgre_tunnel_ctl) from [<81867e00>] (ip_tunnel_siocdevprivate+0x68/0xb4) [ 287.743898][ T5497] r7:20000100 r6:000089f1 r5:20000100 r4:85430800 [ 287.743917][ T5497] [<81867d98>] (ip_tunnel_siocdevprivate) from [<8165f9f8>] (dev_ifsioc+0x17c/0x6d0) [ 287.744008][ T5497] r6:ec359ecc r5:000089f1 r4:85430800 [ 287.744034][ T5497] [<8165f87c>] (dev_ifsioc) from [<816602f8>] (dev_ioctl+0x3ac/0x468) [ 287.744121][ T5497] r9:20000100 r8:ec359ecb r7:00000000 r6:856d1000 r5:ec359ecc r4:000089f1 [ 287.744187][ T5497] [<8165ff4c>] (dev_ioctl) from [<815eb880>] (sock_ioctl+0x3e4/0x4c0) [ 287.744267][ T5497] r10:83e55780 r9:00000003 r8:86222b00 r7:856d1000 r6:20001040 r5:b5403587 [ 287.744294][ T5497] r4:000089f1 r3:20000100 [ 287.744314][ T5497] [<815eb49c>] (sock_ioctl) from [<805a1864>] (sys_ioctl+0x244/0xb5c) [ 287.744403][ T5497] r9:00000003 r8:86222b00 r7:20001040 r6:000089f1 r5:86222b01 r4:00000000 [ 287.744443][ T5497] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 287.744500][ T5497] Exception stack(0xec359fa8 to 0xec359ff0) [ 287.744542][ T5497] 9fa0: 00000000 00000000 00000003 000089f1 20001040 00000000 [ 287.744646][ T5497] 9fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76f480dc [ 287.744720][ T5497] 9fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 287.744763][ T5497] r10:00000036 r9:83e55780 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 287.744789][ T5497] r4:00000000 [ 289.518929][ T5507] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5507 comm=syz.0.767 [ 292.659704][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 292.660062][ T28] audit: type=1400 audit(292.570:2509): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 292.819660][ T5533] FAULT_INJECTION: forcing a failure. [ 292.819660][ T5533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 292.820132][ T5533] CPU: 1 UID: 0 PID: 5533 Comm: syz.1.778 Not tainted syzkaller #0 PREEMPT [ 292.820204][ T5533] Hardware name: ARM-Versatile Express [ 292.820224][ T5533] Call trace: [ 292.820261][ T5533] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 292.820350][ T5533] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 292.820385][ T5533] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 292.820433][ T5533] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 292.820484][ T5533] r7:20000180 r6:00000000 r5:8577f080 r4:82b4f188 [ 292.820497][ T5533] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 292.820540][ T5533] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 292.820613][ T5533] r8:000040c0 r7:20000180 r6:ec229e28 r5:00000000 r4:ec229f20 [ 292.820628][ T5533] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 292.820665][ T5533] [<809d7488>] (should_fail_usercopy) from [<815eac54>] (copy_msghdr_from_user+0x50/0x1e0) [ 292.820736][ T5533] [<815eac04>] (copy_msghdr_from_user) from [<815eae5c>] (___sys_sendmsg+0x78/0xd0) [ 292.820793][ T5533] r8:000040c0 r7:00000000 r6:834a2040 r5:ec229f20 r4:ec229e6c [ 292.820816][ T5533] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 292.820872][ T5533] r9:8577f080 r8:86228500 r7:000040c0 r6:20000180 r5:86228501 r4:00000003 [ 292.820900][ T5533] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 292.820951][ T5533] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 292.820966][ T5533] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 292.821002][ T5533] Exception stack(0xec229fa8 to 0xec229ff0) [ 292.821036][ T5533] 9fa0: 00000000 00000000 00000003 20000180 000040c0 00000000 [ 292.821066][ T5533] 9fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76fab0dc [ 292.821088][ T5533] 9fe0: 76faae88 76faae78 00018ebc 00130810 [ 292.990008][ T28] audit: type=1400 audit(292.900:2510): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.193143][ T28] audit: type=1400 audit(293.100:2511): avc: denied { create } for pid=5534 comm="syz.1.779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 293.267379][ T28] audit: type=1400 audit(293.170:2512): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.394707][ T28] audit: type=1400 audit(293.300:2513): avc: denied { read write } for pid=5536 comm="syz.1.780" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 293.638476][ T28] audit: type=1400 audit(293.550:2514): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.807191][ T28] audit: type=1400 audit(293.700:2515): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.827231][ T28] audit: type=1400 audit(293.730:2516): avc: denied { create } for pid=5538 comm="syz.1.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 293.877354][ T28] audit: type=1400 audit(293.780:2517): avc: denied { create } for pid=5538 comm="syz.1.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 293.951314][ T28] audit: type=1400 audit(293.860:2518): avc: denied { mounton } for pid=5538 comm="syz.1.781" path="/401" dev="tmpfs" ino=2146 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 296.066000][ T5569] FAULT_INJECTION: forcing a failure. [ 296.066000][ T5569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.066538][ T5569] CPU: 1 UID: 0 PID: 5569 Comm: syz.1.794 Not tainted syzkaller #0 PREEMPT [ 296.066648][ T5569] Hardware name: ARM-Versatile Express [ 296.066679][ T5569] Call trace: [ 296.066727][ T5569] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 296.066835][ T5569] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 296.066857][ T5569] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 296.066915][ T5569] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 296.066975][ T5569] r7:8611c200 r6:00000000 r5:8577f080 r4:82b4f188 [ 296.066994][ T5569] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 296.068392][ T5569] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 296.068494][ T5569] r8:84d88000 r7:8611c200 r6:8610d180 r5:200001c0 r4:200001c0 [ 296.068553][ T5569] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 296.068648][ T5569] [<809d7488>] (should_fail_usercopy) from [<805bc38c>] (sys_mount+0xa0/0x260) [ 296.068773][ T5569] [<805bc2ec>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 296.068892][ T5569] Exception stack(0xec831fa8 to 0xec831ff0) [ 296.068939][ T5569] 1fa0: 200001c0 00000000 20000080 20000140 20000180 00000010 [ 296.069019][ T5569] 1fc0: 200001c0 00000000 0012f214 00000015 003462d8 00000000 00000001 76fab0dc [ 296.069156][ T5569] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 296.069225][ T5569] r10:00000015 r9:8577f080 r8:8020029c r7:00000015 r6:0012f214 r5:00000000 [ 296.069279][ T5569] r4:200001c0 [ 299.923848][ T28] kauditd_printk_skb: 90 callbacks suppressed [ 299.924349][ T28] audit: type=1400 audit(299.830:2607): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.058368][ T28] audit: type=1400 audit(299.970:2608): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.069750][ T28] audit: type=1400 audit(299.980:2609): avc: denied { create } for pid=5587 comm="syz.1.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 300.311861][ T28] audit: type=1400 audit(300.220:2610): avc: denied { read write } for pid=5589 comm="syz.0.802" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 300.319704][ T28] audit: type=1400 audit(300.230:2611): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.462276][ T28] audit: type=1400 audit(300.370:2612): avc: denied { create } for pid=5589 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.549643][ T28] audit: type=1400 audit(300.460:2613): avc: denied { create } for pid=5589 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.550298][ T5590] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5590 comm=syz.0.802 [ 300.558923][ T28] audit: type=1400 audit(300.470:2614): avc: denied { create } for pid=5591 comm="syz.1.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 300.607621][ T28] audit: type=1400 audit(300.520:2615): avc: denied { create } for pid=5591 comm="syz.1.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.633355][ T28] audit: type=1400 audit(300.540:2616): avc: denied { read } for pid=5589 comm="syz.0.802" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 300.828819][ T5592] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=5592 comm=syz.1.803 [ 301.976091][ T5603] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5603 comm=syz.1.808 [ 303.443455][ T5615] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5615 comm=syz.1.814 [ 304.980010][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 304.981254][ T28] audit: type=1400 audit(304.890:2667): avc: denied { read } for pid=5632 comm="syz.1.822" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 305.119830][ T28] audit: type=1400 audit(305.030:2668): avc: denied { create } for pid=5632 comm="syz.1.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 305.175360][ T28] audit: type=1400 audit(305.080:2669): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 305.219235][ T28] audit: type=1400 audit(305.130:2670): avc: denied { create } for pid=5634 comm="syz.0.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 305.242553][ T28] audit: type=1400 audit(305.150:2671): avc: denied { read } for pid=5634 comm="syz.0.823" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 305.267565][ T28] audit: type=1400 audit(305.170:2672): avc: denied { prog_load } for pid=5634 comm="syz.0.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.328579][ T28] audit: type=1400 audit(305.240:2673): avc: denied { read } for pid=5634 comm="syz.0.823" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 305.419278][ T28] audit: type=1400 audit(305.330:2674): avc: denied { create } for pid=5634 comm="syz.0.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 305.511712][ T28] audit: type=1400 audit(305.420:2675): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 305.684513][ T28] audit: type=1400 audit(305.590:2676): avc: denied { read } for pid=5636 comm="syz.1.824" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 306.812580][ T5645] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5122 sclass=netlink_tcpdiag_socket pid=5645 comm=syz.0.828 [ 310.174321][ T5661] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=52984 sclass=netlink_tcpdiag_socket pid=5661 comm=syz.1.835 [ 310.372662][ T28] kauditd_printk_skb: 132 callbacks suppressed [ 310.375006][ T28] audit: type=1400 audit(310.280:2809): avc: denied { create } for pid=5660 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 310.617648][ T28] audit: type=1400 audit(310.520:2810): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 310.897211][ T28] audit: type=1400 audit(310.800:2811): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.897706][ T28] audit: type=1400 audit(310.800:2812): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.904828][ T28] audit: type=1400 audit(310.810:2813): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 311.006143][ T28] audit: type=1400 audit(310.910:2814): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 311.097132][ T28] audit: type=1400 audit(311.000:2815): avc: denied { read write } for pid=5663 comm="syz.0.836" name="uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 311.121370][ T28] audit: type=1400 audit(311.030:2816): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 311.157821][ T28] audit: type=1400 audit(311.070:2817): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 311.278383][ T28] audit: type=1400 audit(311.190:2818): avc: denied { create } for pid=5663 comm="syz.0.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 312.401963][ T5670] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5670 comm=syz.1.839 [ 315.405171][ T5680] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5680 comm=syz.0.843 [ 315.416101][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 315.416395][ T28] audit: type=1400 audit(315.320:2839): avc: denied { read } for pid=5679 comm="syz.0.843" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 315.439472][ T28] audit: type=1400 audit(315.350:2840): avc: denied { read } for pid=5679 comm="syz.0.843" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 315.498824][ T28] audit: type=1400 audit(315.410:2841): avc: denied { create } for pid=5679 comm="syz.0.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.699645][ T28] audit: type=1400 audit(315.610:2842): avc: denied { create } for pid=5679 comm="syz.0.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 315.714443][ T28] audit: type=1400 audit(315.620:2843): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 315.748219][ T28] audit: type=1400 audit(315.660:2844): avc: denied { read write } for pid=5679 comm="syz.0.843" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 315.837420][ T28] audit: type=1400 audit(315.740:2845): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 316.110372][ T28] audit: type=1400 audit(316.020:2846): avc: denied { read write } for pid=5685 comm="syz.0.845" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 316.143932][ T28] audit: type=1400 audit(316.050:2847): avc: denied { create } for pid=5685 comm="syz.0.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 316.175950][ T28] audit: type=1400 audit(316.080:2848): avc: denied { create } for pid=5685 comm="syz.0.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 316.190713][ T5686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5686 comm=syz.0.845 [ 316.562673][ T5688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5688 comm=syz.1.846 [ 320.591195][ T5702] FAULT_INJECTION: forcing a failure. [ 320.591195][ T5702] name failslab, interval 1, probability 0, space 0, times 0 [ 320.592017][ T5702] CPU: 1 UID: 0 PID: 5702 Comm: syz.1.852 Tainted: G L syzkaller #0 PREEMPT [ 320.592204][ T5702] Tainted: [L]=SOFTLOCKUP [ 320.592237][ T5702] Hardware name: ARM-Versatile Express [ 320.592264][ T5702] Call trace: [ 320.592322][ T5702] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 320.592435][ T5702] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 320.592453][ T5702] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 320.592514][ T5702] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 320.592588][ T5702] r7:00000cc0 r6:00000000 r5:833e4b00 r4:82b18108 [ 320.592605][ T5702] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 320.592657][ T5702] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 320.592785][ T5702] r8:ece5df3c r7:00000cc0 r6:00000000 r5:00000000 r4:830c4240 [ 320.592812][ T5702] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 320.592868][ T5702] [<8053133c>] (kmem_cache_alloc_noprof) from [<804e6bb0>] (vm_area_dup+0x24/0x148) [ 320.592938][ T5702] r10:ece5de3c r9:7f000000 r8:ece5df3c r7:76f00000 r6:76f00000 r5:860cf880 [ 320.592959][ T5702] r4:860cf880 [ 320.592974][ T5702] [<804e6b8c>] (vm_area_dup) from [<80513450>] (__split_vma+0x8c/0x434) [ 320.593029][ T5702] r5:ece5de78 r4:860cf880 [ 320.593046][ T5702] [<805133c4>] (__split_vma) from [<8051386c>] (vms_gather_munmap_vmas+0x74/0x4fc) [ 320.593108][ T5702] r10:ece5de3c r9:7f000000 r8:ece5de48 r7:00000000 r6:76f00000 r5:ece5de78 [ 320.593160][ T5702] r4:ece5df3c [ 320.593183][ T5702] [<805137f8>] (vms_gather_munmap_vmas) from [<80516564>] (do_vmi_align_munmap+0xfc/0x278) [ 320.593246][ T5702] r10:ece5de3c r9:7f000000 r8:00002000 r7:00000000 r6:76f00000 r5:76f8b000 [ 320.593265][ T5702] r4:ece5df3c [ 320.593281][ T5702] [<80516468>] (do_vmi_align_munmap) from [<80516760>] (do_vmi_munmap+0x80/0xfc) [ 320.593340][ T5702] r10:0000005b r9:0008b000 r8:76f00000 r7:00000001 r6:ece5df3c r5:857a3840 [ 320.593358][ T5702] r4:76f8b000 [ 320.593371][ T5702] [<805166e0>] (do_vmi_munmap) from [<805185e8>] (__vm_munmap+0xc8/0x194) [ 320.593422][ T5702] r8:857a394c r7:857a3840 r6:ece5df30 r5:76f00000 r4:00000000 [ 320.593440][ T5702] [<80518520>] (__vm_munmap) from [<804faab0>] (sys_munmap+0x14/0x18) [ 320.593500][ T5702] r9:833e4b00 r8:8020029c r7:0000005b r6:00100000 r5:00021000 r4:76e00000 [ 320.593518][ T5702] [<804faa9c>] (sys_munmap) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 320.593577][ T5702] Exception stack(0xece5dfa8 to 0xece5dff0) [ 320.593618][ T5702] dfa0: 76e00000 00021000 76f00000 0008b000 00000000 fff00000 [ 320.593652][ T5702] dfc0: 76e00000 00021000 00100000 0000005b 00310000 00001000 76f00000 001cd9c4 [ 320.593680][ T5702] dfe0: 00000000 76fa9cbc 00113e78 0013051c [ 320.809783][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 320.810022][ T28] audit: type=1400 audit(320.720:2869): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 320.911409][ T28] audit: type=1400 audit(320.820:2870): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 322.267971][ T28] audit: type=1400 audit(322.170:2871): avc: denied { read } for pid=5704 comm="syz.1.853" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 322.405835][ T28] audit: type=1400 audit(322.310:2872): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 322.683873][ T28] audit: type=1400 audit(322.590:2873): avc: denied { read write } for pid=5711 comm="syz.1.855" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 322.688139][ T28] audit: type=1400 audit(322.600:2874): avc: denied { mounton } for pid=5711 comm="syz.1.855" path="/441/file0" dev="tmpfs" ino=2368 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 324.011326][ T28] audit: type=1400 audit(323.920:2875): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 324.457375][ T28] audit: type=1400 audit(324.360:2876): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 324.729832][ T28] audit: type=1400 audit(324.640:2877): avc: denied { create } for pid=5716 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 324.885047][ T28] audit: type=1400 audit(324.790:2878): avc: denied { create } for pid=5716 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 326.028936][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 326.029335][ T28] audit: type=1400 audit(325.940:2892): avc: denied { create } for pid=5724 comm="syz.0.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 326.041203][ T5725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5725 comm=syz.0.860 [ 326.068631][ T28] audit: type=1400 audit(325.970:2893): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 326.282960][ T28] audit: type=1400 audit(326.190:2894): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 326.426112][ T28] audit: type=1400 audit(326.330:2895): avc: denied { create } for pid=5728 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 326.436237][ T28] audit: type=1400 audit(326.340:2896): avc: denied { create } for pid=5728 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 326.560064][ T28] audit: type=1400 audit(326.470:2897): avc: denied { create } for pid=5728 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 326.566019][ T28] audit: type=1400 audit(326.470:2898): avc: denied { create } for pid=5728 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=0 [ 326.597875][ T28] audit: type=1400 audit(326.510:2899): avc: denied { read append } for pid=5728 comm="syz.0.862" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 326.658795][ T28] audit: type=1400 audit(326.570:2900): avc: denied { create } for pid=5728 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 326.907185][ T28] audit: type=1400 audit(326.810:2901): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.132446][ T5750] FAULT_INJECTION: forcing a failure. [ 331.132446][ T5750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.132960][ T5750] CPU: 0 UID: 0 PID: 5750 Comm: syz.0.870 Tainted: G L syzkaller #0 PREEMPT [ 331.133059][ T5750] Tainted: [L]=SOFTLOCKUP [ 331.133080][ T5750] Hardware name: ARM-Versatile Express [ 331.133104][ T5750] Call trace: [ 331.133148][ T5750] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 331.133256][ T5750] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 331.133276][ T5750] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 331.133345][ T5750] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 331.133430][ T5750] r7:0000000c r6:00000000 r5:85774b00 r4:82b4f188 [ 331.133453][ T5750] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 331.133530][ T5750] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 331.133594][ T5750] r8:b5403587 r7:0000000c r6:20000000 r5:ecd29e6c r4:0000000c [ 331.133614][ T5750] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 331.133661][ T5750] [<809d7488>] (should_fail_usercopy) from [<815eab40>] (move_addr_to_kernel+0x34/0xf8) [ 331.133723][ T5750] [<815eab0c>] (move_addr_to_kernel) from [<815ead9c>] (copy_msghdr_from_user+0x198/0x1e0) [ 331.133790][ T5750] r7:200000c0 r6:ecd29e28 r5:00000000 r4:ecd29f20 [ 331.133809][ T5750] [<815eac04>] (copy_msghdr_from_user) from [<815eae5c>] (___sys_sendmsg+0x78/0xd0) [ 331.133883][ T5750] r8:00000004 r7:00000000 r6:837a2a40 r5:ecd29f20 r4:ecd29e6c [ 331.133902][ T5750] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 331.133977][ T5750] r9:85774b00 r8:85aaf980 r7:00000004 r6:200000c0 r5:85aaf981 r4:00000004 [ 331.134005][ T5750] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 331.134069][ T5750] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 331.134089][ T5750] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 331.134135][ T5750] Exception stack(0xecd29fa8 to 0xecd29ff0) [ 331.134174][ T5750] 9fa0: 00000000 00000000 00000004 200000c0 00000004 00000000 [ 331.134210][ T5750] 9fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f480dc [ 331.134236][ T5750] 9fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 331.193253][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 331.194446][ T28] audit: type=1400 audit(331.100:2924): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.229375][ T28] audit: type=1400 audit(331.140:2925): avc: denied { read write } for pid=5751 comm="syz.1.871" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.411693][ T28] audit: type=1400 audit(331.320:2926): avc: denied { read } for pid=5753 comm="syz.0.872" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.433924][ T28] audit: type=1400 audit(331.340:2927): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.500231][ T28] audit: type=1400 audit(331.410:2928): avc: denied { read write } for pid=5755 comm="syz.1.873" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.541793][ T28] audit: type=1400 audit(331.450:2929): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.577826][ T28] audit: type=1400 audit(331.490:2930): avc: denied { create } for pid=5755 comm="syz.1.873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 331.584543][ T28] audit: type=1400 audit(331.490:2931): avc: denied { read write } for pid=5755 comm="syz.1.873" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.658617][ T28] audit: type=1400 audit(331.570:2932): avc: denied { create } for pid=5755 comm="syz.1.873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 331.738837][ T28] audit: type=1400 audit(331.650:2933): avc: denied { read write } for pid=5755 comm="syz.1.873" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 332.397952][ T5760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5760 comm=syz.1.876 [ 333.457203][ T5772] FAULT_INJECTION: forcing a failure. [ 333.457203][ T5772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.468197][ T5772] CPU: 1 UID: 0 PID: 5772 Comm: syz.0.880 Tainted: G L syzkaller #0 PREEMPT [ 333.468436][ T5772] Tainted: [L]=SOFTLOCKUP [ 333.468469][ T5772] Hardware name: ARM-Versatile Express [ 333.468498][ T5772] Call trace: [ 333.468553][ T5772] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 333.468666][ T5772] r7:60000113 r6:60000113 r5:8231e214 r4:00000000 [ 333.468689][ T5772] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 333.468746][ T5772] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 333.468808][ T5772] r7:00000000 r6:00000000 r5:85774b00 r4:82b4f188 [ 333.468829][ T5772] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 333.468885][ T5772] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 333.468945][ T5772] r8:76f47f08 r7:00000000 r6:00000000 r5:e00c1f68 r4:00000002 [ 333.468966][ T5772] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 333.469021][ T5772] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 333.469083][ T5772] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 333.469152][ T5772] r10:8064c488 r9:00000001 r8:00000002 r7:e00c1f68 r6:0000000f r5:76f47f08 [ 333.469178][ T5772] r4:85774b00 r3:e00c1e9f [ 333.469198][ T5772] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 333.469284][ T5772] r8:85774b00 r7:e00c1f68 r6:76f47f08 r5:8621e280 r4:0000000f [ 333.469304][ T5772] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 333.469383][ T5772] r10:00000003 r9:85774b00 r8:8020029c r7:00000000 r6:00000000 r5:8621e280 [ 333.469406][ T5772] r4:8621e283 [ 333.469423][ T5772] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 333.469488][ T5772] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 333.469526][ T5772] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 333.469584][ T5772] Exception stack(0xe00c1fa8 to 0xe00c1ff0) [ 333.469626][ T5772] 1fa0: 00000000 00000000 00000003 76f47f08 0000000f 00000000 [ 333.469698][ T5772] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f480dc [ 333.469731][ T5772] 1fe0: 76f47e58 76f47e44 0010ba34 00112618 [ 335.761581][ T5797] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5797 comm=syz.0.890 [ 336.260999][ T28] kauditd_printk_skb: 119 callbacks suppressed [ 336.261362][ T28] audit: type=1400 audit(336.170:3053): avc: denied { create } for pid=5803 comm="syz.1.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 336.347589][ T5804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5804 comm=syz.1.893 [ 336.361627][ T28] audit: type=1400 audit(336.270:3054): avc: denied { prog_load } for pid=5803 comm="syz.1.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.447807][ T28] audit: type=1400 audit(336.350:3055): avc: denied { create } for pid=5805 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 336.461567][ T28] audit: type=1400 audit(336.370:3056): avc: denied { create } for pid=5805 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 336.487742][ T28] audit: type=1400 audit(336.390:3057): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 336.488099][ T28] audit: type=1400 audit(336.390:3058): avc: denied { create } for pid=5805 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 336.488443][ T28] audit: type=1400 audit(336.390:3059): avc: denied { read } for pid=5805 comm="syz.0.894" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 336.507641][ T28] audit: type=1400 audit(336.410:3060): avc: denied { create } for pid=5805 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 336.708557][ T28] audit: type=1400 audit(336.620:3061): avc: denied { read write } for pid=5807 comm="syz.1.895" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 336.757603][ T28] audit: type=1400 audit(336.650:3062): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 337.092203][ T5810] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5810 comm=syz.0.896 [ 339.174281][ T5820] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5820 comm=syz.0.900 [ 339.749011][ T5824] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5824 comm=syz.1.901 [ 340.749836][ T5834] FAULT_INJECTION: forcing a failure. [ 340.749836][ T5834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.751753][ T5834] CPU: 0 UID: 0 PID: 5834 Comm: syz.0.907 Tainted: G L syzkaller #0 PREEMPT [ 340.751868][ T5834] Tainted: [L]=SOFTLOCKUP [ 340.751889][ T5834] Hardware name: ARM-Versatile Express [ 340.751915][ T5834] Call trace: [ 340.751963][ T5834] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 340.752068][ T5834] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 340.752089][ T5834] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 340.752147][ T5834] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 340.752212][ T5834] r7:00000000 r6:00000000 r5:85774b00 r4:82b4f188 [ 340.752230][ T5834] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 340.752286][ T5834] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 340.752345][ T5834] r8:ffffffff r7:00000000 r6:00000100 r5:20001340 r4:20001340 [ 340.752364][ T5834] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 340.752412][ T5834] [<809d7488>] (should_fail_usercopy) from [<809dd428>] (strncpy_from_user+0x20/0x1b0) [ 340.752475][ T5834] [<809dd408>] (strncpy_from_user) from [<805c25bc>] (path_setxattrat+0x7c/0x1bc) [ 340.752551][ T5834] r10:00000001 r9:20001380 r8:ffffffff r7:00000000 r6:00001000 r5:00000008 [ 340.752574][ T5834] r4:20001340 [ 340.752592][ T5834] [<805c2540>] (path_setxattrat) from [<805c28fc>] (sys_fsetxattr+0x30/0x38) [ 340.752665][ T5834] r10:000000e4 r9:85774b00 r8:8020029c r7:000000e4 r6:0012f214 r5:00000000 [ 340.752688][ T5834] r4:00000001 [ 340.752706][ T5834] [<805c28cc>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 340.752759][ T5834] Exception stack(0xea4c5fa8 to 0xea4c5ff0) [ 340.752800][ T5834] 5fa0: 00000001 00000000 ffffffff 20001340 20001380 00000008 [ 340.752839][ T5834] 5fc0: 00000001 00000000 0012f214 000000e4 003462d8 00000000 00000001 76f480dc [ 340.752870][ T5834] 5fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 341.362072][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 341.362592][ T28] audit: type=1400 audit(341.270:3098): avc: denied { read write } for pid=5836 comm="syz.0.908" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 341.409431][ T28] audit: type=1400 audit(341.320:3099): avc: denied { create } for pid=5836 comm="syz.0.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 341.561255][ T28] audit: type=1400 audit(341.470:3100): avc: denied { create } for pid=5836 comm="syz.0.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 341.588182][ T5837] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5837 comm=syz.0.908 [ 341.639811][ T28] audit: type=1400 audit(341.550:3101): avc: denied { read } for pid=5836 comm="syz.0.908" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 341.752090][ T28] audit: type=1400 audit(341.660:3102): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 341.982186][ T28] audit: type=1400 audit(341.890:3103): avc: denied { create } for pid=5838 comm="syz.0.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 341.994364][ T28] audit: type=1400 audit(341.900:3104): avc: denied { create } for pid=5838 comm="syz.0.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 341.996659][ T28] audit: type=1400 audit(341.900:3105): avc: denied { create } for pid=5838 comm="syz.0.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 342.072422][ T28] audit: type=1400 audit(341.980:3106): avc: denied { read write } for pid=5838 comm="syz.0.909" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 342.614406][ T28] audit: type=1400 audit(342.520:3107): avc: denied { allowed } for pid=5838 comm="syz.0.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 345.035063][ T5853] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5853 comm=syz.0.913 [ 346.213786][ T5860] FAULT_INJECTION: forcing a failure. [ 346.213786][ T5860] name failslab, interval 1, probability 0, space 0, times 0 [ 346.215456][ T5860] CPU: 0 UID: 0 PID: 5860 Comm: syz.1.916 Tainted: G L syzkaller #0 PREEMPT [ 346.215580][ T5860] Tainted: [L]=SOFTLOCKUP [ 346.215602][ T5860] Hardware name: ARM-Versatile Express [ 346.215625][ T5860] Call trace: [ 346.215666][ T5860] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 346.215766][ T5860] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 346.215784][ T5860] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 346.215835][ T5860] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 346.215892][ T5860] r7:00000dc0 r6:00000000 r5:83e55780 r4:82b18108 [ 346.215908][ T5860] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 346.215967][ T5860] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 346.216027][ T5860] r8:851e6780 r7:00000dc0 r6:00000000 r5:00000000 r4:830c4480 [ 346.216045][ T5860] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 346.216100][ T5860] [<8053133c>] (kmem_cache_alloc_noprof) from [<807d0e08>] (security_file_alloc+0x30/0x184) [ 346.216182][ T5860] r10:83e55780 r9:00000003 r8:851e6780 r7:830fee80 r6:82ce90e8 r5:851e6780 [ 346.216205][ T5860] r4:851e6780 [ 346.216223][ T5860] [<807d0dd8>] (security_file_alloc) from [<80587c38>] (init_file+0x48/0xfc) [ 346.216285][ T5860] r7:830fee80 r6:00000000 r5:82b1b250 r4:851e6780 [ 346.216302][ T5860] [<80587bf0>] (init_file) from [<80588488>] (alloc_empty_file+0x68/0x13c) [ 346.216355][ T5860] r7:830fee80 r6:00000000 r5:82b1b250 r4:825258a8 [ 346.216372][ T5860] [<80588420>] (alloc_empty_file) from [<805826bc>] (dentry_open+0x28/0x68) [ 346.216437][ T5860] r8:86228a80 r7:856d2000 r6:83e55780 r5:ea701e84 r4:00000007 [ 346.216459][ T5860] [<80582694>] (dentry_open) from [<805dc3c0>] (open_namespace+0x70/0xd4) [ 346.216528][ T5860] r5:00000000 r4:00000007 [ 346.216548][ T5860] [<805dc350>] (open_namespace) from [<805dc440>] (open_related_ns+0x1c/0x20) [ 346.216673][ T5860] r6:00000005 r5:837e02c0 r4:0000894c [ 346.216696][ T5860] [<805dc424>] (open_related_ns) from [<815eb7ec>] (sock_ioctl+0x350/0x4c0) [ 346.216781][ T5860] [<815eb49c>] (sock_ioctl) from [<805a1864>] (sys_ioctl+0x244/0xb5c) [ 346.216862][ T5860] r9:00000003 r8:86228a80 r7:00000005 r6:0000894c r5:86228a81 r4:00000000 [ 346.216881][ T5860] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 346.216928][ T5860] Exception stack(0xea701fa8 to 0xea701ff0) [ 346.216964][ T5860] 1fa0: 00000000 00000000 00000003 0000894c 00000005 00000000 [ 346.217001][ T5860] 1fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fab0dc [ 346.217033][ T5860] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 346.217069][ T5860] r10:00000036 r9:83e55780 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 346.217088][ T5860] r4:00000000 [ 346.630383][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 346.630711][ T28] audit: type=1400 audit(346.540:3166): avc: denied { read write } for pid=5861 comm="syz.1.917" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 346.880241][ T28] audit: type=1400 audit(346.790:3167): avc: denied { read } for pid=5861 comm="syz.1.917" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 346.898873][ T28] audit: type=1400 audit(346.810:3168): avc: denied { create } for pid=5861 comm="syz.1.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 347.110121][ T28] audit: type=1400 audit(347.020:3169): avc: denied { write } for pid=5861 comm="syz.1.917" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 347.208646][ T28] audit: type=1400 audit(347.120:3170): avc: denied { prog_load } for pid=5861 comm="syz.1.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 347.564206][ T28] audit: type=1400 audit(347.470:3171): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 347.724659][ T28] audit: type=1400 audit(347.630:3172): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 347.857965][ T28] audit: type=1400 audit(347.760:3173): avc: denied { create } for pid=5864 comm="syz.1.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 347.955543][ T28] audit: type=1400 audit(347.860:3174): avc: denied { create } for pid=5864 comm="syz.1.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 347.978330][ T28] audit: type=1400 audit(347.880:3175): avc: denied { create } for pid=5864 comm="syz.1.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 348.079358][ T5867] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5867 comm=syz.0.919 [ 350.789981][ T5886] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5886 comm=syz.0.927 [ 351.887484][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 351.887818][ T28] audit: type=1400 audit(351.790:3206): avc: denied { create } for pid=5887 comm="syz.0.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 352.316342][ T28] audit: type=1400 audit(352.220:3207): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 352.775592][ T28] audit: type=1400 audit(352.680:3208): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.129107][ T28] audit: type=1400 audit(353.040:3209): avc: denied { create } for pid=5892 comm="syz.1.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 353.143809][ T28] audit: type=1400 audit(353.050:3210): avc: denied { read write } for pid=5892 comm="syz.1.930" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 353.418565][ T28] audit: type=1400 audit(353.330:3211): avc: denied { create } for pid=5892 comm="syz.1.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 353.441215][ T28] audit: type=1400 audit(353.350:3212): avc: denied { create } for pid=5892 comm="syz.1.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 353.548969][ T28] audit: type=1400 audit(353.460:3213): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.777650][ T28] audit: type=1400 audit(353.680:3214): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.857418][ T28] audit: type=1400 audit(353.760:3215): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.889132][ T5900] FAULT_INJECTION: forcing a failure. [ 353.889132][ T5900] name failslab, interval 1, probability 0, space 0, times 0 [ 353.889556][ T5900] CPU: 1 UID: 0 PID: 5900 Comm: syz.1.933 Tainted: G L syzkaller #0 PREEMPT [ 353.889657][ T5900] Tainted: [L]=SOFTLOCKUP [ 353.889677][ T5900] Hardware name: ARM-Versatile Express [ 353.889702][ T5900] Call trace: [ 353.889743][ T5900] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 353.889912][ T5900] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 353.890006][ T5900] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 353.890102][ T5900] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 353.890201][ T5900] r7:00000000 r6:00000000 r5:840a6400 r4:82b18108 [ 353.890235][ T5900] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 353.890344][ T5900] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 353.890477][ T5900] r8:00000cc0 r7:00000000 r6:00000cc0 r5:00000000 r4:830e4c00 [ 353.890645][ T5900] [<80554020>] (should_failslab) from [<80531b10>] (kmem_cache_alloc_node_noprof+0x58/0x3c8) [ 353.890875][ T5900] [<80531ab8>] (kmem_cache_alloc_node_noprof) from [<815fb7e8>] (__alloc_skb+0x74/0x2c0) [ 353.890997][ T5900] r10:00000000 r9:815fb998 r8:00000cc0 r7:00000000 r6:830e4c00 r5:ffffffff [ 353.891018][ T5900] r4:ddde4708 [ 353.891037][ T5900] [<815fb774>] (__alloc_skb) from [<817229b0>] (netlink_alloc_large_skb+0x8c/0xa8) [ 353.891170][ T5900] r9:00000000 r8:00000000 r7:8625b800 r6:00000014 r5:837e11c0 r4:00000140 [ 353.891219][ T5900] [<81722924>] (netlink_alloc_large_skb) from [<8172316c>] (netlink_sendmsg+0x130/0x444) [ 353.891284][ T5900] r5:837e11c0 r4:eb175f20 [ 353.891324][ T5900] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 353.891400][ T5900] r10:04000040 r9:00000000 r8:eb175dcc r7:00000000 r6:837e11c0 r5:eb175f20 [ 353.891442][ T5900] r4:00000000 [ 353.891512][ T5900] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 353.891639][ T5900] r7:00000000 r6:00000000 r5:837e11c0 r4:eb175f20 [ 353.891659][ T5900] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 353.891762][ T5900] r10:00000128 r9:200005c0 r8:04000040 r7:00000000 r6:837e11c0 r5:eb175f20 [ 353.891784][ T5900] r4:00000000 [ 353.891846][ T5900] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 353.892037][ T5900] r9:840a6400 r8:851e6380 r7:04000040 r6:200005c0 r5:851e6381 r4:00000003 [ 353.892128][ T5900] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 353.892193][ T5900] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 353.892287][ T5900] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 353.892425][ T5900] Exception stack(0xeb175fa8 to 0xeb175ff0) [ 353.892501][ T5900] 5fa0: 00000000 00000000 00000003 200005c0 04000040 00000000 [ 353.892576][ T5900] 5fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76fab0dc [ 353.892609][ T5900] 5fe0: 76faae88 76faae78 00018ebc 00130810 [ 354.318061][ T5902] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=257 sclass=netlink_tcpdiag_socket pid=5902 comm=syz.1.934 [ 356.913278][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 356.915560][ T28] audit: type=1400 audit(356.820:3225): avc: denied { read } for pid=5911 comm="syz.0.937" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 356.932947][ T28] audit: type=1400 audit(356.840:3226): avc: denied { create } for pid=5911 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 356.957112][ T28] audit: type=1400 audit(356.860:3227): avc: denied { create } for pid=5911 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 356.958967][ T28] audit: type=1400 audit(356.860:3228): avc: denied { map_create } for pid=5911 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 357.063779][ T28] audit: type=1400 audit(356.970:3229): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 357.874924][ T28] audit: type=1400 audit(357.780:3230): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 357.947194][ T28] audit: type=1400 audit(357.850:3231): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 358.137522][ T28] audit: type=1400 audit(358.040:3232): avc: denied { write } for pid=5915 comm="syz.0.939" name="if_inet6" dev="proc" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 358.143748][ T28] audit: type=1400 audit(358.050:3233): avc: denied { read } for pid=5916 comm="syz.1.940" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 358.272486][ T28] audit: type=1400 audit(358.180:3234): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 359.282659][ T5925] FAULT_INJECTION: forcing a failure. [ 359.282659][ T5925] name failslab, interval 1, probability 0, space 0, times 0 [ 359.289643][ T5925] CPU: 0 UID: 0 PID: 5925 Comm: syz.0.943 Tainted: G L syzkaller #0 PREEMPT [ 359.289799][ T5925] Tainted: [L]=SOFTLOCKUP [ 359.289824][ T5925] Hardware name: ARM-Versatile Express [ 359.289849][ T5925] Call trace: [ 359.289894][ T5925] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 359.290005][ T5925] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 359.290040][ T5925] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 359.290112][ T5925] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 359.290176][ T5925] r7:00000000 r6:00000000 r5:8483b200 r4:82b18108 [ 359.290200][ T5925] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 359.290254][ T5925] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 359.290315][ T5925] r8:00000cc0 r7:00000000 r6:00000cc0 r5:00000000 r4:830e4c00 [ 359.290333][ T5925] [<80554020>] (should_failslab) from [<80531b10>] (kmem_cache_alloc_node_noprof+0x58/0x3c8) [ 359.290392][ T5925] [<80531ab8>] (kmem_cache_alloc_node_noprof) from [<815fb7e8>] (__alloc_skb+0x74/0x2c0) [ 359.290527][ T5925] r10:00000000 r9:815fb998 r8:00000cc0 r7:00000000 r6:830e4c00 r5:ffffffff [ 359.290572][ T5925] r4:dddd0708 [ 359.290592][ T5925] [<815fb774>] (__alloc_skb) from [<817229b0>] (netlink_alloc_large_skb+0x8c/0xa8) [ 359.290668][ T5925] r9:00000000 r8:00000000 r7:8625d800 r6:00000014 r5:8379d1c0 r4:00000140 [ 359.290688][ T5925] [<81722924>] (netlink_alloc_large_skb) from [<8172316c>] (netlink_sendmsg+0x130/0x444) [ 359.290744][ T5925] r5:8379d1c0 r4:eb30df20 [ 359.290761][ T5925] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 359.290865][ T5925] r10:00000000 r9:00000000 r8:eb30ddcc r7:00000000 r6:8379d1c0 r5:eb30df20 [ 359.290893][ T5925] r4:00000000 [ 359.290911][ T5925] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 359.290970][ T5925] r7:00000000 r6:00000000 r5:8379d1c0 r4:eb30df20 [ 359.290985][ T5925] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 359.291045][ T5925] r10:00000128 r9:20000280 r8:00000000 r7:00000000 r6:8379d1c0 r5:eb30df20 [ 359.291066][ T5925] r4:00000000 [ 359.291084][ T5925] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 359.291236][ T5925] r9:8483b200 r8:838d4e80 r7:00000000 r6:20000280 r5:838d4e81 r4:00000003 [ 359.291263][ T5925] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 359.291325][ T5925] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 359.291343][ T5925] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 359.291387][ T5925] Exception stack(0xeb30dfa8 to 0xeb30dff0) [ 359.291432][ T5925] dfa0: 00000000 00000000 00000003 20000280 00000000 00000000 [ 359.291474][ T5925] dfc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f480dc [ 359.291591][ T5925] dfe0: 76f47e88 76f47e78 00018ebc 00130810 [ 362.434096][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 362.437315][ T28] audit: type=1400 audit(362.340:3245): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 362.675447][ T28] audit: type=1400 audit(362.580:3246): avc: denied { read write } for pid=5934 comm="syz.0.947" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 362.770991][ T28] audit: type=1400 audit(362.630:3247): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 362.920144][ T28] audit: type=1400 audit(362.830:3248): avc: denied { read write } for pid=5937 comm="syz.0.948" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 363.059556][ T28] audit: type=1400 audit(362.970:3249): avc: denied { read write } for pid=5937 comm="syz.0.948" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 363.168257][ T28] audit: type=1400 audit(363.080:3250): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 364.030146][ T28] audit: type=1400 audit(363.940:3251): avc: denied { create } for pid=5939 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 364.047107][ T28] audit: type=1400 audit(363.950:3252): avc: denied { create } for pid=5939 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 364.087914][ T28] audit: type=1400 audit(363.990:3253): avc: denied { create } for pid=5939 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 364.113520][ T5941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=5941 comm=syz.0.949 [ 364.131567][ T28] audit: type=1400 audit(364.040:3254): avc: denied { read } for pid=5939 comm="syz.0.949" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 367.304496][ T5943] veth1_to_bond: entered promiscuous mode [ 367.471487][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 367.472454][ T28] audit: type=1400 audit(367.380:3259): avc: denied { read } for pid=5942 comm="syz.0.950" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 367.488504][ T28] audit: type=1400 audit(367.400:3260): avc: denied { read write } for pid=5942 comm="syz.0.950" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 367.552052][ T28] audit: type=1400 audit(367.460:3261): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 367.800769][ T28] audit: type=1400 audit(367.710:3262): avc: denied { read write } for pid=5945 comm="syz.0.951" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 367.828451][ T28] audit: type=1400 audit(367.740:3263): avc: denied { create } for pid=5945 comm="syz.0.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 367.888514][ T28] audit: type=1400 audit(367.800:3264): avc: denied { create } for pid=5945 comm="syz.0.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 367.900958][ T28] audit: type=1400 audit(367.810:3265): avc: denied { read } for pid=5945 comm="syz.0.951" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 367.995458][ T28] audit: type=1400 audit(367.900:3266): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 368.310568][ T5948] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5948 comm=syz.0.952 [ 368.355570][ T28] audit: type=1400 audit(368.260:3267): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 368.613026][ T28] audit: type=1400 audit(368.520:3268): avc: denied { create } for pid=5949 comm="syz.0.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 372.701895][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 372.702225][ T28] audit: type=1400 audit(372.610:3291): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 372.962572][ T28] audit: type=1400 audit(372.870:3292): avc: denied { read write } for pid=5969 comm="syz.0.961" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 373.069321][ T28] audit: type=1400 audit(372.980:3293): avc: denied { create } for pid=5969 comm="syz.0.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 373.134285][ T28] audit: type=1400 audit(373.040:3294): avc: denied { create } for pid=5969 comm="syz.0.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 373.151356][ T28] audit: type=1400 audit(373.060:3295): avc: denied { read } for pid=5969 comm="syz.0.961" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 373.191551][ T28] audit: type=1400 audit(373.100:3296): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 373.260404][ T28] audit: type=1400 audit(373.170:3297): avc: denied { map_create } for pid=5971 comm="syz.0.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 373.263341][ T28] audit: type=1400 audit(373.170:3298): avc: denied { prog_load } for pid=5971 comm="syz.0.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 373.265837][ T28] audit: type=1400 audit(373.170:3299): avc: denied { read } for pid=5971 comm="syz.0.962" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 373.270383][ T28] audit: type=1400 audit(373.180:3300): avc: denied { create } for pid=5971 comm="syz.0.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 374.399522][ T5979] FAULT_INJECTION: forcing a failure. [ 374.399522][ T5979] name failslab, interval 1, probability 0, space 0, times 0 [ 374.400913][ T5979] CPU: 0 UID: 0 PID: 5979 Comm: syz.0.964 Tainted: G L syzkaller #0 PREEMPT [ 374.401019][ T5979] Tainted: [L]=SOFTLOCKUP [ 374.401037][ T5979] Hardware name: ARM-Versatile Express [ 374.401058][ T5979] Call trace: [ 374.401110][ T5979] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 374.401202][ T5979] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 374.401218][ T5979] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 374.401262][ T5979] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 374.401313][ T5979] r7:00000cc0 r6:00000000 r5:856a4b00 r4:82b18108 [ 374.401326][ T5979] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 374.401371][ T5979] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 374.401423][ T5979] r8:00000001 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4a80 [ 374.401437][ T5979] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 374.401480][ T5979] [<8053133c>] (kmem_cache_alloc_noprof) from [<805956e0>] (do_getname+0x2c/0x14c) [ 374.401541][ T5979] r10:00000015 r9:b5403587 r8:00000001 r7:00000000 r6:20000140 r5:825258b8 [ 374.401558][ T5979] r4:00000000 [ 374.401571][ T5979] [<805956b4>] (do_getname) from [<8059b8ec>] (user_path_at+0x30/0x6c) [ 374.401630][ T5979] r10:00000015 r9:b5403587 r8:856de000 r7:eb149f6c r6:ffffff9c r5:00000001 [ 374.401649][ T5979] r4:00000000 r3:eb149f6c [ 374.401663][ T5979] [<8059b8bc>] (user_path_at) from [<805bc4a8>] (sys_mount+0x1bc/0x260) [ 374.401716][ T5979] r7:86220200 r6:86249e00 r5:200001c0 r4:00000000 [ 374.401730][ T5979] [<805bc2ec>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 374.401775][ T5979] Exception stack(0xeb149fa8 to 0xeb149ff0) [ 374.401813][ T5979] 9fa0: 200001c0 00000000 20000080 20000140 20000180 00000010 [ 374.401843][ T5979] 9fc0: 200001c0 00000000 0012f214 00000015 003462d8 00000000 00000001 76f480dc [ 374.401866][ T5979] 9fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 374.401897][ T5979] r10:00000015 r9:856a4b00 r8:8020029c r7:00000015 r6:0012f214 r5:00000000 [ 374.401918][ T5979] r4:200001c0 [ 376.139975][ T5990] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5990 comm=syz.1.970 [ 377.909349][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 377.910783][ T28] audit: type=1400 audit(377.820:3352): avc: denied { create } for pid=6000 comm="syz.0.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 378.199273][ T28] audit: type=1400 audit(378.110:3353): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 378.599497][ T28] audit: type=1400 audit(378.510:3354): avc: denied { create } for pid=6002 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 378.611345][ T28] audit: type=1400 audit(378.520:3355): avc: denied { create } for pid=6002 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 378.908254][ T28] audit: type=1400 audit(378.820:3356): avc: denied { create } for pid=6002 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 378.959517][ T28] audit: type=1400 audit(378.870:3357): avc: denied { read } for pid=6002 comm="syz.0.976" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 379.169574][ T28] audit: type=1400 audit(379.080:3358): avc: denied { read } for pid=6002 comm="syz.0.976" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 379.389834][ T28] audit: type=1400 audit(379.300:3359): avc: denied { read } for pid=6002 comm="syz.0.976" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 379.398615][ T28] audit: type=1400 audit(379.310:3360): avc: denied { create } for pid=6002 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 379.613123][ T28] audit: type=1400 audit(379.520:3361): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 382.946064][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 382.946876][ T28] audit: type=1400 audit(382.850:3375): avc: denied { create } for pid=6016 comm="syz.0.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 382.996855][ T28] audit: type=1400 audit(382.890:3376): avc: denied { read } for pid=6016 comm="syz.0.982" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 383.110086][ T28] audit: type=1400 audit(383.020:3377): avc: denied { create } for pid=6016 comm="syz.0.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 383.385310][ T28] audit: type=1400 audit(383.290:3378): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 383.688738][ T28] audit: type=1400 audit(383.600:3379): avc: denied { read write } for pid=6018 comm="syz.0.983" name="uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 384.021642][ T28] audit: type=1400 audit(383.930:3380): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 384.240473][ T28] audit: type=1400 audit(384.150:3381): avc: denied { read } for pid=6020 comm="syz.1.984" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 384.421628][ T28] audit: type=1400 audit(384.330:3382): avc: denied { read } for pid=6018 comm="syz.0.983" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 384.630365][ T28] audit: type=1400 audit(384.540:3383): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 384.669658][ T28] audit: type=1400 audit(384.580:3384): avc: denied { write } for pid=6018 comm="syz.0.983" name="userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 385.919948][ T6035] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5122 sclass=netlink_tcpdiag_socket pid=6035 comm=syz.0.990 [ 386.705499][ T6041] FAULT_INJECTION: forcing a failure. [ 386.705499][ T6041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.717318][ T6041] CPU: 1 UID: 0 PID: 6041 Comm: syz.1.992 Tainted: G L syzkaller #0 PREEMPT [ 386.717478][ T6041] Tainted: [L]=SOFTLOCKUP [ 386.717503][ T6041] Hardware name: ARM-Versatile Express [ 386.717527][ T6041] Call trace: [ 386.717577][ T6041] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 386.717689][ T6041] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 386.717709][ T6041] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 386.717761][ T6041] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 386.717817][ T6041] r7:20000900 r6:00000000 r5:84849900 r4:82b4f188 [ 386.717835][ T6041] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 386.717891][ T6041] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 386.717946][ T6041] r8:00000000 r7:20000900 r6:00000010 r5:00000000 r4:ec1c9f30 [ 386.717963][ T6041] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 386.718004][ T6041] [<809d7488>] (should_fail_usercopy) from [<8090f1f0>] (_copy_from_iter+0x64/0x7c4) [ 386.718056][ T6041] [<8090f18c>] (_copy_from_iter) from [<817231c4>] (netlink_sendmsg+0x188/0x444) [ 386.718140][ T6041] r10:00000000 r9:00000000 r8:ec1c9f30 r7:8625b800 r6:00000010 r5:833873c0 [ 386.718162][ T6041] r4:ec1c9f20 [ 386.718179][ T6041] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 386.718259][ T6041] r10:00000004 r9:00000000 r8:ec1c9dcc r7:00000000 r6:837e1bc0 r5:ec1c9f20 [ 386.718281][ T6041] r4:00000000 [ 386.718297][ T6041] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 386.718391][ T6041] r7:00000000 r6:00000000 r5:837e1bc0 r4:ec1c9f20 [ 386.718411][ T6041] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 386.718508][ T6041] r10:00000128 r9:20000980 r8:00000004 r7:00000000 r6:837e1bc0 r5:ec1c9f20 [ 386.718532][ T6041] r4:00000000 [ 386.718550][ T6041] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 386.718624][ T6041] r9:84849900 r8:86399180 r7:00000004 r6:20000980 r5:86399181 r4:00000003 [ 386.718644][ T6041] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 386.718708][ T6041] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 386.718728][ T6041] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 386.718771][ T6041] Exception stack(0xec1c9fa8 to 0xec1c9ff0) [ 386.718813][ T6041] 9fa0: 00000000 00000000 00000003 20000980 00000004 00000000 [ 386.718859][ T6041] 9fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76fab0dc [ 386.718888][ T6041] 9fe0: 76faae88 76faae78 00018ebc 00130810 [ 387.829790][ T6054] FAULT_INJECTION: forcing a failure. [ 387.829790][ T6054] name failslab, interval 1, probability 0, space 0, times 0 [ 387.830284][ T6054] CPU: 0 UID: 0 PID: 6054 Comm: syz.1.998 Tainted: G L syzkaller #0 PREEMPT [ 387.830386][ T6054] Tainted: [L]=SOFTLOCKUP [ 387.830407][ T6054] Hardware name: ARM-Versatile Express [ 387.830435][ T6054] Call trace: [ 387.830526][ T6054] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 387.830637][ T6054] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 387.830742][ T6054] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 387.830827][ T6054] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 387.830996][ T6054] r7:00000000 r6:00000000 r5:8561d780 r4:82b18108 [ 387.831093][ T6054] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 387.831156][ T6054] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 387.831248][ T6054] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 387.831316][ T6054] [<80554020>] (should_failslab) from [<80532680>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 387.831395][ T6054] [<805325d8>] (__kmalloc_node_track_caller_noprof) from [<804c1860>] (kmemdup_noprof+0x28/0x44) [ 387.831497][ T6054] r10:00000006 r9:84435204 r8:ec221c8c r7:85660000 r6:84f01458 r5:ec221c84 [ 387.831522][ T6054] r4:00000017 [ 387.831579][ T6054] [<804c1838>] (kmemdup_noprof) from [<807f3f54>] (sidtab_sid2str_get+0x54/0xa4) [ 387.831671][ T6054] r7:85660000 r6:ec221c8c r5:ec221c84 r4:84d9d0c0 [ 387.831748][ T6054] [<807f3f00>] (sidtab_sid2str_get) from [<807fb4e4>] (sidtab_entry_to_string+0x34/0x94) [ 387.831919][ T6054] r7:85660000 r6:84d9d0c0 r5:ec221c84 r4:0000005f [ 387.831972][ T6054] [<807fb4b0>] (sidtab_entry_to_string) from [<807fb65c>] (security_sid_to_context_core+0x118/0x17c) [ 387.832068][ T6054] r9:ec221dac r8:85660000 r7:84435204 r6:ec221c8c r5:ec221c84 r4:0000005f [ 387.832164][ T6054] [<807fb544>] (security_sid_to_context_core) from [<807fe5b0>] (security_sid_to_context+0x1c/0x24) [ 387.832276][ T6054] r8:807de388 r7:807df100 r6:8561d780 r5:84e6c658 r4:ec221d18 [ 387.832297][ T6054] [<807fe594>] (security_sid_to_context) from [<807df14c>] (avc_audit_post_callback+0x4c/0x32c) [ 387.832411][ T6054] [<807df100>] (avc_audit_post_callback) from [<80806690>] (common_lsm_audit+0x108/0x14c) [ 387.832548][ T6054] r10:00000006 r9:ec221dac r8:807de388 r7:807df100 r6:ec221dac r5:84e6c658 [ 387.832595][ T6054] r4:8561dfa8 [ 387.832615][ T6054] [<80806588>] (common_lsm_audit) from [<807df644>] (slow_avc_audit+0xbc/0x114) [ 387.832747][ T6054] r8:00000004 r7:fffffff3 r6:00000001 r5:0000005f r4:00000001 [ 387.832773][ T6054] [<807df588>] (slow_avc_audit) from [<807e0098>] (avc_has_perm+0xe4/0xf4) [ 387.832866][ T6054] r5:0000005f r4:00000010 [ 387.832973][ T6054] [<807dffb4>] (avc_has_perm) from [<807e4cdc>] (selinux_kernel_module_request+0x74/0x98) [ 387.833053][ T6054] r9:00000000 r8:82af4db8 r7:8165ed60 r6:8561d780 r5:00000001 r4:00000000 [ 387.833128][ T6054] [<807e4c68>] (selinux_kernel_module_request) from [<807d3310>] (security_kernel_module_request+0x50/0x184) [ 387.833229][ T6054] r4:ec221e08 [ 387.833260][ T6054] [<807d32c0>] (security_kernel_module_request) from [<80321754>] (__request_module+0x88/0x2ec) [ 387.833363][ T6054] r5:00000001 r4:824e6f48 [ 387.833468][ T6054] [<803216cc>] (__request_module) from [<8165ed60>] (dev_load+0x80/0x8c) [ 387.833640][ T6054] r3:00400140 r2:ec221ecc r1:824e6f48 [ 387.833741][ T6054] r8:ec221ecb r7:00000000 r6:856d2000 r5:00000000 r4:ec221ecc [ 387.833784][ T6054] [<8165ece0>] (dev_load) from [<816602e0>] (dev_ioctl+0x394/0x468) [ 387.833866][ T6054] r5:ec221ecc r4:000089f6 [ 387.833886][ T6054] [<8165ff4c>] (dev_ioctl) from [<815eb880>] (sock_ioctl+0x3e4/0x4c0) [ 387.834006][ T6054] r10:8561d780 r9:00000003 r8:86116a80 r7:856d2000 r6:20000100 r5:b5403587 [ 387.834105][ T6054] r4:000089f6 r3:00000000 [ 387.834137][ T6054] [<815eb49c>] (sock_ioctl) from [<805a1864>] (sys_ioctl+0x244/0xb5c) [ 387.834245][ T6054] r9:00000003 r8:86116a80 r7:20000100 r6:000089f6 r5:86116a81 r4:00000000 [ 387.834302][ T6054] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 387.834354][ T6054] Exception stack(0xec221fa8 to 0xec221ff0) [ 387.834436][ T6054] 1fa0: 00000000 00000000 00000003 000089f6 20000100 00000000 [ 387.834588][ T6054] 1fc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76fab0dc [ 387.834644][ T6054] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 387.834709][ T6054] r10:00000036 r9:8561d780 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 387.834839][ T6054] r4:00000000 [ 387.951534][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 387.952179][ T28] audit: type=1400 audit(387.740:3425): avc: denied { module_request } for pid=6053 comm="syz.1.998" kmod="netdev-syztnl0" ssid=95 tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 387.952445][ T28] audit: type=1400 audit(387.860:3426): avc: denied { sys_module } for pid=6053 comm="syz.1.998" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 388.060536][ T28] audit: type=1400 audit(387.970:3427): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 388.169101][ T28] audit: type=1400 audit(388.080:3428): avc: denied { create } for pid=6048 comm="syz.0.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 388.295127][ T28] audit: type=1400 audit(388.200:3429): avc: denied { module_request } for pid=6048 comm="syz.0.996" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 388.297799][ T28] audit: type=1400 audit(388.200:3430): avc: denied { sys_module } for pid=6048 comm="syz.0.996" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 388.313113][ T28] audit: type=1400 audit(388.220:3431): avc: denied { module_request } for pid=6048 comm="syz.0.996" kmod="netdev-syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 388.314907][ T28] audit: type=1400 audit(388.220:3432): avc: denied { sys_module } for pid=6048 comm="syz.0.996" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 388.391277][ T28] audit: type=1400 audit(388.300:3433): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 390.047789][ T28] audit: type=1400 audit(389.950:3434): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 393.073941][ T28] kauditd_printk_skb: 75 callbacks suppressed [ 393.074325][ T28] audit: type=1400 audit(392.980:3510): avc: denied { read write } for pid=6077 comm="syz.0.1004" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 393.583168][ T28] audit: type=1400 audit(393.490:3511): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 393.920908][ T28] audit: type=1400 audit(393.830:3512): avc: denied { create } for pid=6079 comm="syz.0.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 393.925041][ T28] audit: type=1400 audit(393.830:3513): avc: denied { create } for pid=6079 comm="syz.0.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 393.967354][ T28] audit: type=1400 audit(393.870:3514): avc: denied { create } for pid=6079 comm="syz.0.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 394.079717][ T28] audit: type=1400 audit(393.990:3515): avc: denied { read } for pid=6079 comm="syz.0.1005" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 394.188985][ T28] audit: type=1400 audit(394.100:3516): avc: denied { read } for pid=6079 comm="syz.0.1005" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 394.279934][ T28] audit: type=1400 audit(394.190:3517): avc: denied { create } for pid=6079 comm="syz.0.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 394.311369][ T28] audit: type=1400 audit(394.220:3518): avc: granted { setsecparam } for pid=6079 comm="syz.0.1005" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 394.396465][ T28] audit: type=1400 audit(394.300:3519): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.052057][ T6082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6082 comm=syz.1.1006 [ 397.072941][ T6096] FAULT_INJECTION: forcing a failure. [ 397.072941][ T6096] name failslab, interval 1, probability 0, space 0, times 0 [ 397.073225][ T6096] CPU: 0 UID: 0 PID: 6096 Comm: syz.1.1013 Tainted: G L syzkaller #0 PREEMPT [ 397.073284][ T6096] Tainted: [L]=SOFTLOCKUP [ 397.073294][ T6096] Hardware name: ARM-Versatile Express [ 397.073307][ T6096] Call trace: [ 397.073331][ T6096] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 397.073391][ T6096] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 397.073401][ T6096] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 397.073430][ T6096] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 397.073461][ T6096] r7:00000cc0 r6:00000000 r5:8380cb00 r4:82b18108 [ 397.073469][ T6096] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 397.073498][ T6096] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 397.073599][ T6096] r8:00000000 r7:00000cc0 r6:00000000 r5:00000000 r4:830c4240 [ 397.073648][ T6096] [<80554020>] (should_failslab) from [<80531390>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 397.073713][ T6096] [<8053133c>] (kmem_cache_alloc_noprof) from [<804e6b4c>] (vm_area_alloc+0x24/0x64) [ 397.073791][ T6096] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:20ffc000 r5:855d83c0 [ 397.073835][ T6096] r4:00000000 [ 397.073936][ T6096] [<804e6b28>] (vm_area_alloc) from [<8051574c>] (__mmap_region+0x4b8/0xe68) [ 397.073980][ T6096] r5:855d83c0 r4:00000000 [ 397.074028][ T6096] [<80515294>] (__mmap_region) from [<805177e0>] (mmap_region+0xac/0x1a4) [ 397.074078][ T6096] r10:00000000 r9:000000f9 r8:ec131f18 r7:00001000 r6:20ffc000 r5:8380cb00 [ 397.074137][ T6096] r4:00000000 [ 397.074168][ T6096] [<80517734>] (mmap_region) from [<804fa258>] (do_mmap+0x3d8/0x53c) [ 397.074228][ T6096] r9:855d83c0 r8:8380cb00 r7:20ffc000 r6:04ebbee9 r5:00028031 r4:00001000 [ 397.074275][ T6096] [<804f9e80>] (do_mmap) from [<804c3120>] (vm_mmap_pgoff+0x128/0x20c) [ 397.074336][ T6096] r10:855d83c0 r9:20ffc000 r8:00001000 r7:ec131f18 r6:00000000 r5:04ebbee9 [ 397.074402][ T6096] r4:00000000 [ 397.074433][ T6096] [<804c2ff8>] (vm_mmap_pgoff) from [<804f9618>] (ksys_mmap_pgoff+0x48/0xec) [ 397.074536][ T6096] r10:000000c0 r9:8380cb00 r8:8020029c r7:20ffc000 r6:00001000 r5:04ebbee9 [ 397.074560][ T6096] r4:00028031 [ 397.074574][ T6096] [<804f95d0>] (ksys_mmap_pgoff) from [<804f96d8>] (sys_mmap_pgoff+0x1c/0x24) [ 397.074675][ T6096] r8:8020029c r7:000000c0 r6:0012f214 r5:f6923000 r4:ffffffff [ 397.074755][ T6096] [<804f96bc>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 397.074817][ T6096] Exception stack(0xec131fa8 to 0xec131ff0) [ 397.074954][ T6096] 1fa0: ffffffff f6923000 20ffc000 00001000 04ebbee9 00028031 [ 397.074998][ T6096] 1fc0: ffffffff f6923000 0012f214 000000c0 003462d8 00000000 00000001 76fab0dc [ 397.075019][ T6096] 1fe0: 76faae88 76faae78 00018ebc 00130810 [ 397.643328][ T6100] FAULT_INJECTION: forcing a failure. [ 397.643328][ T6100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 397.643745][ T6100] CPU: 0 UID: 0 PID: 6100 Comm: syz.1.1015 Tainted: G L syzkaller #0 PREEMPT [ 397.643805][ T6100] Tainted: [L]=SOFTLOCKUP [ 397.643816][ T6100] Hardware name: ARM-Versatile Express [ 397.643829][ T6100] Call trace: [ 397.643851][ T6100] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 397.643910][ T6100] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 397.643919][ T6100] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 397.643946][ T6100] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 397.643997][ T6100] r7:00000000 r6:00000000 r5:833ecb00 r4:82b4f188 [ 397.644012][ T6100] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 397.644110][ T6100] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 397.644190][ T6100] r8:76faaf08 r7:00000000 r6:00000000 r5:ec4d9f68 r4:00000002 [ 397.644270][ T6100] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 397.644331][ T6100] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 397.644396][ T6100] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 397.644472][ T6100] r10:8064c488 r9:00000001 r8:00000002 r7:ec4d9f68 r6:0000000f r5:76faaf08 [ 397.644530][ T6100] r4:833ecb00 r3:ec4d9e9f [ 397.644596][ T6100] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 397.644719][ T6100] r8:833ecb00 r7:ec4d9f68 r6:76faaf08 r5:86100e00 r4:0000000f [ 397.644821][ T6100] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 397.644878][ T6100] r10:00000003 r9:833ecb00 r8:8020029c r7:00000000 r6:00000000 r5:86100e00 [ 397.644910][ T6100] r4:86100e03 [ 397.644944][ T6100] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 397.644976][ T6100] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 397.644985][ T6100] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 397.645011][ T6100] Exception stack(0xec4d9fa8 to 0xec4d9ff0) [ 397.645032][ T6100] 9fa0: 00000000 00000000 00000003 76faaf08 0000000f 00000000 [ 397.645051][ T6100] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fab0dc [ 397.645065][ T6100] 9fe0: 76faae58 76faae44 0010ba34 00112618 [ 398.247385][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 398.247789][ T28] audit: type=1400 audit(398.150:3557): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 398.475035][ T28] audit: type=1400 audit(398.380:3558): avc: denied { create } for pid=6101 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 398.688242][ T28] audit: type=1400 audit(398.590:3559): avc: denied { read } for pid=6105 comm="syz.0.1018" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 398.741739][ T28] audit: type=1400 audit(398.650:3560): avc: denied { read write } for pid=6105 comm="syz.0.1018" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 398.928980][ T28] audit: type=1400 audit(398.840:3561): avc: denied { read write } for pid=6105 comm="syz.0.1018" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 399.110961][ T28] audit: type=1400 audit(399.020:3562): avc: denied { read write } for pid=6105 comm="syz.0.1018" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 399.188404][ T28] audit: type=1400 audit(399.100:3563): avc: denied { create } for pid=6105 comm="syz.0.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 399.428542][ T28] audit: type=1400 audit(399.340:3564): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 399.780435][ T28] audit: type=1400 audit(399.690:3565): avc: denied { create } for pid=6107 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 400.154749][ T28] audit: type=1400 audit(400.060:3566): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 403.266538][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 403.267679][ T28] audit: type=1400 audit(403.170:3589): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 403.599336][ T28] audit: type=1400 audit(403.510:3590): avc: denied { create } for pid=6129 comm="syz.0.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 403.605507][ T28] audit: type=1400 audit(403.510:3591): avc: denied { create } for pid=6129 comm="syz.0.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 403.649374][ T28] audit: type=1400 audit(403.560:3592): avc: denied { read write } for pid=6129 comm="syz.0.1028" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 404.469374][ T28] audit: type=1400 audit(404.380:3593): avc: denied { read } for pid=6129 comm="syz.0.1028" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 404.672114][ T28] audit: type=1400 audit(404.580:3594): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.217703][ T28] audit: type=1400 audit(405.110:3595): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.728666][ T28] audit: type=1400 audit(405.640:3596): avc: denied { create } for pid=6133 comm="syz.0.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 406.050450][ T28] audit: type=1400 audit(405.960:3597): avc: denied { create } for pid=6133 comm="syz.0.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 406.140658][ T28] audit: type=1400 audit(406.050:3598): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 408.547960][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 408.548350][ T28] audit: type=1400 audit(408.460:3608): avc: denied { create } for pid=6141 comm="syz.0.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 408.617956][ T28] audit: type=1400 audit(408.530:3609): avc: denied { create } for pid=6141 comm="syz.0.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 408.642171][ T28] audit: type=1400 audit(408.550:3610): avc: denied { create } for pid=6141 comm="syz.0.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 408.681770][ T28] audit: type=1400 audit(408.590:3611): avc: denied { read } for pid=6141 comm="syz.0.1034" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 408.687240][ T28] audit: type=1400 audit(408.590:3612): avc: denied { create } for pid=6141 comm="syz.0.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 408.727031][ T28] audit: type=1400 audit(408.630:3613): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 409.210179][ T6144] FAULT_INJECTION: forcing a failure. [ 409.210179][ T6144] name failslab, interval 1, probability 0, space 0, times 0 [ 409.227372][ T6144] CPU: 0 UID: 0 PID: 6144 Comm: syz.0.1035 Tainted: G L syzkaller #0 PREEMPT [ 409.227525][ T6144] Tainted: [L]=SOFTLOCKUP [ 409.227547][ T6144] Hardware name: ARM-Versatile Express [ 409.227590][ T6144] Call trace: [ 409.227641][ T6144] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 409.227752][ T6144] r7:60000113 r6:60000113 r5:8231e214 r4:00000000 [ 409.227773][ T6144] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 409.227869][ T6144] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 409.227931][ T6144] r7:00000000 r6:00000000 r5:833e4b00 r4:82b18108 [ 409.227949][ T6144] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 409.228002][ T6144] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 409.228072][ T6144] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 409.228093][ T6144] [<80554020>] (should_failslab) from [<805322e0>] (__kmalloc_noprof+0xa4/0x39c) [ 409.228182][ T6144] [<8053223c>] (__kmalloc_noprof) from [<80815258>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 409.228261][ T6144] r10:00000000 r9:83848c00 r8:00000000 r7:837da908 r6:86100b28 r5:00001000 [ 409.228285][ T6144] r4:00000000 [ 409.228302][ T6144] [<8081521c>] (tomoyo_realpath_from_path) from [<80811320>] (tomoyo_path_number_perm+0xcc/0x22c) [ 409.228373][ T6144] r10:00000000 r9:00000003 r8:86100b00 r7:0000894c r6:81cda124 r5:00000004 [ 409.228397][ T6144] r4:86100b28 r3:828d1400 [ 409.228414][ T6144] [<80811254>] (tomoyo_path_number_perm) from [<80815c74>] (tomoyo_file_ioctl+0x1c/0x20) [ 409.228483][ T6144] r10:833e4b00 r9:00000003 r8:86100b00 r7:00000000 r6:00000000 r5:0000894c [ 409.228504][ T6144] r4:86100b00 [ 409.228521][ T6144] [<80815c58>] (tomoyo_file_ioctl) from [<807c156c>] (security_file_ioctl+0x80/0x1d4) [ 409.228587][ T6144] [<807c14ec>] (security_file_ioctl) from [<805a166c>] (sys_ioctl+0x4c/0xb5c) [ 409.228677][ T6144] r7:00000000 r6:0000894c r5:86100b01 r4:00000000 [ 409.228705][ T6144] [<805a1620>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 409.228812][ T6144] Exception stack(0xec68dfa8 to 0xec68dff0) [ 409.228861][ T6144] dfa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 409.228898][ T6144] dfc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76f480dc [ 409.228928][ T6144] dfe0: 76f47e88 76f47e78 00018ebc 00130810 [ 409.228967][ T6144] r10:00000036 r9:833e4b00 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 409.228987][ T6144] r4:00000000 [ 409.307521][ T6144] ERROR: Out of memory at tomoyo_realpath_from_path. [ 409.309427][ T28] audit: type=1400 audit(409.220:3614): avc: denied { read open } for pid=6143 comm="syz.0.1035" path="net:[4026532746]" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 409.677190][ T28] audit: type=1400 audit(409.580:3615): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 409.982424][ T28] audit: type=1400 audit(409.890:3616): avc: denied { read write } for pid=6145 comm="syz.0.1036" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 409.985296][ T28] audit: type=1400 audit(409.890:3617): avc: denied { mounton } for pid=6145 comm="syz.0.1036" path="/529/file0" dev="tmpfs" ino=2845 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 412.710403][ T6155] FAULT_INJECTION: forcing a failure. [ 412.710403][ T6155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.711618][ T6155] CPU: 1 UID: 0 PID: 6155 Comm: syz.1.1039 Tainted: G L syzkaller #0 PREEMPT [ 412.711729][ T6155] Tainted: [L]=SOFTLOCKUP [ 412.711747][ T6155] Hardware name: ARM-Versatile Express [ 412.711770][ T6155] Call trace: [ 412.711811][ T6155] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 412.711915][ T6155] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 412.711926][ T6155] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 412.711954][ T6155] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 412.711990][ T6155] r7:00000000 r6:00000000 r5:833e4b00 r4:82b4f188 [ 412.711998][ T6155] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 412.712025][ T6155] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 412.712052][ T6155] r8:ec7b5eb8 r7:00000000 r6:76faaf08 r5:00000001 r4:00000001 [ 412.712064][ T6155] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 412.712086][ T6155] [<809d7488>] (should_fail_usercopy) from [<80917cd8>] (kstrtouint_from_user+0x54/0x13c) [ 412.712112][ T6155] [<80917c84>] (kstrtouint_from_user) from [<8064d844>] (proc_fail_nth_write+0x40/0xf4) [ 412.712151][ T6155] r8:8064d804 r7:ec7b5f68 r6:76faaf08 r5:86100b00 r4:00000001 [ 412.712160][ T6155] [<8064d804>] (proc_fail_nth_write) from [<80586404>] (vfs_write+0xd4/0x450) [ 412.712191][ T6155] r5:86100b00 r4:00000001 [ 412.712199][ T6155] [<80586330>] (vfs_write) from [<805868f4>] (ksys_write+0x74/0xec) [ 412.712232][ T6155] r10:00000004 r9:833e4b00 r8:8020029c r7:00000000 r6:00000002 r5:86100b00 [ 412.712242][ T6155] r4:86100b03 [ 412.712249][ T6155] [<80586880>] (ksys_write) from [<8058697c>] (sys_write+0x10/0x14) [ 412.712279][ T6155] r7:00000004 r6:00000000 r5:00000000 r4:00000000 [ 412.712287][ T6155] [<8058696c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 412.712311][ T6155] Exception stack(0xec7b5fa8 to 0xec7b5ff0) [ 412.712330][ T6155] 5fa0: 00000000 00000000 00000003 76faaf08 00000001 00000000 [ 412.712347][ T6155] 5fc0: 00000000 00000000 00000000 00000004 003462d8 00000000 00000001 76fab0dc [ 412.712360][ T6155] 5fe0: 76faae58 76faae44 0010ba34 00112618 [ 413.702334][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 413.702709][ T28] audit: type=1400 audit(413.610:3628): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 413.947681][ T28] audit: type=1400 audit(413.850:3629): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 414.038547][ T28] audit: type=1400 audit(413.950:3630): avc: denied { create } for pid=6161 comm="syz.1.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 414.185360][ T28] audit: type=1400 audit(414.090:3631): avc: denied { create } for pid=6161 comm="syz.1.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 414.220863][ T28] audit: type=1400 audit(414.130:3632): avc: denied { create } for pid=6163 comm="syz.0.1043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 414.244348][ T28] audit: type=1400 audit(414.150:3633): avc: denied { read append } for pid=6161 comm="syz.1.1042" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 415.479348][ T28] audit: type=1400 audit(415.390:3634): avc: denied { create } for pid=6163 comm="syz.0.1043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 417.044850][ T28] audit: type=1400 audit(416.950:3635): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.215345][ T28] audit: type=1400 audit(417.120:3636): avc: denied { read write } for pid=6167 comm="syz.0.1044" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 417.234996][ T28] audit: type=1400 audit(417.140:3637): avc: denied { mounton } for pid=6167 comm="syz.0.1044" path="/532/file0" dev="tmpfs" ino=2864 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 418.858977][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 418.859180][ T28] audit: type=1400 audit(418.770:3644): avc: denied { module_request } for pid=6174 comm="syz.1.1047" kmod="fs-hpfs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 418.861944][ T28] audit: type=1400 audit(418.770:3645): avc: denied { create } for pid=6174 comm="syz.1.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 419.296982][ T28] audit: type=1400 audit(419.200:3646): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 419.657194][ T28] audit: type=1400 audit(419.560:3647): avc: denied { create } for pid=6176 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 419.792220][ T28] audit: type=1400 audit(419.700:3648): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 420.064655][ T6179] FAULT_INJECTION: forcing a failure. [ 420.064655][ T6179] name failslab, interval 1, probability 0, space 0, times 0 [ 420.066344][ T6179] CPU: 0 UID: 0 PID: 6179 Comm: syz.0.1049 Tainted: G L syzkaller #0 PREEMPT [ 420.066505][ T6179] Tainted: [L]=SOFTLOCKUP [ 420.066532][ T6179] Hardware name: ARM-Versatile Express [ 420.066559][ T6179] Call trace: [ 420.066646][ T6179] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 420.066762][ T6179] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 420.066783][ T6179] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 420.066842][ T6179] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 420.066910][ T6179] r7:00000dc0 r6:00000000 r5:833dcb00 r4:82b18108 [ 420.066929][ T6179] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 420.067027][ T6179] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 420.067140][ T6179] r8:00000044 r7:00000dc0 r6:00000000 r5:00000000 r4:83001300 [ 420.067162][ T6179] [<80554020>] (should_failslab) from [<8052db5c>] (__kmalloc_cache_noprof+0x54/0x2f4) [ 420.067221][ T6179] [<8052db08>] (__kmalloc_cache_noprof) from [<804b7dc8>] (shrinker_alloc+0x48/0x374) [ 420.067293][ T6179] r10:86228780 r9:80589528 r8:00000000 r7:86260c44 r6:82b3b120 r5:82525738 [ 420.067315][ T6179] r4:0000000c [ 420.067333][ T6179] [<804b7d80>] (shrinker_alloc) from [<8058aa14>] (alloc_super+0x1fc/0x394) [ 420.067403][ T6179] r3:86260e40 r2:8236ee44 r1:82340544 [ 420.067442][ T6179] r10:86228780 r9:80589528 r8:00000000 r7:86260c44 r6:82b3b120 r5:00000001 [ 420.067465][ T6179] r4:86260c00 [ 420.067483][ T6179] [<8058a818>] (alloc_super) from [<8058b7f0>] (sget_fc+0x54/0x350) [ 420.067551][ T6179] r9:80589528 r8:82a20900 r7:80744d3c r6:00000000 r5:86117100 r4:00000000 [ 420.067575][ T6179] [<8058b79c>] (sget_fc) from [<8058bdd0>] (get_tree_nodev+0x24/0x90) [ 420.067643][ T6179] r9:86117100 r8:86228781 r7:80744d3c r6:86117104 r5:86117100 r4:00000000 [ 420.067666][ T6179] [<8058bdac>] (get_tree_nodev) from [<80744758>] (ramfs_get_tree+0x18/0x1c) [ 420.067738][ T6179] r7:00000000 r6:86117104 r5:86117100 r4:00000000 [ 420.067758][ T6179] [<80744740>] (ramfs_get_tree) from [<80588d74>] (vfs_get_tree+0x2c/0x118) [ 420.067814][ T6179] [<80588d48>] (vfs_get_tree) from [<805dede8>] (vfs_cmd_create+0x54/0xb8) [ 420.067883][ T6179] r6:86117104 r5:86117100 r4:00000000 [ 420.067905][ T6179] [<805ded94>] (vfs_cmd_create) from [<805df554>] (sys_fsconfig+0x440/0x514) [ 420.067976][ T6179] r7:00000000 r6:86117104 r5:00000000 r4:00000006 [ 420.067996][ T6179] [<805df114>] (sys_fsconfig) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 420.068049][ T6179] Exception stack(0xec4d9fa8 to 0xec4d9ff0) [ 420.068094][ T6179] 9fa0: 00000000 00000000 00000003 00000006 00000000 00000000 [ 420.068161][ T6179] 9fc0: 00000000 00000000 0012f214 000001af 003462d8 00000000 00000001 76f480dc [ 420.068191][ T6179] 9fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 420.068231][ T6179] r10:000001af r9:833dcb00 r8:8020029c r7:000001af r6:0012f214 r5:00000000 [ 420.068255][ T6179] r4:00000000 [ 420.173302][ T28] audit: type=1400 audit(420.080:3649): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 420.460149][ T28] audit: type=1400 audit(420.370:3650): avc: denied { read } for pid=6180 comm="syz.0.1050" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.498581][ T28] audit: type=1400 audit(420.410:3651): avc: denied { write } for pid=6180 comm="syz.0.1050" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.741331][ T28] audit: type=1400 audit(420.650:3652): avc: denied { create } for pid=6176 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 420.800595][ T28] audit: type=1400 audit(420.710:3653): avc: denied { create } for pid=6180 comm="syz.0.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 422.758165][ T6190] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=6190 comm=syz.0.1054 [ 423.889521][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 423.889879][ T28] audit: type=1400 audit(423.800:3673): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 424.218929][ T28] audit: type=1400 audit(424.130:3674): avc: denied { read write } for pid=6194 comm="syz.0.1056" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 424.248947][ T28] audit: type=1400 audit(424.160:3675): avc: denied { read write } for pid=6194 comm="syz.0.1056" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 424.451969][ T28] audit: type=1400 audit(424.360:3676): avc: denied { create } for pid=6194 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 424.478330][ T28] audit: type=1400 audit(424.390:3677): avc: denied { create } for pid=6194 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 424.508344][ T28] audit: type=1400 audit(424.420:3678): avc: denied { create } for pid=6194 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 424.549964][ T28] audit: type=1400 audit(424.460:3679): avc: denied { read } for pid=6194 comm="syz.0.1056" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 424.683830][ T28] audit: type=1400 audit(424.590:3680): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 424.925685][ T28] audit: type=1400 audit(424.830:3681): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 425.218367][ T28] audit: type=1400 audit(425.130:3682): avc: denied { create } for pid=6198 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 425.908453][ T6203] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=6203 comm=syz.0.1059 [ 429.071461][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 429.071802][ T28] audit: type=1400 audit(428.980:3697): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 429.459685][ T6210] FAULT_INJECTION: forcing a failure. [ 429.459685][ T6210] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.460179][ T6210] CPU: 1 UID: 0 PID: 6210 Comm: syz.0.1062 Tainted: G L syzkaller #0 PREEMPT [ 429.460267][ T6210] Tainted: [L]=SOFTLOCKUP [ 429.460286][ T6210] Hardware name: ARM-Versatile Express [ 429.460310][ T6210] Call trace: [ 429.460356][ T6210] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 429.460464][ T6210] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 429.460483][ T6210] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 429.460536][ T6210] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 429.460691][ T6210] r7:00000000 r6:00000000 r5:833dbe80 r4:82b4f188 [ 429.460727][ T6210] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 429.460811][ T6210] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 429.460890][ T6210] r8:76f47f08 r7:00000000 r6:00000000 r5:ec8a5f68 r4:00000002 [ 429.460912][ T6210] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 429.460963][ T6210] [<809d7488>] (should_fail_usercopy) from [<805c5510>] (simple_read_from_buffer+0x80/0x140) [ 429.461013][ T6210] [<805c5490>] (simple_read_from_buffer) from [<8064c540>] (proc_fail_nth_read+0xb8/0x10c) [ 429.461082][ T6210] r10:8064c488 r9:00000001 r8:00000002 r7:ec8a5f68 r6:0000000f r5:76f47f08 [ 429.461106][ T6210] r4:833dbe80 r3:ec8a5e9f [ 429.461125][ T6210] [<8064c488>] (proc_fail_nth_read) from [<80585b60>] (vfs_read+0xc0/0x328) [ 429.461220][ T6210] r8:833dbe80 r7:ec8a5f68 r6:76f47f08 r5:86228300 r4:0000000f [ 429.461244][ T6210] [<80585aa0>] (vfs_read) from [<805867f4>] (ksys_read+0x74/0xec) [ 429.461319][ T6210] r10:00000003 r9:833dbe80 r8:8020029c r7:00000000 r6:00000000 r5:86228300 [ 429.461342][ T6210] r4:86228303 [ 429.461358][ T6210] [<80586780>] (ksys_read) from [<8058687c>] (sys_read+0x10/0x14) [ 429.461448][ T6210] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 429.461474][ T6210] [<8058686c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 429.461529][ T6210] Exception stack(0xec8a5fa8 to 0xec8a5ff0) [ 429.461585][ T6210] 5fa0: 00000000 00000000 00000005 76f47f08 0000000f 00000000 [ 429.461629][ T6210] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f480dc [ 429.461661][ T6210] 5fe0: 76f47e58 76f47e44 0010ba34 00112618 [ 429.622146][ T28] audit: type=1400 audit(429.530:3698): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 430.018414][ T28] audit: type=1400 audit(429.930:3699): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 430.041728][ T28] audit: type=1400 audit(429.950:3700): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.051525][ T28] audit: type=1400 audit(429.960:3701): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.087291][ T28] audit: type=1400 audit(429.980:3702): avc: denied { read write } for pid=6211 comm="syz.0.1063" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 430.227312][ T28] audit: type=1400 audit(430.130:3703): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.229067][ T28] audit: type=1400 audit(430.130:3704): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.230810][ T28] audit: type=1400 audit(430.130:3705): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 430.232427][ T28] audit: type=1400 audit(430.130:3706): avc: denied { create } for pid=6211 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 431.320309][ T6219] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=6219 comm=syz.0.1065 [ 434.085631][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 434.086007][ T28] audit: type=1400 audit(433.990:3786): avc: denied { create } for pid=6229 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 434.111520][ T28] audit: type=1400 audit(434.020:3787): avc: denied { create } for pid=6229 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 434.218212][ T28] audit: type=1400 audit(434.130:3788): avc: denied { create } for pid=6229 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 434.288513][ T28] audit: type=1400 audit(434.200:3789): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 434.369588][ T28] audit: type=1400 audit(434.280:3790): avc: denied { create } for pid=6229 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 434.415169][ T28] audit: type=1400 audit(434.320:3791): avc: denied { create } for pid=6229 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 434.429258][ T28] audit: type=1400 audit(434.340:3792): avc: denied { create } for pid=6231 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 434.437837][ T28] audit: type=1400 audit(434.350:3793): avc: denied { create } for pid=6231 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 434.443824][ T28] audit: type=1400 audit(434.350:3794): avc: denied { read } for pid=6231 comm="syz.0.1071" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 434.469330][ T28] audit: type=1400 audit(434.380:3795): avc: denied { create } for pid=6229 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=0 [ 434.698258][ T6232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6232 comm=syz.0.1071 [ 436.433676][ T6243] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=6243 comm=syz.0.1076 [ 436.989718][ T6245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6245 comm=syz.0.1077 [ 439.238389][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 439.238875][ T28] audit: type=1400 audit(439.150:3842): avc: denied { read write } for pid=6260 comm="syz.1.1085" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 439.313021][ T28] audit: type=1400 audit(439.220:3843): avc: denied { mounton } for pid=6260 comm="syz.1.1085" path="/526/file0" dev="tmpfs" ino=2828 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 439.375595][ T28] audit: type=1400 audit(439.280:3844): avc: denied { read write } for pid=6262 comm="syz.0.1086" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 439.509629][ T28] audit: type=1400 audit(439.420:3845): avc: denied { mounton } for pid=6262 comm="syz.0.1086" path="/558/file0" dev="tmpfs" ino=3000 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 439.620358][ T28] audit: type=1400 audit(439.530:3846): avc: denied { read write } for pid=6262 comm="syz.0.1086" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 439.624271][ T28] audit: type=1400 audit(439.530:3847): avc: denied { setattr } for pid=6262 comm="syz.0.1086" path="pipe:[11008]" dev="pipefs" ino=11008 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 439.907835][ T28] audit: type=1400 audit(439.810:3848): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 440.328991][ T28] audit: type=1400 audit(440.240:3849): avc: denied { create } for pid=6265 comm="syz.0.1087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 440.436483][ T28] audit: type=1400 audit(440.340:3850): avc: denied { write } for pid=6265 comm="syz.0.1087" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 440.876432][ T28] audit: type=1400 audit(440.780:3851): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 445.241002][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 445.242793][ T28] audit: type=1400 audit(445.150:3873): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 445.712029][ T28] audit: type=1400 audit(445.620:3874): avc: denied { create } for pid=6290 comm="syz.0.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 445.731505][ T28] audit: type=1400 audit(445.640:3875): avc: denied { read } for pid=6286 comm="syz.1.1097" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 445.752854][ T28] audit: type=1400 audit(445.660:3876): avc: denied { create } for pid=6290 comm="syz.0.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 446.219518][ T28] audit: type=1400 audit(446.130:3877): avc: denied { read } for pid=6290 comm="syz.0.1098" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 446.389786][ T28] audit: type=1400 audit(446.300:3878): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 446.822533][ T28] audit: type=1400 audit(446.730:3879): avc: denied { read } for pid=6294 comm="syz.0.1099" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 446.893114][ T28] audit: type=1400 audit(446.800:3880): avc: denied { create } for pid=6294 comm="syz.0.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 446.898162][ T28] audit: type=1400 audit(446.810:3881): avc: denied { create } for pid=6294 comm="syz.0.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 447.340222][ T28] audit: type=1400 audit(447.250:3882): avc: denied { create } for pid=6294 comm="syz.0.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 451.497227][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 451.497620][ T28] audit: type=1400 audit(451.400:3891): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 451.879346][ T28] audit: type=1400 audit(451.790:3892): avc: denied { read write } for pid=6303 comm="syz.0.1103" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 451.942190][ T28] audit: type=1400 audit(451.850:3893): avc: denied { setattr } for pid=6303 comm="syz.0.1103" path="pipe:[12157]" dev="pipefs" ino=12157 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 451.957196][ T28] audit: type=1400 audit(451.860:3894): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 452.318929][ T28] audit: type=1400 audit(452.230:3895): avc: denied { create } for pid=6305 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 452.447405][ T28] audit: type=1400 audit(452.340:3896): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 452.715147][ T28] audit: type=1400 audit(452.620:3897): avc: denied { create } for pid=6307 comm="syz.0.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 452.788413][ T28] audit: type=1400 audit(452.700:3898): avc: denied { create } for pid=6307 comm="syz.0.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 452.814513][ T28] audit: type=1400 audit(452.720:3899): avc: denied { read } for pid=6307 comm="syz.0.1105" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 453.167406][ T28] audit: type=1400 audit(453.070:3900): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 456.651913][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 456.652369][ T28] audit: type=1400 audit(456.560:3907): avc: denied { read write } for pid=6317 comm="syz.0.1109" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 456.717798][ T28] audit: type=1400 audit(456.630:3908): avc: denied { create } for pid=6317 comm="syz.0.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 456.858772][ T28] audit: type=1400 audit(456.770:3909): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 456.953392][ T28] audit: type=1400 audit(456.860:3910): avc: denied { prog_load } for pid=6316 comm="syz.1.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 457.105056][ T28] audit: type=1400 audit(457.010:3911): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 457.572819][ T28] audit: type=1400 audit(457.480:3912): avc: denied { read write } for pid=6322 comm="syz.0.1112" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 457.591787][ T28] audit: type=1400 audit(457.500:3913): avc: denied { read } for pid=6316 comm="syz.1.1110" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 457.601729][ T28] audit: type=1400 audit(457.510:3914): avc: denied { create } for pid=6316 comm="syz.1.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 457.727172][ T28] audit: type=1400 audit(457.630:3915): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 457.746157][ T28] audit: type=1400 audit(457.650:3916): avc: denied { read write } for pid=6316 comm="syz.1.1110" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 461.110160][ T6340] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=52984 sclass=netlink_tcpdiag_socket pid=6340 comm=syz.1.1120 [ 461.722953][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 461.723406][ T28] audit: type=1400 audit(461.630:3938): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 461.778832][ T28] audit: type=1400 audit(461.690:3939): avc: denied { create } for pid=6343 comm="syz.1.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 461.838937][ T28] audit: type=1400 audit(461.750:3940): avc: denied { write } for pid=6343 comm="syz.1.1122" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 462.048930][ T28] audit: type=1400 audit(461.960:3941): avc: denied { create } for pid=6345 comm="syz.0.1123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 462.055179][ T28] audit: type=1400 audit(461.960:3942): avc: denied { read write } for pid=6343 comm="syz.1.1122" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 462.069717][ T28] audit: type=1400 audit(461.980:3943): avc: denied { read write } for pid=6345 comm="syz.0.1123" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 462.081578][ T28] audit: type=1400 audit(461.990:3944): avc: denied { mounton } for pid=6343 comm="syz.1.1122" path="/541/file0" dev="tmpfs" ino=2907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 462.329623][ T28] audit: type=1400 audit(462.240:3945): avc: denied { read write } for pid=6345 comm="syz.0.1123" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 462.412985][ T28] audit: type=1400 audit(462.310:3946): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 462.431226][ T28] audit: type=1400 audit(462.340:3947): avc: denied { mounton } for pid=6345 comm="syz.0.1123" path="/580/file0" dev="tmpfs" ino=3117 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 466.790163][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 466.790373][ T28] audit: type=1400 audit(466.700:3956): avc: denied { create } for pid=6354 comm="syz.1.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 466.804655][ T28] audit: type=1400 audit(466.710:3957): avc: denied { read } for pid=6354 comm="syz.1.1127" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 467.431179][ T28] audit: type=1400 audit(467.340:3958): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 467.816308][ T28] audit: type=1400 audit(467.720:3959): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 468.366534][ T28] audit: type=1400 audit(468.270:3960): avc: denied { create } for pid=6357 comm="syz.1.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 468.370289][ T28] audit: type=1400 audit(468.280:3961): avc: denied { write } for pid=6357 comm="syz.1.1128" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 468.381721][ T28] audit: type=1400 audit(468.290:3962): avc: denied { read } for pid=6359 comm="syz.0.1129" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 468.452393][ T28] audit: type=1400 audit(468.360:3963): avc: denied { create } for pid=6359 comm="syz.0.1129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 468.529954][ T28] audit: type=1400 audit(468.420:3964): avc: denied { read write } for pid=6359 comm="syz.0.1129" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 468.726333][ T28] audit: type=1400 audit(468.630:3965): avc: denied { read write } for pid=6357 comm="syz.1.1128" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 468.916594][ T6362] FAULT_INJECTION: forcing a failure. [ 468.916594][ T6362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 468.928834][ T6362] CPU: 1 UID: 0 PID: 6362 Comm: syz.0.1130 Tainted: G L syzkaller #0 PREEMPT [ 468.928947][ T6362] Tainted: [L]=SOFTLOCKUP [ 468.928969][ T6362] Hardware name: ARM-Versatile Express [ 468.928994][ T6362] Call trace: [ 468.929038][ T6362] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 468.929154][ T6362] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 468.929176][ T6362] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 468.929235][ T6362] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 468.929297][ T6362] r7:df995e6c r6:00000000 r5:8561a580 r4:82b4f188 [ 468.929312][ T6362] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 468.929369][ T6362] [<809d724c>] (should_fail_ex) from [<809d7484>] (should_fail+0x14/0x18) [ 468.929428][ T6362] r8:df995ebc r7:df995e6c r6:200022c0 r5:df995e5c r4:00000008 [ 468.929445][ T6362] [<809d7470>] (should_fail) from [<809d74a4>] (should_fail_usercopy+0x1c/0x20) [ 468.929491][ T6362] [<809d7488>] (should_fail_usercopy) from [<815ee158>] (copy_from_sockptr_offset.constprop.0+0x50/0xd0) [ 468.929560][ T6362] [<815ee108>] (copy_from_sockptr_offset.constprop.0) from [<815f4500>] (sk_setsockopt+0xcd0/0x11d0) [ 468.929621][ T6362] r7:df995e6c r6:0000000d r5:85b2e3c0 r4:00000000 [ 468.929639][ T6362] [<815f3834>] (sk_setsockopt) from [<815f4a28>] (sock_setsockopt+0x28/0x30) [ 468.929708][ T6362] r10:00000126 r9:8561a580 r8:00000008 r7:837e2040 r6:0000000d r5:85b2e3c0 [ 468.929732][ T6362] r4:00000008 [ 468.929787][ T6362] [<815f4a04>] (sock_setsockopt) from [<818d87b4>] (unix_setsockopt+0x54/0x164) [ 468.929851][ T6362] [<818d8764>] (unix_setsockopt) from [<815e8d00>] (do_sock_setsockopt+0x70/0xc8) [ 468.929919][ T6362] r7:837e2040 r6:0000000d r5:00000001 r4:818d8760 [ 468.929939][ T6362] [<815e8c90>] (do_sock_setsockopt) from [<815ecbb4>] (__sys_setsockopt+0x7c/0xc4) [ 468.930006][ T6362] r8:00000000 r7:86100a00 r6:86100a01 r5:0000000d r4:00000001 [ 468.930028][ T6362] [<815ecb38>] (__sys_setsockopt) from [<815ecc18>] (sys_setsockopt+0x1c/0x24) [ 468.930085][ T6362] r8:8020029c r7:00000126 r6:0012f214 r5:00000000 r4:00000008 [ 468.930103][ T6362] [<815ecbfc>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 468.930145][ T6362] Exception stack(0xdf995fa8 to 0xdf995ff0) [ 468.930184][ T6362] 5fa0: 00000008 00000000 00000003 00000001 0000000d 200022c0 [ 468.930219][ T6362] 5fc0: 00000008 00000000 0012f214 00000126 003462d8 00000000 00000001 76f480dc [ 468.930248][ T6362] 5fe0: 76f47e88 76f47e78 00018ebc 00130810 [ 470.515850][ T6366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6366 comm=syz.0.1132 [ 471.608904][ T6370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=6370 comm=syz.0.1133 [ 471.909456][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 471.909835][ T28] audit: type=1400 audit(471.820:3979): avc: denied { read write } for pid=6371 comm="syz.1.1135" name="fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 472.367492][ T28] audit: type=1400 audit(472.270:3980): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 472.924216][ T28] audit: type=1400 audit(472.830:3981): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 473.547577][ T28] audit: type=1400 audit(473.450:3982): avc: denied { create } for pid=6376 comm="syz.1.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 473.613669][ T28] audit: type=1400 audit(473.470:3983): avc: denied { create } for pid=6378 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 473.872506][ T28] audit: type=1400 audit(473.780:3984): avc: denied { nlmsg_write } for pid=6378 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 473.908095][ T28] audit: type=1400 audit(473.820:3985): avc: denied { create } for pid=6378 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 473.970286][ T28] audit: type=1400 audit(473.870:3986): avc: denied { create } for pid=6376 comm="syz.1.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 474.114421][ T28] audit: type=1400 audit(474.020:3987): avc: denied { read } for pid=6376 comm="syz.1.1137" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 474.148026][ T6377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6377 comm=syz.1.1137 [ 474.398346][ T28] audit: type=1400 audit(474.310:3988): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 474.664214][ T6381] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=6381 comm=syz.1.1140 [ 474.891613][ T6387] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=52984 sclass=netlink_tcpdiag_socket pid=6387 comm=syz.1.1143 [ 475.517786][ T6391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6391 comm=syz.1.1144 [ 476.712102][ T6399] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=52984 sclass=netlink_tcpdiag_socket pid=6399 comm=syz.0.1148 [ 476.959506][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 476.959731][ T28] audit: type=1400 audit(476.870:4008): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 477.123173][ T28] audit: type=1400 audit(477.030:4009): avc: denied { create } for pid=6400 comm="syz.1.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 477.187258][ T28] audit: type=1400 audit(477.090:4010): avc: denied { create } for pid=6400 comm="syz.1.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 477.200908][ T6403] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=6403 comm=syz.0.1149 [ 477.249058][ T28] audit: type=1400 audit(477.160:4011): avc: denied { read } for pid=6400 comm="syz.1.1150" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 477.265698][ T6402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6402 comm=syz.1.1150 [ 477.322301][ T28] audit: type=1400 audit(477.230:4012): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 477.370657][ T28] audit: type=1400 audit(477.280:4013): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 477.651022][ T28] audit: type=1400 audit(477.560:4014): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 477.758975][ T28] audit: type=1400 audit(477.670:4015): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 477.822591][ T28] audit: type=1400 audit(477.730:4016): avc: denied { read write } for pid=6408 comm="syz.1.1154" name="uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 478.074803][ T6411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=248 sclass=netlink_tcpdiag_socket pid=6411 comm=syz.0.1153 [ 478.154520][ T28] audit: type=1400 audit(478.060:4017): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 481.478155][ T6422] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6422 comm=syz.1.1157 [ 481.840779][ T6424] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6424 comm=syz.0.1159 [ 481.987641][ T6426] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=6426 comm=syz.1.1160 [ 482.078455][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 482.079123][ T28] audit: type=1400 audit(481.990:4029): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.110211][ T28] audit: type=1400 audit(482.020:4030): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.408905][ T28] audit: type=1400 audit(482.320:4031): avc: denied { create } for pid=6428 comm="syz.0.1161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 482.469573][ T28] audit: type=1400 audit(482.380:4032): avc: denied { create } for pid=6428 comm="syz.0.1161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 482.480040][ T6429] FAULT_INJECTION: forcing a failure. [ 482.480040][ T6429] name failslab, interval 1, probability 0, space 0, times 0 [ 482.480647][ T6429] CPU: 1 UID: 0 PID: 6429 Comm: syz.1.1162 Tainted: G L syzkaller #0 PREEMPT [ 482.480754][ T6429] Tainted: [L]=SOFTLOCKUP [ 482.480775][ T6429] Hardware name: ARM-Versatile Express [ 482.480799][ T6429] Call trace: [ 482.480841][ T6429] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 482.481051][ T6429] r7:60000013 r6:60000013 r5:8231e214 r4:00000000 [ 482.481092][ T6429] [<80201af0>] (show_stack) from [<8021e35c>] (dump_stack_lvl+0x5c/0x70) [ 482.481171][ T6429] [<8021e300>] (dump_stack_lvl) from [<8021e388>] (dump_stack+0x18/0x1c) [ 482.481259][ T6429] r7:00000000 r6:00000000 r5:833e7080 r4:82b18108 [ 482.481280][ T6429] [<8021e370>] (dump_stack) from [<809d740c>] (should_fail_ex+0x1c0/0x224) [ 482.481361][ T6429] [<809d724c>] (should_fail_ex) from [<8055408c>] (should_failslab+0x6c/0x94) [ 482.481450][ T6429] r8:00000cc0 r7:00000000 r6:00000cc0 r5:00000000 r4:830e4c00 [ 482.481488][ T6429] [<80554020>] (should_failslab) from [<80531b10>] (kmem_cache_alloc_node_noprof+0x58/0x3c8) [ 482.481579][ T6429] [<80531ab8>] (kmem_cache_alloc_node_noprof) from [<815fb7e8>] (__alloc_skb+0x74/0x2c0) [ 482.481663][ T6429] r10:00000000 r9:815fb998 r8:00000cc0 r7:00000000 r6:830e4c00 r5:ffffffff [ 482.481684][ T6429] r4:ddde4708 [ 482.481701][ T6429] [<815fb774>] (__alloc_skb) from [<817229b0>] (netlink_alloc_large_skb+0x8c/0xa8) [ 482.481793][ T6429] r9:00000000 r8:00000000 r7:86260000 r6:00000014 r5:837a1bc0 r4:00000140 [ 482.481887][ T6429] [<81722924>] (netlink_alloc_large_skb) from [<8172316c>] (netlink_sendmsg+0x130/0x444) [ 482.481963][ T6429] r5:837a1bc0 r4:e0195f20 [ 482.481984][ T6429] [<8172303c>] (netlink_sendmsg) from [<815e9a50>] (__sock_sendmsg+0x44/0x78) [ 482.482084][ T6429] r10:240008c0 r9:00000000 r8:e0195dcc r7:00000000 r6:837a1bc0 r5:e0195f20 [ 482.482197][ T6429] r4:00000000 [ 482.482234][ T6429] [<815e9a0c>] (__sock_sendmsg) from [<815eaa80>] (____sys_sendmsg+0x238/0x2c4) [ 482.482336][ T6429] r7:00000000 r6:00000000 r5:837a1bc0 r4:e0195f20 [ 482.482360][ T6429] [<815ea848>] (____sys_sendmsg) from [<815eae80>] (___sys_sendmsg+0x9c/0xd0) [ 482.482513][ T6429] r10:00000128 r9:20000080 r8:240008c0 r7:00000000 r6:837a1bc0 r5:e0195f20 [ 482.482589][ T6429] r4:00000000 [ 482.482631][ T6429] [<815eade4>] (___sys_sendmsg) from [<815ecfd0>] (__sys_sendmsg+0x8c/0xe0) [ 482.482708][ T6429] r9:833e7080 r8:86116000 r7:240008c0 r6:20000080 r5:86116001 r4:00000003 [ 482.482761][ T6429] [<815ecf44>] (__sys_sendmsg) from [<815ed038>] (sys_sendmsg+0x14/0x18) [ 482.482881][ T6429] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 482.482919][ T6429] [<815ed024>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 482.483007][ T6429] Exception stack(0xe0195fa8 to 0xe0195ff0) [ 482.483085][ T6429] 5fa0: 00000000 00000000 00000003 20000080 240008c0 00000000 [ 482.483127][ T6429] 5fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76fab0dc [ 482.483193][ T6429] 5fe0: 76faae88 76faae78 00018ebc 00130810 [ 482.664470][ T28] audit: type=1400 audit(482.570:4033): avc: denied { read write } for pid=3107 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.894059][ T28] audit: type=1400 audit(482.800:4035): avc: denied { execute } for pid=6432 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=0 [ 482.921183][ T28] audit: type=1400 audit(482.830:4036): avc: denied { write } for pid=3101 comm="syz-executor" path="pipe:[1683]" dev="pipefs" ino=1683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 482.929472][ T28] audit: type=1400 audit(482.830:4037): avc: denied { write } for pid=3101 comm="syz-executor" path="pipe:[1683]" dev="pipefs" ino=1683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 482.943033][ T28] audit: type=1400 audit(482.790:4034): avc: denied { read } for pid=6431 comm="syz.1.1163" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 483.229358][ T6151] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.346550][ T6151] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.412632][ T6151] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.472385][ T6151] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.653522][ T6151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 483.671834][ T6151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 483.679428][ T6151] bond0 (unregistering): Released all slaves [ 483.748371][ T6151] hsr_slave_0: left promiscuous mode [ 483.751259][ T6151] hsr_slave_1: left promiscuous mode [ 483.761506][ T6151] veth1_macvtap: left promiscuous mode [ 483.762589][ T6151] veth0_macvtap: left promiscuous mode [ 483.762859][ T6151] veth1_vlan: left promiscuous mode [ 483.763100][ T6151] veth0_vlan: left promiscuous mode [ 484.302538][ T28] audit: type=1400 audit(484.210:4038): avc: denied { write } for pid=6453 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 484.441746][ T6151] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.506004][ T6151] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.586538][ T6151] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.653174][ T6151] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.940883][ T6151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 484.957676][ T6151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 484.963773][ T6151] bond0 (unregistering): Released all slaves [ 485.023791][ T6151] hsr_slave_0: left promiscuous mode [ 485.029590][ T6151] hsr_slave_1: left promiscuous mode [ 485.039447][ T6151] veth1_macvtap: left promiscuous mode [ 485.041065][ T6151] veth0_macvtap: left promiscuous mode [ 485.044199][ T6151] veth1_vlan: left promiscuous mode [ 485.045223][ T6151] veth0_vlan: left promiscuous mode [ 485.412628][ T2962] 8021q: adding VLAN 0 to HW filter on device eth1 [ 486.169643][ T2962] 8021q: adding VLAN 0 to HW filter on device eth2 [ 487.021073][ T2962] 8021q: adding VLAN 0 to HW filter on device eth3 [ 487.285611][ T28] kauditd_printk_skb: 114 callbacks suppressed [ 487.285900][ T28] audit: type=1400 audit(487.190:4153): avc: denied { write } for pid=6489 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 487.388240][ T28] audit: type=1400 audit(487.300:4154): avc: denied { write } for pid=6490 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 487.396081][ T28] audit: type=1400 audit(487.300:4155): avc: denied { search } for pid=6490 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.412993][ T28] audit: type=1400 audit(487.320:4156): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.416037][ T28] audit: type=1400 audit(487.320:4157): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.419583][ T28] audit: type=1400 audit(487.330:4158): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.422944][ T28] audit: type=1400 audit(487.330:4159): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.424585][ T28] audit: type=1400 audit(487.330:4160): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.428419][ T28] audit: type=1400 audit(487.340:4161): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.430187][ T28] audit: type=1400 audit(487.340:4162): avc: denied { search } for pid=6491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 487.815845][ T2962] 8021q: adding VLAN 0 to HW filter on device eth4 [ 488.680749][ T2962] 8021q: adding VLAN 0 to HW filter on device eth5 [ 489.581120][ T2962] 8021q: adding VLAN 0 to HW filter on device eth6 [ 490.481668][ T2962] 8021q: adding VLAN 0 to HW filter on device eth7 [ 491.404488][ T2962] 8021q: adding VLAN 0 to HW filter on device eth8 [ 492.407752][ T28] kauditd_printk_skb: 225 callbacks suppressed [ 492.408047][ T28] audit: type=1400 audit(492.310:4388): avc: denied { write } for pid=6533 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 492.569769][ T28] audit: type=1400 audit(492.480:4389): avc: denied { write } for pid=6534 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 492.676070][ T28] audit: type=1400 audit(492.580:4390): avc: denied { write } for pid=6535 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 502.682679][ T28] audit: type=1400 audit(502.590:4391): avc: denied { write } for pid=6552 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 502.695230][ T28] audit: type=1400 audit(502.600:4392): avc: denied { search } for pid=6552 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.717315][ T28] audit: type=1400 audit(502.620:4393): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.721327][ T28] audit: type=1400 audit(502.630:4394): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.725001][ T28] audit: type=1400 audit(502.630:4395): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.725438][ T28] audit: type=1400 audit(502.630:4396): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.725655][ T28] audit: type=1400 audit(502.630:4397): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.725861][ T28] audit: type=1400 audit(502.630:4398): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.726064][ T28] audit: type=1400 audit(502.630:4399): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 502.726270][ T28] audit: type=1400 audit(502.630:4400): avc: denied { search } for pid=6553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 507.725826][ T28] kauditd_printk_skb: 380 callbacks suppressed [ 507.726325][ T28] audit: type=1400 audit(507.630:4781): avc: denied { search } for pid=6606 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 507.800836][ T28] audit: type=1400 audit(507.710:4782): avc: denied { search } for pid=6601 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0