last executing test programs: 3.037831042s ago: executing program 1 (id=268): mkdir(&(0x7f00000013c0)='./file1\x00', 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', &(0x7f00000001c0)={0x44080}, 0x18) r1 = openat$cuse(0xffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000016c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, r2}, 0x10) mknodat$loop(r0, &(0x7f0000001680)='./file1\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) 2.623512394s ago: executing program 0 (id=269): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, 0x0) 2.622900324s ago: executing program 1 (id=270): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDRT(r0, 0x894c, 0x0) (fail_nth: 5) 2.07393217s ago: executing program 1 (id=271): syz_usb_connect$cdc_ncm(0x0, 0xffffffffffffff8a, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x1000, 0x0, 0x0, 0x0, 0x0, "0000000000000000000080ffffffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c, 0x1800) r3 = creat(&(0x7f0000000240)='./file1\x00', 0xd) write$P9_RUNLINKAT(r3, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="030200000000000001020000c91000000000dd5400"/32], 0x20) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TCSETAF(r1, 0x5408, 0x0) 1.881586165s ago: executing program 0 (id=272): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10042, 0x0) read$hidraw(r0, 0x0, 0x0) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$getown(r1, 0x9) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f00000001c0)={0x1d, r3, 0x3}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='./file0/file0\x00') syz_fuse_handle_req(r4, &(0x7f00000041c0)="7ed2c42ad1b04ce3792cda19c56ce9c81ae16fb01de77f95f775f064b2d612b46878f0f4a0a6f2849f980da1b22329cba96651402f92b1a1e6a59690f7d3c2b83f46342ce56b30111f6dfd123712c00727f907272fce27d40232206a8a7e8fcc150d5a765bac8a3782c384442eaf7db71af25f723953337cf47202b7f3024c9806c0e34f946fbe2bfc8704eebd86cb87c064db095bc2992179479f918597c51ec08d10ddc4297e5b2393283743ae791551e1b69baec8ff6eb755ac3651f92ab58fcd167b7572856cda043426b0fc8900e72cbe576d3888cc8e8c60b97c72fb16860da7fd00bd9fdf528cf0feaf4b51d8234c9a6d629c66b9ea5cf119c2b84f819d3d1a8cf75b9983e5e8fcc9dfe0d68ad096b651d07eaa7ab1a7aae8fc5731c0b24949a8387809114b4001656bf23ee28e639c5adcc443cf2b596030964214c56ffd72725893cfa5ddf147110bd0d5faccf7458dc39569439a2a0cdb82854883999424c5b100acf18d8b473efdc9601165ef1de86b3aa4803e9c9b9a5b7626b3cffe385fbfd19980423e93ebb380ae39aecc96cd32082fd30aeda93f84e216708c76af3a75818ea3d0ef0df84a9ec975e71bdc891f73e71fad39230a72f9f9ab536e935b7e512ecc2d8a3856758eb14133334a1cc9b2656e352855ecdf29ce6598e5365c22beb2000004a740354ce862ccf59e33a2d0f2a3b8ee3679610bc0546ac9f7e9d1a73bfbc27907165f4cbdce5e89ac865c5d249b68a1747c992eb2aecc3abdec090b8803f647788987a1e049b458bff0931e4d438de03a775407096b7a4a8c9f4bd2101beab30240ee86f8e67d210bc3bb1b5cd82892c7853bf1b453cc9021163e0f79e26f7544d2476b4d6264094441ad3195a4667ef0fa150f7dc88956e4bd8f5ebe44194c3e4dbe8442d01a213e68f171737f25d9cf8abe7539ed80e3f87c3863194f4107ffe05244e93d69949edf089d5691d5f15a9777d96bdf8241923736aaaa69e3317e51b9f0b1149eb2e1ccaeb2cd233e30422b58c227b8021782de8c88dd62f53a171372abb08ec973ef911ebbe02b48a0952cd8fb6ba9efddd3625c202b1636e1257927da2111352164a6b1d115f2516faf580f89024c9c740421f9e2caffa09dc82478232e9adb8b922b2491d7168f5600f5fc83b766565c56bfad32fe9fd07edfeac3a6df2db815b7ef3bb18bfb78dbccc5f83e08952397ad031e549f41c1255ca666117c85ea82e2f294e88a2b8a1a5d4029792b00acaeb17cbab642e1e467e45bec53f20c2c26b0c082d32de99e797cd490d24ab2ce8c9397fcc01750716deada5b937005e5c570bc12a1a6b37a4ee281669ac783d18d5950dfb58ee31c1c305761d7ead0cea02afd72db2ae9067eccdac7e0a48112d612a19d47321062d11bf5ab06fcd68499e5b5e6bc5ce84f9e799bf5881b3d0479ae6513ad5eb11a5598dfcba17053c4cb67f3d54340d9505aeb987321857480c87ce3f7e09d437c89c525e7c1cb367fe791ced45e500028f589a74d4688c78011e7b4ead692d81a37973642e5e6845bf48ff98f9fd5b78e06f740f583fa49f6affe889776ad4e7480f12b12b60c661fcf1e0a6143ef08e335a1f5d519c048c0a86eebfe1dec807203a3e5e10ac2e0586b9e459b08f9d0c21fde3962f6bf6d56b8c5fc9292ee189da1ba6b5a88b8c7d3d94f4fb3589940e238f226cb0fe73c9606dcafcb8c841529be202aedb4fd2c8c16cf06817559f5620c174567de9f7427b25eba5c301f433644cc8a5e0ab0bea2513f031310c757e9315bd96be4f47db97d151d18000b9df04e7fcbe0dfc684d1a259b702693e34a274ed0fb93781f39456039d9d80ad240acfaba4892535242761942b95c503db73beb41de80f79ce4d02c51d57b2c0463a3f09fc53fed5523b70a30670ca02da78b0647031ae8ed5612f56eb1abbb50c98b4801f1b17942f6b5a56af59ad68febd24d901b51403a9db23f017ec2b428fa5ab591a1904b49bd452d3937dd6347cd773f9a0699970193daf2b4c7899a8c94ea109a1df422477820da801ae1d8e67f36966b3a9631edc5f81dd6ea3529a5a653edf59374895d1be79f9719856b70f2f86fe4aa419b4a9db3e928abcc4573e5c4668049959ebcb9bd773e08d8a1abdbcb2195c5da9bc7e4a36e83bc42a6139c4d40bb66ddbead9432a3927bfbeb485ecd3d0e666a86398122bf2386c914d5b51d2cc4ee6a3085094bf547678c76ab4a3d7a973852da647fb39023272c7d665ad8eb46024e5e5fe6732b7acd9b39a0fe5b4dbff846e3bd9cbe9d5b6b3ce7b1d3011902f12a20153a1c8222c2f5a940667834cf440a08b14f8e73e4e8ff7f0e588824ac0c2804a83906cf2c5763d2c6a852f53a761a1cb34acbb07bd6a0fae4fb36fa93b854f1dcc0ecca8bbeb4e5036d045e2ff24d98c1a2780963f775c6c02e7e5947869b5c93dab7e8b3eb2935b7d8f0734b472f89155792d65f78e84d72912d36ce05466fa0d1579832e92b6941a5e3b7fcbfa58c6418461d406737ca2b75e771d73e516718f589a859c935d6b4372b7fad7c6541781e01fd905b343d4dd430cfdbd9a63d4f0aee13174aec686af676818332d86182f02f279b1a6980ba0f86f62087d35eb48983a3d16433a1fc09609681f4418629f7b7c50d0ade5518a5d657fbbdf4bf30c7c24a1d81ff2031d921d214966939595aaa566bfaddd7f9fd51228d51976c5b3758d12d31393d263a43ca033cf3b4e9885568a4977368467aa8f2ba6a536f307a550c277886cea27ff17dfdbe914257ffb65b8c276a15be8ea5165fd16b909f7757e30f0ece05a2927c0e7498d6d5ea5619c96786af5230029e9214db8269365a84dc0e2cec200ae9c0b74d579c48037bc40c5fcc73b80e3bc67dd5e0d1ed0484f2c62822401e39621c52ac6d603f2d111350928ee2eb8d0825110321f5c26d6fada90725c6b5204644256a1d74f0daf2e416bee390605e3f6d06cb18c1852b30776d2073bc156c85311ccbfb139b4367f81750140a474e494a1c0d5fa2ff2a6c9b5a40f8f616b3d5e2e4be56442e305376f5d0e6a6c4d54f05e6c08ed6ee32955ff1bdf87189122767e85ad03bfbec0ec78bf859beaf880f2589cc418b53ab5cb3d0264fc11456a1b868fb014e010bff07a07754603891a399047f17dea68c6481d91e71d0aa8c26b3745a69ea2cd02deb3ccc0e7ddc6e3ac7180a9cad8f0ef1253610cb6965fa9307c9082ee845b4021af0a2af27d12b41e4647f92497918e0365fbb14a177150299e6702389939f8c9e66cdade9004ca7bb53e947ca0409d4f9d74bcbc49ac48d7b706832ab0b19f045fd21ff6339565d8d022ab08d15c2229b26ffea5ce20631e759c66095359d614db7c4683de79b53f7185b1d523c90cd1041d095face8e69c8f79862a12b0d2c5a3bb5853643faf495bece649383391e769e40cd4f11cb5bc0891998e059ee61cceb0c27792b88a92d88603e3ee0857fa2a8e03c0bbaa8f895a78e1dc7b54b5321b0db04a4e9ca3cf9a426efb08ed8de49253276849211b385ad9ae841380136caedd3fc49daa7dd4930d5e1c6355438ff086e054ba406a1f4ca450e5197076459c9dd9433bfe0a385b2236b9e28b0091e3269297dca512cbfd21300e49178cf3bc287153a5005ca28e9c7dbb4291ae76fad759ba39ba2b8a63ffcc01db45a13ae616deb1df4ad532f905beaabe165aedc442a0e2f7e232714ca59b7089081963efaf363925b1ddcbfcd4aa85da9ba903765ea04766749a7a69375cb5c7f4da42db2d0c38187c6b37adc198e350e8abac561517c3a668a3f1a0fdc33557e862d252581d13dad4128628b91eb1e1b9a55ceed5ec83ce5b0c9c5f98383c972587d9702bcfa7349f3f3049307210cf211e6bd62b9d11b58bfad21b80a6b1de0d25fc42a0bd94b69d127aa563c61d673dd512878e655756bf20fb5a41101edb2342bc4f7522ca4c3a33c3bc10bd061fce3bb4480199ea88a51990c70b3716c9a17c7b98596d9621f7dea213ef9f1b77105faa85a4467cfb676c94e7343a2089446f6243bbbf36811c669d0b0ccaa4f2ca57f59cf2cc7511887a51c37bf44306ff3709f7ef341df4ab0078b846ca3301170c7f5ea1f94eab76da7b32fe0d44bed365906f513d314b30f050b9fdb4fdf6654378b697e956e46054223d30ec4994f0ec0a7e750c4a580c4174134c0695927a12144151fdeb343df388228fc3710bb7cd80d93458cafd839a7d21116e5b06a4f68bf67a8b7b8f1a3ccea9d05a85c1a2e6c1272f7f015164d556be02cadee46ff48ee04e75aeb06b5a1a0c3ef1ccbb4d59a4c34a05f810e052f9825d24ff27321e6c4b5235dd74dbc48d3c9eed385ad50157c2f84be8872c75b4d236063f0356860ecebfc1b6b83d30397bc174b29b8a7c0d88c468e326783c00a146509e75ccd460e9230f7977ec3cb2425bf2e314680ff492753607731bc1d674f935d6ce06901a308a8711c20677fe9ae855144a8e0bc9a7d0f49f4f08186817b0b94fd56d496067c80b76eb77bb534f85ff8f4397a02a8e9448c9a1b9924d27fcdbab5feeddb14d1f57032d8a7d8e1aafbc8f9eacdd01c4788a239c1108ef5ccc159e0db4ba44de7a7cbf3f97fe03b57ec6364fe0e7d2b903b2a3f8fb52e99042b3ab6d6c4e3dd73ef2256af4567554823821c7464247e6fe624f83c2f282d42aefd38560aa4879afcdd4531c7cb192bb9abc24af0b8f981af96a7db30c0ebdaeaebc5a7841d7825f0a017382fe903478e7e54d2953c8ae8c537754cab7d59c42dedcef719c049bed1cbea347749741b2652cc1b88923d50bee5cb4aaaff9c2ff6111b2501c58f62c60bead8cac89e1ab10ff784b8228739d20a808a1a88aed3904cc25a938906ded4cf007bb9c009c52d0439444d08d1b26ff8c935115c6601a29f15a9b8d3c1c5b0959521c0a55c91b40e1aa96f8d5a1813c4baf2d0335d5e5e2bea7aa2b3ba2bdc7369a768c3bed6a11d47173442a961babc8f02fe7b701697cbc9c93599d69a25a96044c1d901a7c8b489b5a77cdb2e3894b31ab6969c25b17ca9bd95b8399e4e9968c764a1512989cfb8a53e1837cd27acb58ed999ec20016a0601b3a020924968984b982b6de1734705e413a680702605b6648d9bc93ff57cc5541b73317233b04e3aee4c3138e0f9a2a49155f4ea1e62d9ff541f7f566b18c5ee024d4750be962377937ec97b038bce7b3a7de504214e7eb22407fc0e8eb1455fe5951e83553d8e538db244b62ec9f56a1b7c155d5d1736944bb3e46edf0461068a4b9b02ba07679d003572252fd3d596a9020b153637c7513f27f4efef20ee83ab0285f2892ff52262b9d1e2bf92c4cb273d20b975d163eb2dfa4eba7b9e642bbd3acf3a192963fab83373d00f9bf543cbde732b16bfb4f9699458df528ea37790cc4ec09e7b6d6ae3a83187eebb57678da1ffc230786a79566a7e22836aab04598c0fdf991b96256f14e1d8936668147edf405bbc88e84d7a312f892c3a1dcad7e11a7fa27ca50bcbe2e3fcb201f1297899e327972bec7d631b9ee036194fad4918f0f1c7639491ba7d3b29022d53b6a6fbdef6f7566164487f59b466c9235288a2a3d5a44886ae9b375f8a7cd383da9c607dd3bada8a29d0d77672a3edc11f3a653ae729474bbdedbfcf0ab19b2fe998b7ac59e87552028c9c6578464af8e76c2864c11121009219dd32a5efd6a596b6324c680d19ba0fbb019d722f71fd68443e0c0588764d1dab37cf7bceb4e2b1248efd3f22e26e75472e35166f1545ae178da423c0bbd175aec6360cdd7d2812f4fae46295596e4d9e40f68fb3c9360a2b47dddc35aa2fd34d05411f3fca71df5702edba8c182e94a0ef2b89945d2f9dae556965f52ccdba267bd8f84db5ffc537b30f431455976b92680895695bcf86e1b22821b0fff3511eb44518afeece8dc580e6189e7ce26e3ba6ad4c93083f0766c79e185f8fa2099fa660dcfb6cbd36f91922c9eb6aad143a646744f73237af4dddd2b184091568760210676c468252653f4f5949f346afcd5d062a1387892236d0186ae01bfcf5814617790414b62355513c961f9fd324aa05dbc16725368b3bc4b591a58b7d47c1ffb7bc4c24ec18e4598b692cbf0a88c18f969e702fbb7d0ccf81a7468a7f7ebac94364fa44bbeeb022a2da5b980d109d93b6252dcc00c3158aed7d928a8bc1077023a62288845d474c0143ada9854dcd9bcfbcbd93e62f1a163d06e3f012d6c814cf3b2589a0fb7c21708025ba26375e7f5b3b76e12d90918683adbe81c08b03c3fff740c0c35d38d17468aa1b7959bb9cd6c8735ae32819c5607f34249251832d7f30b30b2cbde6a7235a9137dd1c3abf3f8d07192795280388c546806678f71e511956e86ba03930f579ed7076787404f24680bbf3cb6b562106bcee85012d08861857673e202e05c70fb151803564dafa7e4237674ed5f936e0dea63e7e5bf98058a4eaffc2eba998707c2fb54e1f38626b9a0d34267e1f40a4b0787ce848909a583990194434a9197a1c989d0c0b204199bfe32c281714e3c3fb6c2a26fdd049a5fbd352b6f561e2fa874c9a36c294f253281ff0d89b535189b9fab730858d078e71a0451abe07455ff9527569f50d3b2e406b37b8891045413c072fc4fd848c28b89ef4228b85e919072ccf6ecc0a53a3b086caeea506bdba02c9eeb66efcbc0682e52a3a2b078ffc9752b93330bea7039de2a8db03401d28775ef1f39803b77d42f6de6f482756ad1addebf8d10fa3ca75267f4d526162a669d0d1952cb91da2354f39b95c417ebf83af5cb0a7ca452910867ea4f7cc2e268f635b1febc5b7f5daff7e5057f8b3124b8bba68e2b34e879adc8a4da0ce6b2c7981883b403fafdea21c6f9955bd789a9807183a455ecaaddfc2c250244d040996098e1e5222a945ae7616817953bb0353ce90c42cc991a0db325e8e7bbb039885f4845c368a513e781428d53226cc7e48b48388c02c2b77be2d1d51da3fbe8bda78c12023487225730c59e7db2bfaa0d94917cd68b3a9b9e4b96219bd68f37ba382edc6eeffb0763c44e4023aa64a5b539817bc522eb969aa79143450580e73ecaa398157ffe9dc9d3ede14fc83d032d29d964072e34f2e6e60877fe5dbd5152edb58ffccc0f6f48b4873a82ed6ca0cc1e32a8d21f38180fd2877538ebcc0a2e415f0dfde170b08244d34554c1b26bf6e6c8f85df2b52bf0f02949663e0bdf9a2b1f4b18743dca57ff68cc37e963848ace00a0c304276208aa5e7caff86c435792d084542cb6712151de2f065fb4cc55b164ef2f95c90eb7d05b4ec7ab03489a9924ceccdbd12469bcb054a38142b7fb83b42a394a8e5eb4bbc3a96f482db8cf6b5acdc295a746517d77141faf3b9cb247774dc5064e22218af24610cceefe61cf360059db259a58d4760678ba0638ac84dc9a06bd142e8862d2d7f659c2004561ad89d4959bd2b09ff93c24ba5b807c652043e8e832e3a37c4f7573541c50c3a026283c4ff1bf7cd629302f5def4dc31ee4a24fa1074b77b563728bedc90dcd6b0a99989de0a04761762925b1ea95805ad59218e852aa8eacd1847a559339e1e5050279986a8a5b5dd71ecbdba8dd8d79eaac5b13b0e41cbef43ef24d14ca2197e7526c55de4bb7fc45f341c6e4647d4c5eda01f97e4879883b2dacc8411dc38a6362ac8a1426beafb561ce53dd28005540b2fa00c34bd132618a61893409501407692d344779807ab5590546d1d73840effe22ae3f85427ea37958f0efd4fd4b295d6fef9aa80982f30adb4b7d243b4adc78cdf2f6324d7ebc5ec128f38e98f4ca9f03abd1fcafcbef25f96221a78c8e9a3a8c974d17b5827416e01fa3192708782278700b8a13681bcd2832ff2ae5551cfdb477ea8f0b13f8c507be94aa86f1fb52924ba96b10c5f5861cf0937e474fe7cfbb84347a48d9a5bb2fa698286023f2ea1216851b7d7b8e204db759c163ba490c31ae8b517163d5d57b882dfacb4308e7796b83f998a4f8762b5eeee0e85440b972a46eed1e3e717ede0dd112a6dc5a5cbc71a9018c4dce90ef5e3437038b83c05562b60417e7f81ca0d93377531fa0582638ca1a4a39fe9973c40ebeee50b5cb6d55974f23dff764517289296908c5432bd92060d721ada9d90dbd4485613a58f338fd527965d1bab5df9317bd6019a8549f175feffed260df04e0ee114c1f04e9920a85b872745e6d261af012e65b5ccf34dd9f942c9693c51bbc56609f563e29c6922c1505af2b9a173160fa1b5575d8d91143638219707f0df7402e638c010fa77932cde29dece0dff0d8e0f4d9bb645757e4194115ca768b26148e8066dbd345f92997cdf1017469081c618ae3855c226e07289a9404326ad6f019afe5588981b7fbaefb168363f46cbc4cf3edd8575245b64f9468972fc9a3516d7b6f72450e1c37ae5dd248e58398151c098efd59bfec1162ee05c4f748b7c0f13eccfc6bd71ce7d93f77f0e6878f2f55bea321204ba04e4b69d2382b35d60676c8e3c63ca92199e9134f59721a2a80cee9c4e7e3075fbc012fc69f0e9307946dfd1214a918eae892508833ea130d300319b54c38310b8a006dcc79a53ffd523101e57e0b0fb9201d37a6ef84b4f0b9a189fdc52dc46f9cae08108b76173c6daad6942268cf0b5fc120e0db99729b8f35f9038fade1a328fdbd08964e01867c667a2e6553b26e0c678d58f6e919a44e1d06a3df4bdecf0c92b29a1a347394ed717d8797fc47b2791a205f9cc3c7145de2150177a432ecc7c1a4823274f773b30b33c2a95d8bcc8e8ff550983dc7f103745f668189ca299ab33c7e1f003f44fbcf6616bfabe4105d7537c4814d24438203fa254668efd0b58bd2b5a34fd5687884967815c68f39be8dbde7b146fc487de3d0249f38e5abaee7b8a33eb8a6522e0c52a91a49990c77a3fa4b6679410b5bb40e56394c7433352290e9fcf8f8d2e581b8e422a1d0802e69f7d21deb2e68675bf64410572b709141cbe17ffc41f9761bdce2f0fe2b17e90280c3c56b0a2ff9cdc47fe8c17f2ffb5d9481c0df7961addc54feec21b7675c9b711c75bd69f29863c2d7fe9930510338fd211e12a56f05ed7444cca5de0be51241de353166d38e08c7f260700e8a16fb3491dfaaba0843c06f17111e1d64baaa5e90631164cf53a7e5ee2701b470e5d0a5bfc62364dc8083db3b39c683f4c167a53ef289085ba686b2ec72e119ec38f8093cf7eb23155d31e852aec81fea7eb1a1551998bb91b46b726fcf670c458853f655167be94db5f9524369ad541d590cb90089c150bb6f379a4f03d935ab6e65a9be43af3001fc99800bc210695b0c749a80d084882827a324da046e421fcc973c2ffe53c235de2f3ebc81ba79c55aa49125539927c2c85fe0c3c6f85ee71818c81fd159739e9df7dfd82900ac67c14ce6c86bd3edaa64c691a0371d2d4167ca68ebc1b4bbbc23994840e20e53516e3bdeeda5d3025f118fea3a7291157bb9ed22cd544c6dd37e649de95b307c6d4c37dc102b51464a3d3cc3ffc4f3c2466278b2f5de6597e136ced64a41d96fc1d773289ba9e0c8b2fa8627ba87189690867402bf73661df6cd230e4ae9b99392075957a5ffbeff81f8723360f6e1b5e7ab2234d4ca100b6f9ce72d1ccc5b349bd47ea38f92de6decc2155fd4cc34d7eed0968ad901c8064c8bd54e59fae7ea9320a6292a0b68f2b204f6bfc773b1e01fe7de2a3dd0a5ec00adbe1c39a193a701ac897fee76fa9c3f18ae53def4676527ac1247cfddfaec56ce1a09fa0d6004d58b13642f981264ce52ac4e19259d34e18a5136e2c064a5d22b1cabb442079e5bab5f9c85d7f01c22171ade59970d7fe593391c5ee9e7cc787bed72da399ea8fe7d39b0e8385f7c67a043e485abda5f77cbe0b89cf0a5b3f326913ab0217b5a1fe2d39427b348573044f8a5d5e4722a73f9d49447ae4f50cea06ecbf46065237ca2c75237f0d93aabff94166ebbf744aa8e3ceb3750bac643416789457f14466f910ab297e62ee05f1782d6541d81cb196b7a3d6ab3f7bbed709e50999b4f28995576d47c620a24acd23ec1c03b14d4238b29e220152f7e4fe4ed496e8f939c5ed0893443d58c37a16b1f2deca1add92f54a3de96695f4852386bf1bd8b4984bf336613d1912db65b8d69690cd4420b733b34d1a7dfc8136068d3b710298ff9405524d20666488ccd7650f6b02285266af3e88f9ad99a26fb5256d7601310d2da89245e70f811a994d85bb138d29786c11746598141abfd195f801c0d86584221c4b1a82470dd4f17bab73271ce4ebdc2e94abf56dc6e047bca8d3988e337c499aed8c1391ab1af615d8ba93e8575e1dd69c595a7835eacb8109c7e719e376590e16a4c16889604047f04674e38425ba8e743ff91fc7e0f172eedcc182e8d42a28c9416e74b7caab5749859d7b231dfae0d573547e27f00f1d0e088aa7acfa6db7de3cfe2df15b076c2174e3f50447a4881045dfe54e1fbd489993bf947d549adadf8337174d64c0a67983fbef163375555bd3f159998794231dbc264f4bfd52b1a655fdd0fd27b1857279a2bc209aee01e8062a2ac5349398c92899744c986d3f472d6059575da3fa9a634ccc778387fecd1f43c6be46777afe156be99d76d11d47b76f194a67a50c5ad9941aaba39cc72fa93698916af7b34656c75796caa682185d09747f9911c95a8e6d095631c58d3cb37ab20e6292a4fd065e2dc2d745e171aaecd0600c54dfcf4212a4bfeaf307099063cbb3b892b96bab588c992613d7c7c6bb3d953ae5410d4c3b18b59003c7721dbc4379b4a4a243f8cb93dd5ad8276608f26201c2bff86e64f43a2bf793517681a1f9ca659f1de4b5ccd5496b40c52349c442c354112565fee597b12efb427eb63e6692fc3bda9b831da0e1afc8dcb2a3aa21fbd444c80f39cfd78c8e26155fd86740c8e225f06a0962abe5f687e6953c3382ee3f4b559b97f2a451df9db76d3084065ddc713aa9b63c0154b386be600a285692140f5e019ed2b01a44ba946a52355baa806e2247dbec3d0a4fb8ff14500fab216e425cb2a158efa9fd79e50b020a9316ef4e3726d08fae1683da67c323c2fbdc97b01860109387a62ef8ba4709cf079041925ce1801a8828d1f73e119be76190b5344e3c82c83d787544a883cd34721dece78e2495ca7e850f2af14395af675e6fda7d5cd7e122f1eb317480c071284cdd53b9c0457ed7b074f5a9f647fa3b5a1aad9f6459a9510af3f9c4f52c698c23c4c6f0022781ce7bdb57c493ed3ae6213e437560290e30cedc90ae400711c2220ae142c099d17cd1fa45f4424df658abc04e47754e0e66f38a7ea83c751181a2ab77d4e95b3c6008ecba7d4aa457d16b2e82fabea5a55244da18d2926153b1ee36471d1a37de2ead7d0650ea582332735c05d0abfa881cd7e841a0f53e8ad4dfb4f70b855c259588172cb1027b5b51f0cad9e89a739d07319e82977716ea71325412ae3ddc0a210e774c3061a623096f354dfd36759ac63bb5a926e7582478cc987", 0x2000, &(0x7f0000000a00)={&(0x7f0000000180)={0x50, 0x0, 0xfffffffffffffffe, {0x7, 0x28, 0x0, 0x0, 0x0, 0xffff}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r4, &(0x7f00000081c0)={0x2020, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r4, &(0x7f0000002140)="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", 0x2000, &(0x7f0000000b40)={&(0x7f0000000400)={0x50, 0x0, 0x1000, {0x7, 0x28, 0xe0000000, 0x488504, 0x9, 0x5, 0x8, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INTERRUPT(r4, &(0x7f0000000140)={0x10, 0x0, r5}, 0x10) mount$cgroup(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) sendmsg$NL80211_CMD_START_NAN(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x5452, &(0x7f0000000a40)) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDRT(r7, 0x894c, 0x0) 1.555911815s ago: executing program 1 (id=273): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) fchdir(0xffffffffffffffff) r2 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socket(0x840000000002, 0x3, 0x100) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140), 0x109102, 0x0) writev(r3, &(0x7f0000000280)=[{&(0x7f0000002700)='5', 0x1}], 0x1) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x100000a, 0x4082172, 0xffffffffffffffff, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40000000, 0x0) 1.38782608s ago: executing program 0 (id=274): r0 = socket(0x10, 0x2, 0x0) r1 = socket(0x1d, 0x2, 0x6) openat$adsp1(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x8080}, 0x200008d4) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0xfffffffffffffcb7, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0xfb}}}, 0x10}, 0x1, 0x0, 0x0, 0x15}, 0x40080) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), r2) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000600)={'wlan0\x00'}) syz_open_dev$loop(&(0x7f0000000000), 0x2, 0x18000) setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f00000002c0)={@multicast1, @dev={0xac, 0x14, 0x14, 0x23}, 0xffffffffffffffff, "3b07972b431640e1d4ca3acffcdcc57fbaf1042c7514798d03ada07209791ba7", 0x1, 0x9ceb, 0xd, 0xf}, 0x3c) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), r0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000540)={0x5}, 0x4) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="18010000130a01010000000000000000020000060900010073797a30000000000900010073797a30000000000900020073797a320000000008000340000000050900020073797a3000000000c00008004ad0f2e456ac839f4959de577c67fee90ae18cd0906560163ecfa00c7507ebc330f5ccae0b4fbc915188dd852031d5ccba34e5ba9d8c360e2580482c69006f1a9b965428d15ba15e00d8ccb2edecb97147a1cacecbffdb9bdb23d941548afa5e0e6ddfd6b3ce8ef65aa57a74488dd71c1bbad0f5d1752f993f58220fa47f60f8d9c5dd558b4699d13b3a0ecc6b2fef375dbfa86fb6c922bb408313ea36c69cbfee407da4a8f9533e52067ae42940258fd35e15bad4576df879bfa64e0c0006400000000000000005"], 0x118}}, 0x4000000) 934.211563ms ago: executing program 1 (id=275): r0 = eventfd(0x1000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) ioctl$SNDRV_PCM_IOCTL_PAUSE(r1, 0x40044145, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0106434, &(0x7f0000000080)={0x2b, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40106435, &(0x7f00000000c0)={0x0, r2}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'wlan1\x00'}) r4 = fcntl$dupfd(r1, 0x406, r1) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000140)) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0186405, &(0x7f00000001c0)={0x9, 0xb, {0x0}, {0xffffffffffffffff}, 0xa87, 0xa}) sendmsg$AUDIT_SET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, 0x3e9, 0x100, 0x70bd29, 0x25dfdbff, {0x10, 0x0, 0x2, r5, 0x5, 0x4, 0x0, 0x80}, ["", "", "", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000040}, 0x48000) ioctl$RTC_AIE_ON(r1, 0x7001) sendmsg$NFT_MSG_GETSET(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0xa, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_SET_POLICY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) r6 = open(&(0x7f00000003c0)='./file0\x00', 0x10000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000440)={'nat\x00', 0x0, 0x0, 0x0, [0x1, 0x8001, 0x3c, 0x8, 0x4, 0xffff], 0x3, &(0x7f0000000400)=[{}, {}], 0x0, [{}, {}, {}]}, 0x80) close_range(r6, r4, 0x0) getsockname$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) recvfrom(r4, &(0x7f00000004c0)=""/137, 0x89, 0x0, &(0x7f0000000600)=@ll={0x11, 0x10, r7, 0x1, 0x47, 0x6, @local}, 0x80) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r4, &(0x7f0000000680)={0x20000000}) r8 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r8) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000006c0)=0xffffffffffffffff, 0x4) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000740), r1) sendmsg$NL80211_CMD_RADAR_DETECT(r4, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, r9, 0x100, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3d1, 0x73}}}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x10b}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x84}, 0x20000054) socket$netlink(0x10, 0x3, 0x8) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000840), &(0x7f0000000880)=0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000008c0)={{0x1, 0x1, 0x18, r3, {0x7}}, './file0\x00'}) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000900)=0x1, 0x4) r11 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f00000009c0)={'syztnl0\x00', &(0x7f0000000940)={'ip6_vti0\x00', r7, 0x0, 0xd7, 0xfa, 0x80000000, 0x1d, @remote, @local, 0x8, 0x8000, 0x3, 0xfffff278}}) 674.39095ms ago: executing program 0 (id=276): r0 = openat$hwrng(0xffffff9c, &(0x7f00000004c0), 0x800, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x24000410}, 0x2404c051) ioctl$FIOCLEX(r0, 0x5451) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r3, 0xa02, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x1}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xfffe}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}]}, 0x34}, 0x1, 0x0, 0x0, 0x8001}, 0x0) 448.028807ms ago: executing program 1 (id=277): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x19}, @void, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x41}, 0x1) timer_create(0x2, &(0x7f0000000140)={0x0, 0x4, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) (async) timer_create(0x2, &(0x7f0000000140)={0x0, 0x4, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_settime(r2, 0x1, &(0x7f00000001c0), &(0x7f0000000200)) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r3, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000280)={0x33c, 0x14, 0x100, 0x70bd2b, 0x25dfdbfd, {0x28}, [@INET_DIAG_REQ_BYTECODE={0xea, 0x1, "68375c724c446d4f98b7dc2e2fc8dbb471f3eae720b85ac17252be6d478108f24d2d5702ec304315fce81c2752ff6819619d0cbde9f960c2852e2fb6325a5d324617a8f9c1b3c65da8247333552283bf780d45dbcc8fa0bef8127ce3355ef58d4d6881acd059f3ee7ec2502e45e9c338bff1b14ca4a4166a5c85d6949a04189d1fc7862271f34e5ed4860ae1954cbb46c456d8be413417c152c979dfa47a7a0b3837fb28549f483e64460064ae6743c1824a95d90359ad8d4fb3ea129c38a129d929b3049bbbe7e06c3154f665849997ba11470a1c9e7b9801b31ed334327c98625510a861cc"}, @INET_DIAG_REQ_BYTECODE={0xbc, 0x1, "5901f5ea2bfd3ab7777a2db5d49010137ac35589cd66eb0ee2cada316f4e8a2d3e74382ae654ad74168873a94ec953c1e3e3617a242917586d93939859c8e05708246c41ff27f7eb9d6f8adfa7d0750fec09faa9acb6922af05a0b3bdf0aa3e88eaab45deb2d94b0f2e301b0058767ddfddfcf161e4d96bd5c66bf80961b058002ff021d6525a9e356601e91bd6acf0b96f5278799080f4b6ce7c8a50221f63ec72956e9c6093cd13eeb88917dd7932f0b7a6a20ffea38ae"}, @INET_DIAG_REQ_BYTECODE={0x26, 0x1, "686ad883de2588683e2391dc68cf89d63ca3bdacee422ae8db390ec86d6406619c17"}, @INET_DIAG_REQ_BYTECODE={0x7f, 0x1, "d21421f8b90729d1dbecd54a7440e76024e34f8ce38a5d4231ed86c3d21b88d245f5ed8d712aeb877745f8dbe12f9918ac627df76b05b91ddacdf1eeefd0b80041181235f389cb83b951cf1c366ca9a7d3ed00b3573f373b431d7df7a1b2a25c654e708ad8b40aa31ff530a5f44a16bddf8b7df696950b1f0a0198"}, @INET_DIAG_REQ_BYTECODE={0xd6, 0x1, "18379f56c4c9cb9bb8db2c901c95479fe0f560339a68e2b597a5d894400a0934b676b62732d355894d020bf14f4abc2796149a761a79d991210aff0f8924a6c6f945cca94dd332d72999255b9d006f02fe84054831b5f00ae8528f39e22d45c6053e01c1bc1892059ec9ce112b8d09140f7c85cae792d905818c81e5ae33dc347fdd2532c9eadcf6361c43e8bb34229e430770568d8e34b3703891903997bf1e6618664d3553d622d56700cf0a5284fb999536ccd670ebec26ac3b9c64792ff1afbc2a84bab9a32f76059217c8fa6b04dcd3"}]}, 0x33c}, 0x1, 0x0, 0x0, 0x40}, 0x24004080) timer_gettime(r2, &(0x7f0000000640)) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) (async) r4 = add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000700)="1c3285c4ee9367c468a0b5e312d0c51354f9da2d1456777142bcb66869098263bba3997b0753", 0x26, r4) (async) add_key$user(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000700)="1c3285c4ee9367c468a0b5e312d0c51354f9da2d1456777142bcb66869098263bba3997b0753", 0x26, r4) r5 = request_key(&(0x7f00000007c0)='id_resolver\x00', &(0x7f0000000800)={'syz', 0x0}, &(0x7f0000000840)='[:&,%^](-\x00', 0x0) keyctl$assume_authority(0x10, r5) r6 = openat$nullb(0xffffff9c, &(0x7f0000000880), 0x10100, 0x0) ioctl$BLKIOOPT(r6, 0x1279, &(0x7f00000008c0)) r7 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GETFSUUID(r7, 0x8008662c, &(0x7f0000000900)) r8 = syz_open_dev$mouse(&(0x7f0000000940), 0x6, 0x480) write$binfmt_elf64(r8, &(0x7f0000000980)={{0x7f, 0x45, 0x4c, 0x46, 0x14, 0x9a, 0xea, 0x1, 0xeb6, 0x3, 0x6, 0x4, 0x3c, 0x40, 0x25c, 0x10000, 0x8001, 0x38, 0x2, 0x2000, 0x4, 0x2}, [{0x60000000, 0x3, 0x5, 0x3fe0000, 0x1, 0x1, 0xc7c, 0xe422}, {0x6474e551, 0x0, 0x2, 0x7, 0x7, 0x523fe25e, 0x1}], "e05c62b162647b7ada933055ad606b14148e1b353277cd0106e6b59061e283ef9c863d2d257d3c6d6c10f39d67c20ab4e3bb102d1ec76f78e177c2b8c5700ab64f2485dfd6ead4ac802c9785f65e5a0ac96a71b36188a1241240e5982eb32e1b2bb849b1a380d54625aaf37967128cd79daa5d", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) (async) write$binfmt_elf64(r8, &(0x7f0000000980)={{0x7f, 0x45, 0x4c, 0x46, 0x14, 0x9a, 0xea, 0x1, 0xeb6, 0x3, 0x6, 0x4, 0x3c, 0x40, 0x25c, 0x10000, 0x8001, 0x38, 0x2, 0x2000, 0x4, 0x2}, [{0x60000000, 0x3, 0x5, 0x3fe0000, 0x1, 0x1, 0xc7c, 0xe422}, {0x6474e551, 0x0, 0x2, 0x7, 0x7, 0x523fe25e, 0x1}], "e05c62b162647b7ada933055ad606b14148e1b353277cd0106e6b59061e283ef9c863d2d257d3c6d6c10f39d67c20ab4e3bb102d1ec76f78e177c2b8c5700ab64f2485dfd6ead4ac802c9785f65e5a0ac96a71b36188a1241240e5982eb32e1b2bb849b1a380d54625aaf37967128cd79daa5d", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$F2FS_IOC_GET_FEATURES(r7, 0x8004f50c, &(0x7f00000013c0)) (async) ioctl$F2FS_IOC_GET_FEATURES(r7, 0x8004f50c, &(0x7f00000013c0)) r9 = openat$snapshot(0xffffff9c, &(0x7f0000001400), 0x10000, 0x0) read$snapshot(r9, &(0x7f0000001440)=""/128, 0x80) (async) read$snapshot(r9, &(0x7f0000001440)=""/128, 0x80) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f00000014c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r8, 0xd0009412, &(0x7f00000024c0)={r10, 0xffffffffffffffff}) (async) ioctl$BTRFS_IOC_INO_LOOKUP(r8, 0xd0009412, &(0x7f00000024c0)={r10, 0xffffffffffffffff}) close(r3) (async) close(r3) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003500), r8) sendmsg$NL80211_CMD_SET_MPATH(r3, &(0x7f0000003600)={&(0x7f00000034c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000035c0)={&(0x7f0000003540)={0x4c, r11, 0x400, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x1e}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x4c}}, 0x200004c1) (async) sendmsg$NL80211_CMD_SET_MPATH(r3, &(0x7f0000003600)={&(0x7f00000034c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000035c0)={&(0x7f0000003540)={0x4c, r11, 0x400, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x1e}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x4c}}, 0x200004c1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000036c0)={r8, 0x58, &(0x7f0000003640)}, 0x10) ioctl$VT_ACTIVATE(r8, 0x5606, 0x1ff) r12 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r12, &(0x7f00000038c0)={&(0x7f0000003700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000003880)={&(0x7f0000003780)={0xdc, 0x0, 0x6b44bfabf07de040, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_OUT_LEVEL={0x8, 0x2a, 0x2}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x4}, @NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xac, 0x2b, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x48, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0x100}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x10000}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xdd3f}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x20008840}, 0x200000a0) 317.76242ms ago: executing program 0 (id=278): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r1) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000dc0), 0x4) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, 0x0, 0x64000040) 0s ago: executing program 0 (id=279): timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x1, r0, 0x0, 0x2, 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000040)=""/180) ptrace(0x10, r0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x4048810) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, 0x0, 0x0) kernel console output (not intermixed with test programs): ext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 286.913622][ T3532] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3532 comm=syz.0.43 [ 286.938226][ T29] audit: type=1400 audit(286.230:155): avc: denied { write } for pid=3528 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 293.782202][ T3543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3543 comm=syz.0.49 [ 293.836449][ T29] audit: type=1400 audit(293.110:156): avc: denied { create } for pid=3541 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 293.838304][ T29] audit: type=1400 audit(293.130:157): avc: denied { setopt } for pid=3541 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 306.317910][ T29] audit: type=1400 audit(305.610:158): avc: denied { accept } for pid=3558 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 307.121804][ T29] audit: type=1400 audit(306.370:159): avc: denied { read write } for pid=3562 comm="syz.1.57" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 307.135482][ T29] audit: type=1400 audit(306.420:160): avc: denied { open } for pid=3562 comm="syz.1.57" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 307.155074][ T29] audit: type=1400 audit(306.440:161): avc: denied { ioctl } for pid=3562 comm="syz.1.57" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 310.167330][ T3584] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3584 comm=syz.1.66 [ 310.394626][ T29] audit: type=1400 audit(309.690:162): avc: denied { read write } for pid=3583 comm="syz.0.67" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 310.402694][ T29] audit: type=1400 audit(309.700:163): avc: denied { open } for pid=3583 comm="syz.0.67" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 310.806802][ T29] audit: type=1400 audit(310.100:164): avc: denied { prog_load } for pid=3586 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 310.809718][ T29] audit: type=1400 audit(310.100:165): avc: denied { bpf } for pid=3586 comm="syz.1.68" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 310.814369][ T29] audit: type=1400 audit(310.110:166): avc: denied { perfmon } for pid=3586 comm="syz.1.68" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 311.361053][ T29] audit: type=1400 audit(310.530:167): avc: denied { map_read map_write } for pid=3588 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 311.362605][ T29] audit: type=1404 audit(310.600:168): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 311.563986][ T29] audit: type=1400 audit(310.830:169): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 311.873859][ T29] audit: type=1400 audit(311.130:170): avc: denied { read } for pid=3588 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.873859][ T29] audit: type=1400 audit(311.130:170): avc: denied { read } for pid=3588 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 311.899064][ T29] audit: type=1400 audit(311.190:171): avc: denied { create } for pid=3592 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 311.901249][ T29] audit: type=1400 audit(311.190:172): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 311.909306][ T29] audit: type=1400 audit(311.200:173): avc: denied { create } for pid=3592 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.899064][ T29] audit: type=1400 audit(311.190:171): avc: denied { create } for pid=3592 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.901249][ T29] audit: type=1400 audit(311.190:172): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 311.934912][ T29] audit: type=1400 audit(311.210:174): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 311.935923][ T29] audit: type=1400 audit(311.220:175): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.909306][ T29] audit: type=1400 audit(311.200:173): avc: denied { create } for pid=3592 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 311.946645][ T29] audit: type=1400 audit(311.230:176): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.934912][ T29] audit: type=1400 audit(311.210:174): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.935923][ T29] audit: type=1400 audit(311.220:175): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:11 syzkaller kern.notice kernel: [ 311.946645][ T29] audit: type=1400 audit(311.230:176): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 313.674076][ T3614] FAULT_INJECTION: forcing a failure. [ 313.674076][ T3614] name failslab, interval 1, probability 0, space 0, times 1 [ 313.675607][ T3614] CPU: 1 UID: 0 PID: 3614 Comm: syz.1.81 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 313.676038][ T3614] Hardware name: linux,dummy-virt (DT) [ 313.676356][ T3614] Call trace: [ 313.676633][ T3614] show_stack+0x18/0x24 (C) [ 313.677000][ T3614] dump_stack_lvl+0xdc/0xf4 [ 313.677315][ T3614] dump_stack+0x1c/0x28 [ 313.677582][ T3614] should_fail_ex+0x510/0x5f4 [ 313.677848][ T3614] should_failslab+0xbc/0x11c [ 313.678107][ T3614] __kmalloc_node_noprof+0xd4/0x4d4 [ 313.678385][ T3614] crypto_alloc_tfmmem.isra.0+0x3c/0x100 [ 313.678685][ T3614] crypto_create_tfm_node+0x78/0x2a8 [ 313.679022][ T3614] crypto_ahash_init_tfm+0x1f4/0x3ec [ 313.679340][ T3614] crypto_create_tfm_node+0xcc/0x2a8 [ 313.679627][ T3614] crypto_alloc_tfm_node+0xe0/0x1d0 [ 313.679971][ T3614] crypto_alloc_ahash+0x24/0x30 [ 313.680333][ T3614] tcp_sigpool_alloc_ahash+0x484/0xa84 [ 313.680709][ T3614] tcp_md5_alloc_sigpool+0x20/0x40 [ 313.681260][ T3614] tcp_md5_do_add+0x11c/0x2dc [ 313.681565][ T3614] tcp_v6_parse_md5_keys+0x31c/0x5f4 [ 313.681891][ T3614] do_tcp_setsockopt+0x654/0x1adc [ 313.682189][ T3614] tcp_setsockopt+0xb0/0xcc [ 313.682483][ T3614] sock_common_setsockopt+0x70/0xe0 [ 313.682792][ T3614] do_sock_setsockopt+0x17c/0x354 [ 313.683078][ T3614] __sys_setsockopt+0xcc/0x144 [ 313.683355][ T3614] __arm64_sys_setsockopt+0xa4/0x100 [ 313.683651][ T3614] invoke_syscall+0x6c/0x258 [ 313.683931][ T3614] el0_svc_common.constprop.0+0xac/0x230 [ 313.684286][ T3614] do_el0_svc_compat+0x40/0x68 [ 313.684619][ T3614] el0_svc_compat+0x4c/0x17c [ 313.685043][ T3614] el0t_32_sync_handler+0x98/0x13c [ 313.685434][ T3614] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:12 syzkaller kern.notice kernel: [ 313.674076][ T3614] FAULT_INJECTION: forcing a failure. Jan 1 00:05:13 syzkaller kern.notice kernel: [ 313.674076][ T3614] name failslab, interval 1, probability 0, space 0, times 1 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.675607][ T3614] CPU: 1 UID: 0 PID: 3614 Comm: syz.1.81 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.676038][ T3614] Hardware name: linux,dummy-virt (DT) Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.676356][ T3614] Call trace: Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.676633][ T3614] show_stack+0x18/0x24 (C) Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.677000][ T3614] dump_stack_lvl+0xdc/0xf4 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.677315][ T3614] dump_stack+0x1c/0x28 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.677582][ T3614] should_fail_ex+0x510/0x5f4 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.677848][ T3614] should_failslab+0xbc/0x11c Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.678107][ T3614] __kmalloc_node_noprof+0xd4/0x4d4 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.678385][ T3614] crypto_alloc_tfmmem.isra.0+0x3c/0x100 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.678685][ T3614] crypto_create_tfm_node+0x78/0x2a8 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.679022][ T3614] crypto_ahash_init_tfm+0x1f4/0x3ec Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.679340][ T3614] crypto_create_tfm_node+0xcc/0x2a8 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.679627][ T3614] crypto_alloc_tfm_node+0xe0/0x1d0 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.679971][ T3614] crypto_alloc_ahash+0x24/0x30 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.680333][ T3614] tcp_sigpool_alloc_ahash+0x484/0xa84 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.680709][ T3614] tcp_md5_alloc_sigpool+0x20/0x40 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.681260][ T3614] tcp_md5_do_add+0x11c/0x2dc Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.681565][ T3614] tcp_v6_parse_md5_keys+0x31c/0x5f4 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.681891][ T3614] do_tcp_setsockopt+0x654/0x1adc Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.682189][ T3614] tcp_setsockopt+0xb0/0xcc Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.682483][ T3614] sock_common_setsockopt+0x70/0xe0 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.682792][ T3614] do_sock_setsockopt+0x17c/0x354 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.683078][ T3614] __sys_setsockopt+0xcc/0x144 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.683355][ T3614] __arm64_sys_setsockopt+0xa4/0x100 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.683651][ T3614] invoke_syscall+0x6c/0x258 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.683931][ T3614] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.684286][ T3614] do_el0_svc_compat+0x40/0x68 Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.684619][ T3614] el0_svc_compat+0x4c/0x17c Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.685043][ T3614] el0t_32_sync_handler+0x98/0x13c Jan 1 00:05:13 syzkaller kern.warn kernel: [ 313.685434][ T3614] el0t_32_sync+0x19c/0x1a0 [ 315.984279][ T3629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3629 comm=syz.0.86 Jan 1 00:05:15 syzkaller kern.warn kernel: [ 315.984279][ T3629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3629 comm=syz.0.86 [ 316.431944][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 316.432062][ T29] audit: type=1400 audit(315.670:250): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.531570][ T29] audit: type=1400 audit(315.820:251): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.warn kernel: [ 316.431944][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 316.546396][ T29] audit: type=1400 audit(315.840:252): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.432062][ T29] audit: type=1400 audit(315.670:250): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk [ 316.558327][ T29] audit: type=1400 audit(315.850:253): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.531570][ T29] audit: type=1400 audit(315.820:251): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 316.569799][ T29] audit: type=1400 audit(315.860:254): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.546396][ T29] audit: type=1400 audit(315.840:252): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.558327][ T29] audit: type=1400 audit(315.850:253): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 316.585166][ T29] audit: type=1400 audit(315.870:255): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 316.592977][ T29] audit: type=1400 audit(315.880:256): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.569799][ T29] audit: type=1400 audit(315.860:254): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 316.612624][ T29] audit: type=1400 audit(315.890:257): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.585166][ T29] audit: type=1400 audit(315.870:255): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 316.630296][ T29] audit: type=1400 audit(315.920:258): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.592977][ T29] audit: type=1400 audit(315.880:256): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.612624][ T29] audit: type=1400 audit(315.890:257): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 316.644435][ T29] audit: type=1400 audit(315.930:259): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.630296][ T29] audit: type=1400 audit(315.920:258): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:15 syzkaller kern.notice kernel: [ 316.644435][ T29] audit: type=1400 audit(315.930:259): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 318.426397][ T3651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3651 comm=syz.1.95 Jan 1 00:05:17 syzkaller kern.warn kernel: [ 318.426397][ T3651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3651 comm=syz.1.95 [ 321.558555][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 321.558666][ T29] audit: type=1400 audit(320.850:308): avc: denied { map_create } for pid=3670 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 321.574192][ T29] audit: type=1400 audit(320.870:309): avc: denied { prog_load } for pid=3670 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 321.632188][ T29] audit: type=1400 audit(320.900:310): avc: denied { prog_load } for pid=3670 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 321.633415][ T29] audit: type=1400 audit(320.900:311): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:20 syzkaller kern.warn kernel: [ 321.558555][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 321.656074][ T29] audit: type=1400 audit(320.950:312): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.558666][ T29] audit: type=1400 audit(320.850:308): avc: denied { map_create } for pid=3670 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 321.681526][ T29] audit: type=1400 audit(320.970:313): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 321.682997][ T29] audit: type=1400 audit(320.970:314): avc: denied { create } for pid=3672 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.574192][ T29] audit: type=1400 audit(320.870:309): avc: denied { prog_load } for pid=3670 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.632188][ T29] audit: type=1400 audit(320.900:310): avc: denied { prog_load } for pid=3670 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 321.711532][ T29] audit: type=1400 audit(320.980:315): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 321.712547][ T29] audit: type=1400 audit(321.000:316): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.633415][ T29] audit: type=1400 audit(320.900:311): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 321.717750][ T29] audit: type=1400 audit(321.010:317): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.656074][ T29] audit: type=1400 audit(320.950:312): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.681526][ T29] audit: type=1400 audit(320.970:313): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:20 syzkaller kern.notice kernel: [ 321.682997][ T29] audit: type=1400 audit(320.970:314): avc: denied { create } for pid=3672 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:21 syzkaller kern.notice kernel: [ 321.711532][ T29] audit: type=1400 audit(320.980:315): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:21 syzkaller kern.notice kernel: [ 321.712547][ T29] audit: type=1400 audit(321.000:316): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:21 syzkaller kern.notice kernel: [ 321.717750][ T29] audit: type=1400 audit(321.010:317): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 322.864802][ T3679] FAULT_INJECTION: forcing a failure. [ 322.864802][ T3679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.865817][ T3679] CPU: 0 UID: 0 PID: 3679 Comm: syz.1.108 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 322.866539][ T3679] Hardware name: linux,dummy-virt (DT) [ 322.867101][ T3679] Call trace: [ 322.867668][ T3679] show_stack+0x18/0x24 (C) [ 322.868290][ T3679] dump_stack_lvl+0xdc/0xf4 [ 322.868990][ T3679] dump_stack+0x1c/0x28 [ 322.869376][ T3679] should_fail_ex+0x510/0x5f4 [ 322.869773][ T3679] should_fail+0x14/0x20 [ 322.870102][ T3679] should_fail_usercopy+0x1c/0x28 [ 322.870374][ T3679] simple_read_from_buffer+0x90/0x1ec [ 322.870712][ T3679] proc_fail_nth_read+0x160/0x248 [ 322.870971][ T3679] vfs_read+0x18c/0x978 [ 322.871210][ T3679] ksys_read+0xec/0x1d8 [ 322.871446][ T3679] __arm64_sys_read+0x6c/0x9c [ 322.871696][ T3679] invoke_syscall+0x6c/0x258 [ 322.871938][ T3679] el0_svc_common.constprop.0+0xac/0x230 [ 322.872194][ T3679] do_el0_svc_compat+0x40/0x68 [ 322.872425][ T3679] el0_svc_compat+0x4c/0x17c [ 322.872881][ T3679] el0t_32_sync_handler+0x98/0x13c [ 322.873440][ T3679] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:22 syzkaller kern.notice kernel: [ 322.864802][ T3679] FAULT_INJECTION: forcing a failure. Jan 1 00:05:22 syzkaller kern.notice kernel: [ 322.864802][ T3679] name fail_usercopy, interval 1, probability 0, space 0, times 0 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.865817][ T3679] CPU: 0 UID: 0 PID: 3679 Comm: syz.1.108 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.866539][ T3679] Hardware name: linux,dummy-virt (DT) Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.867101][ T3679] Call trace: Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.867668][ T3679] show_stack+0x18/0x24 (C) Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.868290][ T3679] dump_stack_lvl+0xdc/0xf4 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.868990][ T3679] dump_stack+0x1c/0x28 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.869376][ T3679] should_fail_ex+0x510/0x5f4 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.869773][ T3679] should_fail+0x14/0x20 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.870102][ T3679] should_fail_usercopy+0x1c/0x28 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.870374][ T3679] simple_read_from_buffer+0x90/0x1ec Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.870712][ T3679] proc_fail_nth_read+0x160/0x248 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.870971][ T3679] vfs_read+0x18c/0x978 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.871210][ T3679] ksys_read+0xec/0x1d8 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.871446][ T3679] __arm64_sys_read+0x6c/0x9c Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.871696][ T3679] invoke_syscall+0x6c/0x258 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.871938][ T3679] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.872194][ T3679] do_el0_svc_compat+0x40/0x68 Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.872425][ T3679] el0_svc_compat+0x4c/0x17c Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.872881][ T3679] el0t_32_sync_handler+0x98/0x13c Jan 1 00:05:22 syzkaller kern.warn kernel: [ 322.873440][ T3679] el0t_32_sync+0x19c/0x1a0 [ 323.652866][ T3682] capability: warning: `syz.1.109' uses 32-bit capabilities (legacy support in use) Jan 1 00:05:22 syzkaller kern.info kernel: [ 323.652866][ T3682] capability: warning: `syz.1.109' uses 32-bit capabilities (legacy support in use) [ 326.561101][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 326.561210][ T29] audit: type=1400 audit(325.850:378): avc: denied { map_create } for pid=3693 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.585926][ T29] audit: type=1400 audit(325.880:379): avc: denied { prog_load } for pid=3693 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.616634][ T29] audit: type=1400 audit(325.910:380): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 326.622228][ T29] audit: type=1400 audit(325.910:381): avc: denied { prog_load } for pid=3693 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:05:25 syzkaller kern.warn kernel: [ 326.561101][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 326.646915][ T29] audit: type=1400 audit(325.940:382): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:25 syzkaller kern.notice kernel: [ 326.561210][ T29] audit: type=1400 audit(325.850:378): avc: denied { map_create } for pid=3693 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.693459][ T29] audit: type=1400 audit(325.970:383): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:25 syzkaller kern.notice kernel: [ 326.585926][ T29] audit: type=1400 audit(325.880:379): avc: denied { prog_load } for pid=3693 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.734390][ T29] audit: type=1400 audit(326.020:384): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:25 syzkaller kern.notice kernel: [ 326.616634][ T29] audit: type=1400 audit(325.910:380): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 326.763306][ T29] audit: type=1400 audit(326.050:385): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:25 syzkaller kern.notice kernel: [ 326.622228][ T29] audit: type=1400 audit(325.910:381): avc: denied { prog_load } for pid=3693 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.806163][ T29] audit: type=1400 audit(326.100:386): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:25 syzkaller kern.notice kernel: [ 326.646915][ T29] audit: type=1400 audit(325.940:382): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:26 syzkaller kern.notice kernel: [ 326.693459][ T29] audit: type=1400 audit(325.970:383): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 326.839591][ T29] audit: type=1400 audit(326.120:387): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:26 syzkaller kern.notice kernel: [ 326.734390][ T29] audit: type=1400 audit(326.020:384): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:26 syzkaller kern.notice kernel: [ 326.763306][ T29] audit: type=1400 audit(326.050:385): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:26 syzkaller kern.notice kernel: [ 326.806163][ T29] audit: type=1400 audit(326.100:386): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:26 syzkaller kern.notice kernel: [ 326.839591][ T29] audit: type=1400 audit(326.120:387): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 328.137779][ T3702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3702 comm=syz.0.119 Jan 1 00:05:27 syzkaller kern.warn kernel: [ 328.137779][ T3702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3702 comm=syz.0.119 [ 330.341977][ T3720] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3720 comm=syz.1.128 Jan 1 00:05:29 syzkaller kern.warn kernel: [ 330.341977][ T3720] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3720 comm=syz.1.128 [ 331.714862][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 331.715102][ T29] audit: type=1400 audit(331.010:434): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.763968][ T29] audit: type=1400 audit(331.030:435): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.warn kernel: [ 331.714862][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 331.787761][ T29] audit: type=1400 audit(331.070:436): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.715102][ T29] audit: type=1400 audit(331.010:434): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk [ 331.807338][ T29] audit: type=1400 audit(331.100:437): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.763968][ T29] audit: type=1400 audit(331.030:435): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 331.827508][ T29] audit: type=1400 audit(331.120:438): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.787761][ T29] audit: type=1400 audit(331.070:436): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 331.847892][ T29] audit: type=1400 audit(331.140:439): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.807338][ T29] audit: type=1400 audit(331.100:437): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.827508][ T29] audit: type=1400 audit(331.120:438): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 331.882184][ T29] audit: type=1400 audit(331.160:440): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.847892][ T29] audit: type=1400 audit(331.140:439): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 331.887309][ T29] audit: type=1400 audit(331.170:441): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.925463][ T29] audit: type=1400 audit(331.210:442): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.882184][ T29] audit: type=1400 audit(331.160:440): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 331.949529][ T29] audit: type=1400 audit(331.240:443): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.887309][ T29] audit: type=1400 audit(331.170:441): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.925463][ T29] audit: type=1400 audit(331.210:442): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:31 syzkaller kern.notice kernel: [ 331.949529][ T29] audit: type=1400 audit(331.240:443): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 332.923792][ T3731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3731 comm=syz.0.133 Jan 1 00:05:32 syzkaller kern.warn kernel: [ 332.923792][ T3731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3731 comm=syz.0.133 [ 336.637667][ T3756] FAULT_INJECTION: forcing a failure. [ 336.637667][ T3756] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 336.641512][ T3756] CPU: 0 UID: 0 PID: 3756 Comm: syz.0.145 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 336.642271][ T3756] Hardware name: linux,dummy-virt (DT) [ 336.642906][ T3756] Call trace: [ 336.643562][ T3756] show_stack+0x18/0x24 (C) [ 336.644189][ T3756] dump_stack_lvl+0xdc/0xf4 [ 336.644861][ T3756] dump_stack+0x1c/0x28 [ 336.645432][ T3756] should_fail_ex+0x510/0x5f4 [ 336.645966][ T3756] should_fail_alloc_page+0x70/0xb8 [ 336.646527][ T3756] prepare_alloc_pages+0x170/0x518 [ 336.647182][ T3756] __alloc_pages_noprof+0x140/0x2248 [ 336.647701][ T3756] alloc_pages_mpol_noprof+0x104/0x490 [ 336.648224][ T3756] folio_alloc_mpol_noprof+0x18/0xa0 [ 336.648795][ T3756] vma_alloc_folio_noprof+0x104/0x1bc [ 336.649328][ T3756] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 336.649999][ T3756] __handle_mm_fault+0x1fec/0x3580 [ 336.650632][ T3756] handle_mm_fault+0x32c/0x798 [ 336.651179][ T3756] do_page_fault+0x1e8/0xeac [ 336.651704][ T3756] do_translation_fault+0x184/0x1e8 [ 336.652304][ T3756] do_mem_abort+0x68/0x1a4 [ 336.652887][ T3756] el0_da+0x5c/0x174 [ 336.653348][ T3756] el0t_32_sync_handler+0x110/0x13c [ 336.654014][ T3756] el0t_32_sync+0x19c/0x1a0 [ 336.664060][ T3756] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF Jan 1 00:05:35 syzkaller kern.notice kernel: [ 336.637667][ T3756] FAULT_INJECTION: forcing a failure. Jan 1 00:05:35 syzkaller kern.notice kernel: [ 336.637667][ T3756] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 336.751987][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 336.752233][ T29] audit: type=1400 audit(336.040:481): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.641512][ T3756] CPU: 0 UID: 0 PID: 3756 Comm: syz.0.145 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 336.832335][ T29] audit: type=1400 audit(336.120:482): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.642271][ T3756] Hardware name: linux,dummy-virt (DT) [ 336.868556][ T29] audit: type=1400 audit(336.160:483): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.642906][ T3756] Call trace:[ 336.894927][ T29] audit: type=1400 audit(336.180:484): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.643562][ T3756] show_stack+0x18/0x24 (C) Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.644189][ T3756] dump_stack_lvl+0xdc/0xf4 [ 337.053183][ T29] audit: type=1400 audit(336.220:485): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.055496][ T29] audit: type=1400 audit(336.250:486): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.057009][ T29] audit: type=1400 audit(336.280:487): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.644861][ T3756] dump_stack+0x1c/0x28 [ 337.084734][ T29] audit: type=1400 audit(336.380:488): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.645432][ T3756] should_fail_ex+0x510/0x5f4 [ 337.149894][ T29] audit: type=1400 audit(336.420:489): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.645966][ T3756] should_fail_alloc_page+0x70/0xb8 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.646527][ T3756] prepare_alloc_pages+0x170/0x518 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.647182][ T3756] __alloc_pages_noprof+0x140/0x2248 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.647701][ T3756] alloc_pages_mpol_noprof+0x104/0x490 Jan 1 00:05:35 syzkaller kern.warn kernel: [ 336.648224][ T3756] folio_alloc_mpol_noprof+0x18/0xa0 [ 337.216662][ T29] audit: type=1400 audit(336.460:490): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.648795][ T3756] vma_alloc_folio_noprof+0x104/0x1bc Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.649328][ T3756] vma_alloc_zeroed_movable_folio+0x50/0x6c Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.649999][ T3756] __handle_mm_fault+0x1fec/0x3580 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.650632][ T3756] handle_mm_fault+0x32c/0x798 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.651179][ T3756] do_page_fault+0x1e8/0xeac Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.651704][ T3756] do_translation_fault+0x184/0x1e8 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.652304][ T3756] do_mem_abort+0x68/0x1a4 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.652887][ T3756] el0_da+0x5c/0x174 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.653348][ T3756] el0t_32_sync_handler+0x110/0x13c Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.654014][ T3756] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.664060][ T3756] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF Jan 1 00:05:36 syzkaller kern.warn kernel: [ 336.751987][ T29] kauditd_printk_skb: 37 callbacks suppressed Jan 1 00:05:36 syzkaller kern.notice kernel: [ 336.752233][ T29] audit: type=1400 audit(336.040:481): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 336.832335][ T29] audit: type=1400 audit(336.120:482): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 336.868556][ T29] audit: type=1400 audit(336.160:483): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk Jan 1 00:05:36 syzkaller kern.notice kernel: [ 336.894927][ T29] audit: type=1400 audit(336.180:484): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 337.053183][ T29] audit: type=1400 audit(336.220:485): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 337.055496][ T29] audit: type=1400 audit(336.250:486): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 337.057009][ T29] audit: type=1400 audit(336.280:487): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 337.084734][ T29] audit: type=1400 audit(336.380:488): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 337.149894][ T29] audit: type=1400 audit(336.420:489): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:36 syzkaller kern.notice kernel: [ 337.216662][ T29] audit: type=1400 audit(336.460:490): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 341.003845][ T3781] FAULT_INJECTION: forcing a failure. [ 341.003845][ T3781] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.004526][ T3781] CPU: 0 UID: 0 PID: 3781 Comm: syz.1.158 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 341.005149][ T3781] Hardware name: linux,dummy-virt (DT) [ 341.005457][ T3781] Call trace: [ 341.005674][ T3781] show_stack+0x18/0x24 (C) [ 341.006029][ T3781] dump_stack_lvl+0xdc/0xf4 [ 341.006286][ T3781] dump_stack+0x1c/0x28 [ 341.006600][ T3781] should_fail_ex+0x510/0x5f4 [ 341.006934][ T3781] should_fail_alloc_page+0x70/0xb8 [ 341.007237][ T3781] prepare_alloc_pages+0x170/0x518 [ 341.007532][ T3781] __alloc_pages_noprof+0x140/0x2248 [ 341.007806][ T3781] alloc_pages_mpol_noprof+0x104/0x490 [ 341.008081][ T3781] folio_alloc_mpol_noprof+0x18/0xa0 [ 341.008476][ T3781] vma_alloc_folio_noprof+0x104/0x1bc [ 341.009029][ T3781] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 341.009671][ T3781] __handle_mm_fault+0x1fec/0x3580 [ 341.010553][ T3781] handle_mm_fault+0x32c/0x798 [ 341.011162][ T3781] do_page_fault+0x1e8/0xeac [ 341.011719][ T3781] do_translation_fault+0x184/0x1e8 [ 341.012328][ T3781] do_mem_abort+0x68/0x1a4 [ 341.012917][ T3781] el0_da+0x5c/0x174 [ 341.013560][ T3781] el0t_32_sync_handler+0x110/0x13c [ 341.014329][ T3781] el0t_32_sync+0x19c/0x1a0 [ 341.032340][ T3781] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF Jan 1 00:05:40 syzkaller kern.notice kernel: [ 341.003845][ T3781] FAULT_INJECTION: forcing a failure. Jan 1 00:05:40 syzkaller kern.notice kernel: [ 341.003845][ T3781] name fail_page_alloc, interval 1, probability 0, space 0, times 0 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.004526][ T3781] CPU: 0 UID: 0 PID: 3781 Comm: syz.1.158 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.005149][ T3781] Hardware name: linux,dummy-virt (DT) Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.005457][ T3781] Call trace: Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.005674][ T3781] show_stack+0x18/0x24 (C) Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.006029][ T3781] dump_stack_lvl+0xdc/0xf4 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.006286][ T3781] dump_stack+0x1c/0x28 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.006600][ T3781] should_fail_ex+0x510/0x5f4 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.006934][ T3781] should_fail_alloc_page+0x70/0xb8 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.007237][ T3781] prepare_alloc_pages+0x170/0x518 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.007532][ T3781] __alloc_pages_noprof+0x140/0x2248 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.007806][ T3781] alloc_pages_mpol_noprof+0x104/0x490 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.008081][ T3781] folio_alloc_mpol_noprof+0x18/0xa0 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.008476][ T3781] vma_alloc_folio_noprof+0x104/0x1bc Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.009029][ T3781] vma_alloc_zeroed_movable_folio+0x50/0x6c Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.009671][ T3781] __handle_mm_fault+0x1fec/0x3580 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.010553][ T3781] handle_mm_fault+0x32c/0x798 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.011162][ T3781] do_page_fault+0x1e8/0xeac Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.011719][ T3781] do_translation_fault+0x184/0x1e8 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.012328][ T3781] do_mem_abort+0x68/0x1a4 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.012917][ T3781] el0_da+0x5c/0x174 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.013560][ T3781] el0t_32_sync_handler+0x110/0x13c Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.014329][ T3781] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.032340][ T3781] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 341.545966][ T3782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=3782 comm=syz.0.156 Jan 1 00:05:40 syzkaller kern.warn kernel: [ 341.545966][ T3782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=3782 comm=syz.0.156 [ 342.843874][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 342.844099][ T29] audit: type=1400 audit(341.250:573): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 342.846354][ T29] audit: type=1400 audit(341.730:574): avc: denied { create } for pid=3785 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 342.847749][ T29] audit: type=1400 audit(341.890:575): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 342.904346][ T29] audit: type=1400 audit(342.200:576): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 343.501510][ T29] audit: type=1400 audit(342.700:577): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 343.529798][ T29] audit: type=1400 audit(342.820:578): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:42 syzkaller kern.warn kernel: [ 342.843874][ T29] kauditd_printk_skb: 82 callbacks suppressed Jan 1 00:05:42 syzkaller kern.notice kernel: [ 342.844099][ T29] audit: type=1400 audit(341.250:573): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk Jan 1 00:05:42 syzkaller kern.notice kernel: [ 342.846354][ T29] audit: type=1400 audit(341.730:574): avc: denied { create } for pid=3785 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:42 syzkaller kern.notice kernel: [ 342.847749][ T29] audit: type=1400 audit(341.890:575): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk [ 343.603242][ T29] audit: type=1400 audit(342.830:579): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.605129][ T29] audit: type=1400 audit(342.840:580): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.606594][ T29] audit: type=1400 audit(342.860:581): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.608053][ T29] audit: type=1400 audit(342.880:582): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:42 syzkaller kern.notice kernel: [ 342.904346][ T29] audit: type=1400 audit(342.200:576): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk Jan 1 00:05:42 syzkaller kern.notice kernel: [ 343.501510][ T29] audit: type=1400 audit(342.700:577): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk Jan 1 00:05:42 syzkaller kern.notice kernel: [ 343.529798][ T29] audit: type=1400 audit(342.820:578): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:42 syzkaller kern.notice kernel: [ 343.603242][ T29] audit: type=1400 audit(342.830:579): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:42 syzkaller kern.notice kernel: [ 343.605129][ T29] audit: type=1400 audit(342.840:580): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:42 syzkaller kern.notice kernel: [ 343.606594][ T29] audit: type=1400 audit(342.860:581): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:42 syzkaller kern.notice kernel: [ 343.608053][ T29] audit: type=1400 audit(342.880:582): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 346.023948][ T3808] FAULT_INJECTION: forcing a failure. [ 346.023948][ T3808] name failslab, interval 1, probability 0, space 0, times 0 [ 346.024936][ T3808] CPU: 0 UID: 0 PID: 3808 Comm: syz.1.170 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 346.025923][ T3808] Hardware name: linux,dummy-virt (DT) [ 346.026296][ T3808] Call trace: [ 346.026596][ T3808] show_stack+0x18/0x24 (C) [ 346.026930][ T3808] dump_stack_lvl+0xdc/0xf4 [ 346.027230][ T3808] dump_stack+0x1c/0x28 [ 346.027523][ T3808] should_fail_ex+0x510/0x5f4 [ 346.027824][ T3808] should_failslab+0xbc/0x11c [ 346.028174][ T3808] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 [ 346.028640][ T3808] alloc_inode+0xa0/0x1b4 [ 346.029047][ T3808] new_inode_pseudo+0x10/0x1c [ 346.029335][ T3808] path_from_stashed+0x37c/0x8c4 [ 346.029649][ T3808] open_namespace+0x80/0x130 [ 346.030035][ T3808] open_related_ns+0x1c/0x28 [ 346.030489][ T3808] sock_ioctl+0x314/0x5e0 [ 346.030882][ T3808] compat_sock_ioctl+0x26c/0x538 [ 346.031219][ T3808] __arm64_compat_sys_ioctl+0x1b0/0x214 [ 346.031542][ T3808] invoke_syscall+0x6c/0x258 [ 346.031862][ T3808] el0_svc_common.constprop.0+0xac/0x230 [ 346.032212][ T3808] do_el0_svc_compat+0x40/0x68 [ 346.032594][ T3808] el0_svc_compat+0x4c/0x17c [ 346.033038][ T3808] el0t_32_sync_handler+0x98/0x13c [ 346.033389][ T3808] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:45 syzkaller kern.notice kernel: [ 346.023948][ T3808] FAULT_INJECTION: forcing a failure. Jan 1 00:05:45 syzkaller kern.notice kernel: [ 346.023948][ T3808] name failslab, interval 1, probability 0, space 0, times 0 [ 346.082921][ T3807] serio: Serial port pts0 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.024936][ T3808] CPU: 0 UID: 0 PID: 3808 Comm: syz.1.170 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.025923][ T3808] Hardware name: linux,dummy-virt (DT) Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.026296][ T3808] Call trace: Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.026596][ T3808] show_stack+0x18/0x24 (C) Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.026930][ T3808] dump_stack_lvl+0xdc/0xf4 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.027230][ T3808] dump_stack+0x1c/0x28 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.027523][ T3808] should_fail_ex+0x510/0x5f4 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.027824][ T3808] should_failslab+0xbc/0x11c Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.028174][ T3808] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.028640][ T3808] alloc_inode+0xa0/0x1b4 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.029047][ T3808] new_inode_pseudo+0x10/0x1c Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.029335][ T3808] path_from_stashed+0x37c/0x8c4 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.029649][ T3808] open_namespace+0x80/0x130 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.030035][ T3808] open_related_ns+0x1c/0x28 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.030489][ T3808] sock_ioctl+0x314/0x5e0 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.030882][ T3808] compat_sock_ioctl+0x26c/0x538 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.031219][ T3808] __arm64_compat_sys_ioctl+0x1b0/0x214 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.031542][ T3808] invoke_syscall+0x6c/0x258 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.031862][ T3808] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.032212][ T3808] do_el0_svc_compat+0x40/0x68 Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.032594][ T3808] el0_svc_compat+0x4c/0x17c Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.033038][ T3808] el0t_32_sync_handler+0x98/0x13c Jan 1 00:05:45 syzkaller kern.warn kernel: [ 346.033389][ T3808] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:45 syzkaller kern.info kernel: [ 346.082921][ T3807] serio: Serial port pts0 [ 347.897093][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 347.897413][ T29] audit: type=1400 audit(347.090:638): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 347.899506][ T29] audit: type=1400 audit(347.100:639): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 347.914963][ T29] audit: type=1400 audit(347.100:640): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 347.916753][ T29] audit: type=1400 audit(347.120:641): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 347.918220][ T29] audit: type=1400 audit(347.120:642): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 347.919455][ T29] audit: type=1400 audit(347.150:643): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 348.021141][ T29] audit: type=1400 audit(347.270:644): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:05:47 syzkaller kern.warn kernel: [ 347.897093][ T29] kauditd_printk_skb: 55 callbacks suppressed Jan 1 00:05:47 syzkaller kern.notice kernel: [ 347.897413][ T29] audit: type=1400 audit(347.090:638): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 Jan 1 00:05:47 syzkaller kern.notice kernel: [ 347.899506][ T29] audit: type=1400 audit(347.100:639): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0[ 348.051852][ T29] audit: type=1400 audit(347.330:645): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.055930][ T29] audit: type=1400 audit(347.340:646): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.057982][ T29] audit: type=1400 audit(347.340:647): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:47 syzkaller kern.notice kernel: [ 347.914963][ T29] audit: type=1400 audit(347.100:640): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:47 syzkaller kern.notice kernel: [ 347.916753][ T29] audit: type=1400 audit(347.120:641): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 Jan 1 00:05:47 syzkaller kern.notice kernel: [ 347.918220][ T29] audit: type=1400 audit(347.120:642): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:47 syzkaller kern.notice kernel: [ 347.919455][ T29] audit: type=1400 audit(347.150:643): avc: denied { create } for pid=3819 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 Jan 1 00:05:47 syzkaller kern.notice kernel: [ 348.021141][ T29] audit: type=1400 audit(347.270:644): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk Jan 1 00:05:47 syzkaller kern.notice kernel: [ 348.051852][ T29] audit: type=1400 audit(347.330:645): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:47 syzkaller kern.notice kernel: [ 348.055930][ T29] audit: type=1400 audit(347.340:646): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:47 syzkaller kern.notice kernel: [ 348.057982][ T29] audit: type=1400 audit(347.340:647): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 350.302843][ T3832] FAULT_INJECTION: forcing a failure. [ 350.302843][ T3832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.303533][ T3832] CPU: 0 UID: 0 PID: 3832 Comm: syz.1.180 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 350.303952][ T3832] Hardware name: linux,dummy-virt (DT) [ 350.304345][ T3832] Call trace: [ 350.304667][ T3832] show_stack+0x18/0x24 (C) [ 350.305063][ T3832] dump_stack_lvl+0xdc/0xf4 [ 350.305351][ T3832] dump_stack+0x1c/0x28 [ 350.305644][ T3832] should_fail_ex+0x510/0x5f4 [ 350.305916][ T3832] should_fail+0x14/0x20 [ 350.306362][ T3832] should_fail_usercopy+0x1c/0x28 [ 350.306641][ T3832] simple_read_from_buffer+0x90/0x1ec [ 350.306926][ T3832] proc_fail_nth_read+0x160/0x248 [ 350.307201][ T3832] vfs_read+0x18c/0x978 [ 350.307481][ T3832] ksys_read+0xec/0x1d8 [ 350.307898][ T3832] __arm64_sys_read+0x6c/0x9c [ 350.308399][ T3832] invoke_syscall+0x6c/0x258 [ 350.308744][ T3832] el0_svc_common.constprop.0+0xac/0x230 [ 350.309248][ T3832] do_el0_svc_compat+0x40/0x68 [ 350.309519][ T3832] el0_svc_compat+0x4c/0x17c [ 350.309871][ T3832] el0t_32_sync_handler+0x98/0x13c [ 350.310268][ T3832] el0t_32_sync+0x19c/0x1a0 Jan 1 00:05:49 syzkaller kern.notice kernel: [ 350.302843][ T3832] FAULT_INJECTION: forcing a failure. Jan 1 00:05:49 syzkaller kern.notice kernel: [ 350.302843][ T3832] name fail_usercopy, interval 1, probability 0, space 0, times 0 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.303533][ T3832] CPU: 0 UID: 0 PID: 3832 Comm: syz.1.180 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.303952][ T3832] Hardware name: linux,dummy-virt (DT) Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.304345][ T3832] Call trace: Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.304667][ T3832] show_stack+0x18/0x24 (C) Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.305063][ T3832] dump_stack_lvl+0xdc/0xf4 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.305351][ T3832] dump_stack+0x1c/0x28 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.305644][ T3832] should_fail_ex+0x510/0x5f4 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.305916][ T3832] should_fail+0x14/0x20 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.306362][ T3832] should_fail_usercopy+0x1c/0x28 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.306641][ T3832] simple_read_from_buffer+0x90/0x1ec Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.306926][ T3832] proc_fail_nth_read+0x160/0x248 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.307201][ T3832] vfs_read+0x18c/0x978 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.307481][ T3832] ksys_read+0xec/0x1d8 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.307898][ T3832] __arm64_sys_read+0x6c/0x9c Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.308399][ T3832] invoke_syscall+0x6c/0x258 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.308744][ T3832] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.309248][ T3832] do_el0_svc_compat+0x40/0x68 Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.309519][ T3832] el0_svc_compat+0x4c/0x17c Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.309871][ T3832] el0t_32_sync_handler+0x98/0x13c Jan 1 00:05:49 syzkaller kern.warn kernel: [ 350.310268][ T3832] el0t_32_sync+0x19c/0x1a0 [ 353.641141][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 353.641321][ T29] audit: type=1400 audit(352.930:701): avc: denied { create } for pid=3843 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 353.678972][ T29] audit: type=1400 audit(352.950:702): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:52 syzkaller kern.warn kernel: [ 353.641141][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 353.698742][ T29] audit: type=1400 audit(352.990:703): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:52 syzkaller kern.notice kernel: [ 353.641321][ T29] audit: type=1400 audit(352.930:701): avc: denied { create } for pid=3843 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 353.758837][ T29] audit: type=1400 audit(353.050:704): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:52 syzkaller kern.notice kernel: [ 353.678972][ T29] audit: type=1400 audit(352.950:702): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 353.791759][ T29] audit: type=1400 audit(353.080:705): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.806730][ T29] audit: type=1400 audit(353.090:706): avc: denied { create } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 353.848325][ T29] audit: type=1400 audit(353.140:707): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 353.943053][ T29] audit: type=1400 audit(353.230:708): avc: denied { prog_load } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.965370][ T29] audit: type=1400 audit(353.260:709): avc: denied { create } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.698742][ T29] audit: type=1400 audit(352.990:703): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 354.092106][ T29] audit: type=1400 audit(353.380:710): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.758837][ T29] audit: type=1400 audit(353.050:704): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.791759][ T29] audit: type=1400 audit(353.080:705): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.806730][ T29] audit: type=1400 audit(353.090:706): avc: denied { create } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.848325][ T29] audit: type=1400 audit(353.140:707): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.943053][ T29] audit: type=1400 audit(353.230:708): avc: denied { prog_load } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:05:53 syzkaller kern.notice kernel: [ 353.965370][ T29] audit: type=1400 audit(353.260:709): avc: denied { create } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 00:05:53 syzkaller kern.notice kernel: [ 354.092106][ T29] audit: type=1400 audit(353.380:710): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.148752][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 359.148951][ T29] audit: type=1400 audit(358.440:811): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 359.192662][ T29] audit: type=1400 audit(358.470:812): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.warn kernel: [ 359.148752][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 359.212393][ T29] audit: type=1400 audit(358.500:813): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.148951][ T29] audit: type=1400 audit(358.440:811): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk [ 359.232719][ T29] audit: type=1400 audit(358.520:814): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.192662][ T29] audit: type=1400 audit(358.470:812): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.251900][ T29] audit: type=1400 audit(358.540:815): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.212393][ T29] audit: type=1400 audit(358.500:813): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.327331][ T29] audit: type=1400 audit(358.620:816): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.232719][ T29] audit: type=1400 audit(358.520:814): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.364014][ T29] audit: type=1400 audit(358.650:817): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.251900][ T29] audit: type=1400 audit(358.540:815): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.431691][ T29] audit: type=1400 audit(358.720:818): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.327331][ T29] audit: type=1400 audit(358.620:816): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.483346][ T29] audit: type=1400 audit(358.760:819): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.364014][ T29] audit: type=1400 audit(358.650:817): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 359.526927][ T29] audit: type=1400 audit(358.820:820): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.431691][ T29] audit: type=1400 audit(358.720:818): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.483346][ T29] audit: type=1400 audit(358.760:819): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:05:58 syzkaller kern.notice kernel: [ 359.526927][ T29] audit: type=1400 audit(358.820:820): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 364.406068][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 364.406194][ T29] audit: type=1400 audit(363.700:835): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 364.417310][ T29] audit: type=1400 audit(363.710:836): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.warn kernel: [ 364.406068][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 364.473386][ T29] audit: type=1400 audit(363.750:837): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.406194][ T29] audit: type=1400 audit(363.700:835): avc: denied { read write } for pid=3280 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk [ 364.514569][ T29] audit: type=1400 audit(363.790:838): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.417310][ T29] audit: type=1400 audit(363.710:836): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.473386][ T29] audit: type=1400 audit(363.750:837): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.514569][ T29] audit: type=1400 audit(363.790:838): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 364.583595][ T29] audit: type=1400 audit(363.870:839): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.584726][ T29] audit: type=1400 audit(363.870:840): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.611235][ T29] audit: type=1400 audit(363.900:841): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.583595][ T29] audit: type=1400 audit(363.870:839): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 364.641357][ T29] audit: type=1400 audit(363.930:842): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.584726][ T29] audit: type=1400 audit(363.870:840): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 364.664535][ T29] audit: type=1400 audit(363.950:843): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.611235][ T29] audit: type=1400 audit(363.900:841): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 364.683759][ T29] audit: type=1400 audit(363.970:844): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.641357][ T29] audit: type=1400 audit(363.930:842): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:03 syzkaller kern.notice kernel: [ 364.664535][ T29] audit: type=1400 audit(363.950:843): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:04 syzkaller kern.notice kernel: [ 364.683759][ T29] audit: type=1400 audit(363.970:844): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 367.035654][ T3908] FAULT_INJECTION: forcing a failure. [ 367.035654][ T3908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.039327][ T3908] CPU: 1 UID: 0 PID: 3908 Comm: syz.1.205 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 367.040015][ T3908] Hardware name: linux,dummy-virt (DT) [ 367.040710][ T3908] Call trace: [ 367.041096][ T3908] show_stack+0x18/0x24 (C) [ 367.041587][ T3908] dump_stack_lvl+0xdc/0xf4 [ 367.042131][ T3908] dump_stack+0x1c/0x28 [ 367.042710][ T3908] should_fail_ex+0x510/0x5f4 [ 367.043280][ T3908] should_fail+0x14/0x20 [ 367.043933][ T3908] should_fail_usercopy+0x1c/0x28 [ 367.044513][ T3908] simple_read_from_buffer+0x90/0x1ec [ 367.045164][ T3908] proc_fail_nth_read+0x160/0x248 [ 367.045844][ T3908] vfs_read+0x18c/0x978 [ 367.046429][ T3908] ksys_read+0xec/0x1d8 [ 367.046874][ T3908] __arm64_sys_read+0x6c/0x9c [ 367.047374][ T3908] invoke_syscall+0x6c/0x258 [ 367.048434][ T3908] el0_svc_common.constprop.0+0xac/0x230 [ 367.049021][ T3908] do_el0_svc_compat+0x40/0x68 [ 367.049525][ T3908] el0_svc_compat+0x4c/0x17c [ 367.050089][ T3908] el0t_32_sync_handler+0x98/0x13c [ 367.050745][ T3908] el0t_32_sync+0x19c/0x1a0 Jan 1 00:06:06 syzkaller kern.notice kernel: [ 367.035654][ T3908] FAULT_INJECTION: forcing a failure. Jan 1 00:06:06 syzkaller kern.notice kernel: [ 367.035654][ T3908] name fail_usercopy, interval 1, probability 0, space 0, times 0 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.039327][ T3908] CPU: 1 UID: 0 PID: 3908 Comm: syz.1.205 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.040015][ T3908] Hardware name: linux,dummy-virt (DT) Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.040710][ T3908] Call trace: Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.041096][ T3908] show_stack+0x18/0x24 (C) Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.041587][ T3908] dump_stack_lvl+0xdc/0xf4 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.042131][ T3908] dump_stack+0x1c/0x28 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.042710][ T3908] should_fail_ex+0x510/0x5f4 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.043280][ T3908] should_fail+0x14/0x20 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.043933][ T3908] should_fail_usercopy+0x1c/0x28 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.044513][ T3908] simple_read_from_buffer+0x90/0x1ec Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.045164][ T3908] proc_fail_nth_read+0x160/0x248 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.045844][ T3908] vfs_read+0x18c/0x978 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.046429][ T3908] ksys_read+0xec/0x1d8 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.046874][ T3908] __arm64_sys_read+0x6c/0x9c Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.047374][ T3908] invoke_syscall+0x6c/0x258 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.048434][ T3908] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.049021][ T3908] do_el0_svc_compat+0x40/0x68 Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.049525][ T3908] el0_svc_compat+0x4c/0x17c Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.050089][ T3908] el0t_32_sync_handler+0x98/0x13c Jan 1 00:06:06 syzkaller kern.warn kernel: [ 367.050745][ T3908] el0t_32_sync+0x19c/0x1a0 [ 369.471517][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 369.471622][ T29] audit: type=1400 audit(368.760:922): avc: denied { map_create } for pid=3923 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 369.477475][ T29] audit: type=1400 audit(368.770:923): avc: denied { prog_load } for pid=3923 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 369.494936][ T29] audit: type=1400 audit(368.790:924): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:08 syzkaller kern.warn kernel: [ 369.471517][ T29] kauditd_printk_skb: 77 callbacks suppressed Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.471622][ T29] audit: type=1400 audit(368.760:922): avc: denied { map_create } for pid=3923 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 369.519323][ T29] audit: type=1400 audit(368.810:925): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.524784][ T29] audit: type=1400 audit(368.820:926): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.477475][ T29] audit: type=1400 audit(368.770:923): avc: denied { prog_load } for pid=3923 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 369.538009][ T29] audit: type=1400 audit(368.830:927): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.545282][ T29] audit: type=1400 audit(368.840:928): avc: denied { prog_load } for pid=3923 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.494936][ T29] audit: type=1400 audit(368.790:924): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 369.564359][ T29] audit: type=1400 audit(368.860:929): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.519323][ T29] audit: type=1400 audit(368.810:925): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.524784][ T29] audit: type=1400 audit(368.820:926): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 369.583342][ T29] audit: type=1400 audit(368.870:930): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.591039][ T29] audit: type=1400 audit(368.880:931): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.538009][ T29] audit: type=1400 audit(368.830:927): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.545282][ T29] audit: type=1400 audit(368.840:928): avc: denied { prog_load } for pid=3923 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.564359][ T29] audit: type=1400 audit(368.860:929): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.583342][ T29] audit: type=1400 audit(368.870:930): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:08 syzkaller kern.notice kernel: [ 369.591039][ T29] audit: type=1400 audit(368.880:931): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 371.652501][ T3941] FAULT_INJECTION: forcing a failure. [ 371.652501][ T3941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.653518][ T3941] CPU: 0 UID: 0 PID: 3941 Comm: syz.1.223 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 371.654137][ T3941] Hardware name: linux,dummy-virt (DT) [ 371.654466][ T3941] Call trace: [ 371.654809][ T3941] show_stack+0x18/0x24 (C) [ 371.655119][ T3941] dump_stack_lvl+0xdc/0xf4 [ 371.655674][ T3941] dump_stack+0x1c/0x28 [ 371.656132][ T3941] should_fail_ex+0x510/0x5f4 [ 371.656497][ T3941] should_fail+0x14/0x20 [ 371.656951][ T3941] should_fail_usercopy+0x1c/0x28 [ 371.657396][ T3941] get_compat_msghdr+0xa0/0x1f0 [ 371.657851][ T3941] ___sys_sendmsg+0x184/0x19c [ 371.658243][ T3941] __sys_sendmsg+0x114/0x198 [ 371.658653][ T3941] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 371.659077][ T3941] invoke_syscall+0x6c/0x258 [ 371.659489][ T3941] el0_svc_common.constprop.0+0xac/0x230 [ 371.660059][ T3941] do_el0_svc_compat+0x40/0x68 [ 371.660664][ T3941] el0_svc_compat+0x4c/0x17c [ 371.661212][ T3941] el0t_32_sync_handler+0x98/0x13c [ 371.661722][ T3941] el0t_32_sync+0x19c/0x1a0 Jan 1 00:06:10 syzkaller kern.notice kernel: [ 371.652501][ T3941] FAULT_INJECTION: forcing a failure. Jan 1 00:06:10 syzkaller kern.notice kernel: [ 371.652501][ T3941] name fail_usercopy, interval 1, probability 0, space 0, times 0 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.653518][ T3941] CPU: 0 UID: 0 PID: 3941 Comm: syz.1.223 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.654137][ T3941] Hardware name: linux,dummy-virt (DT) Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.654466][ T3941] Call trace: Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.654809][ T3941] show_stack+0x18/0x24 (C) Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.655119][ T3941] dump_stack_lvl+0xdc/0xf4 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.655674][ T3941] dump_stack+0x1c/0x28 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.656132][ T3941] should_fail_ex+0x510/0x5f4 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.656497][ T3941] should_fail+0x14/0x20 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.656951][ T3941] should_fail_usercopy+0x1c/0x28 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.657396][ T3941] get_compat_msghdr+0xa0/0x1f0 Jan 1 00:06:10 syzkaller kern.warn kernel: [ 371.657851][ T3941] ___sys_sendmsg+0x184/0x19c Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.658243][ T3941] __sys_sendmsg+0x114/0x198 Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.658653][ T3941] __arm64_compat_sys_sendmsg+0x74/0xa4 Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.659077][ T3941] invoke_syscall+0x6c/0x258 Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.659489][ T3941] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.660059][ T3941] do_el0_svc_compat+0x40/0x68 Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.660664][ T3941] el0_svc_compat+0x4c/0x17c Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.661212][ T3941] el0t_32_sync_handler+0x98/0x13c Jan 1 00:06:11 syzkaller kern.warn kernel: [ 371.661722][ T3941] el0t_32_sync+0x19c/0x1a0 [ 374.485649][ T3964] FAULT_INJECTION: forcing a failure. [ 374.485649][ T3964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 374.486400][ T3964] CPU: 0 UID: 0 PID: 3964 Comm: syz.0.234 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 374.486824][ T3964] Hardware name: linux,dummy-virt (DT) [ 374.487213][ T3964] Call trace: [ 374.487501][ T3964] show_stack+0x18/0x24 (C) [ 374.487840][ T3964] dump_stack_lvl+0xdc/0xf4 [ 374.488389][ T3964] dump_stack+0x1c/0x28 [ 374.488754][ T3964] should_fail_ex+0x510/0x5f4 [ 374.489069][ T3964] should_fail+0x14/0x20 [ 374.489328][ T3964] should_fail_usercopy+0x1c/0x28 [ 374.489615][ T3964] simple_read_from_buffer+0x90/0x1ec [ 374.489953][ T3964] proc_fail_nth_read+0x160/0x248 [ 374.490302][ T3964] vfs_read+0x18c/0x978 [ 374.490586][ T3964] ksys_read+0xec/0x1d8 [ 374.490860][ T3964] __arm64_sys_read+0x6c/0x9c [ 374.491123][ T3964] invoke_syscall+0x6c/0x258 [ 374.491562][ T3964] el0_svc_common.constprop.0+0xac/0x230 [ 374.491861][ T3964] do_el0_svc_compat+0x40/0x68 [ 374.492136][ T3964] el0_svc_compat+0x4c/0x17c [ 374.492471][ T3964] el0t_32_sync_handler+0x98/0x13c [ 374.492848][ T3964] el0t_32_sync+0x19c/0x1a0 [ 374.504483][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 374.504599][ T29] audit: type=1400 audit(373.800:990): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.notice kernel: [ 374.485649][ T3964] FAULT_INJECTION: forcing a failure. [ 374.518134][ T29] audit: type=1400 audit(373.810:991): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.notice kernel: [ 374.485649][ T3964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 374.536497][ T29] audit: type=1400 audit(373.830:992): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.486400][ T3964] CPU: 0 UID: 0 PID: 3964 Comm: syz.0.234 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.486824][ T3964] Hardware name: linux,dummy-virt (DT) [ 374.561544][ T29] audit: type=1400 audit(373.850:993): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.563265][ T29] audit: type=1400 audit(373.850:994): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.487213][ T3964] Call trace: [ 374.581250][ T29] audit: type=1400 audit(373.870:995): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.487501][ T3964] show_stack+0x18/0x24 (C) Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.487840][ T3964] dump_stack_lvl+0xdc/0xf4[ 374.653656][ T29] audit: type=1400 audit(373.940:996): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.660855][ T29] audit: type=1400 audit(373.950:997): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.488389][ T3964] dump_stack+0x1c/0x28 [ 374.675480][ T29] audit: type=1400 audit(373.970:998): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.488754][ T3964] should_fail_ex+0x510/0x5f4 [ 374.685519][ T29] audit: type=1400 audit(373.980:999): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.489069][ T3964] should_fail+0x14/0x20 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.489328][ T3964] should_fail_usercopy+0x1c/0x28 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.489615][ T3964] simple_read_from_buffer+0x90/0x1ec Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.489953][ T3964] proc_fail_nth_read+0x160/0x248 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.490302][ T3964] vfs_read+0x18c/0x978 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.490586][ T3964] ksys_read+0xec/0x1d8 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.490860][ T3964] __arm64_sys_read+0x6c/0x9c Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.491123][ T3964] invoke_syscall+0x6c/0x258 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.491562][ T3964] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.491861][ T3964] do_el0_svc_compat+0x40/0x68 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.492136][ T3964] el0_svc_compat+0x4c/0x17c Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.492471][ T3964] el0t_32_sync_handler+0x98/0x13c Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.492848][ T3964] el0t_32_sync+0x19c/0x1a0 Jan 1 00:06:13 syzkaller kern.warn kernel: [ 374.504483][ T29] kauditd_printk_skb: 58 callbacks suppressed Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.504599][ T29] audit: type=1400 audit(373.800:990): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.518134][ T29] audit: type=1400 audit(373.810:991): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.536497][ T29] audit: type=1400 audit(373.830:992): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.561544][ T29] audit: type=1400 audit(373.850:993): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.563265][ T29] audit: type=1400 audit(373.850:994): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.581250][ T29] audit: type=1400 audit(373.870:995): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.653656][ T29] audit: type=1400 audit(373.940:996): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.660855][ T29] audit: type=1400 audit(373.950:997): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.675480][ T29] audit: type=1400 audit(373.970:998): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:14 syzkaller kern.notice kernel: [ 374.685519][ T29] audit: type=1400 audit(373.980:999): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.251953][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 380.252078][ T29] audit: type=1400 audit(379.530:1037): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.287521][ T29] audit: type=1400 audit(379.580:1038): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.warn kernel: [ 380.251953][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 380.302007][ T29] audit: type=1400 audit(379.590:1039): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.252078][ T29] audit: type=1400 audit(379.530:1037): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis [ 380.424983][ T29] audit: type=1400 audit(379.720:1040): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.287521][ T29] audit: type=1400 audit(379.580:1038): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.438911][ T29] audit: type=1400 audit(379.730:1041): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.302007][ T29] audit: type=1400 audit(379.590:1039): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.458886][ T29] audit: type=1400 audit(379.750:1042): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.424983][ T29] audit: type=1400 audit(379.720:1040): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.502263][ T29] audit: type=1400 audit(379.780:1043): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.438911][ T29] audit: type=1400 audit(379.730:1041): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.519656][ T29] audit: type=1400 audit(379.810:1044): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.458886][ T29] audit: type=1400 audit(379.750:1042): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.545336][ T29] audit: type=1400 audit(379.840:1045): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.502263][ T29] audit: type=1400 audit(379.780:1043): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 380.562697][ T29] audit: type=1400 audit(379.850:1046): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.519656][ T29] audit: type=1400 audit(379.810:1044): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.545336][ T29] audit: type=1400 audit(379.840:1045): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:19 syzkaller kern.notice kernel: [ 380.562697][ T29] audit: type=1400 audit(379.850:1046): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 385.567937][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 385.568125][ T29] audit: type=1400 audit(384.860:1069): avc: denied { read } for pid=4010 comm="syz.1.256" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 385.585203][ T29] audit: type=1400 audit(384.880:1070): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:24 syzkaller kern.warn kernel: [ 385.567937][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 385.628610][ T29] audit: type=1400 audit(384.920:1071): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:24 syzkaller kern.notice kernel: [ 385.568125][ T29] audit: type=1400 audit(384.860:1069): avc: denied { read } for pid=4010 comm="syz.1.256" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tcla [ 385.666100][ T29] audit: type=1400 audit(384.960:1072): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:24 syzkaller kern.notice kernel: [ 385.585203][ T29] audit: type=1400 audit(384.880:1070): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 385.699458][ T29] audit: type=1400 audit(384.990:1073): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:24 syzkaller kern.notice kernel: [ 385.628610][ T29] audit: type=1400 audit(384.920:1071): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 385.736330][ T29] audit: type=1400 audit(385.020:1074): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:24 syzkaller kern.notice kernel: [ 385.666100][ T29] audit: type=1400 audit(384.960:1072): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 385.774716][ T29] audit: type=1400 audit(385.070:1075): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:25 syzkaller kern.notice kernel: [ 385.699458][ T29] audit: type=1400 audit(384.990:1073): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file[ 385.796785][ T29] audit: type=1400 audit(385.080:1076): avc: denied { create } for pid=4010 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 385.821846][ T29] audit: type=1400 audit(385.110:1077): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:25 syzkaller kern.notice kernel: [ 385.736330][ T29] audit: type=1400 audit(385.020:1074): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 385.882474][ T29] audit: type=1400 audit(385.140:1078): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:25 syzkaller kern.notice kernel: [ 385.774716][ T29] audit: type=1400 audit(385.070:1075): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:25 syzkaller kern.notice kernel: [ 385.796785][ T29] audit: type=1400 audit(385.080:1076): avc: denied { create } for pid=4010 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 Jan 1 00:06:25 syzkaller kern.notice kernel: [ 385.821846][ T29] audit: type=1400 audit(385.110:1077): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:25 syzkaller kern.notice kernel: [ 385.882474][ T29] audit: type=1400 audit(385.140:1078): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 389.248138][ T4044] FAULT_INJECTION: forcing a failure. [ 389.248138][ T4044] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 389.248885][ T4044] CPU: 1 UID: 0 PID: 4044 Comm: syz.1.261 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 389.249271][ T4044] Hardware name: linux,dummy-virt (DT) [ 389.249561][ T4044] Call trace: [ 389.249799][ T4044] show_stack+0x18/0x24 (C) [ 389.250265][ T4044] dump_stack_lvl+0xdc/0xf4 [ 389.250642][ T4044] dump_stack+0x1c/0x28 [ 389.250955][ T4044] should_fail_ex+0x510/0x5f4 [ 389.251257][ T4044] should_fail+0x14/0x20 [ 389.251540][ T4044] should_fail_usercopy+0x1c/0x28 [ 389.251951][ T4044] simple_read_from_buffer+0x90/0x1ec [ 389.252292][ T4044] proc_fail_nth_read+0x160/0x248 [ 389.252623][ T4044] vfs_read+0x18c/0x978 [ 389.252968][ T4044] ksys_read+0xec/0x1d8 [ 389.253252][ T4044] __arm64_sys_read+0x6c/0x9c [ 389.253597][ T4044] invoke_syscall+0x6c/0x258 [ 389.253885][ T4044] el0_svc_common.constprop.0+0xac/0x230 [ 389.254212][ T4044] do_el0_svc_compat+0x40/0x68 [ 389.254501][ T4044] el0_svc_compat+0x4c/0x17c [ 389.254790][ T4044] el0t_32_sync_handler+0x98/0x13c [ 389.255086][ T4044] el0t_32_sync+0x19c/0x1a0 Jan 1 00:06:28 syzkaller kern.notice kernel: [ 389.248138][ T4044] FAULT_INJECTION: forcing a failure. Jan 1 00:06:28 syzkaller kern.notice kernel: [ 389.248138][ T4044] name fail_usercopy, interval 1, probability 0, space 0, times 0 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.248885][ T4044] CPU: 1 UID: 0 PID: 4044 Comm: syz.1.261 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.249271][ T4044] Hardware name: linux,dummy-virt (DT) Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.249561][ T4044] Call trace: Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.249799][ T4044] show_stack+0x18/0x24 (C) Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.250265][ T4044] dump_stack_lvl+0xdc/0xf4 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.250642][ T4044] dump_stack+0x1c/0x28 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.250955][ T4044] should_fail_ex+0x510/0x5f4 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.251257][ T4044] should_fail+0x14/0x20 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.251540][ T4044] should_fail_usercopy+0x1c/0x28 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.251951][ T4044] simple_read_from_buffer+0x90/0x1ec Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.252292][ T4044] proc_fail_nth_read+0x160/0x248 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.252623][ T4044] vfs_read+0x18c/0x978 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.252968][ T4044] ksys_read+0xec/0x1d8 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.253252][ T4044] __arm64_sys_read+0x6c/0x9c Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.253597][ T4044] invoke_syscall+0x6c/0x258 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.253885][ T4044] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.254212][ T4044] do_el0_svc_compat+0x40/0x68 Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.254501][ T4044] el0_svc_compat+0x4c/0x17c Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.254790][ T4044] el0t_32_sync_handler+0x98/0x13c Jan 1 00:06:28 syzkaller kern.warn kernel: [ 389.255086][ T4044] el0t_32_sync+0x19c/0x1a0 [ 390.624003][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 390.624226][ T29] audit: type=1400 audit(389.920:1142): avc: denied { create } for pid=4055 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 390.631415][ T29] audit: type=1400 audit(389.920:1143): avc: denied { create } for pid=4055 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Jan 1 00:06:29 syzkaller kern.warn kernel: [ 390.624003][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 390.662206][ T29] audit: type=1400 audit(389.940:1144): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 390.675324][ T29] audit: type=1400 audit(389.970:1145): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:29 syzkaller kern.notice kernel: [ 390.624226][ T29] audit: type=1400 audit(389.920:1142): avc: denied { create } for pid=4055 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 390.723031][ T29] audit: type=1400 audit(390.000:1146): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:29 syzkaller kern.notice kernel: [ 390.631415][ T29] audit: type=1400 audit(389.920:1143): avc: denied { create } for pid=4055 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 390.776206][ T29] audit: type=1400 audit(390.070:1147): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:29 syzkaller kern.notice kernel: [ 390.662206][ T29] audit: type=1400 audit(389.940:1144): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:29 syzkaller kern.notice kernel: [ 390.675324][ T29] audit: type=1400 audit(389.970:1145): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:30 syzkaller kern.notice kernel: [ 390.723031][ T29] audit: type=1400 audit(390.000:1146): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 390.813560][ T29] audit: type=1400 audit(390.080:1148): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 390.815202][ T29] audit: type=1400 audit(390.090:1149): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 390.815968][ T29] audit: type=1400 audit(390.110:1150): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:30 syzkaller kern.notice kernel: [ 390.776206][ T29] audit: type=1400 audit(390.070:1147): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 390.879789][ T29] audit: type=1400 audit(390.170:1151): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:30 syzkaller kern.notice kernel: [ 390.813560][ T29] audit: type=1400 audit(390.080:1148): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:30 syzkaller kern.notice kernel: [ 390.815202][ T29] audit: type=1400 audit(390.090:1149): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:30 syzkaller kern.notice kernel: [ 390.815968][ T29] audit: type=1400 audit(390.110:1150): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file Jan 1 00:06:30 syzkaller kern.notice kernel: [ 390.879789][ T29] audit: type=1400 audit(390.170:1151): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file [ 391.154866][ T4060] FAULT_INJECTION: forcing a failure. [ 391.154866][ T4060] name failslab, interval 1, probability 0, space 0, times 0 [ 391.155648][ T4060] CPU: 1 UID: 0 PID: 4060 Comm: syz.1.270 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 391.156154][ T4060] Hardware name: linux,dummy-virt (DT) [ 391.156523][ T4060] Call trace: [ 391.156867][ T4060] show_stack+0x18/0x24 (C) [ 391.157247][ T4060] dump_stack_lvl+0xdc/0xf4 [ 391.157621][ T4060] dump_stack+0x1c/0x28 [ 391.157960][ T4060] should_fail_ex+0x510/0x5f4 [ 391.158322][ T4060] should_failslab+0xbc/0x11c [ 391.158685][ T4060] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 [ 391.159120][ T4060] __d_alloc+0x34/0x7f0 [ 391.159593][ T4060] d_alloc_anon+0x14/0x20 [ 391.160139][ T4060] path_from_stashed+0x518/0x8c4 [ 391.160751][ T4060] open_namespace+0x80/0x130 [ 391.161310][ T4060] open_related_ns+0x1c/0x28 [ 391.161820][ T4060] sock_ioctl+0x314/0x5e0 [ 391.162298][ T4060] compat_sock_ioctl+0x26c/0x538 [ 391.162782][ T4060] __arm64_compat_sys_ioctl+0x1b0/0x214 [ 391.163262][ T4060] invoke_syscall+0x6c/0x258 [ 391.163741][ T4060] el0_svc_common.constprop.0+0xac/0x230 [ 391.164254][ T4060] do_el0_svc_compat+0x40/0x68 [ 391.164754][ T4060] el0_svc_compat+0x4c/0x17c [ 391.165265][ T4060] el0t_32_sync_handler+0x98/0x13c [ 391.165776][ T4060] el0t_32_sync+0x19c/0x1a0 Jan 1 00:06:30 syzkaller kern.notice kernel: [ 391.154866][ T4060] FAULT_INJECTION: forcing a failure. Jan 1 00:06:30 syzkaller kern.notice kernel: [ 391.154866][ T4060] name failslab, interval 1, probability 0, space 0, times 0 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.155648][ T4060] CPU: 1 UID: 0 PID: 4060 Comm: syz.1.270 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.156154][ T4060] Hardware name: linux,dummy-virt (DT) Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.156523][ T4060] Call trace: Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.156867][ T4060] show_stack+0x18/0x24 (C) Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.157247][ T4060] dump_stack_lvl+0xdc/0xf4 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.157621][ T4060] dump_stack+0x1c/0x28 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.157960][ T4060] should_fail_ex+0x510/0x5f4 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.158322][ T4060] should_failslab+0xbc/0x11c Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.158685][ T4060] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.159120][ T4060] __d_alloc+0x34/0x7f0 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.159593][ T4060] d_alloc_anon+0x14/0x20 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.160139][ T4060] path_from_stashed+0x518/0x8c4 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.160751][ T4060] open_namespace+0x80/0x130 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.161310][ T4060] open_related_ns+0x1c/0x28 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.161820][ T4060] sock_ioctl+0x314/0x5e0 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.162298][ T4060] compat_sock_ioctl+0x26c/0x538 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.162782][ T4060] __arm64_compat_sys_ioctl+0x1b0/0x214 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.163262][ T4060] invoke_syscall+0x6c/0x258 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.163741][ T4060] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.164254][ T4060] do_el0_svc_compat+0x40/0x68 Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.164754][ T4060] el0_svc_compat+0x4c/0x17c Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.165265][ T4060] el0t_32_sync_handler+0x98/0x13c Jan 1 00:06:30 syzkaller kern.warn kernel: [ 391.165776][ T4060] el0t_32_sync+0x19c/0x1a0 [ 392.418348][ T4070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=4070 comm=syz.0.274 Jan 1 00:06:31 syzkaller kern.warn kernel: [ 392.418348][ T4070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=4070 comm=syz.0.274 [ 393.531149][ C0] [ 393.531563][ C0] ============================= [ 393.531850][ C0] [ BUG: Invalid wait context ] [ 393.532126][ C0] 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Not tainted [ 393.532718][ C0] ----------------------------- [ 393.533021][ C0] syz.1.277/4078 is trying to lock: [ 393.533416][ C0] ffff00007fc1ffd8 (&zone->lock){-.-.}-{3:3}, at: __rmqueue_pcplist+0x388/0x1178 [ 393.534705][ C0] other info that might help us debug this: [ 393.535516][ C0] context-{2:2} [ 393.536224][ C0] 1 lock held by syz.1.277/4078: [ 393.536789][ C0] #0: ffff000069f75698 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x428/0x20f0 [ 393.537505][ C0] stack backtrace: [ 393.537775][ C0] CPU: 0 UID: 0 PID: 4078 Comm: syz.1.277 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 393.538164][ C0] Hardware name: linux,dummy-virt (DT) [ 393.538459][ C0] Call trace: [ 393.538681][ C0] show_stack+0x18/0x24 (C) [ 393.538946][ C0] dump_stack_lvl+0xa4/0xf4 [ 393.539205][ C0] dump_stack+0x1c/0x28 [ 393.539464][ C0] __lock_acquire+0x1514/0x6604 [ 393.539777][ C0] lock_acquire+0x450/0x76c [ 393.540328][ C0] _raw_spin_lock_irqsave+0x58/0x80 [ 393.540668][ C0] __rmqueue_pcplist+0x388/0x1178 [ 393.540993][ C0] get_page_from_freelist+0x4a0/0x20f0 [ 393.541428][ C0] __alloc_pages_noprof+0x1b4/0x2248 [ 393.541727][ C0] alloc_pages_mpol_noprof+0x104/0x490 [ 393.542016][ C0] alloc_pages_noprof+0x178/0x1ec [ 393.542291][ C0] stack_depot_save_flags+0x2b0/0x9e0 [ 393.542584][ C0] kasan_save_stack+0x50/0x64 [ 393.542846][ C0] __kasan_record_aux_stack+0xa0/0xb8 [ 393.543123][ C0] kasan_record_aux_stack+0x14/0x20 [ 393.543433][ C0] task_work_add+0x9c/0x35c [ 393.543844][ C0] run_posix_cpu_timers+0x520/0x814 [ 393.544158][ C0] update_process_times+0x16c/0x444 [ 393.544449][ C0] tick_nohz_handler+0x198/0x40c [ 393.544738][ C0] __hrtimer_run_queues+0x5ec/0x964 [ 393.545006][ C0] hrtimer_interrupt+0x2a0/0x768 [ 393.545315][ C0] arch_timer_handler_phys+0x40/0x6c [ 393.545656][ C0] handle_percpu_devid_irq+0x19c/0x30c [ 393.545942][ C0] generic_handle_domain_irq+0x78/0xa4 [ 393.546223][ C0] gic_handle_irq+0x54/0x184 [ 393.546598][ C0] call_on_irq_stack+0x24/0x4c [ 393.546865][ C0] do_interrupt_handler+0x12c/0x150 [ 393.547129][ C0] el1_interrupt+0x34/0x54 [ 393.547381][ C0] el1h_64_irq_handler+0x18/0x24 [ 393.547667][ C0] el1h_64_irq+0x6c/0x70 [ 393.547984][ C0] _raw_spin_unlock_irqrestore+0x40/0xac (P) [ 393.548295][ C0] do_timer_settime+0x230/0x2f4 [ 393.548637][ C0] __arm64_sys_timer_settime32+0x12c/0x1e0 [ 393.548967][ C0] invoke_syscall+0x6c/0x258 [ 393.549221][ C0] el0_svc_common.constprop.0+0xac/0x230 [ 393.549502][ C0] do_el0_svc_compat+0x40/0x68 [ 393.549751][ C0] el0_svc_compat+0x4c/0x17c [ 393.550048][ C0] el0t_32_sync_handler+0x98/0x13c [ 393.550349][ C0] el0t_32_sync+0x19c/0x1a0 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.531149][ C0] Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.531563][ C0] ============================= Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.531850][ C0] [ BUG: Invalid wait context ] Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.532126][ C0] 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Not tainted Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.532718][ C0] ----------------------------- Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.533021][ C0] syz.1.277/4078 is trying to lock: Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.533416][ C0] ffff00007fc1ffd8 (&zone->lock){-.-.}-{3:3}, at: __rmqueue_pcplist+0x388/0x1178 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.534705][ C0] other info that might help us debug this: Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.535516][ C0] context-{2:2} Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.536224][ C0] 1 lock held by syz.1.277/4078: Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.536789][ C0] #0: ffff000069f75698 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x428/0x20f0 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.537505][ C0] stack backtrace: Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.537775][ C0] CPU: 0 UID: 0 PID: 4078 Comm: syz.1.277 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.538164][ C0] Hardware name: linux,dummy-virt (DT) Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.538459][ C0] Call trace: Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.538681][ C0] show_stack+0x18/0x24 (C) Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.538946][ C0] dump_stack_lvl+0xa4/0xf4 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.539205][ C0] dump_stack+0x1c/0x28 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.539464][ C0] __lock_acquire+0x1514/0x6604 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.539777][ C0] lock_acquire+0x450/0x76c Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.540328][ C0] _raw_spin_lock_irqsave+0x58/0x80 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.540668][ C0] __rmqueue_pcplist+0x388/0x1178 Jan 1 00:06:32 syzkaller kern.warn kernel: [ 393.540993][ C0] get_page_from_freelist+0x4a0/0x20f0 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.541428][ C0] __alloc_pages_noprof+0x1b4/0x2248 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.541727][ C0] alloc_pages_mpol_noprof+0x104/0x490 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.542016][ C0] alloc_pages_noprof+0x178/0x1ec Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.542291][ C0] stack_depot_save_flags+0x2b0/0x9e0 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.542584][ C0] kasan_save_stack+0x50/0x64 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.542846][ C0] __kasan_record_aux_stack+0xa0/0xb8 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.543123][ C0] kasan_record_aux_stack+0x14/0x20 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.543433][ C0] task_work_add+0x9c/0x35c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.543844][ C0] run_posix_cpu_timers+0x520/0x814 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.544158][ C0] update_process_times+0x16c/0x444 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.544449][ C0] tick_nohz_handler+0x198/0x40c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.544738][ C0] __hrtimer_run_queues+0x5ec/0x964 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.545006][ C0] hrtimer_interrupt+0x2a0/0x768 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.545315][ C0] arch_timer_handler_phys+0x40/0x6c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.545656][ C0] handle_percpu_devid_irq+0x19c/0x30c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.545942][ C0] generic_handle_domain_irq+0x78/0xa4 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.546223][ C0] gic_handle_irq+0x54/0x184 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.546598][ C0] call_on_irq_stack+0x24/0x4c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.546865][ C0] do_interrupt_handler+0x12c/0x150 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.547129][ C0] el1_interrupt+0x34/0x54 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.547381][ C0] el1h_64_irq_handler+0x18/0x24 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.547667][ C0] el1h_64_irq+0x6c/0x70 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.547984][ C0] _raw_spin_unlock_irqrestore+0x40/0xac (P) Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.548295][ C0] do_timer_settime+0x230/0x2f4 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.548637][ C0] __arm64_sys_timer_settime32+0x12c/0x1e0 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.548967][ C0] invoke_syscall+0x6c/0x258 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.549221][ C0] el0_svc_common.constprop.0+0xac/0x230 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.549502][ C0] do_el0_svc_compat+0x40/0x68 Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.549751][ C0] el0_svc_compat+0x4c/0x17c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.550048][ C0] el0t_32_sync_handler+0x98/0x13c Jan 1 00:06:33 syzkaller kern.warn kernel: [ 393.550349][ C0] el0t_32_sync+0x19c/0x1a0 VM DIAGNOSIS: 12:59:13 Registers: info registers vcpu 0 CPU#0 PC=ffff8000853164bc X00=00000000000000c0 X01=0000000000000001 X02=0000000000000001 X03=ffff80008030fc80 X04=ffff700010dd33dd X05=ffff800086e99ee0 X06=ffff700010dd33dc X07=0000000000000001 X08=ffff800086e99ee0 X09=dfff800000000000 X10=ffff700010dd33dc X11=1ffff00010dd33dc X12=ffff700010dd33dd X13=000000000000f1f1 X14=0000000000000001 X15=1fffe00002ce114c X16=0000000000000000 X17=0000000000000000 X18=0000000000000004 X19=00000000000000c0 X20=ffff800086e99ee0 X21=ffff800080334154 X22=00000000000000c0 X23=0000000000000000 X24=0000000000000000 X25=ffff8000853a0180 X26=0000000000000001 X27=ffff800080334154 X28=ffff000016708000 X29=ffff800080006a60 X30=ffff8000853164ac SP=ffff800080006a60 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000807db520 X00=0000000000000000 X01=0000000000000003 X02=0000000000000010 X03=1ffff0001422cf45 X04=0000000000000001 X05=ffff00001696d060 X06=ffff70001422cf4c X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff70001422cf4c X11=1ffff0001422cf4c X12=ffff70001422cf4d X13=000000000000f1f1 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=1ffff0001422cf6e X18=1ffff0001422cf4c X19=ffff00001696cfe0 X20=ffff80008cc59828 X21=ffff00001ac58000 X22=ffff00001696d180 X23=ffff00001696d168 X24=1ffff0001422cf66 X25=ffff00001696d008 X26=ffff00001696d1a8 X27=ffff00001696d0b0 X28=ffff800085440fe0 X29=ffff8000a1167880 X30=ffff80008140a724 SP=ffff8000a1167880 PSTATE=40000005 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000