last executing test programs: 15.377418368s ago: executing program 1 (id=3780): r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000001080)=0x8) 15.281602484s ago: executing program 1 (id=3781): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) shutdown(r0, 0x1) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 15.221712267s ago: executing program 1 (id=3782): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000002840)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x8) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000200)=0x15) 15.16247869s ago: executing program 1 (id=3783): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f0000000080)=0x80000003) r3 = dup2(r2, r2) read$FUSE(r3, &(0x7f00000063c0)={0x2020}, 0x2020) syz_usb_connect(0x5, 0x36, 0x0, 0x0) 5.330751834s ago: executing program 0 (id=3785): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000003180)=@req3={0x1000, 0x3a, 0x1000, 0x8, 0x7ff, 0xf84, 0x3}, 0x1c) rt_sigqueueinfo(0xffffffffffffffff, 0x18, &(0x7f00000005c0)={0x1a, 0xdcd, 0xfffffffe}) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f00000000c0)={0x1d, r2}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20080, 0x4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}]}}}]}, 0x40}}, 0x0) connect$can_j1939(r1, &(0x7f0000000140)={0x1d, r2}, 0x18) sendmmsg(r1, &(0x7f0000003e40), 0x3fffffffffffe3d, 0x0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 4.849409261s ago: executing program 0 (id=3786): sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB='8\x00\x00', @ANYRES16], 0x38}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) 4.759650297s ago: executing program 0 (id=3787): socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() syz_pidfd_open(r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') r4 = socket$packet(0x11, 0x3, 0x300) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r4, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000340)=""/187, 0xbb}], 0x1, 0x33, 0x33) 4.661371893s ago: executing program 0 (id=3788): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x18b801, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000080)={0x2400, 0x0, 0x29}, 0x18) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240), 0x4000000004002, 0x0) io_setup(0x2, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x1f, 0x1, 0x3, r1, &(0x7f00000011c0)='\n', 0x1}]) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r3, 0x800c5011, 0x0) r4 = gettid() timer_create(0x2, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) close(r5) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r6 = accept4(r5, 0x0, 0x0, 0x800) sendmmsg$alg(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x10}], 0x2b}], 0x1, 0x48810) close_range(r0, 0xffffffffffffffff, 0x0) 3.797876592s ago: executing program 0 (id=3789): r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$notify(r0, 0x402, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x801) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0xa031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x4}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000800000/0x800000)=nil, &(0x7f0000339000/0x1000)=nil, 0x800000}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000540)=ANY=[@ANYBLOB="580000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800c0001006d6163766c616e0020000280080001001000000008000300010000000a000400aaaaaaaaaabb000008000500", @ANYRES32=r3], 0x58}}, 0x0) fcntl$notify(r0, 0x402, 0x80000000) 3.719781617s ago: executing program 0 (id=3790): openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) socket$nl_audit(0x10, 0x3, 0x9) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x60240) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x5c, 0x2) r2 = syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, &(0x7f0000000100)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_MSG_RING={0x28, 0x0, 0x0, r2, 0x0, 0x0}) io_uring_enter(r2, 0x25e4, 0x731b, 0x48, 0x0, 0x0) 108.549044ms ago: executing program 1 (id=3791): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x19ca, 0x4) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xc9, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 0s ago: executing program 1 (id=3792): madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000640)={[0x20000000]}, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='qgroup_meta_reserve\x00', r0, 0x0, 0x200}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x202, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) sendmmsg$unix(r2, &(0x7f000000bf00), 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x4040810) r4 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x4885, 0x100, 0x4, 0x1d}, &(0x7f0000000340)=0x0, &(0x7f0000000600)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r4, 0x16, &(0x7f0000000040)={&(0x7f0000001000)={[{0x0, 0x0, 0x3, 0xf4}]}, 0x1, 0x1}, 0x1) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r7 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x80082, 0x0) write$vga_arbiter(r7, &(0x7f0000000440)=ANY=[@ANYBLOB='unlock me'], 0xb) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r8, 0x0, 0x0, 0x0, 0x322, 0x1, {0x1}}) io_uring_enter(r4, 0x3516, 0x0, 0x0, 0x0, 0x5d) r9 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000040)={0x84, @loopback, 0x15, 0x3, 'dh\x00', 0x20, 0x4, 0x75}, 0x2c) getsockopt$inet_buf(r9, 0x0, 0x23, &(0x7f0000000000)=""/77, 0x0) kernel console output (not intermixed with test programs): 0201ae0>] (show_stack+0x18/0x1c) [ 1838.440765][T15520] r7:00000000 r6:00000000 r5:60000013 r4:82257c34 [ 1838.440787][T15520] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1838.440841][T15520] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1838.440895][T15520] r5:83b9d400 r4:82951710 [ 1838.440912][T15520] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1838.440975][T15520] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1838.441040][T15520] r8:76b37f30 r7:00000000 r6:00000000 r5:ee6b9f68 r4:00000002 [ 1838.441057][T15520] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1838.441107][T15520] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 1838.441166][T15520] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 1838.441235][T15520] r10:00000001 r9:8060401c r8:00000002 r7:ee6b9f68 r6:0000000f r5:76b37f30 [ 1838.441259][T15520] r4:83b9d400 r3:ee6b9e9f [ 1838.441276][T15520] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 1838.441340][T15520] r8:76b37f30 r7:ee6b9f68 r6:83b9d400 r5:0000000f r4:84d69b40 [ 1838.441358][T15520] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 1838.441441][T15520] r10:00000003 r9:83b9d400 r8:8020029c r7:00000000 r6:00000000 r5:84d69b40 [ 1838.441463][T15520] r4:84d69b43 [ 1838.441481][T15520] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 1838.441561][T15520] r7:00000003 r6:00000005 r5:76b37f30 r4:0000000f [ 1838.441581][T15520] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1838.441678][T15520] Exception stack(0xee6b9fa8 to 0xee6b9ff0) [ 1838.441725][T15520] 9fa0: 0000000f 76b37f30 00000005 76b37f30 0000000f 00000000 [ 1838.441765][T15520] 9fc0: 0000000f 76b37f30 00000005 00000003 002d0000 00000000 00006364 76b380bc [ 1838.441798][T15520] 9fe0: 00000158 76b37ed0 000d7d68 0012fe04 [ 1839.870328][T15532] FAULT_INJECTION: forcing a failure. [ 1839.870328][T15532] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.871529][T15532] CPU: 0 UID: 0 PID: 15532 Comm: syz.0.2800 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1839.871606][T15532] Hardware name: ARM-Versatile Express [ 1839.871620][T15532] Call trace: [ 1839.871652][T15532] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1839.871711][T15532] r7:847c3000 r6:00000000 r5:60000013 r4:82257c34 [ 1839.871720][T15532] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1839.871747][T15532] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1839.871777][T15532] r5:847c3000 r4:8291bcc0 [ 1839.871784][T15532] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1839.871815][T15532] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1839.871853][T15532] r8:00000000 r7:847c3000 r6:00000cc0 r5:ffffffff r4:830ad9c0 [ 1839.871863][T15532] [<80525738>] (should_failslab) from [<80509b64>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1839.871892][T15532] [<80509b14>] (kmem_cache_alloc_node_noprof) from [<81526d70>] (__alloc_skb+0x138/0x160) [ 1839.871929][T15532] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830ad9c0 r5:ffffffff [ 1839.871939][T15532] r4:82806040 [ 1839.871946][T15532] [<81526c38>] (__alloc_skb) from [<816448dc>] (netlink_alloc_large_skb+0x88/0xa0) [ 1839.871981][T15532] r8:00000000 r7:84eca000 r6:00000014 r5:85029180 r4:00000140 [ 1839.871990][T15532] [<81644854>] (netlink_alloc_large_skb) from [<81644f00>] (netlink_sendmsg+0x134/0x444) [ 1839.872019][T15532] r5:85029180 r4:df845f20 [ 1839.872026][T15532] [<81644dcc>] (netlink_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 1839.872062][T15532] r10:00000000 r9:df845dc4 r8:df845dc4 r7:00000000 r6:85029180 r5:df845f20 [ 1839.872072][T15532] r4:00000000 [ 1839.872080][T15532] [<815199f0>] (__sock_sendmsg) from [<8151a2a4>] (____sys_sendmsg+0x298/0x2cc) [ 1839.872109][T15532] r7:00000000 r6:85029180 r5:00000040 r4:df845f20 [ 1839.872117][T15532] [<8151a00c>] (____sys_sendmsg) from [<8151c044>] (___sys_sendmsg+0x9c/0xd0) [ 1839.872150][T15532] r10:df845e24 r9:20000200 r8:00000040 r7:00000000 r6:85029180 r5:df845f20 [ 1839.872159][T15532] r4:00000000 [ 1839.872166][T15532] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 1839.872199][T15532] r10:00000128 r9:847c3000 r8:8487a6c0 r7:00000040 r6:20000200 r5:8487a6c1 [ 1839.872208][T15532] r4:00000003 [ 1839.872215][T15532] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 1839.872247][T15532] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1839.872255][T15532] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1839.872280][T15532] Exception stack(0xdf845fa8 to 0xdf845ff0) [ 1839.872300][T15532] 5fa0: 00000000 00000000 00000003 20000200 00000040 00000000 [ 1839.872318][T15532] 5fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b460bc [ 1839.872332][T15532] 5fe0: 76b45ec0 76b45eb0 0001939c 00131f30 [ 1842.614142][ T31] audit: type=1400 audit(2098.527:713): avc: denied { setopt } for pid=15550 comm="syz.1.2806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1845.861827][T15564] fuse: Unknown parameter ' ' [ 1846.493064][T15574] FAULT_INJECTION: forcing a failure. [ 1846.493064][T15574] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.494250][T15574] CPU: 0 UID: 0 PID: 15574 Comm: syz.0.2812 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1846.494319][T15574] Hardware name: ARM-Versatile Express [ 1846.494333][T15574] Call trace: [ 1846.494355][T15574] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1846.494427][T15574] r7:847c0000 r6:00000000 r5:60000013 r4:82257c34 [ 1846.494436][T15574] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1846.494464][T15574] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1846.494493][T15574] r5:847c0000 r4:8291bcc0 [ 1846.494500][T15574] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1846.494530][T15574] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1846.494567][T15574] r8:00000000 r7:847c0000 r6:00000dc0 r5:8487a180 r4:830a8540 [ 1846.494576][T15574] [<80525738>] (should_failslab) from [<8050a1d0>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1846.494603][T15574] [<8050a184>] (kmem_cache_alloc_noprof) from [<807790d8>] (security_file_alloc+0x30/0x1dc) [ 1846.494639][T15574] r10:00000005 r9:85ab9000 r8:82805c40 r7:8451df00 r6:00001800 r5:8487a180 [ 1846.494649][T15574] r4:8487a180 [ 1846.494656][T15574] [<807790a8>] (security_file_alloc) from [<80553908>] (init_file+0x48/0x110) [ 1846.494686][T15574] r5:8487a180 r4:8487a180 [ 1846.494695][T15574] [<805538c0>] (init_file) from [<80554050>] (alloc_empty_file+0x68/0x13c) [ 1846.494726][T15574] r7:8451df00 r6:00001800 r5:8487a180 r4:8245d828 [ 1846.494734][T15574] [<80553fe8>] (alloc_empty_file) from [<805668b0>] (path_openat+0x40/0x11a0) [ 1846.494768][T15574] r8:dfcfde58 r7:dfcfde58 r6:dfcfdf20 r5:847c0000 r4:ffffff9c [ 1846.494776][T15574] [<80566870>] (path_openat) from [<80567abc>] (do_filp_open+0xac/0x148) [ 1846.494819][T15574] r10:00000005 r9:85ab9000 r8:00000001 r7:dfcfde58 r6:dfcfdf20 r5:847c0000 [ 1846.494829][T15574] r4:ffffff9c [ 1846.494836][T15574] [<80567a10>] (do_filp_open) from [<8054e87c>] (do_sys_openat2+0x90/0xe0) [ 1846.494870][T15574] r9:847c0000 r8:8020029c r7:ffffff9c r6:dfcfdf58 r5:85ab9000 r4:00000005 [ 1846.494878][T15574] [<8054e7ec>] (do_sys_openat2) from [<8054ebd0>] (sys_open+0x94/0xd0) [ 1846.494907][T15574] r7:00000005 r6:0012fee0 r5:00000000 r4:200001c0 [ 1846.494915][T15574] [<8054eb3c>] (sys_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1846.494940][T15574] Exception stack(0xdfcfdfa8 to 0xdfcfdff0) [ 1846.494959][T15574] dfa0: 00000000 00000000 200001c0 00001800 00000000 00000000 [ 1846.494977][T15574] dfc0: 00000000 00000000 0012fee0 00000005 002d0000 00000000 00006364 76b250bc [ 1846.494990][T15574] dfe0: 76b24ec0 76b24eb0 0001939c 00131f30 [ 1846.495002][T15574] r5:00000000 r4:00000000 [ 1849.313336][ T31] audit: type=1400 audit(2105.227:714): avc: denied { create } for pid=15585 comm="syz.1.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1849.382188][ T31] audit: type=1400 audit(2105.297:715): avc: denied { setopt } for pid=15585 comm="syz.1.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1851.055705][ T31] audit: type=1400 audit(2106.967:716): avc: denied { read write } for pid=14015 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1851.059943][ T31] audit: type=1400 audit(2106.967:717): avc: denied { open } for pid=14015 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1851.068421][ T31] audit: type=1400 audit(2106.977:718): avc: denied { ioctl } for pid=14015 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1851.110895][ T31] audit: type=1400 audit(2107.027:719): avc: denied { read } for pid=15609 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1851.135570][ T31] audit: type=1400 audit(2107.047:720): avc: denied { write } for pid=15609 comm="syz.1.2825" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1851.137690][ T31] audit: type=1400 audit(2107.047:721): avc: denied { open } for pid=15609 comm="syz.1.2825" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1851.142584][ T31] audit: type=1400 audit(2107.057:722): avc: denied { mounton } for pid=15609 comm="syz.1.2825" path="/203/file0" dev="tmpfs" ino=1082 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1851.150090][ T31] audit: type=1400 audit(2107.067:723): avc: denied { mount } for pid=15609 comm="syz.1.2825" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1855.640876][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 1855.643345][ T31] audit: type=1400 audit(2111.557:741): avc: denied { write } for pid=15628 comm="syz.0.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1855.646161][ T31] audit: type=1400 audit(2111.557:742): avc: denied { read } for pid=15628 comm="syz.0.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1855.656956][ T31] audit: type=1400 audit(2111.567:743): avc: denied { module_request } for pid=15628 comm="syz.0.2832" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1855.835606][ T31] audit: type=1400 audit(2111.747:744): avc: denied { sys_module } for pid=15628 comm="syz.0.2832" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1856.003779][ T31] audit: type=1400 audit(2111.917:745): avc: denied { create } for pid=15638 comm="syz.0.2833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1856.195162][ T31] audit: type=1400 audit(2112.107:746): avc: denied { create } for pid=15640 comm="syz.0.2834" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1856.197465][ T31] audit: type=1400 audit(2112.107:747): avc: denied { execmem } for pid=15640 comm="syz.0.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1856.200703][ T31] audit: type=1400 audit(2112.117:748): avc: denied { ioctl } for pid=15640 comm="syz.0.2834" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=32830 ioctlcmd=0xaa08 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1856.205411][ T31] audit: type=1400 audit(2112.117:749): avc: denied { getopt } for pid=15640 comm="syz.0.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1856.221598][ T31] audit: type=1400 audit(2112.137:750): avc: denied { setopt } for pid=15640 comm="syz.0.2834" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1857.601950][T15656] SELinux: Context u:r:untrusted_app:s0:c512,c768 is not valid (left unmapped). [ 1863.007267][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 1863.007603][ T31] audit: type=1400 audit(2118.917:762): avc: denied { listen } for pid=15677 comm="syz.1.2850" path=2F3231332FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1863.490166][ T31] audit: type=1400 audit(2119.407:763): avc: denied { map } for pid=15681 comm="syz.0.2851" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32883 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1863.490754][ T31] audit: type=1400 audit(2119.407:764): avc: denied { read write } for pid=15681 comm="syz.0.2851" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32883 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1865.552410][ T31] audit: type=1400 audit(2121.467:765): avc: denied { create } for pid=15681 comm="syz.0.2851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1865.555427][ T31] audit: type=1400 audit(2121.467:766): avc: denied { write } for pid=15681 comm="syz.0.2851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1865.570382][ T31] audit: type=1400 audit(2121.487:767): avc: denied { shutdown } for pid=15681 comm="syz.0.2851" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1867.278027][ T31] audit: type=1400 audit(2123.187:768): avc: granted { setsecparam } for pid=15694 comm="syz.1.2856" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1869.112097][ T31] audit: type=1400 audit(2125.027:769): avc: denied { create } for pid=15709 comm="syz.1.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1869.216055][ T31] audit: type=1400 audit(2125.117:770): avc: denied { ioctl } for pid=15709 comm="syz.1.2861" path="socket:[32952]" dev="sockfs" ino=32952 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1871.151942][ T31] audit: type=1400 audit(2127.067:771): avc: denied { ioctl } for pid=15722 comm="syz.0.2866" path="socket:[32981]" dev="sockfs" ino=32981 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1871.779350][ T31] audit: type=1400 audit(2127.687:772): avc: denied { create } for pid=15726 comm="syz.0.2868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1871.824929][ T31] audit: type=1400 audit(2127.737:773): avc: denied { write } for pid=15726 comm="syz.0.2868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1872.112132][ T31] audit: type=1400 audit(2128.027:774): avc: denied { setopt } for pid=15730 comm="syz.1.2870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1872.115311][ T31] audit: type=1400 audit(2128.027:775): avc: denied { connect } for pid=15730 comm="syz.1.2870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1872.250874][ T31] audit: type=1400 audit(2128.167:776): avc: denied { create } for pid=15736 comm="syz.0.2872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1872.253228][ T31] audit: type=1400 audit(2128.167:777): avc: denied { getopt } for pid=15736 comm="syz.0.2872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1872.256624][ T31] audit: type=1400 audit(2128.167:778): avc: denied { listen } for pid=15736 comm="syz.0.2872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1875.274202][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 1875.274699][ T31] audit: type=1400 audit(2131.177:781): avc: denied { ioctl } for pid=15755 comm="syz.1.2879" path="socket:[32633]" dev="sockfs" ino=32633 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1878.422402][ T31] audit: type=1400 audit(2134.337:782): avc: denied { getopt } for pid=15773 comm="syz.0.2885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1888.008236][ T31] audit: type=1400 audit(2143.917:783): avc: denied { create } for pid=15839 comm="syz.0.2908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1888.012163][ T31] audit: type=1400 audit(2143.927:784): avc: denied { listen } for pid=15839 comm="syz.0.2908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1888.015593][T15840] FAULT_INJECTION: forcing a failure. [ 1888.015593][T15840] name failslab, interval 1, probability 0, space 0, times 0 [ 1888.017318][T15840] CPU: 0 UID: 0 PID: 15840 Comm: syz.0.2908 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1888.017375][T15840] Hardware name: ARM-Versatile Express [ 1888.017390][T15840] Call trace: [ 1888.017411][T15840] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1888.017520][T15840] r7:00000d40 r6:00000000 r5:600c0013 r4:82257c34 [ 1888.017532][T15840] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1888.017567][T15840] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1888.017596][T15840] r5:84c0a400 r4:8291bcc0 [ 1888.017603][T15840] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1888.017658][T15840] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1888.017694][T15840] r8:84c0a400 r7:00000d40 r6:8486f9e8 r5:00000019 r4:83001240 [ 1888.017703][T15840] [<80525738>] (should_failslab) from [<8050a554>] (__kmalloc_noprof+0x9c/0x458) [ 1888.017730][T15840] [<8050a4b8>] (__kmalloc_noprof) from [<807bc004>] (tomoyo_encode2+0x64/0xf0) [ 1888.017768][T15840] r10:00000fff r9:8309fc00 r8:00000000 r7:837d5cc0 r6:8486f9e8 r5:8324bffd [ 1888.017778][T15840] r4:8324bfef [ 1888.017784][T15840] [<807bbfa0>] (tomoyo_encode2) from [<807bc0b4>] (tomoyo_encode+0x24/0x30) [ 1888.017818][T15840] r9:8309fc00 r8:00000000 r7:837d5cc0 r6:8486f9e8 r5:00001000 r4:8324bff0 [ 1888.017827][T15840] [<807bc090>] (tomoyo_encode) from [<807bc140>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1888.017856][T15840] r5:00001000 r4:8324b000 [ 1888.017863][T15840] [<807bc0c0>] (tomoyo_realpath_from_path) from [<807b8240>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1888.017898][T15840] r10:84c0a400 r9:00000000 r8:8486f9c0 r7:80045439 r6:00000004 r5:81cd56c4 [ 1888.017909][T15840] r4:8486f9e8 r3:826c0240 [ 1888.017916][T15840] [<807b8174>] (tomoyo_path_number_perm) from [<807bcb20>] (tomoyo_file_ioctl+0x1c/0x20) [ 1888.017951][T15840] r9:00000004 r8:8486f9c0 r7:00000000 r6:00000000 r5:80045439 r4:8486f9c0 [ 1888.017959][T15840] [<807bcb04>] (tomoyo_file_ioctl) from [<8076a55c>] (security_file_ioctl+0x64/0x1e4) [ 1888.017989][T15840] [<8076a4f8>] (security_file_ioctl) from [<8056b444>] (sys_ioctl+0x4c/0xd84) [ 1888.018020][T15840] r7:00000000 r6:8486f9c1 r5:00000000 r4:80045439 [ 1888.018028][T15840] [<8056b3f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1888.018052][T15840] Exception stack(0xdfe31fa8 to 0xdfe31ff0) [ 1888.018071][T15840] 1fa0: 00000000 00000000 00000004 80045439 00000000 00000000 [ 1888.018089][T15840] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b460bc [ 1888.018102][T15840] 1fe0: 76b45ec0 76b45eb0 0001939c 00131f30 [ 1888.018120][T15840] r10:00000036 r9:84c0a400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1888.018129][T15840] r4:00000000 [ 1888.032844][T15840] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1888.033887][ T31] audit: type=1400 audit(2143.947:785): avc: denied { ioctl } for pid=15839 comm="syz.0.2908" path="socket:[32755]" dev="sockfs" ino=32755 ioctlcmd=0x5439 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1888.173176][ T31] audit: type=1400 audit(2144.087:786): avc: denied { ioctl } for pid=15843 comm="syz.1.2910" path="socket:[33795]" dev="sockfs" ino=33795 ioctlcmd=0xf514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1888.184543][ T31] audit: type=1400 audit(2144.097:787): avc: denied { read } for pid=15843 comm="syz.1.2910" path="socket:[33795]" dev="sockfs" ino=33795 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1890.754482][T15850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15850 comm=syz.1.2911 [ 1890.756616][T15850] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2911'. [ 1890.761211][T15850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15850 comm=syz.1.2911 [ 1892.480495][ T31] audit: type=1400 audit(2148.397:788): avc: denied { listen } for pid=15853 comm="syz.1.2913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1894.263950][ T31] audit: type=1400 audit(2150.177:789): avc: denied { create } for pid=15863 comm="syz.1.2916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1894.266525][ T31] audit: type=1400 audit(2150.177:790): avc: denied { setopt } for pid=15863 comm="syz.1.2916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1897.602652][ T31] audit: type=1400 audit(2153.517:791): avc: denied { ioctl } for pid=15884 comm="syz.0.2924" path="socket:[33268]" dev="sockfs" ino=33268 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1898.819997][ T31] audit: type=1400 audit(2154.737:792): avc: denied { create } for pid=15894 comm="syz.0.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1898.872663][T15895] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15895 comm=syz.0.2928 [ 1901.649950][T15916] FAULT_INJECTION: forcing a failure. [ 1901.649950][T15916] name failslab, interval 1, probability 0, space 0, times 0 [ 1901.651056][T15916] CPU: 0 UID: 0 PID: 15916 Comm: syz.1.2935 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1901.651122][T15916] Hardware name: ARM-Versatile Express [ 1901.651136][T15916] Call trace: [ 1901.651159][T15916] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1901.651223][T15916] r7:83a7b000 r6:00000000 r5:60000013 r4:82257c34 [ 1901.651232][T15916] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1901.651260][T15916] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1901.651288][T15916] r5:83a7b000 r4:8291bcc0 [ 1901.651295][T15916] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1901.651325][T15916] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1901.651361][T15916] r8:00000000 r7:83a7b000 r6:00000cc0 r5:ffffffff r4:830ad9c0 [ 1901.651369][T15916] [<80525738>] (should_failslab) from [<80509b64>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1901.651397][T15916] [<80509b14>] (kmem_cache_alloc_node_noprof) from [<81526d70>] (__alloc_skb+0x138/0x160) [ 1901.651434][T15916] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830ad9c0 r5:ffffffff [ 1901.651444][T15916] r4:82806040 [ 1901.651451][T15916] [<81526c38>] (__alloc_skb) from [<816448dc>] (netlink_alloc_large_skb+0x88/0xa0) [ 1901.651487][T15916] r8:00000000 r7:84eca400 r6:00000014 r5:85028280 r4:00000140 [ 1901.651495][T15916] [<81644854>] (netlink_alloc_large_skb) from [<81644f00>] (netlink_sendmsg+0x134/0x444) [ 1901.651524][T15916] r5:85028280 r4:e0561f20 [ 1901.651532][T15916] [<81644dcc>] (netlink_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 1901.651575][T15916] r10:00000000 r9:e0561dc4 r8:e0561dc4 r7:00000000 r6:85028280 r5:e0561f20 [ 1901.651584][T15916] r4:00000000 [ 1901.651591][T15916] [<815199f0>] (__sock_sendmsg) from [<8151a2a4>] (____sys_sendmsg+0x298/0x2cc) [ 1901.651619][T15916] r7:00000000 r6:85028280 r5:20000050 r4:e0561f20 [ 1901.651627][T15916] [<8151a00c>] (____sys_sendmsg) from [<8151c044>] (___sys_sendmsg+0x9c/0xd0) [ 1901.651659][T15916] r10:e0561e24 r9:20000280 r8:20000050 r7:00000000 r6:85028280 r5:e0561f20 [ 1901.651668][T15916] r4:00000000 [ 1901.651675][T15916] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 1901.651709][T15916] r10:00000128 r9:83a7b000 r8:8486f180 r7:20000050 r6:20000280 r5:8486f181 [ 1901.651718][T15916] r4:00000003 [ 1901.651725][T15916] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 1901.651756][T15916] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1901.651764][T15916] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1901.651788][T15916] Exception stack(0xe0561fa8 to 0xe0561ff0) [ 1901.651807][T15916] 1fa0: 00000000 00000000 00000003 20000280 20000050 00000000 [ 1901.651825][T15916] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b380bc [ 1901.651839][T15916] 1fe0: 76b37ec0 76b37eb0 0001939c 00131f30 [ 1901.717907][ T31] audit: type=1400 audit(2157.627:793): avc: denied { setopt } for pid=15917 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1904.208453][ T31] audit: type=1400 audit(2160.117:794): avc: denied { create } for pid=15934 comm="syz.0.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1904.257982][ T31] audit: type=1400 audit(2160.167:795): avc: denied { create } for pid=15934 comm="syz.0.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1904.857605][ T31] audit: type=1400 audit(2160.767:796): avc: denied { prog_load } for pid=15951 comm="syz.0.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1904.858005][ T31] audit: type=1400 audit(2160.767:797): avc: denied { bpf } for pid=15951 comm="syz.0.2946" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1904.860114][ T31] audit: type=1400 audit(2160.777:798): avc: denied { perfmon } for pid=15951 comm="syz.0.2946" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1904.862433][ T31] audit: type=1400 audit(2160.777:799): avc: denied { prog_run } for pid=15951 comm="syz.0.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1904.865385][ T31] audit: type=1400 audit(2160.777:800): avc: denied { map_create } for pid=15951 comm="syz.0.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1904.865682][ T31] audit: type=1400 audit(2160.777:801): avc: denied { map_read map_write } for pid=15951 comm="syz.0.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1904.881740][T15952] FAULT_INJECTION: forcing a failure. [ 1904.881740][T15952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1904.882925][T15952] CPU: 0 UID: 0 PID: 15952 Comm: syz.0.2946 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1904.883005][T15952] Hardware name: ARM-Versatile Express [ 1904.883026][T15952] Call trace: [ 1904.883060][T15952] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1904.883149][T15952] r7:00000001 r6:00000000 r5:60000013 r4:82257c34 [ 1904.883164][T15952] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1904.883208][T15952] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1904.883255][T15952] r5:83a78c00 r4:82951710 [ 1904.883267][T15952] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1904.883317][T15952] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1904.883370][T15952] r8:830abe40 r7:00000001 r6:00000000 r5:00000000 r4:20000200 [ 1904.883383][T15952] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1904.883424][T15952] [<8095f614>] (should_fail_usercopy) from [<808aecb8>] (_copy_from_iter+0x208/0x7c8) [ 1904.883471][T15952] [<808aeab0>] (_copy_from_iter) from [<815b663c>] (sk_msg_memcopy_from_iter+0x144/0x1fc) [ 1904.883536][T15952] r10:00000015 r9:00000000 r8:00000018 r7:e044da80 r6:00000000 r5:00000015 [ 1904.883558][T15952] r4:00000000 [ 1904.883571][T15952] [<815b64f8>] (sk_msg_memcopy_from_iter) from [<817ae10c>] (tcp_bpf_sendmsg+0x218/0x8ac) [ 1904.883637][T15952] r10:e044da80 r9:00000000 r8:00000000 r7:8490fa00 r6:00000015 r5:83a5a940 [ 1904.883653][T15952] r4:00000000 [ 1904.883666][T15952] [<817adef4>] (tcp_bpf_sendmsg) from [<817f3b50>] (inet6_sendmsg+0x40/0x4c) [ 1904.883728][T15952] r10:00000000 r9:e044dd1c r8:e044dd1c r7:00000000 r6:83a5a940 r5:00000015 [ 1904.883744][T15952] r4:e044de90 [ 1904.883757][T15952] [<817f3b10>] (inet6_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 1904.883811][T15952] r7:00000000 r6:85028000 r5:e044de90 r4:00000000 [ 1904.883825][T15952] [<815199f0>] (__sock_sendmsg) from [<8151a0cc>] (____sys_sendmsg+0xc0/0x2cc) [ 1904.883871][T15952] r7:00000000 r6:85028000 r5:00000041 r4:e044de90 [ 1904.883884][T15952] [<8151a00c>] (____sys_sendmsg) from [<8151c044>] (___sys_sendmsg+0x9c/0xd0) [ 1904.883939][T15952] r10:e044dd7c r9:20000480 r8:00000041 r7:e044ded8 r6:85028000 r5:e044de90 [ 1904.883955][T15952] r4:00000000 [ 1904.883967][T15952] [<8151bfa8>] (___sys_sendmsg) from [<8151c62c>] (__sys_sendmmsg+0xf4/0x1c4) [ 1904.884020][T15952] r10:b5403587 r9:00000041 r8:e044ded8 r7:00000041 r6:00000001 r5:00000000 [ 1904.884036][T15952] r4:20000480 [ 1904.884048][T15952] [<8151c538>] (__sys_sendmmsg) from [<8151c718>] (sys_sendmmsg+0x1c/0x24) [ 1904.884102][T15952] r10:00000176 r9:83a78c00 r8:8020029c r7:00000176 r6:0012fee0 r5:00000000 [ 1904.884117][T15952] r4:00000000 [ 1904.884128][T15952] [<8151c6fc>] (sys_sendmmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1904.884168][T15952] Exception stack(0xe044dfa8 to 0xe044dff0) [ 1904.884199][T15952] dfa0: 00000000 00000000 00000003 20000480 00000001 00000041 [ 1904.884228][T15952] dfc0: 00000000 00000000 0012fee0 00000176 002d0000 00000000 00006364 76b460bc [ 1904.884252][T15952] dfe0: 76b45ec0 76b45eb0 0001939c 00131f30 [ 1906.887573][ T31] audit: type=1400 audit(2162.797:802): avc: denied { append } for pid=15958 comm="syz.1.2949" name="controlC0" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1907.137446][ T31] audit: type=1400 audit(2163.047:803): avc: denied { write } for pid=15958 comm="syz.1.2949" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1907.493300][ T31] audit: type=1400 audit(2163.407:804): avc: denied { ioctl } for pid=15958 comm="syz.1.2949" path="socket:[33967]" dev="sockfs" ino=33967 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1907.878150][T15965] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15965 comm=syz.0.2951 [ 1908.776273][ T31] audit: type=1400 audit(2164.687:805): avc: denied { read } for pid=15976 comm="syz.0.2956" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 1908.776668][ T31] audit: type=1400 audit(2164.687:806): avc: denied { open } for pid=15976 comm="syz.0.2956" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 1908.776903][ T31] audit: type=1400 audit(2164.687:807): avc: denied { ioctl } for pid=15976 comm="syz.0.2956" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x45c0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 1909.364580][ T31] audit: type=1400 audit(2165.277:808): avc: denied { wake_alarm } for pid=15978 comm="syz.1.2957" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1910.051245][T15987] FAULT_INJECTION: forcing a failure. [ 1910.051245][T15987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1910.059378][T15987] CPU: 0 UID: 0 PID: 15987 Comm: syz.1.2958 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1910.059445][T15987] Hardware name: ARM-Versatile Express [ 1910.059460][T15987] Call trace: [ 1910.059483][T15987] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1910.059574][T15987] r7:ea811e20 r6:00000000 r5:600f0113 r4:82257c34 [ 1910.059585][T15987] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1910.059614][T15987] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1910.059643][T15987] r5:84c0bc00 r4:82951710 [ 1910.059650][T15987] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1910.059680][T15987] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1910.059713][T15987] r8:20008000 r7:ea811e20 r6:20000300 r5:00000000 r4:ea811f20 [ 1910.059721][T15987] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1910.059747][T15987] [<8095f614>] (should_fail_usercopy) from [<8151bec8>] (copy_msghdr_from_user+0x50/0x130) [ 1910.059777][T15987] [<8151be78>] (copy_msghdr_from_user) from [<8151c020>] (___sys_sendmsg+0x78/0xd0) [ 1910.059807][T15987] r8:20008000 r7:00000000 r6:8352b400 r5:ea811f20 r4:ea811e64 [ 1910.059816][T15987] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 1910.059848][T15987] r10:00000128 r9:84c0bc00 r8:84dea0c0 r7:20008000 r6:20000300 r5:84dea0c1 [ 1910.059857][T15987] r4:00000003 [ 1910.059864][T15987] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 1910.059904][T15987] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1910.059913][T15987] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1910.059943][T15987] Exception stack(0xea811fa8 to 0xea811ff0) [ 1910.059962][T15987] 1fa0: 00000000 00000000 00000003 20000300 20008000 00000000 [ 1910.059980][T15987] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b170bc [ 1910.059994][T15987] 1fe0: 76b16ec0 76b16eb0 0001939c 00131f30 [ 1911.949945][ T31] audit: type=1400 audit(2167.867:809): avc: denied { create } for pid=16016 comm="syz.1.2972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1912.133395][ T31] audit: type=1400 audit(2168.047:810): avc: denied { setopt } for pid=16016 comm="syz.1.2972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1912.549839][ T31] audit: type=1400 audit(2168.457:811): avc: denied { getopt } for pid=16026 comm="syz.1.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1912.593307][ T31] audit: type=1400 audit(2168.507:812): avc: denied { create } for pid=16028 comm="syz.0.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1914.685080][ T31] audit: type=1400 audit(2170.597:813): avc: denied { getopt } for pid=16028 comm="syz.0.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1915.390734][T16035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pid=16035 comm=syz.1.2978 [ 1915.924691][T16045] FAULT_INJECTION: forcing a failure. [ 1915.924691][T16045] name failslab, interval 1, probability 0, space 0, times 0 [ 1915.926005][T16045] CPU: 0 UID: 0 PID: 16045 Comm: syz.0.2983 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1915.926091][T16045] Hardware name: ARM-Versatile Express [ 1915.926108][T16045] Call trace: [ 1915.926134][T16045] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1915.926212][T16045] r7:00000d40 r6:00000000 r5:60000013 r4:82257c34 [ 1915.926222][T16045] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1915.926250][T16045] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1915.926278][T16045] r5:833e5400 r4:8291bcc0 [ 1915.926285][T16045] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1915.926315][T16045] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1915.926353][T16045] r8:833e5400 r7:00000d40 r6:8486f868 r5:00000020 r4:83001240 [ 1915.926361][T16045] [<80525738>] (should_failslab) from [<8050a554>] (__kmalloc_noprof+0x9c/0x458) [ 1915.926389][T16045] [<8050a4b8>] (__kmalloc_noprof) from [<807bc004>] (tomoyo_encode2+0x64/0xf0) [ 1915.926426][T16045] r10:00000fff r9:8309e800 r8:00000000 r7:834bdf68 r6:8486f868 r5:8324cffc [ 1915.926436][T16045] r4:8324cfe7 [ 1915.926443][T16045] [<807bbfa0>] (tomoyo_encode2) from [<807bc0b4>] (tomoyo_encode+0x24/0x30) [ 1915.926477][T16045] r9:8309e800 r8:00000000 r7:834bdf68 r6:8486f868 r5:00001000 r4:8324cfe8 [ 1915.926486][T16045] [<807bc090>] (tomoyo_encode) from [<807bc140>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1915.926515][T16045] r5:00001000 r4:8324c000 [ 1915.926522][T16045] [<807bc0c0>] (tomoyo_realpath_from_path) from [<807b8240>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1915.926557][T16045] r10:833e5400 r9:00000000 r8:8486f840 r7:00005451 r6:00000004 r5:81cd56c4 [ 1915.926568][T16045] r4:8486f868 r3:826c0240 [ 1915.926575][T16045] [<807b8174>] (tomoyo_path_number_perm) from [<807bcb20>] (tomoyo_file_ioctl+0x1c/0x20) [ 1915.926610][T16045] r9:00000003 r8:8486f840 r7:00000000 r6:00000000 r5:00005451 r4:8486f840 [ 1915.926618][T16045] [<807bcb04>] (tomoyo_file_ioctl) from [<8076a55c>] (security_file_ioctl+0x64/0x1e4) [ 1915.926648][T16045] [<8076a4f8>] (security_file_ioctl) from [<8056b444>] (sys_ioctl+0x4c/0xd84) [ 1915.926679][T16045] r7:00000000 r6:8486f841 r5:00000000 r4:00005451 [ 1915.926687][T16045] [<8056b3f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1915.926711][T16045] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 1915.926741][T16045] 9fa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 1915.926760][T16045] 9fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b460bc [ 1915.926773][T16045] 9fe0: 76b45ec0 76b45eb0 0001939c 00131f30 [ 1915.926792][T16045] r10:00000036 r9:833e5400 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 1915.926801][T16045] r4:00000000 [ 1915.942078][T16045] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1918.063818][ T31] audit: type=1400 audit(2173.977:814): avc: denied { write } for pid=16056 comm="syz.1.2989" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 1919.276438][ T31] audit: type=1400 audit(2175.187:815): avc: denied { create } for pid=16073 comm="syz.1.2994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1919.284435][ T31] audit: type=1400 audit(2175.197:816): avc: denied { setopt } for pid=16073 comm="syz.1.2994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1921.132515][ T31] audit: type=1400 audit(2177.047:817): avc: denied { map } for pid=16085 comm="syz.0.2999" path="socket:[33736]" dev="sockfs" ino=33736 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1922.100843][T16097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16097 comm=syz.1.3003 [ 1922.149736][ T31] audit: type=1400 audit(2178.067:818): avc: denied { connect } for pid=16098 comm="syz.1.3004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1922.150557][ T31] audit: type=1400 audit(2178.067:819): avc: denied { name_connect } for pid=16098 comm="syz.1.3004" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1922.155253][ T31] audit: type=1400 audit(2178.067:820): avc: denied { accept } for pid=16098 comm="syz.1.3004" lport=45481 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1922.173770][ T31] audit: type=1400 audit(2178.087:821): avc: denied { setopt } for pid=16098 comm="syz.1.3004" lport=45481 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1922.773579][ T31] audit: type=1400 audit(2178.687:822): avc: denied { setopt } for pid=16118 comm="syz.1.3009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1922.849997][ T31] audit: type=1400 audit(2178.767:823): avc: denied { bind } for pid=16120 comm="syz.1.3010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1923.233301][ T31] audit: type=1400 audit(2179.147:824): avc: denied { ioctl } for pid=16127 comm="syz.1.3012" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1923.343236][ T31] audit: type=1400 audit(2179.257:825): avc: denied { read write } for pid=16129 comm="syz.1.3013" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1923.351604][ T31] audit: type=1400 audit(2179.267:826): avc: denied { open } for pid=16129 comm="syz.1.3013" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1923.364392][ T31] audit: type=1400 audit(2179.277:827): avc: denied { lock } for pid=16129 comm="syz.1.3013" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1926.896560][ T31] audit: type=1400 audit(2182.807:828): avc: denied { accept } for pid=16143 comm="syz.0.3018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1926.904846][ T31] audit: type=1400 audit(2182.817:829): avc: denied { write } for pid=16143 comm="syz.0.3018" name="udplite" dev="proc" ino=4026532757 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1928.524933][T16176] FAULT_INJECTION: forcing a failure. [ 1928.524933][T16176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1928.525423][T16176] CPU: 0 UID: 0 PID: 16176 Comm: syz.1.3028 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1928.525567][T16176] Hardware name: ARM-Versatile Express [ 1928.525641][T16176] Call trace: [ 1928.525707][T16176] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1928.525819][T16176] r7:e03c9e20 r6:00000000 r5:60000013 r4:82257c34 [ 1928.525839][T16176] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1928.525926][T16176] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1928.526008][T16176] r5:83243000 r4:82951710 [ 1928.526027][T16176] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1928.526087][T16176] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1928.526151][T16176] r8:20028890 r7:e03c9e20 r6:20000300 r5:00000000 r4:e03c9f20 [ 1928.526168][T16176] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1928.526216][T16176] [<8095f614>] (should_fail_usercopy) from [<8151bec8>] (copy_msghdr_from_user+0x50/0x130) [ 1928.526290][T16176] [<8151be78>] (copy_msghdr_from_user) from [<8151c020>] (___sys_sendmsg+0x78/0xd0) [ 1928.526374][T16176] r8:20028890 r7:00000000 r6:8366a280 r5:e03c9f20 r4:e03c9e64 [ 1928.526394][T16176] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 1928.526474][T16176] r10:00000128 r9:83243000 r8:85512000 r7:20028890 r6:20000300 r5:85512001 [ 1928.526528][T16176] r4:00000004 [ 1928.526549][T16176] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 1928.526613][T16176] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1928.526630][T16176] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1928.526680][T16176] Exception stack(0xe03c9fa8 to 0xe03c9ff0) [ 1928.526734][T16176] 9fa0: 00000000 00000000 00000004 20000300 20028890 00000000 [ 1928.526772][T16176] 9fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b170bc [ 1928.526799][T16176] 9fe0: 76b16ec0 76b16eb0 0001939c 00131f30 [ 1929.623428][ T31] audit: type=1400 audit(2185.537:830): avc: granted { setsecparam } for pid=16179 comm="syz.0.3030" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1931.456670][ T31] audit: type=1400 audit(2187.367:831): avc: denied { setopt } for pid=16202 comm="syz.1.3039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1931.511860][ T31] audit: type=1400 audit(2187.427:832): avc: denied { map } for pid=16202 comm="syz.1.3039" path="socket:[35020]" dev="sockfs" ino=35020 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1931.513955][ T31] audit: type=1400 audit(2187.427:833): avc: denied { read } for pid=16202 comm="syz.1.3039" path="socket:[35020]" dev="sockfs" ino=35020 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1931.739839][T16212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16212 comm=syz.1.3043 [ 1931.794264][T16214] FAULT_INJECTION: forcing a failure. [ 1931.794264][T16214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1931.795285][T16214] CPU: 1 UID: 0 PID: 16214 Comm: syz.1.3044 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1931.795355][T16214] Hardware name: ARM-Versatile Express [ 1931.795369][T16214] Call trace: [ 1931.795392][T16214] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1931.795453][T16214] r7:20000000 r6:00000000 r5:60000013 r4:82257c34 [ 1931.795463][T16214] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1931.795490][T16214] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1931.795519][T16214] r5:83243c00 r4:82951710 [ 1931.795526][T16214] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1931.795555][T16214] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1931.795587][T16214] r8:b5403587 r7:20000000 r6:e05c1e64 r5:0000000c r4:0000000c [ 1931.795594][T16214] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1931.795619][T16214] [<8095f614>] (should_fail_usercopy) from [<8151a30c>] (move_addr_to_kernel+0x34/0xf8) [ 1931.795660][T16214] [<8151a2d8>] (move_addr_to_kernel) from [<8151be4c>] (__copy_msghdr+0xe4/0x110) [ 1931.795690][T16214] r7:e05c1e20 r6:20000100 r5:e05c1dd0 r4:e05c1f20 [ 1931.795699][T16214] [<8151bd68>] (__copy_msghdr) from [<8151bf24>] (copy_msghdr_from_user+0xac/0x130) [ 1931.795726][T16214] r5:00000000 r4:e05c1f20 [ 1931.795733][T16214] [<8151be78>] (copy_msghdr_from_user) from [<8151c020>] (___sys_sendmsg+0x78/0xd0) [ 1931.795765][T16214] r8:00004100 r7:00000000 r6:83595400 r5:e05c1f20 r4:e05c1e64 [ 1931.795772][T16214] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 1931.795805][T16214] r10:00000128 r9:83243c00 r8:8573ec00 r7:00004100 r6:20000100 r5:8573ec01 [ 1931.795815][T16214] r4:00000003 [ 1931.795822][T16214] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 1931.795932][T16214] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 1931.795941][T16214] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1931.795991][T16214] Exception stack(0xe05c1fa8 to 0xe05c1ff0) [ 1931.796012][T16214] 1fa0: 00000000 00000000 00000003 20000100 00004100 00000000 [ 1931.796030][T16214] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b380bc [ 1931.796049][T16214] 1fe0: 76b37ec0 76b37eb0 0001939c 00131f30 [ 1931.943975][ T31] audit: type=1400 audit(2187.857:834): avc: denied { write } for pid=16219 comm="syz.0.3046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1934.670798][T16231] FAULT_INJECTION: forcing a failure. [ 1934.670798][T16231] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1934.680379][T16231] CPU: 1 UID: 0 PID: 16231 Comm: syz.0.3051 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1934.680449][T16231] Hardware name: ARM-Versatile Express [ 1934.680465][T16231] Call trace: [ 1934.680490][T16231] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1934.680587][T16231] r7:00000000 r6:00000000 r5:60000113 r4:82257c34 [ 1934.680600][T16231] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1934.680635][T16231] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1934.680683][T16231] r5:8458bc00 r4:82951710 [ 1934.680691][T16231] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1934.680723][T16231] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1934.680758][T16231] r8:76b45f30 r7:00000000 r6:00000000 r5:dff39f68 r4:00000002 [ 1934.680766][T16231] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1934.680793][T16231] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 1934.680824][T16231] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 1934.680863][T16231] r10:00000001 r9:8060401c r8:00000002 r7:dff39f68 r6:0000000f r5:76b45f30 [ 1934.680875][T16231] r4:8458bc00 r3:dff39e9f [ 1934.680883][T16231] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 1934.680928][T16231] r8:76b45f30 r7:dff39f68 r6:8458bc00 r5:0000000f r4:8573e9c0 [ 1934.680937][T16231] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 1934.680972][T16231] r10:00000003 r9:8458bc00 r8:8020029c r7:00000000 r6:00000000 r5:8573e9c0 [ 1934.680981][T16231] r4:8573e9c3 [ 1934.680989][T16231] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 1934.681020][T16231] r7:00000003 r6:00000004 r5:76b45f30 r4:0000000f [ 1934.681028][T16231] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1934.681053][T16231] Exception stack(0xdff39fa8 to 0xdff39ff0) [ 1934.681076][T16231] 9fa0: 0000000f 76b45f30 00000004 76b45f30 0000000f 00000000 [ 1934.681094][T16231] 9fc0: 0000000f 76b45f30 00000004 00000003 002d0000 00000000 00006364 76b460bc [ 1934.681108][T16231] 9fe0: 00000158 76b45ed0 000d7d68 0012fe04 [ 1937.647947][T16277] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1937.677833][ T31] audit: type=1400 audit(2193.587:835): avc: denied { setopt } for pid=16276 comm="syz.0.3055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1937.789597][T16285] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16285 comm=syz.0.3056 [ 1941.731538][ T31] audit: type=1400 audit(2197.647:836): avc: denied { setopt } for pid=16314 comm="syz.0.3066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1941.756840][ T31] audit: type=1400 audit(2197.667:837): avc: denied { create } for pid=16318 comm="syz.1.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1941.795129][ T31] audit: type=1400 audit(2197.707:838): avc: denied { create } for pid=16318 comm="syz.1.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1941.797516][ T31] audit: type=1400 audit(2197.707:839): avc: denied { ioctl } for pid=16318 comm="syz.1.3068" path="socket:[34588]" dev="sockfs" ino=34588 ioctlcmd=0xf504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1944.473981][ T31] audit: type=1400 audit(2200.387:840): avc: denied { ioctl } for pid=16330 comm="syz.1.3073" path="socket:[34624]" dev="sockfs" ino=34624 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1944.476328][ T31] audit: type=1400 audit(2200.387:841): avc: denied { connect } for pid=16330 comm="syz.1.3073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1944.490950][ T31] audit: type=1400 audit(2200.407:842): avc: denied { write } for pid=16330 comm="syz.1.3073" path="socket:[34624]" dev="sockfs" ino=34624 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1952.179666][ T110] usb 2-1: new high-speed USB device number 102 using dummy_hcd [ 1952.339076][ T110] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1952.340406][ T110] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1952.344006][ T110] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1952.348380][ T110] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1952.350178][ T110] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1952.356573][ T110] usb 2-1: config 0 descriptor?? [ 1952.789499][ T110] plantronics 0003:047F:FFFF.0011: No inputs registered, leaving [ 1952.794334][ T110] plantronics 0003:047F:FFFF.0011: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1953.053404][ T94] usb 2-1: USB disconnect, device number 102 [ 1956.037920][T16403] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16403 comm=syz.1.3091 [ 1956.046054][T16402] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16402 comm=syz.1.3091 [ 1956.145778][ T31] audit: type=1400 audit(2212.057:843): avc: denied { append } for pid=16406 comm="syz.1.3093" name="nbd1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1959.577349][ T31] audit: type=1400 audit(2215.487:844): avc: denied { read } for pid=16431 comm="syz.1.3102" path="socket:[35378]" dev="sockfs" ino=35378 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1959.586298][ T31] audit: type=1400 audit(2215.497:845): avc: denied { create } for pid=16431 comm="syz.1.3102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1967.192218][ T31] audit: type=1400 audit(2223.107:846): avc: denied { block_suspend } for pid=16493 comm="syz.1.3121" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1967.756479][ T31] audit: type=1400 audit(2223.667:847): avc: denied { bind } for pid=16507 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1967.762124][ T31] audit: type=1400 audit(2223.677:848): avc: denied { accept } for pid=16507 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1967.774971][ T31] audit: type=1400 audit(2223.687:849): avc: denied { create } for pid=16507 comm="syz.0.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1968.392334][T16516] SELinux: Context system_u:object_r:semanage_store_t:s0 is not valid (left unmapped). [ 1968.401760][ T31] audit: type=1400 audit(2224.317:850): avc: denied { relabelto } for pid=16515 comm="syz.0.3129" name="cgroup.procs" dev="cgroup2" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_store_t:s0" [ 1968.403061][ T31] audit: type=1400 audit(2224.317:851): avc: denied { associate } for pid=16515 comm="syz.0.3129" name="cgroup.procs" dev="cgroup2" ino=62 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_store_t:s0" [ 1969.574315][T16528] FAULT_INJECTION: forcing a failure. [ 1969.574315][T16528] name failslab, interval 1, probability 0, space 0, times 0 [ 1969.574611][T16528] CPU: 1 UID: 0 PID: 16528 Comm: syz.0.3132 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1969.574674][T16528] Hardware name: ARM-Versatile Express [ 1969.574688][T16528] Call trace: [ 1969.574710][T16528] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1969.574774][T16528] r7:84c0bc00 r6:00000000 r5:60000013 r4:82257c34 [ 1969.574784][T16528] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1969.574811][T16528] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1969.574841][T16528] r5:84c0bc00 r4:8291bcc0 [ 1969.574955][T16528] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1969.575063][T16528] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1969.575206][T16528] r8:00000000 r7:84c0bc00 r6:00000dc0 r5:84783540 r4:830a8540 [ 1969.575319][T16528] [<80525738>] (should_failslab) from [<8050a1d0>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1969.575447][T16528] [<8050a184>] (kmem_cache_alloc_noprof) from [<807790d8>] (security_file_alloc+0x30/0x1dc) [ 1969.575489][T16528] r10:00000005 r9:832de000 r8:82805c40 r7:8451df00 r6:00001800 r5:84783540 [ 1969.575501][T16528] r4:84783540 [ 1969.575509][T16528] [<807790a8>] (security_file_alloc) from [<80553908>] (init_file+0x48/0x110) [ 1969.575607][T16528] r5:84783540 r4:84783540 [ 1969.575673][T16528] [<805538c0>] (init_file) from [<80554050>] (alloc_empty_file+0x68/0x13c) [ 1969.575747][T16528] r7:8451df00 r6:00001800 r5:84783540 r4:8245d828 [ 1969.575862][T16528] [<80553fe8>] (alloc_empty_file) from [<805668b0>] (path_openat+0x40/0x11a0) [ 1969.575998][T16528] r8:eb0d1e58 r7:eb0d1e58 r6:eb0d1f20 r5:84c0bc00 r4:ffffff9c [ 1969.576096][T16528] [<80566870>] (path_openat) from [<80567abc>] (do_filp_open+0xac/0x148) [ 1969.576347][T16528] r10:00000005 r9:832de000 r8:00000001 r7:eb0d1e58 r6:eb0d1f20 r5:84c0bc00 [ 1969.576722][T16528] r4:ffffff9c [ 1969.577036][T16528] [<80567a10>] (do_filp_open) from [<8054e87c>] (do_sys_openat2+0x90/0xe0) [ 1969.577219][T16528] r9:84c0bc00 r8:8020029c r7:ffffff9c r6:eb0d1f58 r5:832de000 r4:00000005 [ 1969.577247][T16528] [<8054e7ec>] (do_sys_openat2) from [<8054ebd0>] (sys_open+0x94/0xd0) [ 1969.577597][T16528] r7:00000005 r6:0012fee0 r5:00000000 r4:200001c0 [ 1969.578010][T16528] [<8054eb3c>] (sys_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1969.578449][T16528] Exception stack(0xeb0d1fa8 to 0xeb0d1ff0) [ 1969.578500][T16528] 1fa0: 00000000 00000000 200001c0 00001800 00000000 00000000 [ 1969.578541][T16528] 1fc0: 00000000 00000000 0012fee0 00000005 002d0000 00000000 00006364 76b250bc [ 1969.578751][T16528] 1fe0: 76b24ec0 76b24eb0 0001939c 00131f30 [ 1969.579455][T16528] r5:00000000 r4:00000000 [ 1972.558823][ T31] audit: type=1400 audit(2228.467:852): avc: denied { create } for pid=16548 comm="syz.1.3143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1972.561441][ T31] audit: type=1400 audit(2228.477:853): avc: denied { setopt } for pid=16548 comm="syz.1.3143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1981.778992][ T31] audit: type=1400 audit(2237.687:854): avc: denied { connect } for pid=16627 comm="syz.0.3172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1981.915565][ T31] audit: type=1400 audit(2237.827:855): avc: denied { audit_write } for pid=16627 comm="syz.0.3172" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1982.274826][T16643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=16643 comm=syz.1.3178 [ 1982.283505][T16643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16643 comm=syz.1.3178 [ 1983.737675][ T31] audit: type=1400 audit(2239.647:856): avc: denied { sqpoll } for pid=16651 comm="syz.1.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1984.660345][ T31] audit: type=1400 audit(2240.567:857): avc: denied { create } for pid=16661 comm="syz.1.3186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1984.661914][ T31] audit: type=1400 audit(2240.577:858): avc: denied { connect } for pid=16661 comm="syz.1.3186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1986.682823][ T31] audit: type=1400 audit(2242.597:859): avc: denied { write } for pid=16675 comm="syz.1.3191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1987.349880][T16686] FAULT_INJECTION: forcing a failure. [ 1987.349880][T16686] name failslab, interval 1, probability 0, space 0, times 0 [ 1987.350148][T16686] CPU: 1 UID: 0 PID: 16686 Comm: syz.1.3195 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1987.350195][T16686] Hardware name: ARM-Versatile Express [ 1987.350209][T16686] Call trace: [ 1987.350231][T16686] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1987.350303][T16686] r7:8389b000 r6:00000000 r5:60000013 r4:82257c34 [ 1987.350313][T16686] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1987.350341][T16686] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1987.350369][T16686] r5:8389b000 r4:8291bcc0 [ 1987.350377][T16686] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1987.350407][T16686] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 1987.350444][T16686] r8:00000000 r7:8389b000 r6:00000cc0 r5:ffffffff r4:830ada80 [ 1987.350453][T16686] [<80525738>] (should_failslab) from [<80509b64>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1987.350481][T16686] [<80509b14>] (kmem_cache_alloc_node_noprof) from [<81526d70>] (__alloc_skb+0x138/0x160) [ 1987.350518][T16686] r10:8389b000 r9:845bb0c0 r8:00000cc0 r7:00000001 r6:830ada80 r5:ffffffff [ 1987.350528][T16686] r4:82806040 [ 1987.350535][T16686] [<81526c38>] (__alloc_skb) from [<81711c30>] (tcp_stream_alloc_skb+0x24/0x130) [ 1987.350572][T16686] r8:00000000 r7:00000000 r6:00000001 r5:845ba940 r4:845ba940 [ 1987.350580][T16686] [<81711c0c>] (tcp_stream_alloc_skb) from [<81729a3c>] (tcp_connect+0x354/0xe88) [ 1987.350615][T16686] r7:00000000 r6:845ba968 r5:00000000 r4:845ba940 [ 1987.350624][T16686] [<817296e8>] (tcp_connect) from [<8183a7d0>] (tcp_v6_connect+0x508/0x6a8) [ 1987.350674][T16686] r10:00000000 r9:845bb0c0 r8:854e1840 r7:845bb0c0 r6:845ba968 r5:dfe99ee4 [ 1987.350685][T16686] r4:845ba940 [ 1987.350692][T16686] [<8183a2c8>] (tcp_v6_connect) from [<81758f58>] (__inet_stream_connect+0x298/0x414) [ 1987.350729][T16686] r10:00000122 r9:dfe99e98 r8:8389b000 r7:00000000 r6:00000000 r5:850e0f00 [ 1987.350738][T16686] r4:845ba940 [ 1987.350746][T16686] [<81758cc0>] (__inet_stream_connect) from [<817120bc>] (tcp_sendmsg_fastopen+0xe0/0x188) [ 1987.350784][T16686] r10:00000122 r9:dfe99e98 r8:dfe99ee4 r7:dfe99ddc r6:00000000 r5:dfe99e98 [ 1987.350794][T16686] r4:845ba940 [ 1987.350801][T16686] [<81711fdc>] (tcp_sendmsg_fastopen) from [<81712a24>] (tcp_sendmsg_locked+0x8c0/0xdb4) [ 1987.350837][T16686] r8:845ba940 r7:24000011 r6:00000000 r5:dfe99e98 r4:00000000 [ 1987.350845][T16686] [<81712164>] (tcp_sendmsg_locked) from [<81712f48>] (tcp_sendmsg+0x30/0x44) [ 1987.350882][T16686] r10:00000122 r9:84a8c300 r8:84a8c301 r7:20000080 r6:00000000 r5:dfe99e98 [ 1987.350891][T16686] r4:845ba940 [ 1987.350898][T16686] [<81712f18>] (tcp_sendmsg) from [<817f3b50>] (inet6_sendmsg+0x40/0x4c) [ 1987.350935][T16686] r7:20000080 r6:845ba940 r5:00000000 r4:dfe99e98 [ 1987.350943][T16686] [<817f3b10>] (inet6_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 1987.350977][T16686] r7:20000080 r6:850e0f00 r5:dfe99e98 r4:00000000 [ 1987.350985][T16686] [<815199f0>] (__sock_sendmsg) from [<8151b874>] (__sys_sendto+0x110/0x15c) [ 1987.351015][T16686] r7:20000080 r6:850e0f00 r5:24000011 r4:00000000 [ 1987.351024][T16686] [<8151b764>] (__sys_sendto) from [<8151b8dc>] (sys_sendto+0x1c/0x24) [ 1987.351057][T16686] r9:8389b000 r8:8020029c r7:00000122 r6:0012fee0 r5:0000001c r4:20000080 [ 1987.351066][T16686] [<8151b8c0>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1987.351091][T16686] Exception stack(0xdfe99fa8 to 0xdfe99ff0) [ 1987.351113][T16686] 9fa0: 20000080 0000001c 00000004 00000000 00000000 24000011 [ 1987.351131][T16686] 9fc0: 20000080 0000001c 0012fee0 00000122 002d0000 00000000 00006364 76b380bc [ 1987.351145][T16686] 9fe0: 76b37ec0 76b37eb0 0001939c 00131f30 [ 1989.570610][ T31] audit: type=1400 audit(2245.487:860): avc: denied { read } for pid=16692 comm="syz.0.3199" path="socket:[36927]" dev="sockfs" ino=36927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1991.374260][ T31] audit: type=1400 audit(2247.287:861): avc: denied { create } for pid=16703 comm="syz.0.3201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1995.379869][ T31] audit: type=1400 audit(2251.287:862): avc: denied { write } for pid=16722 comm="syz.1.3208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1995.387855][ T31] audit: type=1400 audit(2251.297:863): avc: denied { read } for pid=16722 comm="syz.1.3208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1997.775534][ T31] audit: type=1400 audit(2253.687:864): avc: denied { map } for pid=16736 comm="syz.0.3213" path="/dev/udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1999.284615][T16754] FAULT_INJECTION: forcing a failure. [ 1999.284615][T16754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1999.289305][T16754] CPU: 0 UID: 0 PID: 16754 Comm: syz.1.3221 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1999.289373][T16754] Hardware name: ARM-Versatile Express [ 1999.289388][T16754] Call trace: [ 1999.289412][T16754] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 1999.289473][T16754] r7:20000200 r6:00000000 r5:60000113 r4:82257c34 [ 1999.289482][T16754] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 1999.289511][T16754] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 1999.289540][T16754] r5:83898000 r4:82951710 [ 1999.289547][T16754] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 1999.289578][T16754] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 1999.289640][T16754] r8:b5403587 r7:20000200 r6:b5003500 r5:200001c0 r4:00000000 [ 1999.289662][T16754] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 1999.289719][T16754] [<8095f614>] (should_fail_usercopy) from [<81913c2c>] (sctp_getsockopt_pr_supported+0xe8/0x19c) [ 1999.289753][T16754] [<81913b44>] (sctp_getsockopt_pr_supported) from [<8191ac6c>] (sctp_getsockopt+0x820/0x1c98) [ 1999.289788][T16754] r8:20000200 r7:00000008 r6:200001c0 r5:00000071 r4:85704d80 [ 1999.289807][T16754] [<8191a44c>] (sctp_getsockopt) from [<8151cdcc>] (sock_common_getsockopt+0x28/0x30) [ 1999.289856][T16754] r10:00000127 r9:20000200 r8:00000000 r7:850e5680 r6:00000071 r5:00000084 [ 1999.289878][T16754] r4:8191a44c [ 1999.289894][T16754] [<8151cda4>] (sock_common_getsockopt) from [<81519e7c>] (do_sock_getsockopt+0x10c/0x29c) [ 1999.289927][T16754] r4:8151cda4 [ 1999.289935][T16754] [<81519d70>] (do_sock_getsockopt) from [<8151bc24>] (__sys_getsockopt+0x94/0xcc) [ 1999.289993][T16754] r9:83898000 r8:84926cc0 r7:e0391f50 r6:00000071 r5:e0391f58 r4:84926cc1 [ 1999.290008][T16754] [<8151bb90>] (__sys_getsockopt) from [<8151bc78>] (sys_getsockopt+0x1c/0x24) [ 1999.290044][T16754] r8:8020029c r7:00000127 r6:0012fee0 r5:00000000 r4:20000200 [ 1999.290065][T16754] [<8151bc5c>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1999.290111][T16754] Exception stack(0xe0391fa8 to 0xe0391ff0) [ 1999.290139][T16754] 1fa0: 20000200 00000000 00000003 00000084 00000071 200001c0 [ 1999.290175][T16754] 1fc0: 20000200 00000000 0012fee0 00000127 002d0000 00000000 00006364 76b380bc [ 1999.290199][T16754] 1fe0: 76b37ec0 76b37eb0 0001939c 00131f30 [ 2001.513245][ T31] audit: type=1400 audit(2257.427:865): avc: denied { shutdown } for pid=16766 comm="syz.1.3226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2001.588832][ T31] audit: type=1400 audit(2257.497:866): avc: denied { ioctl } for pid=16766 comm="syz.1.3226" path="socket:[37061]" dev="sockfs" ino=37061 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2001.697489][ T31] audit: type=1400 audit(2257.607:867): avc: denied { read } for pid=16766 comm="syz.1.3226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2001.705334][ T31] audit: type=1400 audit(2257.617:868): avc: denied { write } for pid=16766 comm="syz.1.3226" path="socket:[37128]" dev="sockfs" ino=37128 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2006.237661][T16794] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16794 comm=syz.1.3233 [ 2007.781696][ T31] audit: type=1400 audit(2263.697:869): avc: denied { write } for pid=16791 comm="syz.1.3233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2011.737754][T16831] FAULT_INJECTION: forcing a failure. [ 2011.737754][T16831] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2011.749779][T16831] CPU: 1 UID: 0 PID: 16831 Comm: syz.1.3247 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2011.749957][T16831] Hardware name: ARM-Versatile Express [ 2011.749996][T16831] Call trace: [ 2011.750076][T16831] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2011.750184][T16831] r7:20000280 r6:00000000 r5:60000113 r4:82257c34 [ 2011.750196][T16831] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2011.750229][T16831] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2011.750261][T16831] r5:847c0000 r4:82951710 [ 2011.750269][T16831] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2011.750304][T16831] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2011.750341][T16831] r8:00000000 r7:20000280 r6:8481a3a3 r5:00000000 r4:00000000 [ 2011.750349][T16831] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2011.750378][T16831] [<8095f614>] (should_fail_usercopy) from [<808aeb1c>] (_copy_from_iter+0x6c/0x7c8) [ 2011.750410][T16831] [<808aeab0>] (_copy_from_iter) from [<818d9208>] (isotp_sendmsg+0x254/0x820) [ 2011.750458][T16831] r10:dfa31f20 r9:8481a3a3 r8:dfa31f30 r7:00000024 r6:84818000 r5:8481a000 [ 2011.750477][T16831] r4:00000000 [ 2011.750786][T16831] [<818d8fb4>] (isotp_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 2011.750837][T16831] r10:00000000 r9:dfa31dc4 r8:dfa31dc4 r7:00000000 r6:850e2f00 r5:dfa31f20 [ 2011.750847][T16831] r4:00000000 [ 2011.751148][T16831] [<815199f0>] (__sock_sendmsg) from [<8151a2a4>] (____sys_sendmsg+0x298/0x2cc) [ 2011.751188][T16831] r7:00000000 r6:850e2f00 r5:00008044 r4:dfa31f20 [ 2011.751197][T16831] [<8151a00c>] (____sys_sendmsg) from [<8151c044>] (___sys_sendmsg+0x9c/0xd0) [ 2011.751275][T16831] r10:dfa31e24 r9:20000300 r8:00008044 r7:00000000 r6:850e2f00 r5:dfa31f20 [ 2011.751287][T16831] r4:00000000 [ 2011.751296][T16831] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 2011.751385][T16831] r10:00000128 r9:847c0000 r8:84c4ccc0 r7:00008044 r6:20000300 r5:84c4ccc1 [ 2011.751419][T16831] r4:00000003 [ 2011.751429][T16831] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 2011.751467][T16831] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 2011.751482][T16831] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2011.751511][T16831] Exception stack(0xdfa31fa8 to 0xdfa31ff0) [ 2011.751537][T16831] 1fa0: 00000000 00000000 00000003 20000300 00008044 00000000 [ 2011.751558][T16831] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b380bc [ 2011.751574][T16831] 1fe0: 76b37ec0 76b37eb0 0001939c 00131f30 [ 2012.640713][T16834] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16834 comm=syz.1.3248 [ 2018.723730][ T31] audit: type=1400 audit(2274.637:870): avc: denied { associate } for pid=16846 comm="syz.1.3253" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2021.279277][ T31] audit: type=1400 audit(2277.187:871): avc: denied { create } for pid=16862 comm="syz.1.3258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 2021.563698][T16863] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16863 comm=syz.1.3258 [ 2023.557992][ T31] audit: type=1400 audit(2279.467:872): avc: denied { setattr } for pid=16878 comm="syz.1.3264" name="NFC_LLCP" dev="sockfs" ino=36459 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2024.570335][T16896] FAULT_INJECTION: forcing a failure. [ 2024.570335][T16896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2024.570643][T16896] CPU: 0 UID: 0 PID: 16896 Comm: syz.0.3271 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2024.570692][T16896] Hardware name: ARM-Versatile Express [ 2024.570707][T16896] Call trace: [ 2024.570729][T16896] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2024.570799][T16896] r7:00000000 r6:00000000 r5:60000013 r4:82257c34 [ 2024.570810][T16896] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2024.570840][T16896] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2024.570872][T16896] r5:847c0000 r4:82951710 [ 2024.570880][T16896] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2024.570916][T16896] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2024.571038][T16896] r8:76b45f30 r7:00000000 r6:00000000 r5:dfa31f68 r4:00000002 [ 2024.571071][T16896] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2024.571165][T16896] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 2024.571237][T16896] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 2024.571353][T16896] r10:00000001 r9:8060401c r8:00000002 r7:dfa31f68 r6:0000000f r5:76b45f30 [ 2024.571408][T16896] r4:847c0000 r3:dfa31e9f [ 2024.571839][T16896] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 2024.572081][T16896] r8:76b45f30 r7:dfa31f68 r6:847c0000 r5:0000000f r4:84c4c900 [ 2024.572105][T16896] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 2024.572707][T16896] r10:00000003 r9:847c0000 r8:8020029c r7:00000000 r6:00000000 r5:84c4c900 [ 2024.573039][T16896] r4:84c4c903 [ 2024.573065][T16896] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 2024.573576][T16896] r7:00000003 r6:00000004 r5:76b45f30 r4:0000000f [ 2024.573596][T16896] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2024.574561][T16896] Exception stack(0xdfa31fa8 to 0xdfa31ff0) [ 2024.574688][T16896] 1fa0: 0000000f 76b45f30 00000004 76b45f30 0000000f 00000000 [ 2024.574762][T16896] 1fc0: 0000000f 76b45f30 00000004 00000003 002d0000 00000000 00006364 76b460bc [ 2024.575238][T16896] 1fe0: 00000158 76b45ed0 000d7d68 0012fe04 [ 2024.792682][ T31] audit: type=1400 audit(2280.707:873): avc: denied { create } for pid=16897 comm="syz.0.3272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 2029.183973][T16945] FAULT_INJECTION: forcing a failure. [ 2029.183973][T16945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2029.184254][T16945] CPU: 0 UID: 0 PID: 16945 Comm: syz.1.3292 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2029.184289][T16945] Hardware name: ARM-Versatile Express [ 2029.184303][T16945] Call trace: [ 2029.184323][T16945] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2029.184397][T16945] r7:00000000 r6:00000000 r5:60000013 r4:82257c34 [ 2029.184459][T16945] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2029.184495][T16945] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2029.184561][T16945] r5:847c3c00 r4:82951710 [ 2029.184570][T16945] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2029.184616][T16945] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2029.184670][T16945] r8:76b37f30 r7:00000000 r6:00000000 r5:dfda9f68 r4:00000002 [ 2029.184697][T16945] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2029.184727][T16945] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 2029.184781][T16945] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 2029.184845][T16945] r10:00000001 r9:8060401c r8:00000002 r7:dfda9f68 r6:0000000f r5:76b37f30 [ 2029.184860][T16945] r4:847c3c00 r3:dfda9e9f [ 2029.184868][T16945] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 2029.184915][T16945] r8:76b37f30 r7:dfda9f68 r6:847c3c00 r5:0000000f r4:84926cc0 [ 2029.184925][T16945] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 2029.184979][T16945] r10:00000003 r9:847c3c00 r8:8020029c r7:00000000 r6:00000000 r5:84926cc0 [ 2029.184990][T16945] r4:84926cc3 [ 2029.184998][T16945] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 2029.185032][T16945] r7:00000003 r6:00000004 r5:76b37f30 r4:0000000f [ 2029.185065][T16945] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2029.185094][T16945] Exception stack(0xdfda9fa8 to 0xdfda9ff0) [ 2029.185116][T16945] 9fa0: 0000000f 76b37f30 00000004 76b37f30 0000000f 00000000 [ 2029.185136][T16945] 9fc0: 0000000f 76b37f30 00000004 00000003 002d0000 00000000 00006364 76b380bc [ 2029.185172][T16945] 9fe0: 00000158 76b37ed0 000d7d68 0012fe04 [ 2032.533985][T16977] fuse: Bad value for 'fd' [ 2033.465868][ T31] audit: type=1400 audit(2289.377:874): avc: denied { getopt } for pid=16986 comm="syz.1.3311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2060.078520][T17176] fuse: Bad value for 'group_id' [ 2060.081177][T17176] fuse: Bad value for 'group_id' [ 2060.370896][T17185] fuse: Bad value for 'group_id' [ 2060.371137][T17185] fuse: Bad value for 'group_id' [ 2063.227667][T17204] fuse: Bad value for 'group_id' [ 2063.228519][T17204] fuse: Bad value for 'group_id' [ 2066.618256][T17234] fuse: Unknown parameter 'group_id00000000000000000000' [ 2069.257532][T17247] FAULT_INJECTION: forcing a failure. [ 2069.257532][T17247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2069.257870][T17247] CPU: 0 UID: 0 PID: 17247 Comm: syz.0.3390 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2069.257936][T17247] Hardware name: ARM-Versatile Express [ 2069.257950][T17247] Call trace: [ 2069.257971][T17247] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2069.258035][T17247] r7:e0585e20 r6:00000000 r5:60000013 r4:82257c34 [ 2069.258044][T17247] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2069.258071][T17247] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2069.258100][T17247] r5:8389c800 r4:82951710 [ 2069.258107][T17247] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2069.258138][T17247] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2069.258170][T17247] r8:00000000 r7:e0585e20 r6:20000200 r5:00000000 r4:e0585f20 [ 2069.258179][T17247] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2069.258204][T17247] [<8095f614>] (should_fail_usercopy) from [<8151bec8>] (copy_msghdr_from_user+0x50/0x130) [ 2069.258235][T17247] [<8151be78>] (copy_msghdr_from_user) from [<8151c020>] (___sys_sendmsg+0x78/0xd0) [ 2069.258266][T17247] r8:00000000 r7:00000000 r6:850e5180 r5:e0585f20 r4:e0585e64 [ 2069.258274][T17247] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 2069.258306][T17247] r10:00000128 r9:8389c800 r8:84926540 r7:00000000 r6:20000200 r5:84926541 [ 2069.258316][T17247] r4:00000003 [ 2069.258324][T17247] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 2069.258359][T17247] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 2069.258367][T17247] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2069.258392][T17247] Exception stack(0xe0585fa8 to 0xe0585ff0) [ 2069.258413][T17247] 5fa0: 00000000 00000000 00000003 20000200 00000000 00000000 [ 2069.258430][T17247] 5fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b460bc [ 2069.258444][T17247] 5fe0: 76b45ec0 76b45eb0 0001939c 00131f30 [ 2069.465470][T17249] fuse: Bad value for 'user_id' [ 2069.465822][T17249] fuse: Bad value for 'user_id' [ 2073.037778][T17267] fuse: Bad value for 'user_id' [ 2073.038009][T17267] fuse: Bad value for 'user_id' [ 2078.551975][ T31] audit: type=1400 audit(2334.467:875): avc: denied { ioctl } for pid=17296 comm="syz.0.3405" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2078.552202][T17303] binder: 17296:17303 ioctl 40046629 20000300 returned -22 [ 2078.553791][T17298] binder: 17296:17298 ioctl 40046629 20000300 returned -22 [ 2078.564741][T17298] binder: 17296:17298 ioctl 81f8943c 200003c0 returned -22 [ 2078.565102][T17297] binder: 17296:17297 ioctl 81f8943c 200003c0 returned -22 [ 2081.217720][T17319] fuse: Bad value for 'fd' [ 2084.437475][T17339] fuse: Bad value for 'fd' [ 2087.957811][T17361] fuse: Bad value for 'fd' [ 2092.315161][T17384] fuse: Bad value for 'fd' [ 2095.393152][T17404] fuse: Bad value for 'fd' [ 2100.976213][T17428] fuse: Invalid rootmode [ 2106.106862][T17451] fuse: Invalid rootmode [ 2106.415798][T17455] fuse: Bad value for 'fd' [ 2108.929602][T17466] fuse: Bad value for 'rootmode' [ 2110.322671][T17474] fuse: Bad value for 'fd' [ 2110.618311][T17479] fuse: Bad value for 'rootmode' [ 2112.204329][T17491] fuse: Bad value for 'rootmode' [ 2112.385056][T17493] fuse: Bad value for 'fd' [ 2112.833688][T17501] fuse: Invalid rootmode [ 2112.963292][T17505] fuse: Unknown parameter 'use00000000000000000000' [ 2113.343427][T17511] fuse: Bad value for 'fd' [ 2113.710974][T17518] fuse: Unknown parameter 'use00000000000000000000' [ 2115.179825][T17526] FAULT_INJECTION: forcing a failure. [ 2115.179825][T17526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2115.189156][T17526] CPU: 1 UID: 0 PID: 17526 Comm: syz.0.3476 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2115.189214][T17526] Hardware name: ARM-Versatile Express [ 2115.189317][T17526] Call trace: [ 2115.189795][T17526] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2115.190318][T17526] r7:00000000 r6:00000000 r5:60000113 r4:82257c34 [ 2115.190331][T17526] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2115.190364][T17526] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2115.190397][T17526] r5:84f30c00 r4:82951710 [ 2115.190405][T17526] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2115.190439][T17526] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2115.190477][T17526] r8:76b45f30 r7:00000000 r6:00000000 r5:dfc8df68 r4:00000002 [ 2115.190485][T17526] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2115.190515][T17526] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 2115.190548][T17526] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 2115.190592][T17526] r10:00000001 r9:8060401c r8:00000002 r7:dfc8df68 r6:0000000f r5:76b45f30 [ 2115.190605][T17526] r4:84f30c00 r3:dfc8de9f [ 2115.190613][T17526] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 2115.190654][T17526] r8:76b45f30 r7:dfc8df68 r6:84f30c00 r5:0000000f r4:84a270c0 [ 2115.190663][T17526] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 2115.190701][T17526] r10:00000003 r9:84f30c00 r8:8020029c r7:00000000 r6:00000000 r5:84a270c0 [ 2115.190730][T17526] r4:84a270c3 [ 2115.190740][T17526] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 2115.190776][T17526] r7:00000003 r6:00000004 r5:76b45f30 r4:0000000f [ 2115.190784][T17526] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2115.190812][T17526] Exception stack(0xdfc8dfa8 to 0xdfc8dff0) [ 2115.190837][T17526] dfa0: 0000000f 76b45f30 00000004 76b45f30 0000000f 00000000 [ 2115.190865][T17526] dfc0: 0000000f 76b45f30 00000004 00000003 002d0000 00000000 00006364 76b460bc [ 2115.190881][T17526] dfe0: 00000158 76b45ed0 000d7d68 0012fe04 [ 2115.945510][T17535] fuse: Bad value for 'fd' [ 2117.157375][T17546] fuse: Bad value for 'fd' [ 2117.962591][T17559] fuse: Bad value for 'fd' [ 2118.687275][T17569] fuse: Unknown parameter 'user_i00000000000000000000' [ 2119.053784][T17574] fuse: Bad value for 'group_id' [ 2119.054511][T17574] fuse: Bad value for 'group_id' [ 2125.034098][T17623] FAULT_INJECTION: forcing a failure. [ 2125.034098][T17623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2125.034420][T17623] CPU: 0 UID: 0 PID: 17623 Comm: syz.1.3516 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2125.034465][T17623] Hardware name: ARM-Versatile Express [ 2125.034479][T17623] Call trace: [ 2125.034501][T17623] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2125.034559][T17623] r7:200000c0 r6:00000000 r5:60000013 r4:82257c34 [ 2125.034587][T17623] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2125.034673][T17623] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2125.034803][T17623] r5:83898000 r4:82951710 [ 2125.034852][T17623] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2125.034914][T17623] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2125.034981][T17623] r8:00000000 r7:200000c0 r6:85aab440 r5:00000000 r4:dfa69f20 [ 2125.035093][T17623] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2125.035255][T17623] [<8095f614>] (should_fail_usercopy) from [<808aeb1c>] (_copy_from_iter+0x6c/0x7c8) [ 2125.035289][T17623] [<808aeab0>] (_copy_from_iter) from [<81644f58>] (netlink_sendmsg+0x18c/0x444) [ 2125.035335][T17623] r10:00000000 r9:00000000 r8:dfa69f30 r7:84ec8c00 r6:0000002c r5:84a43600 [ 2125.035566][T17623] r4:dfa69f20 [ 2125.035637][T17623] [<81644dcc>] (netlink_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 2125.035770][T17623] r10:00000000 r9:dfa69dc4 r8:dfa69dc4 r7:00000000 r6:8366ac80 r5:dfa69f20 [ 2125.035874][T17623] r4:00000000 [ 2125.035883][T17623] [<815199f0>] (__sock_sendmsg) from [<8151a2a4>] (____sys_sendmsg+0x298/0x2cc) [ 2125.035940][T17623] r7:00000000 r6:8366ac80 r5:20000000 r4:dfa69f20 [ 2125.035991][T17623] [<8151a00c>] (____sys_sendmsg) from [<8151c044>] (___sys_sendmsg+0x9c/0xd0) [ 2125.036077][T17623] r10:dfa69e24 r9:20000300 r8:20000000 r7:00000000 r6:8366ac80 r5:dfa69f20 [ 2125.036193][T17623] r4:00000000 [ 2125.036203][T17623] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 2125.036288][T17623] r10:00000128 r9:83898000 r8:85512480 r7:20000000 r6:20000300 r5:85512481 [ 2125.036345][T17623] r4:00000003 [ 2125.036383][T17623] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 2125.036433][T17623] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 2125.036466][T17623] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2125.036523][T17623] Exception stack(0xdfa69fa8 to 0xdfa69ff0) [ 2125.036570][T17623] 9fa0: 00000000 00000000 00000003 20000300 20000000 00000000 [ 2125.036616][T17623] 9fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b380bc [ 2125.036638][T17623] 9fe0: 76b37ec0 76b37eb0 0001939c 00131f30 [ 2126.254135][T17629] FAULT_INJECTION: forcing a failure. [ 2126.254135][T17629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2126.254431][T17629] CPU: 0 UID: 0 PID: 17629 Comm: syz.1.3519 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2126.254520][T17629] Hardware name: ARM-Versatile Express [ 2126.254538][T17629] Call trace: [ 2126.254560][T17629] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2126.254619][T17629] r7:00000000 r6:00000000 r5:60000013 r4:82257c34 [ 2126.254629][T17629] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2126.254656][T17629] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2126.254684][T17629] r5:83898000 r4:82951710 [ 2126.254691][T17629] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2126.254742][T17629] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2126.254779][T17629] r8:76b37f30 r7:00000000 r6:00000000 r5:dfab1f68 r4:00000002 [ 2126.254787][T17629] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2126.254814][T17629] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 2126.254844][T17629] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 2126.254888][T17629] r10:00000001 r9:8060401c r8:00000002 r7:dfab1f68 r6:0000000f r5:76b37f30 [ 2126.254901][T17629] r4:83898000 r3:dfab1e9f [ 2126.254908][T17629] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 2126.254944][T17629] r8:76b37f30 r7:dfab1f68 r6:83898000 r5:0000000f r4:85512600 [ 2126.254952][T17629] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 2126.254985][T17629] r10:00000003 r9:83898000 r8:8020029c r7:00000000 r6:00000000 r5:85512600 [ 2126.254995][T17629] r4:85512603 [ 2126.255002][T17629] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 2126.255031][T17629] r7:00000003 r6:00000004 r5:76b37f30 r4:0000000f [ 2126.255040][T17629] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2126.255065][T17629] Exception stack(0xdfab1fa8 to 0xdfab1ff0) [ 2126.255087][T17629] 1fa0: 0000000f 76b37f30 00000004 76b37f30 0000000f 00000000 [ 2126.255105][T17629] 1fc0: 0000000f 76b37f30 00000004 00000003 002d0000 00000000 00006364 76b380bc [ 2126.255119][T17629] 1fe0: 00000158 76b37ed0 000d7d68 0012fe04 [ 2129.194325][T17673] fuse: Bad value for 'group_id' [ 2129.194589][T17673] fuse: Bad value for 'group_id' [ 2130.421467][T17691] fuse: Unknown parameter '0x0000000000000003' [ 2130.705977][T17694] fuse: Bad value for 'fd' [ 2131.282653][T17702] fuse: Unknown parameter '0x0000000000000003' [ 2131.639685][T17706] fuse: Unknown parameter 'group_i00000000000000000000' [ 2132.074484][T17714] fuse: Unknown parameter '0x0000000000000003' [ 2132.293659][T17718] fuse: Unknown parameter 'group_i00000000000000000000' [ 2132.660053][T17724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17724 comm=syz.0.3556 [ 2132.660338][T17724] FAULT_INJECTION: forcing a failure. [ 2132.660338][T17724] name failslab, interval 1, probability 0, space 0, times 0 [ 2132.663083][T17724] CPU: 0 UID: 0 PID: 17724 Comm: syz.0.3556 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2132.663144][T17724] Hardware name: ARM-Versatile Express [ 2132.663157][T17724] Call trace: [ 2132.663178][T17724] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2132.663233][T17724] r7:84c09800 r6:00000000 r5:60000013 r4:82257c34 [ 2132.663241][T17724] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2132.663268][T17724] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2132.663295][T17724] r5:84c09800 r4:8291bcc0 [ 2132.663302][T17724] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2132.663332][T17724] [<8095f3d4>] (should_fail_ex) from [<805257a4>] (should_failslab+0x6c/0x94) [ 2132.663369][T17724] r8:00000000 r7:84c09800 r6:00000cc0 r5:ffffffff r4:830ad9c0 [ 2132.663377][T17724] [<80525738>] (should_failslab) from [<80509b64>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 2132.663404][T17724] [<80509b14>] (kmem_cache_alloc_node_noprof) from [<81526d70>] (__alloc_skb+0x138/0x160) [ 2132.663439][T17724] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830ad9c0 r5:ffffffff [ 2132.663449][T17724] r4:82806040 [ 2132.663456][T17724] [<81526c38>] (__alloc_skb) from [<81645280>] (netlink_ack+0x70/0x214) [ 2132.663490][T17724] r8:8498a540 r7:85aaa240 r6:00000100 r5:81566238 r4:00000014 [ 2132.663499][T17724] [<81645210>] (netlink_ack) from [<81645510>] (netlink_rcv_skb+0xec/0x120) [ 2132.663534][T17724] r10:00000000 r9:00000000 r8:84b25100 r7:0000001c r6:85aaa240 r5:81566238 [ 2132.663551][T17724] r4:8498a540 [ 2132.663558][T17724] [<81645424>] (netlink_rcv_skb) from [<815650e4>] (rtnetlink_rcv+0x18/0x1c) [ 2132.663590][T17724] r7:8498a540 r6:8559ec40 r5:0000001c r4:84564800 [ 2132.663598][T17724] [<815650cc>] (rtnetlink_rcv) from [<81644ccc>] (netlink_unicast+0x19c/0x29c) [ 2132.663622][T17724] [<81644b30>] (netlink_unicast) from [<81644f98>] (netlink_sendmsg+0x1cc/0x444) [ 2132.663656][T17724] r9:00000000 r8:00000000 r7:84ec8000 r6:0000001c r5:8498a540 r4:dfe4df20 [ 2132.663664][T17724] [<81644dcc>] (netlink_sendmsg) from [<81519a34>] (__sock_sendmsg+0x44/0x78) [ 2132.663697][T17724] r10:00000000 r9:dfe4ddc4 r8:dfe4ddc4 r7:00000000 r6:8366ac80 r5:dfe4df20 [ 2132.663706][T17724] r4:00000000 [ 2132.663713][T17724] [<815199f0>] (__sock_sendmsg) from [<8151a2a4>] (____sys_sendmsg+0x298/0x2cc) [ 2132.663740][T17724] r7:00000000 r6:8366ac80 r5:00004080 r4:dfe4df20 [ 2132.663748][T17724] [<8151a00c>] (____sys_sendmsg) from [<8151c044>] (___sys_sendmsg+0x9c/0xd0) [ 2132.663779][T17724] r10:dfe4de24 r9:200003c0 r8:00004080 r7:00000000 r6:8366ac80 r5:dfe4df20 [ 2132.663789][T17724] r4:00000000 [ 2132.663796][T17724] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 2132.663827][T17724] r10:00000128 r9:84c09800 r8:85512a80 r7:00004080 r6:200003c0 r5:85512a81 [ 2132.663837][T17724] r4:00000003 [ 2132.663843][T17724] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 2132.663874][T17724] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 2132.663881][T17724] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2132.663905][T17724] Exception stack(0xdfe4dfa8 to 0xdfe4dff0) [ 2132.663924][T17724] dfa0: 00000000 00000000 00000003 200003c0 00004080 00000000 [ 2132.663942][T17724] dfc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76b460bc [ 2132.663955][T17724] dfe0: 76b45ec0 76b45eb0 0001939c 00131f30 [ 2133.145173][T17730] fuse: Unknown parameter '0x0000000000000003' [ 2134.953778][T17754] fuse: Bad value for 'fd' [ 2135.330624][ T31] audit: type=1400 audit(2391.247:876): avc: denied { bind } for pid=17760 comm="syz.1.3573" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2135.335569][ T31] audit: type=1400 audit(2391.247:877): avc: denied { name_bind } for pid=17760 comm="syz.1.3573" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2135.340971][ T31] audit: type=1400 audit(2391.257:878): avc: denied { node_bind } for pid=17760 comm="syz.1.3573" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2135.631548][ T31] audit: type=1400 audit(2391.547:879): avc: denied { execute } for pid=17766 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2135.639837][ T31] audit: type=1400 audit(2391.547:880): avc: denied { execute_no_trans } for pid=17766 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2135.790017][ T31] audit: type=1400 audit(2391.687:881): avc: denied { mounton } for pid=17767 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2135.990605][T13535] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2136.105337][T13535] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2136.221285][T13535] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2136.290037][T13535] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2136.752615][T13535] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2136.755836][T13535] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2136.757848][T13535] bond0 (unregistering): Released all slaves [ 2136.819476][T13535] hsr_slave_0: left promiscuous mode [ 2136.820905][T13535] hsr_slave_1: left promiscuous mode [ 2136.839870][T13535] veth1_macvtap: left promiscuous mode [ 2136.840531][T13535] veth0_macvtap: left promiscuous mode [ 2136.841085][T13535] veth1_vlan: left promiscuous mode [ 2136.841579][T13535] veth0_vlan: left promiscuous mode [ 2137.434071][ T31] audit: type=1400 audit(2393.347:882): avc: denied { write } for pid=17802 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2137.438579][ T31] audit: type=1400 audit(2393.347:883): avc: denied { open } for pid=17802 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2137.722736][ T31] audit: type=1400 audit(2393.637:884): avc: denied { search } for pid=17808 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2137.899453][ T31] audit: type=1400 audit(2393.807:885): avc: denied { read } for pid=17830 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2139.119902][T17767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2139.122910][T17767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2140.324233][T17767] hsr_slave_0: entered promiscuous mode [ 2140.326162][T17767] hsr_slave_1: entered promiscuous mode [ 2140.761074][T17767] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2140.774098][T17767] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2140.781226][T17767] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2140.786816][T17767] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2141.232977][T17767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2141.341772][T18166] fuse: Unknown parameter 'grou00000000000000000000' [ 2141.439521][T18170] fuse: Bad value for 'fd' [ 2142.762109][T18220] fuse: Unknown parameter 'grou00000000000000000000' [ 2142.855160][T17767] veth0_vlan: entered promiscuous mode [ 2142.865701][T17767] veth1_vlan: entered promiscuous mode [ 2142.896112][T18225] fuse: Bad value for 'fd' [ 2142.906660][T17767] veth0_macvtap: entered promiscuous mode [ 2142.913137][T17767] veth1_macvtap: entered promiscuous mode [ 2142.952910][T17767] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2142.953587][T17767] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2142.954175][T17767] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2142.954846][T17767] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2143.003377][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 2143.005101][ T31] audit: type=1400 audit(2398.917:899): avc: denied { mounton } for pid=17767 comm="syz-executor" path="/syzkaller.QhzywW/syz-tmp" dev="vda" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2143.007431][ T31] audit: type=1400 audit(2398.917:900): avc: denied { mount } for pid=17767 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2143.013975][ T31] audit: type=1400 audit(2398.927:901): avc: denied { mount } for pid=17767 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2143.019961][ T31] audit: type=1400 audit(2398.937:902): avc: denied { mounton } for pid=17767 comm="syz-executor" path="/syzkaller.QhzywW/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2143.022404][ T31] audit: type=1400 audit(2398.937:903): avc: denied { mounton } for pid=17767 comm="syz-executor" path="/syzkaller.QhzywW/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=41313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2143.028492][ T31] audit: type=1400 audit(2398.937:904): avc: denied { unmount } for pid=17767 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2143.036504][ T31] audit: type=1400 audit(2398.947:905): avc: denied { mounton } for pid=17767 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2143.036874][ T31] audit: type=1400 audit(2398.947:906): avc: denied { mount } for pid=17767 comm="syz-executor" name="/" dev="gadgetfs" ino=2431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2143.037035][ T31] audit: type=1400 audit(2398.947:907): avc: denied { mount } for pid=17767 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2143.037165][ T31] audit: type=1400 audit(2398.947:908): avc: denied { mounton } for pid=17767 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2143.256940][T18235] fuse: Bad value for 'fd' [ 2143.339670][T18237] fuse: Bad value for 'group_id' [ 2143.339922][T18237] fuse: Bad value for 'group_id' [ 2143.687749][T18246] fuse: Bad value for 'fd' [ 2143.897949][T17773] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2143.946310][T17773] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2144.018175][T17773] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2144.057822][T17773] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2144.319924][T17773] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2144.323720][T17773] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2144.327021][T17773] bond0 (unregistering): Released all slaves [ 2144.413031][T17773] hsr_slave_0: left promiscuous mode [ 2144.414509][T17773] hsr_slave_1: left promiscuous mode [ 2144.419902][T17773] veth1_macvtap: left promiscuous mode [ 2144.420505][T17773] veth0_macvtap: left promiscuous mode [ 2144.421982][T17773] veth1_vlan: left promiscuous mode [ 2144.430117][T17773] veth0_vlan: left promiscuous mode [ 2144.626464][T18292] fuse: Bad value for 'fd' [ 2145.444277][T18250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2145.448580][T18250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2146.026540][T18523] fuse: Bad value for 'fd' [ 2146.051577][T18250] hsr_slave_0: entered promiscuous mode [ 2146.053112][T18250] hsr_slave_1: entered promiscuous mode [ 2146.055244][T18250] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2146.055900][T18250] Cannot create hsr debugfs directory [ 2146.546889][T18250] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2146.552573][T18250] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2146.557812][T18250] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2146.562992][T18250] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2146.957548][T18250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2147.387644][T18653] fuse: Bad value for 'user_id' [ 2147.389593][T18653] fuse: Bad value for 'user_id' [ 2147.500490][T18657] fuse: Invalid rootmode [ 2148.556044][T18250] veth0_vlan: entered promiscuous mode [ 2148.571097][T18250] veth1_vlan: entered promiscuous mode [ 2148.612964][T18250] veth0_macvtap: entered promiscuous mode [ 2148.621270][T18250] veth1_macvtap: entered promiscuous mode [ 2148.664062][T18250] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2148.665477][T18250] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2148.667273][T18250] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2148.668756][T18250] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2148.852272][T18700] fuse: Bad value for 'user_id' [ 2148.853202][T18700] fuse: Bad value for 'user_id' [ 2148.864893][T18702] fuse: Bad value for 'group_id' [ 2148.869730][T18702] fuse: Bad value for 'group_id' [ 2148.932997][T18705] fuse: Invalid rootmode [ 2150.186652][T18733] fuse: Unknown parameter 'group_i00000000000000000000' [ 2150.324820][ T31] audit: type=1400 audit(2406.237:909): avc: denied { ioctl } for pid=18734 comm="syz.0.3623" path="/dev/loop-control" dev="devtmpfs" ino=632 ioctlcmd=0x55d1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2150.424645][T18739] fuse: Invalid rootmode [ 2152.253215][T18756] fuse: Bad value for 'group_id' [ 2152.254343][T18756] fuse: Bad value for 'group_id' [ 2152.505029][T18762] fuse: Bad value for 'fd' [ 2153.239540][T18768] fuse: Unknown parameter 'use00000000000000000000' [ 2153.310472][T18770] fuse: Unknown parameter 'group_id00000000000000000000' [ 2153.490637][T18774] fuse: Bad value for 'fd' [ 2153.666657][T18779] fuse: Unknown parameter 'use00000000000000000000' [ 2153.738160][T18781] fuse: Unknown parameter 'group_id00000000000000000000' [ 2156.161921][T18795] fuse: Unknown parameter 'use00000000000000000000' [ 2156.201880][T18797] fuse: Unknown parameter 'group_id00000000000000000000' [ 2156.271924][T18801] fuse: Unknown parameter 'group_id00000000000000000000' [ 2156.326216][T18805] fuse: Unknown parameter 'grou00000000000000000000' [ 2156.387983][T18807] fuse: Unknown parameter 'user_i00000000000000000000' [ 2157.643477][T18819] fuse: Unknown parameter 'group_i00000000000000000000' [ 2157.730461][T18823] fuse: Unknown parameter 'user_i00000000000000000000' [ 2157.995771][T18828] FAULT_INJECTION: forcing a failure. [ 2157.995771][T18828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2157.996064][T18828] CPU: 0 UID: 0 PID: 18828 Comm: syz.0.3656 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2157.996109][T18828] Hardware name: ARM-Versatile Express [ 2157.996122][T18828] Call trace: [ 2157.996142][T18828] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2157.996212][T18828] r7:00000000 r6:00000000 r5:60000013 r4:82257c34 [ 2157.996222][T18828] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2157.996250][T18828] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2157.996279][T18828] r5:84c0d400 r4:82951710 [ 2157.996286][T18828] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2157.996315][T18828] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2157.996347][T18828] r8:76bd8f30 r7:00000000 r6:00000000 r5:ea9fdf68 r4:00000002 [ 2157.996356][T18828] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2157.996381][T18828] [<8095f614>] (should_fail_usercopy) from [<8058cd44>] (simple_read_from_buffer+0x80/0x13c) [ 2157.996411][T18828] [<8058ccc4>] (simple_read_from_buffer) from [<806040d4>] (proc_fail_nth_read+0xb8/0x100) [ 2157.996448][T18828] r10:00000001 r9:8060401c r8:00000002 r7:ea9fdf68 r6:0000000f r5:76bd8f30 [ 2157.996459][T18828] r4:84c0d400 r3:ea9fde9f [ 2157.996466][T18828] [<8060401c>] (proc_fail_nth_read) from [<805518b8>] (vfs_read+0x98/0x320) [ 2157.996520][T18828] r8:76bd8f30 r7:ea9fdf68 r6:84c0d400 r5:0000000f r4:85512cc0 [ 2157.996589][T18828] [<80551820>] (vfs_read) from [<80552558>] (ksys_read+0x74/0xe4) [ 2157.996718][T18828] r10:00000003 r9:84c0d400 r8:8020029c r7:00000000 r6:00000000 r5:85512cc0 [ 2157.997005][T18828] r4:85512cc3 [ 2157.997918][T18828] [<805524e4>] (ksys_read) from [<805525d8>] (sys_read+0x10/0x14) [ 2157.998703][T18828] r7:00000003 r6:00000003 r5:76bd8f30 r4:0000000f [ 2157.998759][T18828] [<805525c8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2157.999137][T18828] Exception stack(0xea9fdfa8 to 0xea9fdff0) [ 2157.999891][T18828] dfa0: 0000000f 76bd8f30 00000003 76bd8f30 0000000f 00000000 [ 2157.999957][T18828] dfc0: 0000000f 76bd8f30 00000003 00000003 002d0000 00000000 00006364 76bd90bc [ 2157.999986][T18828] dfe0: 00000158 76bd8ed0 000d7d68 0012fe04 [ 2158.068474][T18830] fuse: Unknown parameter 'group_i00000000000000000000' [ 2158.191151][T18834] fuse: Unknown parameter 'user_id00000000000000000000' [ 2159.551651][T18847] fuse: Unknown parameter 'group_i00000000000000000000' [ 2159.628299][T18849] fuse: Unknown parameter 'user_id00000000000000000000' [ 2159.703121][T18851] fuse: Bad value for 'user_id' [ 2159.703865][T18851] fuse: Bad value for 'user_id' [ 2160.942115][T18859] fuse: Unknown parameter 'group_id00000000000000000000' [ 2160.984423][T18861] fuse: Unknown parameter 'user_id00000000000000000000' [ 2161.006952][ T31] audit: type=1400 audit(2416.917:910): avc: denied { append } for pid=18862 comm="syz.0.3670" name="event8" dev="devtmpfs" ino=842 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:var_lock_t:s0" [ 2161.007217][ T31] audit: type=1400 audit(2416.917:911): avc: denied { open } for pid=18862 comm="syz.0.3670" path="/dev/input/event8" dev="devtmpfs" ino=842 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:var_lock_t:s0" [ 2161.014237][ T31] audit: type=1400 audit(2416.927:912): avc: denied { relabelto } for pid=18862 comm="syz.0.3670" name="event8" dev="devtmpfs" ino=842 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:var_lock_t:s0" [ 2161.014476][ T31] audit: type=1400 audit(2416.927:913): avc: denied { associate } for pid=18862 comm="syz.0.3670" name="event8" dev="devtmpfs" ino=842 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:var_lock_t:s0" [ 2162.152783][T18871] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18871 comm=syz.1.3673 [ 2162.273464][T18875] fuse: Bad value for 'fd' [ 2162.332310][T18877] fuse: Unknown parameter 'group_id00000000000000000000' [ 2162.406869][T18879] fuse: Bad value for 'fd' [ 2163.577705][ T31] audit: type=1400 audit(2419.487:914): avc: denied { write } for pid=18884 comm="syz.1.3679" path="socket:[41819]" dev="sockfs" ino=41819 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2163.650734][T18887] fuse: Bad value for 'fd' [ 2163.729536][T18889] fuse: Unknown parameter 'group_id00000000000000000000' [ 2163.835927][T18891] fuse: Bad value for 'fd' [ 2164.038111][T18895] FAULT_INJECTION: forcing a failure. [ 2164.038111][T18895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2164.038601][T18895] CPU: 1 UID: 0 PID: 18895 Comm: syz.1.3684 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2164.038693][T18895] Hardware name: ARM-Versatile Express [ 2164.038803][T18895] Call trace: [ 2164.038853][T18895] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2164.038972][T18895] r7:eade1e20 r6:00000000 r5:60000013 r4:82257c34 [ 2164.038996][T18895] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 2164.039055][T18895] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 2164.039254][T18895] r5:84c0a400 r4:82951710 [ 2164.039278][T18895] [<80220048>] (dump_stack) from [<8095f598>] (should_fail_ex+0x1c4/0x228) [ 2164.039347][T18895] [<8095f3d4>] (should_fail_ex) from [<8095f610>] (should_fail+0x14/0x18) [ 2164.039440][T18895] r8:00000800 r7:eade1e20 r6:20000140 r5:00000000 r4:eade1f20 [ 2164.039539][T18895] [<8095f5fc>] (should_fail) from [<8095f630>] (should_fail_usercopy+0x1c/0x20) [ 2164.039692][T18895] [<8095f614>] (should_fail_usercopy) from [<8151bec8>] (copy_msghdr_from_user+0x50/0x130) [ 2164.039981][T18895] [<8151be78>] (copy_msghdr_from_user) from [<8151c020>] (___sys_sendmsg+0x78/0xd0) [ 2164.040067][T18895] r8:00000800 r7:00000000 r6:850c3680 r5:eade1f20 r4:eade1e64 [ 2164.040450][T18895] [<8151bfa8>] (___sys_sendmsg) from [<8151c4d4>] (__sys_sendmsg+0x8c/0xd8) [ 2164.040578][T18895] r10:00000128 r9:84c0a400 r8:85470180 r7:00000800 r6:20000140 r5:85470181 [ 2164.040801][T18895] r4:00000003 [ 2164.040922][T18895] [<8151c448>] (__sys_sendmsg) from [<8151c534>] (sys_sendmsg+0x14/0x18) [ 2164.041086][T18895] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 2164.041249][T18895] [<8151c520>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2164.041754][T18895] Exception stack(0xeade1fa8 to 0xeade1ff0) [ 2164.041976][T18895] 1fa0: 00000000 00000000 00000003 20000140 00000800 00000000 [ 2164.042176][T18895] 1fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76bee0bc [ 2164.042259][T18895] 1fe0: 76bedec0 76bedeb0 0001939c 00131f30 [ 2164.166146][T18897] fuse: Bad value for 'fd' [ 2164.276784][T18901] fuse: Bad value for 'fd' [ 2168.431640][T18906] fuse: Unknown parameter 'grou00000000000000000000' [ 2168.486683][T18908] fuse: Unknown parameter '0x0000000000000003' [ 2168.579606][T18912] fuse: Bad value for 'fd' [ 2168.743754][T18916] x_tables: ip6_tables: policy.0 match: invalid size 312 (kernel) != (user) 8 [ 2169.354363][ T31] audit: type=1400 audit(2425.267:915): avc: denied { setopt } for pid=18933 comm="syz.1.3697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2169.430069][ T31] audit: type=1400 audit(2425.347:916): avc: denied { bind } for pid=18935 comm="syz.1.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2169.430618][ T31] audit: type=1400 audit(2425.347:917): avc: denied { name_bind } for pid=18935 comm="syz.1.3698" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 2169.430775][ T31] audit: type=1400 audit(2425.347:918): avc: denied { node_bind } for pid=18935 comm="syz.1.3698" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 2169.438442][ T31] audit: type=1400 audit(2425.347:919): avc: denied { name_connect } for pid=18935 comm="syz.1.3698" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 2169.459689][ T31] audit: type=1400 audit(2425.377:920): avc: denied { shutdown } for pid=18935 comm="syz.1.3698" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2170.039447][ T31] audit: type=1400 audit(2425.947:921): avc: denied { execute } for pid=18954 comm="syz.1.3705" path="/79/cpu.stat" dev="tmpfs" ino=453 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2171.267460][ T31] audit: type=1400 audit(2427.177:922): avc: denied { read } for pid=18965 comm="syz.1.3710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2171.680051][ T31] audit: type=1400 audit(2427.597:923): avc: denied { nlmsg_write } for pid=18987 comm="syz.0.3716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2172.029224][ T94] usb 1-1: new high-speed USB device number 84 using dummy_hcd [ 2172.189111][ T94] usb 1-1: Using ep0 maxpacket: 8 [ 2172.195545][ T94] usb 1-1: config 0 has an invalid interface number: 151 but max is 1 [ 2172.195779][ T94] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2172.195907][ T94] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 2172.196021][ T94] usb 1-1: config 0 has no interface number 0 [ 2172.196135][ T94] usb 1-1: config 0 interface 151 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 2172.196193][ T94] usb 1-1: config 0 interface 151 altsetting 0 has an endpoint descriptor with address 0xA3, changing to 0x83 [ 2172.196236][ T94] usb 1-1: config 0 interface 151 altsetting 0 endpoint 0x83 has invalid maxpacket 64466, setting to 1024 [ 2172.196300][ T94] usb 1-1: config 0 interface 151 altsetting 0 bulk endpoint 0x83 has invalid maxpacket 1024 [ 2172.196422][ T94] usb 1-1: config 0 interface 151 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 2172.229798][ T94] usb 1-1: New USB device found, idVendor=0499, idProduct=500a, bcdDevice=e7.b7 [ 2172.230011][ T94] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2172.230130][ T94] usb 1-1: Product: syz [ 2172.230233][ T94] usb 1-1: Manufacturer: syz [ 2172.230269][ T94] usb 1-1: SerialNumber: syz [ 2172.236814][ T94] usb 1-1: config 0 descriptor?? [ 2172.240775][T18988] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2172.244604][ T94] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 2172.458048][ T94] usb 1-1: USB disconnect, device number 84 [ 2172.980214][ T31] audit: type=1400 audit(2428.897:924): avc: denied { getopt } for pid=19040 comm="syz.0.3725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2173.219351][T16852] usb 1-1: new high-speed USB device number 85 using dummy_hcd [ 2173.369345][T16852] usb 1-1: Using ep0 maxpacket: 16 [ 2173.374532][T16852] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2173.375314][T16852] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2173.375911][T16852] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2173.376708][T16852] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 2173.377871][T16852] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2173.382341][T16852] usb 1-1: config 0 descriptor?? [ 2173.795799][T16852] koneplus 0003:1E7D:2E22.0012: unknown main item tag 0x0 [ 2173.797505][T16852] koneplus 0003:1E7D:2E22.0012: unknown main item tag 0x0 [ 2173.802741][T16852] koneplus 0003:1E7D:2E22.0012: hidraw0: USB HID v0.00 Device [HID 1e7d:2e22] on usb-dummy_hcd.0-1/input0 [ 2174.212274][ T110] usb 1-1: USB disconnect, device number 85 [ 2176.406321][ T31] audit: type=1400 audit(2432.317:925): avc: denied { name_bind } for pid=19079 comm="syz.1.3730" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2176.409867][ T31] audit: type=1400 audit(2432.317:926): avc: denied { node_bind } for pid=19079 comm="syz.1.3730" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2176.544479][T19082] vcan0: tx drop: invalid sa for name 0xfffffffffffffffc [ 2176.546416][ T31] audit: type=1400 audit(2432.457:927): avc: denied { connect } for pid=19081 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2176.594607][ T31] audit: type=1400 audit(2432.507:928): avc: denied { set_context_mgr } for pid=19083 comm="syz.1.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2176.631475][ T31] audit: type=1400 audit(2432.547:929): avc: denied { map } for pid=19083 comm="syz.1.3732" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2176.644853][T19084] binder: 19083:19084 ioctl c0306201 200003c0 returned -14 [ 2177.152668][ T31] audit: type=1400 audit(2433.067:930): avc: denied { call } for pid=19083 comm="syz.1.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2178.751814][ T31] audit: type=1400 audit(2434.637:931): avc: denied { write } for pid=19110 comm="syz.1.3738" lport=39128 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 2179.194266][ T31] audit: type=1400 audit(2435.107:932): avc: denied { append } for pid=19114 comm="syz.1.3740" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 2179.210096][ T31] audit: type=1400 audit(2435.127:933): avc: denied { map } for pid=19114 comm="syz.1.3740" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 2179.211349][ T31] audit: type=1400 audit(2435.127:934): avc: denied { execute } for pid=19114 comm="syz.1.3740" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 2179.896640][ T3773] hid-generic 000A:0002:0009.0013: item fetching failed at offset 1/4 [ 2179.897160][ T3773] hid-generic 000A:0002:0009.0013: probe with driver hid-generic failed with error -22 [ 2182.574113][T16852] usb 2-1: new high-speed USB device number 103 using dummy_hcd [ 2182.776133][T16852] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2182.776397][T16852] usb 2-1: New USB device found, idVendor=0d8c, idProduct=0014, bcdDevice= 0.00 [ 2182.776577][T16852] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2182.797274][T16852] usb 2-1: config 0 descriptor?? [ 2183.260015][T16852] cmedia_hs100b 0003:0D8C:0014.0014: hidraw0: USB HID v0.00 Device [HID 0d8c:0014] on usb-dummy_hcd.1-1/input0 [ 2183.447350][ T94] usb 2-1: USB disconnect, device number 103 [ 2184.624175][T19167] can: request_module (can-proto-0) failed. [ 2185.284130][T19183] netlink: 'syz.0.3754': attribute type 5 has an invalid length. [ 2185.481439][ T31] audit: type=1400 audit(2441.397:935): avc: denied { name_bind } for pid=19191 comm="syz.0.3756" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2185.629284][ T94] usb 2-1: new high-speed USB device number 104 using dummy_hcd [ 2185.932272][ T94] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2185.932730][ T94] usb 2-1: config 0 has no interfaces? [ 2185.933210][ T94] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 2185.933306][ T94] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2185.937814][ T94] usb 2-1: config 0 descriptor?? [ 2187.720543][T19203] i2c i2c-0: died at extended address code [ 2197.210604][T19229] netlink: 64 bytes leftover after parsing attributes in process `syz.0.3770'. [ 2199.326530][ T6777] usb 2-1: USB disconnect, device number 104 [ 2200.079795][ T31] audit: type=1400 audit(2455.997:936): avc: denied { cmd } for pid=19252 comm="syz.1.3777" path="socket:[42379]" dev="sockfs" ino=42379 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2201.624818][ T31] audit: type=1400 audit(2457.537:937): avc: denied { getopt } for pid=19266 comm="syz.1.3782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2212.120648][ T31] audit: type=1400 audit(2468.037:938): avc: denied { bind } for pid=19281 comm="syz.0.3787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2217.402592][T19304] 8<--- cut here --- [ 2217.402860][T19304] Unable to handle kernel NULL pointer dereference at virtual address 0000000e when read [ 2217.404827][T19304] [0000000e] *pgd=86268003, *pmd=df6f3003 [ 2217.405943][T19304] Internal error: Oops: 205 [#1] SMP ARM [ 2217.407046][T19304] Modules linked in: [ 2217.407523][T19304] CPU: 1 UID: 0 PID: 19304 Comm: syz.1.3792 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 2217.407983][T19304] Hardware name: ARM-Versatile Express [ 2217.408186][T19304] PC is at io_ring_buffers_peek+0x24/0x258 [ 2217.408509][T19304] LR is at io_buffers_peek+0x68/0x8c [ 2217.408813][T19304] pc : [<8088956c>] lr : [<80889cb0>] psr: 20000013 [ 2217.409210][T19304] sp : dfac5dc0 ip : dfac5e08 fp : dfac5e04 [ 2217.409419][T19304] r10: 00000362 r9 : 00000000 r8 : 8549f940 [ 2217.409685][T19304] r7 : 8487970c r6 : 84879700 r5 : dfac5e44 r4 : 84edd000 [ 2217.409943][T19304] r3 : 00000001 r2 : 8487970c r1 : dfac5e44 r0 : 84edd000 [ 2217.410236][T19304] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2217.410508][T19304] Control: 30c5387d Table: 8577cac0 DAC: 00000000 [ 2217.410758][T19304] Register r0 information: slab io_kiocb start 84edd000 pointer offset 0 size 192 [ 2217.411550][T19304] Register r1 information: 2-page vmalloc region starting at 0xdfac4000 allocated at kernel_clone+0xac/0x3e4 [ 2217.412222][T19304] Register r2 information: slab kmalloc-256 start 84879700 pointer offset 12 size 256 [ 2217.412573][T19304] Register r3 information: non-paged memory [ 2217.412857][T19304] Register r4 information: slab io_kiocb start 84edd000 pointer offset 0 size 192 [ 2217.413211][T19304] Register r5 information: 2-page vmalloc region starting at 0xdfac4000 allocated at kernel_clone+0xac/0x3e4 [ 2217.413563][T19304] Register r6 information: slab kmalloc-256 start 84879700 pointer offset 0 size 256 [ 2217.413989][T19304] Register r7 information: slab kmalloc-256 start 84879700 pointer offset 12 size 256 [ 2217.414341][T19304] Register r8 information: slab kmalloc-64 start 8549f940 pointer offset 0 size 64 [ 2217.414690][T19304] Register r9 information: NULL pointer [ 2217.414883][T19304] Register r10 information: non-paged memory [ 2217.415091][T19304] Register r11 information: 2-page vmalloc region starting at 0xdfac4000 allocated at kernel_clone+0xac/0x3e4 [ 2217.415436][T19304] Register r12 information: 2-page vmalloc region starting at 0xdfac4000 allocated at kernel_clone+0xac/0x3e4 [ 2217.415809][T19304] Process syz.1.3792 (pid: 19304, stack limit = 0xdfac4000) [ 2217.416083][T19304] Stack: (0xdfac5dc0 to 0xdfac6000) [ 2217.416330][T19304] 5dc0: 81a4be54 8030cb0c 855ea100 00000001 00010000 8487970c 00000000 84edd000 [ 2217.416599][T19304] 5de0: dfac5e44 84879700 8487970c 00000000 80000001 00000362 dfac5e1c dfac5e08 [ 2217.416873][T19304] 5e00: 80889cb0 80889554 850c2780 84edd000 dfac5e84 dfac5e20 808931e0 80889c54 [ 2217.417142][T19304] 5e20: dfac5e4c dfac5e30 8089ec2c 8050a4c4 00010001 00000001 8057abbc 00000000 [ 2217.417414][T19304] 5e40: 00000000 8487970c 00000000 00000000 00010001 4b6a6584 80886a40 84edd000 [ 2217.417761][T19304] 5e60: 81cf0ca0 00000000 80000001 81cf0b5c 0000001b 833e0000 dfac5ebc dfac5e88 [ 2217.418129][T19304] 5e80: 80886bd8 80892f38 84edd3c0 84edd480 84edd540 855ea000 84edd06c 84edd000 [ 2217.418392][T19304] 5ea0: 86400000 00000000 00000000 833e0000 dfac5f14 dfac5ec0 808877a8 80886b7c [ 2217.418657][T19304] 5ec0: 8088e164 81a4bdf8 dfac5f24 dfac5ed8 00000800 00000800 81cf0b5c 00000800 [ 2217.419427][T19304] 5ee0: 855ea000 4b6a6584 85470900 00000000 855ea000 00003516 85470900 00000000 [ 2217.419945][T19304] 5f00: 833e0000 00000000 dfac5fa4 dfac5f18 80888250 808875a8 ecac8b10 855ea040 [ 2217.420289][T19304] 5f20: 0000005d 00000000 81a4fbd0 81a4faa0 dfac5f54 dfac5f40 8026b438 8029ce1c [ 2217.420562][T19304] 5f40: dfac5fb0 40000000 dfac5f84 dfac5f58 802229dc 8026b3f4 00000000 8281d05c [ 2217.420877][T19304] 5f60: dfac5fb0 0014c490 ecac8b10 80222930 00000000 4b6a6584 dfac5fac 00000000 [ 2217.421145][T19304] 5f80: 0000005d 002e63a4 000001aa 8020029c 833e0000 000001aa 00000000 dfac5fa8 [ 2217.421429][T19304] 5fa0: 80200060 80888124 00000000 0000005d 00000008 00003516 00000000 00000000 [ 2217.421730][T19304] 5fc0: 00000000 0000005d 002e63a4 000001aa 002d0000 00000000 00006364 76bcd0bc [ 2217.422004][T19304] 5fe0: 76bccec0 76bcceb0 0001939c 00131f30 60000010 00000008 00000000 00000000 [ 2217.422294][T19304] Call trace: [ 2217.422464][T19304] [<80889548>] (io_ring_buffers_peek) from [<80889cb0>] (io_buffers_peek+0x68/0x8c) [ 2217.422762][T19304] r10:00000362 r9:80000001 r8:00000000 r7:8487970c r6:84879700 r5:dfac5e44 [ 2217.423017][T19304] r4:84edd000 [ 2217.423138][T19304] [<80889c48>] (io_buffers_peek) from [<808931e0>] (io_recv+0x2b4/0x46c) [ 2217.423400][T19304] r5:84edd000 r4:850c2780 [ 2217.423537][T19304] [<80892f2c>] (io_recv) from [<80886bd8>] (io_issue_sqe+0x68/0x658) [ 2217.423791][T19304] r10:833e0000 r9:0000001b r8:81cf0b5c r7:80000001 r6:00000000 r5:81cf0ca0 [ 2217.424036][T19304] r4:84edd000 [ 2217.424155][T19304] [<80886b70>] (io_issue_sqe) from [<808877a8>] (io_submit_sqes+0x20c/0x938) [ 2217.424424][T19304] r10:833e0000 r9:00000000 r8:00000000 r7:86400000 r6:84edd000 r5:84edd06c [ 2217.424666][T19304] r4:855ea000 [ 2217.424781][T19304] [<8088759c>] (io_submit_sqes) from [<80888250>] (sys_io_uring_enter+0x138/0x780) [ 2217.425078][T19304] r10:00000000 r9:833e0000 r8:00000000 r7:85470900 r6:00003516 r5:855ea000 [ 2217.425323][T19304] r4:00000000 [ 2217.425441][T19304] [<80888118>] (sys_io_uring_enter) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2217.425768][T19304] Exception stack(0xdfac5fa8 to 0xdfac5ff0) [ 2217.426036][T19304] 5fa0: 00000000 0000005d 00000008 00003516 00000000 00000000 [ 2217.426298][T19304] 5fc0: 00000000 0000005d 002e63a4 000001aa 002d0000 00000000 00006364 76bcd0bc [ 2217.426559][T19304] 5fe0: 76bccec0 76bcceb0 0001939c 00131f30 [ 2217.426743][T19304] r10:000001aa r9:833e0000 r8:8020029c r7:000001aa r6:002e63a4 r5:0000005d [ 2217.427000][T19304] r4:00000000 [ 2217.427271][T19304] Code: e1a08002 e5912000 e50b2030 e1a05001 (e1d920be) [ 2217.428313][T19304] ---[ end trace 0000000000000000 ]--- [ 2217.440251][ T31] audit: type=1400 audit(2473.347:939): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2217.440546][ T31] audit: type=1400 audit(2473.347:940): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2217.440711][ T31] audit: type=1400 audit(2473.347:941): avc: denied { write } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2217.440839][ T31] audit: type=1400 audit(2473.347:942): avc: denied { add_name } for pid=2909 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2217.440967][ T31] audit: type=1400 audit(2473.347:943): avc: denied { create } for pid=2909 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2217.441094][ T31] audit: type=1400 audit(2473.347:944): avc: denied { append open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2217.441214][ T31] audit: type=1400 audit(2473.347:945): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2217.472559][T19304] Kernel panic - not syncing: Fatal exception [ 2217.474285][T19304] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:39:10 Registers: info registers vcpu 0 CPU#0 R00=dfa71e14 R01=00000001 R02=0000001c R03=00000000 R04=dfa71ee0 R05=dfa71e10 R06=201aa420 R07=dfa71e0c R08=b5403587 R09=00000002 R10=dfa71d4c R11=dfa71dfc R12=dfa71dcc R13=dfa71d20 R14=817f136c R15=81a56644 PSR=20000013 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=dfac5c14 R01=00000000 R02=00000000 R03=00000000 R04=dfac5d70 R05=833e0000 R06=00000205 R07=600f0113 R08=82a7045c R09=8281d058 R10=833e0000 R11=dfac5c6c R12=dfac5c54 R13=dfac5c00 R14=00000000 R15=81a22060 PSR=600f0193 -ZC- A S svc32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=00000000 s03=00000000 d01=0000000000000000 s04=ef0cee00 s05=ef0cee00 d02=ef0cee00ef0cee00 s06=08040200 s07=80402000 d03=8040200008040200 s08=00000c00 s09=c0200c03 d04=c0200c0300000c00 s10=08040201 s11=80402000 d05=8040200008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000