last executing test programs: 2.016694361s ago: executing program 0 (id=5360): syz_emit_ethernet(0x5e, &(0x7f00000003c0)={@random="e33110495bfd", @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "cb653e", 0x28, 0x3a, 0xff, @dev, @local, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1}}}}}}, 0x0) 1.859009756s ago: executing program 1 (id=5361): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r0, &(0x7f0000003c40)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3f8}, &(0x7f0000000180)=0x8) 1.7088979s ago: executing program 0 (id=5362): mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x400400, &(0x7f0000000040)={[{@clone_children}]}) 1.567001194s ago: executing program 1 (id=5363): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.407270029s ago: executing program 0 (id=5364): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x705, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x1, 0xffe0}, {0x10, 0x8}, {0xfff2, 0x7}}}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 1.155062476s ago: executing program 0 (id=5365): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x2, 0x9, @l2={'ib', 0x3a, 'geneve0\x00'}}}}}, 0x34}}, 0x24008080) 1.154720526s ago: executing program 1 (id=5366): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)={0x2c, 0x140f, 0x1, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x11, 0x45, 'ib_multicast\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 927.565173ms ago: executing program 0 (id=5367): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x0, 0x1, 0x0, &(0x7f0000000100)=""/47, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000500)=""/69, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000016c0)) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af00, &(0x7f00000000c0)) r1 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)=0xfffffffd) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000380)={0x0, r1}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) 727.890829ms ago: executing program 1 (id=5368): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 516.641135ms ago: executing program 0 (id=5369): sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = io_uring_setup(0x6fe1, &(0x7f000009df80)) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 357.6666ms ago: executing program 1 (id=5370): r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003a40)=[{{&(0x7f0000000140)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000200)}}, {{&(0x7f0000000300)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0}}], 0x2, 0x0) 0s ago: executing program 1 (id=5371): mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000000280)=ANY=[]) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) kernel console output (not intermixed with test programs): 6] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3623.607202][T23706] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3623.607742][T23706] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3624.415315][ T31] kauditd_printk_skb: 376 callbacks suppressed [ 3624.415397][ T31] audit: type=1400 audit(3624.280:64833): avc: denied { search } for pid=24215 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.418739][ T31] audit: type=1400 audit(3624.280:64834): avc: denied { search } for pid=24215 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.442593][ T31] audit: type=1400 audit(3624.290:64835): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3624.443497][ T31] audit: type=1400 audit(3624.300:64836): avc: denied { search } for pid=24215 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.444327][ T31] audit: type=1400 audit(3624.300:64837): avc: denied { append } for pid=24215 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=115 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3624.445098][ T31] audit: type=1400 audit(3624.300:64838): avc: denied { append open } for pid=24215 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=115 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3624.468745][ T31] audit: type=1400 audit(3624.320:64839): avc: denied { search } for pid=24215 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.472587][ T31] audit: type=1400 audit(3624.330:64840): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.475079][ T31] audit: type=1400 audit(3624.340:64841): avc: denied { search } for pid=24215 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.478175][ T31] audit: type=1400 audit(3624.340:64842): avc: denied { search } for pid=24215 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.422654][ T31] kauditd_printk_skb: 313 callbacks suppressed [ 3629.422752][ T31] audit: type=1400 audit(3629.280:65156): avc: denied { getattr } for pid=24255 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.437819][ T31] audit: type=1400 audit(3629.300:65157): avc: denied { search } for pid=24255 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.441252][ T31] audit: type=1400 audit(3629.300:65158): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3629.453131][ T31] audit: type=1400 audit(3629.310:65159): avc: denied { search } for pid=24255 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.454497][ T31] audit: type=1400 audit(3629.310:65160): avc: denied { search } for pid=24255 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.455344][ T31] audit: type=1400 audit(3629.310:65161): avc: denied { search } for pid=24255 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.456226][ T31] audit: type=1400 audit(3629.320:65162): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.456993][ T31] audit: type=1400 audit(3629.320:65163): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3629.458333][ T31] audit: type=1400 audit(3629.320:65164): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3629.468982][ T31] audit: type=1400 audit(3629.330:65165): avc: denied { search } for pid=24255 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3634.491556][ T31] kauditd_printk_skb: 385 callbacks suppressed [ 3634.491676][ T31] audit: type=1400 audit(3634.350:65551): avc: denied { write } for pid=24277 comm="syz.0.5038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3634.524131][ T31] audit: type=1400 audit(3634.380:65552): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3634.524974][ T31] audit: type=1400 audit(3634.380:65553): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3634.535056][ T31] audit: type=1400 audit(3634.400:65554): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3634.538054][ T31] audit: type=1400 audit(3634.400:65555): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3634.542420][ T31] audit: type=1400 audit(3634.400:65556): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3634.714946][ T31] audit: type=1400 audit(3634.580:65557): avc: denied { read } for pid=24281 comm="syz.1.5039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3634.816642][ T31] audit: type=1400 audit(3634.670:65558): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3634.819812][ T31] audit: type=1400 audit(3634.680:65559): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3634.827210][ T31] audit: type=1400 audit(3634.690:65560): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3639.498459][ T31] kauditd_printk_skb: 289 callbacks suppressed [ 3639.498568][ T31] audit: type=1400 audit(3639.360:65848): avc: denied { search } for pid=24310 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.500754][ T31] audit: type=1400 audit(3639.360:65849): avc: denied { search } for pid=24310 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.507345][ T31] audit: type=1400 audit(3639.370:65850): avc: denied { search } for pid=24310 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.508380][ T31] audit: type=1400 audit(3639.370:65851): avc: denied { read } for pid=24310 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.515281][ T31] audit: type=1400 audit(3639.380:65852): avc: denied { read open } for pid=24310 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.518073][ T31] audit: type=1400 audit(3639.380:65853): avc: denied { getattr } for pid=24310 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.523679][ T31] audit: type=1400 audit(3639.390:65854): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3639.528525][ T31] audit: type=1400 audit(3639.390:65855): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3639.531042][ T31] audit: type=1400 audit(3639.390:65856): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3639.538980][ T31] audit: type=1400 audit(3639.400:65857): avc: denied { search } for pid=24310 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3644.540178][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 3644.540273][ T31] audit: type=1400 audit(3644.400:65996): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3644.550552][ T31] audit: type=1400 audit(3644.410:65997): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3644.567207][ T31] audit: type=1400 audit(3644.420:65998): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3644.568334][ T31] audit: type=1400 audit(3644.430:65999): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3644.575287][ T31] audit: type=1400 audit(3644.440:66000): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3644.577576][ T31] audit: type=1400 audit(3644.440:66001): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3644.579910][ T31] audit: type=1400 audit(3644.440:66002): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3644.595074][ T31] audit: type=1400 audit(3644.460:66003): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3644.773428][ T31] audit: type=1400 audit(3644.640:66004): avc: denied { create } for pid=24335 comm="syz.1.5049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3644.780820][ T31] audit: type=1400 audit(3644.640:66005): avc: denied { write } for pid=24335 comm="syz.1.5049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3649.741088][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 3649.741173][ T31] audit: type=1400 audit(3649.600:66048): avc: denied { read } for pid=24349 comm="syz.0.5053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3649.749261][ T31] audit: type=1400 audit(3649.610:66049): avc: denied { ioctl } for pid=24349 comm="syz.0.5053" path="socket:[57276]" dev="sockfs" ino=57276 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3649.757043][ T31] audit: type=1400 audit(3649.620:66050): avc: denied { module_request } for pid=24349 comm="syz.0.5053" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3649.782442][ T31] audit: type=1400 audit(3649.640:66051): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3649.784573][ T31] audit: type=1400 audit(3649.640:66052): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3649.785468][ T31] audit: type=1400 audit(3649.640:66053): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3649.792791][ T31] audit: type=1400 audit(3649.650:66054): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3649.794817][ T31] audit: type=1400 audit(3649.650:66055): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3649.935500][ T31] audit: type=1400 audit(3649.800:66056): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3649.937949][ T31] audit: type=1400 audit(3649.800:66057): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3654.758522][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 3654.758591][ T31] audit: type=1400 audit(3654.620:66095): avc: denied { ioctl } for pid=24369 comm="syz.0.5057" path="socket:[57287]" dev="sockfs" ino=57287 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3654.781272][ T31] audit: type=1400 audit(3654.640:66096): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3654.789550][ T31] audit: type=1400 audit(3654.650:66097): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3654.805391][ T31] audit: type=1400 audit(3654.670:66098): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3654.810130][ T31] audit: type=1400 audit(3654.670:66099): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3654.815202][ T31] audit: type=1400 audit(3654.680:66100): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3654.882728][ T31] audit: type=1400 audit(3654.740:66101): avc: denied { create } for pid=24373 comm="syz.1.5058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3654.890139][ T31] audit: type=1400 audit(3654.750:66102): avc: denied { ioctl } for pid=24373 comm="syz.1.5058" path="socket:[57292]" dev="sockfs" ino=57292 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3654.907199][ T31] audit: type=1400 audit(3654.770:66103): avc: denied { bind } for pid=24373 comm="syz.1.5058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3654.916621][ T31] audit: type=1400 audit(3654.780:66104): avc: denied { write } for pid=24373 comm="syz.1.5058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3658.328740][T24389] FAULT_INJECTION: forcing a failure. [ 3658.328740][T24389] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3658.329625][T24389] CPU: 1 UID: 0 PID: 24389 Comm: syz.1.5062 Not tainted 6.12.0-syzkaller #0 [ 3658.331926][T24389] Hardware name: ARM-Versatile Express [ 3658.332702][T24389] Call trace: [ 3658.333105][T24389] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3658.335631][T24389] r7:e076ddec r6:00000000 r5:60000113 r4:8203df48 [ 3658.335887][T24389] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3658.336236][T24389] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3658.336642][T24389] r5:00000000 r4:827192b0 [ 3658.336816][T24389] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3658.337132][T24389] [<808e6968>] (should_fail_ex) from [<804e9170>] (should_fail_alloc_page+0x68/0x74) [ 3658.337462][T24389] r6:00000000 r5:00140cca r4:e076ddf8 [ 3658.337680][T24389] [<804e9108>] (should_fail_alloc_page) from [<804b9670>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 3658.338043][T24389] [<804b95e8>] (prepare_alloc_pages.constprop.0) from [<804c0248>] (__alloc_pages_noprof+0xb4/0x1128) [ 3658.338412][T24389] r10:00000000 r9:842f9500 r8:00000000 r7:84713000 r6:00140cca r5:84713000 [ 3658.338698][T24389] r4:00000000 r3:e076ddf8 [ 3658.338890][T24389] [<804c0194>] (__alloc_pages_noprof) from [<804c1848>] (__folio_alloc_noprof+0x14/0x2c) [ 3658.339233][T24389] r10:e076dfb0 r9:842f9500 r8:00000000 r7:00000040 r6:76bcfe84 r5:84713000 [ 3658.339658][T24389] r4:00001255 [ 3658.339812][T24389] [<804c1834>] (__folio_alloc_noprof) from [<80495090>] (handle_mm_fault+0xd18/0x135c) [ 3658.340159][T24389] r5:84713000 r4:00001255 [ 3658.340320][T24389] [<80494378>] (handle_mm_fault) from [<802142b0>] (do_page_fault+0x1c8/0x3d8) [ 3658.340653][T24389] r10:00000002 r9:842f9500 r8:00000255 r7:84713000 r6:00000a07 r5:76bcfe84 [ 3658.340931][T24389] r4:e076dfb0 [ 3658.341082][T24389] [<802140e8>] (do_page_fault) from [<802146a8>] (do_DataAbort+0x38/0xa8) [ 3658.341398][T24389] r10:003d0f00 r9:00006364 r8:802140e8 r7:e076dfb0 r6:76bcfe84 r5:00000a07 [ 3658.341674][T24389] r4:8261d1bc [ 3658.341816][T24389] [<80214670>] (do_DataAbort) from [<80200ebc>] (__dabt_usr+0x5c/0x60) [ 3658.342122][T24389] Exception stack(0xe076dfb0 to 0xe076dff8) [ 3658.342458][T24389] dfa0: 200000c0 00000003 00000000 00000000 [ 3658.342794][T24389] dfc0: 76bcfeb0 200000c0 00000000 00189250 00000000 00006364 003d0f00 76bd10bc [ 3658.343178][T24389] dfe0: 00000000 76bcfe80 00018ad0 0001b4a4 20000010 ffffffff [ 3658.343606][T24389] r8:824b1044 r7:84713000 r6:ffffffff r5:20000010 r4:0001b4a4 [ 3658.346007][T24389] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 3660.008045][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 3660.008168][ T31] audit: type=1400 audit(3659.870:66167): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3660.011715][ T31] audit: type=1400 audit(3659.870:66168): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3660.020729][ T31] audit: type=1400 audit(3659.880:66169): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3660.035049][ T31] audit: type=1400 audit(3659.890:66170): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3660.046163][ T31] audit: type=1400 audit(3659.910:66171): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3660.049462][ T31] audit: type=1400 audit(3659.910:66172): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3660.060647][ T31] audit: type=1400 audit(3659.920:66173): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3660.061467][ T31] audit: type=1400 audit(3659.920:66174): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3660.281287][ T31] audit: type=1400 audit(3660.140:66175): avc: denied { create } for pid=24395 comm="syz.1.5064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3660.303823][ T31] audit: type=1400 audit(3660.170:66176): avc: denied { setopt } for pid=24395 comm="syz.1.5064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3664.570077][T24422] FAULT_INJECTION: forcing a failure. [ 3664.570077][T24422] name failslab, interval 1, probability 0, space 0, times 0 [ 3664.570656][T24422] CPU: 1 UID: 0 PID: 24422 Comm: syz.1.5072 Not tainted 6.12.0-syzkaller #0 [ 3664.570968][T24422] Hardware name: ARM-Versatile Express [ 3664.571132][T24422] Call trace: [ 3664.571293][T24422] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3664.571682][T24422] r7:00000c40 r6:84f591a8 r5:60000013 r4:8203df48 [ 3664.572190][T24422] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3664.572731][T24422] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3664.573147][T24422] r5:00000000 r4:8271925c [ 3664.573408][T24422] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3664.573772][T24422] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 3664.574120][T24422] r6:84f591a8 r5:00001000 r4:82c016c0 [ 3664.574322][T24422] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 3664.574676][T24422] [<804ce1b8>] (__kmalloc_noprof) from [<807522c0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3664.575064][T24422] r10:83e04800 r9:82c9f800 r8:00000000 r7:8482c6e8 r6:84f591a8 r5:00001000 [ 3664.575370][T24422] r4:00000000 [ 3664.575540][T24422] [<80752284>] (tomoyo_realpath_from_path) from [<8074e404>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3664.575959][T24422] r10:83e04800 r9:00000000 r8:00000004 r7:8004af81 r6:00000004 r5:81ad1968 [ 3664.576264][T24422] r4:84f591a8 r3:824ba340 [ 3664.576435][T24422] [<8074e338>] (tomoyo_path_number_perm) from [<80752cd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3664.576833][T24422] r9:84f59180 r8:00000004 r7:00000000 r6:00000000 r5:8004af81 r4:84f59180 [ 3664.577206][T24422] [<80752cb4>] (tomoyo_file_ioctl) from [<8070131c>] (security_file_ioctl+0x64/0x1e4) [ 3664.577579][T24422] [<807012b8>] (security_file_ioctl) from [<80530600>] (sys_ioctl+0x50/0xd98) [ 3664.577955][T24422] r7:00000000 r6:84f59181 r5:00000000 r4:8004af81 [ 3664.578235][T24422] [<805305b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3664.578601][T24422] Exception stack(0xe890dfa8 to 0xe890dff0) [ 3664.578838][T24422] dfa0: 00000000 00000000 00000004 8004af81 00000000 00000000 [ 3664.579160][T24422] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bf20bc [ 3664.579515][T24422] dfe0: 76bf1ec0 76bf1eb0 00018af0 00133450 [ 3664.579718][T24422] r10:00000036 r9:83e04800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 3664.580046][T24422] r4:00000000 [ 3664.583252][T24422] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3665.307710][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 3665.307827][ T31] audit: type=1400 audit(3665.170:66275): avc: denied { write } for pid=24411 comm="syz.0.5069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3665.322593][ T31] audit: type=1400 audit(3665.180:66276): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3665.337393][ T31] audit: type=1400 audit(3665.200:66277): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3665.338862][ T31] audit: type=1400 audit(3665.200:66278): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3665.340823][ T31] audit: type=1400 audit(3665.200:66279): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3665.344555][ T31] audit: type=1400 audit(3665.210:66280): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3665.819536][ T31] audit: type=1400 audit(3665.680:66281): avc: denied { read } for pid=24411 comm="syz.0.5069" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.824359][ T31] audit: type=1400 audit(3665.690:66282): avc: denied { read open } for pid=24411 comm="syz.0.5069" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3665.845214][ T31] audit: type=1400 audit(3665.710:66283): avc: denied { write } for pid=24411 comm="syz.0.5069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3665.937128][ T31] audit: type=1400 audit(3665.800:66284): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3670.645984][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 3670.646098][ T31] audit: type=1400 audit(3670.510:66333): avc: denied { ioctl } for pid=24445 comm="syz.1.5079" path="socket:[58410]" dev="sockfs" ino=58410 ioctlcmd=0x5432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3670.661361][ T31] audit: type=1400 audit(3670.520:66334): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3670.667980][ T31] audit: type=1400 audit(3670.530:66335): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3670.671270][ T31] audit: type=1400 audit(3670.530:66336): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3670.681660][ T31] audit: type=1400 audit(3670.540:66337): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3670.686912][ T31] audit: type=1400 audit(3670.540:66338): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3671.125753][ T31] audit: type=1400 audit(3670.990:66339): avc: denied { create } for pid=24448 comm="syz.0.5080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3671.132802][ T31] audit: type=1400 audit(3671.000:66340): avc: denied { create } for pid=24448 comm="syz.0.5080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3671.140981][ T31] audit: type=1400 audit(3671.000:66341): avc: denied { write } for pid=24448 comm="syz.0.5080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3671.148690][ T31] audit: type=1400 audit(3671.010:66342): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3675.835427][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 3675.835562][ T31] audit: type=1400 audit(3675.700:66388): avc: denied { ioctl } for pid=24462 comm="syz.1.5083" path="socket:[58434]" dev="sockfs" ino=58434 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3675.856933][ T31] audit: type=1400 audit(3675.720:66389): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3675.863137][ T31] audit: type=1400 audit(3675.720:66390): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3675.872632][ T31] audit: type=1400 audit(3675.730:66391): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3675.872814][ T31] audit: type=1400 audit(3675.730:66392): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3675.874593][ T31] audit: type=1400 audit(3675.740:66393): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3676.337933][ T31] audit: type=1400 audit(3676.200:66394): avc: denied { create } for pid=24468 comm="syz.0.5085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3676.345308][ T31] audit: type=1400 audit(3676.210:66395): avc: denied { ioctl } for pid=24462 comm="syz.1.5083" path="socket:[58434]" dev="sockfs" ino=58434 ioctlcmd=0x4b4d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3676.347117][ T31] audit: type=1400 audit(3676.210:66396): avc: denied { create } for pid=24468 comm="syz.0.5085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3676.350625][ T31] audit: type=1400 audit(3676.210:66397): avc: denied { write } for pid=24468 comm="syz.0.5085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3681.060255][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 3681.060368][ T31] audit: type=1400 audit(3680.920:66443): avc: denied { write } for pid=24481 comm="syz.1.5088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3681.075755][ T31] audit: type=1400 audit(3680.940:66444): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3681.082970][ T31] audit: type=1400 audit(3680.940:66445): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3681.086043][ T31] audit: type=1400 audit(3680.950:66446): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.088175][ T31] audit: type=1400 audit(3680.950:66447): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.096412][ T31] audit: type=1400 audit(3680.950:66448): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.757564][ T31] audit: type=1400 audit(3681.620:66449): avc: denied { create } for pid=24489 comm="syz.0.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3681.769817][ T31] audit: type=1400 audit(3681.630:66450): avc: denied { create } for pid=24489 comm="syz.0.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3681.777455][ T31] audit: type=1400 audit(3681.640:66451): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3681.782782][ T31] audit: type=1400 audit(3681.640:66452): avc: denied { write } for pid=24489 comm="syz.0.5090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3686.088415][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 3686.088517][ T31] audit: type=1400 audit(3685.950:66508): avc: denied { write } for pid=24503 comm="syz.1.5095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3686.099390][ T31] audit: type=1400 audit(3685.960:66509): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3686.102583][ T31] audit: type=1400 audit(3685.970:66510): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3686.104017][ T31] audit: type=1400 audit(3685.970:66511): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.105276][ T31] audit: type=1400 audit(3685.970:66512): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.106872][ T31] audit: type=1400 audit(3685.970:66513): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.557348][ T31] audit: type=1400 audit(3686.420:66514): avc: denied { read } for pid=24497 comm="syz.0.5093" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3686.560180][ T31] audit: type=1400 audit(3686.420:66515): avc: denied { read open } for pid=24497 comm="syz.0.5093" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3686.572502][ T31] audit: type=1400 audit(3686.430:66516): avc: denied { write } for pid=24497 comm="syz.0.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3686.582480][ T31] audit: type=1400 audit(3686.440:66517): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3691.328021][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 3691.328127][ T31] audit: type=1400 audit(3691.190:66557): avc: denied { create } for pid=24524 comm="syz.1.5100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3691.345808][ T31] audit: type=1400 audit(3691.210:66558): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3691.351224][ T31] audit: type=1400 audit(3691.210:66559): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3691.356253][ T31] audit: type=1400 audit(3691.220:66560): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.360600][ T31] audit: type=1400 audit(3691.220:66561): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.365034][ T31] audit: type=1400 audit(3691.230:66562): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.508643][ T31] audit: type=1400 audit(3691.370:66563): avc: denied { ioctl } for pid=24526 comm="syz.0.5101" path="socket:[58517]" dev="sockfs" ino=58517 ioctlcmd=0x5432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3692.021774][ T31] audit: type=1400 audit(3691.880:66564): avc: denied { ioctl } for pid=24526 comm="syz.0.5101" path="socket:[58517]" dev="sockfs" ino=58517 ioctlcmd=0x54db scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3692.539109][ T31] audit: type=1400 audit(3692.400:66565): avc: denied { listen } for pid=24526 comm="syz.0.5101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3692.575644][ T31] audit: type=1400 audit(3692.430:66566): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3693.556715][T24535] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24535 comm=syz.1.5102 [ 3693.574409][T24535] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5132 sclass=netlink_audit_socket pid=24535 comm=syz.1.5102 [ 3696.759996][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 3696.760080][ T31] audit: type=1400 audit(3696.620:66611): avc: denied { create } for pid=24551 comm="syz.0.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3696.773128][ T31] audit: type=1400 audit(3696.630:66612): avc: denied { ioctl } for pid=24551 comm="syz.0.5107" path="socket:[58051]" dev="sockfs" ino=58051 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3696.786419][ T31] audit: type=1400 audit(3696.650:66613): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3696.790596][ T31] audit: type=1400 audit(3696.650:66614): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3696.794356][ T31] audit: type=1400 audit(3696.660:66615): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3696.799048][ T31] audit: type=1400 audit(3696.660:66616): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3696.800182][ T31] audit: type=1400 audit(3696.660:66617): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3696.807499][ T31] audit: type=1400 audit(3696.670:66618): avc: denied { bind } for pid=24551 comm="syz.0.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3696.813031][ T31] audit: type=1400 audit(3696.680:66619): avc: denied { write } for pid=24551 comm="syz.0.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3696.840043][T24552] audit: audit_lost=25 audit_rate_limit=0 audit_backlog_limit=64 [ 3702.088145][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 3702.088283][ T31] audit: type=1400 audit(3701.950:66675): avc: denied { read } for pid=24572 comm="syz.1.5115" path="socket:[58593]" dev="sockfs" ino=58593 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3702.102485][ T31] audit: type=1400 audit(3701.960:66676): avc: denied { read } for pid=24572 comm="syz.1.5115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3702.118500][ T31] audit: type=1400 audit(3701.980:66677): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3702.138201][ T31] audit: type=1400 audit(3702.000:66679): avc: denied { setopt } for pid=24580 comm="syz.0.5118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3702.141527][ T31] audit: type=1400 audit(3702.000:66678): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3702.149740][ T31] audit: type=1400 audit(3702.010:66680): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3702.150731][ T31] audit: type=1400 audit(3702.010:66681): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3702.160322][ T31] audit: type=1400 audit(3702.010:66682): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3702.161375][ T31] audit: type=1400 audit(3702.020:66683): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3702.167342][ T31] audit: type=1400 audit(3702.030:66684): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3706.769111][T24599] FAULT_INJECTION: forcing a failure. [ 3706.769111][T24599] name failslab, interval 1, probability 0, space 0, times 0 [ 3706.770974][T24599] CPU: 0 UID: 0 PID: 24599 Comm: syz.0.5121 Not tainted 6.12.0-syzkaller #0 [ 3706.771362][T24599] Hardware name: ARM-Versatile Express [ 3706.771695][T24599] Call trace: [ 3706.772450][T24599] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3706.772850][T24599] r7:00000c40 r6:854411a8 r5:60000013 r4:8203df48 [ 3706.773086][T24599] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3706.773404][T24599] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3706.773719][T24599] r5:00000000 r4:8271925c [ 3706.773906][T24599] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3706.774223][T24599] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 3706.774547][T24599] r6:854411a8 r5:00001000 r4:82c016c0 [ 3706.774752][T24599] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 3706.775091][T24599] [<804ce1b8>] (__kmalloc_noprof) from [<807522c0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3706.775449][T24599] r10:83e02400 r9:82c9f800 r8:00000000 r7:832c2550 r6:854411a8 r5:00001000 [ 3706.775768][T24599] r4:00000000 [ 3706.775928][T24599] [<80752284>] (tomoyo_realpath_from_path) from [<8074e404>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3706.776299][T24599] r10:83e02400 r9:00000000 r8:00000003 r7:0000894c r6:00000004 r5:81ad1968 [ 3706.776582][T24599] r4:854411a8 r3:824ba340 [ 3706.776763][T24599] [<8074e338>] (tomoyo_path_number_perm) from [<80752cd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3706.777124][T24599] r9:85441180 r8:00000003 r7:00000000 r6:00000000 r5:0000894c r4:85441180 [ 3706.777397][T24599] [<80752cb4>] (tomoyo_file_ioctl) from [<8070131c>] (security_file_ioctl+0x64/0x1e4) [ 3706.777733][T24599] [<807012b8>] (security_file_ioctl) from [<80530600>] (sys_ioctl+0x50/0xd98) [ 3706.778075][T24599] r7:00000000 r6:85441181 r5:00000000 r4:0000894c [ 3706.778304][T24599] [<805305b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3706.778606][T24599] Exception stack(0xeac95fa8 to 0xeac95ff0) [ 3706.778838][T24599] 5fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 3706.779137][T24599] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b480bc [ 3706.779436][T24599] 5fe0: 76b47ec0 76b47eb0 00018af0 00133450 [ 3706.779697][T24599] r10:00000036 r9:83e02400 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 3706.779980][T24599] r4:00000000 [ 3706.783725][T24599] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3707.094772][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3707.094865][ T31] audit: type=1400 audit(3706.960:66721): avc: denied { ioctl } for pid=24600 comm="syz.0.5122" path="socket:[58639]" dev="sockfs" ino=58639 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3707.098831][ T31] audit: type=1400 audit(3706.960:66722): avc: denied { listen } for pid=24600 comm="syz.0.5122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3707.101355][ T31] audit: type=1400 audit(3706.960:66723): avc: denied { write } for pid=24600 comm="syz.0.5122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3707.146140][ T31] audit: type=1400 audit(3707.000:66724): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3707.147004][ T31] audit: type=1400 audit(3707.000:66725): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3707.147605][ T31] audit: type=1400 audit(3707.000:66726): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.165928][ T31] audit: type=1400 audit(3707.000:66727): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.166870][ T31] audit: type=1400 audit(3707.030:66728): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.229578][ T31] audit: type=1400 audit(3707.090:66729): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3707.242624][ T31] audit: type=1400 audit(3707.100:66730): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3710.634459][T24616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24616 comm=syz.0.5126 [ 3712.164929][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 3712.165104][ T31] audit: type=1400 audit(3712.030:66789): avc: denied { write } for pid=24625 comm="syz.0.5129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3712.183723][ T31] audit: type=1400 audit(3712.040:66790): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3712.190094][ T31] audit: type=1400 audit(3712.050:66791): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3712.202335][ T31] audit: type=1400 audit(3712.060:66792): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.205046][ T31] audit: type=1400 audit(3712.060:66793): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.206157][ T31] audit: type=1400 audit(3712.060:66794): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.673498][ T31] audit: type=1400 audit(3712.540:66795): avc: denied { write } for pid=24625 comm="syz.0.5129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3712.850808][ T31] audit: type=1400 audit(3712.710:66796): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3712.857828][ T31] audit: type=1400 audit(3712.720:66797): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3712.865473][ T31] audit: type=1400 audit(3712.730:66798): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3717.175640][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 3717.175749][ T31] audit: type=1400 audit(3717.040:66899): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3717.202669][ T31] audit: type=1400 audit(3717.050:66900): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3717.208699][ T31] audit: type=1400 audit(3717.070:66901): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3717.216094][ T31] audit: type=1400 audit(3717.080:66902): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3717.225766][ T31] audit: type=1400 audit(3717.090:66903): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3717.230730][ T31] audit: type=1400 audit(3717.090:66904): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3717.325809][ T31] audit: type=1400 audit(3717.190:66905): avc: denied { create } for pid=24662 comm="syz.0.5142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3717.343731][ T31] audit: type=1400 audit(3717.210:66906): avc: denied { setopt } for pid=24662 comm="syz.0.5142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3717.349211][ T31] audit: type=1400 audit(3717.210:66907): avc: denied { connect } for pid=24662 comm="syz.0.5142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3717.473174][ T31] audit: type=1400 audit(3717.330:66908): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3718.717046][T24676] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=24676 comm=syz.1.5147 [ 3719.583287][T24684] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5132 sclass=netlink_audit_socket pid=24684 comm=syz.1.5150 [ 3722.272738][ T31] kauditd_printk_skb: 133 callbacks suppressed [ 3722.272888][ T31] audit: type=1400 audit(3722.130:67042): avc: denied { ioctl } for pid=24701 comm="syz.0.5157" path="socket:[58785]" dev="sockfs" ino=58785 ioctlcmd=0x54db scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3722.288146][ T31] audit: type=1400 audit(3722.150:67043): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3722.290990][ T31] audit: type=1400 audit(3722.150:67044): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3722.294395][ T31] audit: type=1400 audit(3722.160:67045): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.298033][ T31] audit: type=1400 audit(3722.160:67046): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.300842][ T31] audit: type=1400 audit(3722.160:67047): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.564384][ T31] audit: type=1400 audit(3722.430:67048): avc: denied { map_create } for pid=24703 comm="syz.1.5158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3722.779262][ T31] audit: type=1400 audit(3722.640:67049): avc: denied { listen } for pid=24701 comm="syz.0.5157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3723.287936][ T31] audit: type=1400 audit(3723.150:67050): avc: denied { read } for pid=24701 comm="syz.0.5157" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3723.293760][ T31] audit: type=1400 audit(3723.150:67051): avc: denied { read open } for pid=24701 comm="syz.0.5157" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3724.974311][T24720] FAULT_INJECTION: forcing a failure. [ 3724.974311][T24720] name failslab, interval 1, probability 0, space 0, times 0 [ 3724.974905][T24720] CPU: 1 UID: 0 PID: 24720 Comm: syz.0.5163 Not tainted 6.12.0-syzkaller #0 [ 3724.975217][T24720] Hardware name: ARM-Versatile Express [ 3724.975433][T24720] Call trace: [ 3724.975610][T24720] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3724.975989][T24720] r7:83e01800 r6:00000cc0 r5:60000013 r4:8203df48 [ 3724.976217][T24720] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3724.976514][T24720] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3724.976824][T24720] r5:00000000 r4:8271925c [ 3724.976998][T24720] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3724.977294][T24720] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 3724.977593][T24720] r6:00000cc0 r5:ffffffff r4:82cac6c0 [ 3724.977803][T24720] [<804e9074>] (should_failslab) from [<804cd864>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 3724.978123][T24720] [<804cd814>] (kmem_cache_alloc_node_noprof) from [<81494ac4>] (__alloc_skb+0x138/0x160) [ 3724.978460][T24720] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cac6c0 r5:ffffffff [ 3724.978722][T24720] r4:82606000 [ 3724.978885][T24720] [<8149498c>] (__alloc_skb) from [<815aa118>] (netlink_alloc_large_skb+0x88/0xa0) [ 3724.979281][T24720] r8:00000000 r7:84fef000 r6:00000028 r5:832ae280 r4:00000140 [ 3724.979605][T24720] [<815aa090>] (netlink_alloc_large_skb) from [<815aa720>] (netlink_sendmsg+0x134/0x43c) [ 3724.979986][T24720] r5:832ae280 r4:eb711f38 [ 3724.980163][T24720] [<815aa5ec>] (netlink_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 3724.980483][T24720] r10:00000000 r9:eb711dd4 r8:eb711dd4 r7:832ae280 r6:832ae280 r5:eb711f38 [ 3724.980841][T24720] r4:00000000 [ 3724.981022][T24720] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 3724.981415][T24720] r7:832ae280 r6:00000000 r5:00040800 r4:eb711f38 [ 3724.981695][T24720] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 3724.982402][T24720] r10:eb711e34 r9:20000300 r8:00040800 r7:00000000 r6:832ae280 r5:eb711f38 [ 3724.982707][T24720] r4:00000000 [ 3724.982887][T24720] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 3724.983242][T24720] r10:00000128 r9:83e01800 r8:8020029c r7:00040800 r6:20000300 r5:832ae280 [ 3724.983596][T24720] r4:00000000 [ 3724.983776][T24720] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3724.984161][T24720] Exception stack(0xeb711fa8 to 0xeb711ff0) [ 3724.984450][T24720] 1fa0: 00000000 00000000 00000003 20000300 00040800 00000000 [ 3724.984742][T24720] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b480bc [ 3724.984998][T24720] 1fe0: 76b47ec0 76b47eb0 00018af0 00133450 [ 3724.985398][T24720] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 3727.522926][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 3727.523049][ T31] audit: type=1400 audit(3727.380:67093): avc: denied { read } for pid=24723 comm="syz.0.5165" name="mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3727.524739][ T31] audit: type=1400 audit(3727.390:67094): avc: denied { read open } for pid=24723 comm="syz.0.5165" path="/dev/mixer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3727.549356][ T31] audit: type=1400 audit(3727.410:67095): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3727.558592][ T31] audit: type=1400 audit(3727.410:67096): avc: denied { ioctl } for pid=24723 comm="syz.0.5165" path="/dev/mixer" dev="devtmpfs" ino=721 ioctlcmd=0x700d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3727.559660][ T31] audit: type=1400 audit(3727.420:67097): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3727.560450][ T31] audit: type=1400 audit(3727.420:67098): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.565338][ T31] audit: type=1400 audit(3727.420:67099): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.566345][ T31] audit: type=1400 audit(3727.430:67100): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.571644][ T31] audit: type=1400 audit(3727.430:67101): avc: denied { write } for pid=24723 comm="syz.0.5165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3728.125488][ T31] audit: type=1400 audit(3727.990:67102): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3728.370170][T24735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24735 comm=syz.1.5166 [ 3732.796845][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 3732.796928][ T31] audit: type=1400 audit(3732.660:67149): avc: denied { create } for pid=24760 comm="syz.0.5175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3732.814457][ T31] audit: type=1400 audit(3732.670:67150): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3732.817753][ T31] audit: type=1400 audit(3732.680:67151): avc: denied { setopt } for pid=24760 comm="syz.0.5175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3732.821486][ T31] audit: type=1400 audit(3732.680:67152): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3732.827249][ T31] audit: type=1400 audit(3732.690:67153): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.830436][ T31] audit: type=1400 audit(3732.690:67154): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.835796][ T31] audit: type=1400 audit(3732.700:67155): avc: denied { connect } for pid=24760 comm="syz.0.5175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3732.837708][ T31] audit: type=1400 audit(3732.700:67156): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.914896][ T31] audit: type=1400 audit(3732.780:67157): avc: denied { listen } for pid=24756 comm="syz.1.5173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3733.348032][ T31] audit: type=1400 audit(3733.210:67158): avc: denied { ioctl } for pid=24760 comm="syz.0.5175" path="socket:[58858]" dev="sockfs" ino=58858 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3737.817758][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 3737.817850][ T31] audit: type=1400 audit(3737.680:67227): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3737.822636][ T31] audit: type=1400 audit(3737.680:67228): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3737.830314][ T31] audit: type=1400 audit(3737.690:67229): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3737.840865][ T31] audit: type=1400 audit(3737.690:67230): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3737.852993][ T31] audit: type=1400 audit(3737.710:67231): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3737.853817][ T31] audit: type=1400 audit(3737.710:67232): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.854396][ T31] audit: type=1400 audit(3737.710:67233): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.855258][ T31] audit: type=1400 audit(3737.720:67234): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3738.009696][ T31] audit: type=1400 audit(3737.870:67235): avc: denied { read } for pid=24797 comm="syz.1.5187" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3738.010898][ T31] audit: type=1400 audit(3737.870:67236): avc: denied { read open } for pid=24797 comm="syz.1.5187" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3740.037393][T24818] FAULT_INJECTION: forcing a failure. [ 3740.037393][T24818] name failslab, interval 1, probability 0, space 0, times 0 [ 3740.037875][T24818] CPU: 1 UID: 0 PID: 24818 Comm: syz.1.5195 Not tainted 6.12.0-syzkaller #0 [ 3740.038180][T24818] Hardware name: ARM-Versatile Express [ 3740.038316][T24818] Call trace: [ 3740.038410][T24818] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3740.038654][T24818] r7:00000820 r6:8372cb58 r5:60000013 r4:8203df48 [ 3740.038816][T24818] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3740.039007][T24818] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3740.039187][T24818] r5:00000000 r4:8271925c [ 3740.039296][T24818] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3740.039569][T24818] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 3740.039791][T24818] r6:8372cb58 r5:00000017 r4:82c01240 [ 3740.039939][T24818] [<804e9074>] (should_failslab) from [<804cef08>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 3740.040203][T24818] [<804cee68>] (__kmalloc_node_track_caller_noprof) from [<8046d120>] (kmemdup_noprof+0x28/0x44) [ 3740.040466][T24818] r10:00000000 r9:84c61c04 r8:ec5a9bc0 r7:83dde000 r6:8372cb58 r5:00000017 [ 3740.040674][T24818] r4:83e51100 [ 3740.040764][T24818] [<8046d0f8>] (kmemdup_noprof) from [<8073133c>] (sidtab_sid2str_get+0x54/0xa4) [ 3740.040995][T24818] r7:83dde000 r6:ec5a9bc0 r5:ec5a9bb8 r4:83e51100 [ 3740.041152][T24818] [<807312e8>] (sidtab_sid2str_get) from [<80738774>] (sidtab_entry_to_string+0x34/0x94) [ 3740.041405][T24818] r7:83dde000 r6:83e51100 r5:ec5a9bb8 r4:00000060 [ 3740.041561][T24818] [<80738740>] (sidtab_entry_to_string) from [<807388ec>] (security_sid_to_context_core+0x118/0x17c) [ 3740.041953][T24818] r9:ec5a9cfc r8:83dde000 r7:84c61c04 r6:ec5a9bc0 r5:ec5a9bb8 r4:00000060 [ 3740.042357][T24818] [<807387d4>] (security_sid_to_context_core) from [<8073b6e8>] (security_sid_to_context+0x1c/0x24) [ 3740.042975][T24818] r8:83e04800 r7:8071cb30 r6:84fd6880 r5:8518ff70 r4:ec5a9c68 [ 3740.043203][T24818] [<8073b6cc>] (security_sid_to_context) from [<8071dd48>] (avc_audit_post_callback+0x80/0x2f8) [ 3740.043494][T24818] [<8071dcc8>] (avc_audit_post_callback) from [<80743488>] (common_lsm_audit+0x16c/0x904) [ 3740.043796][T24818] r10:00000000 r9:ec5a9cfc r8:8071dcc8 r7:8071cb30 r6:84fd6880 r5:8518ff70 [ 3740.044032][T24818] r4:ec5a9cfc [ 3740.044130][T24818] [<8074331c>] (common_lsm_audit) from [<8071e1d8>] (slow_avc_audit+0xbc/0x114) [ 3740.044605][T24818] r9:ec5a9cfc r8:00000058 r7:00000060 r6:00000060 r5:00000060 r4:00000060 [ 3740.044895][T24818] [<8071e11c>] (slow_avc_audit) from [<8071eac4>] (avc_has_perm+0xd4/0xe4) [ 3740.045305][T24818] r5:00000000 r4:00000004 [ 3740.045550][T24818] [<8071e9f0>] (avc_has_perm) from [<80723e48>] (sock_has_perm+0xd8/0x104) [ 3740.045886][T24818] r9:83e04800 r8:00000004 r7:84fd6880 r6:8224320c r5:8516e500 r4:00000000 [ 3740.046129][T24818] [<80723d70>] (sock_has_perm) from [<80723efc>] (selinux_socket_sendmsg+0x18/0x1c) [ 3740.046388][T24818] r9:ec5a9dd4 r8:ec5a9dd4 r7:832af680 r6:00000000 r5:ec5a9f38 r4:832af680 [ 3740.046606][T24818] [<80723ee4>] (selinux_socket_sendmsg) from [<80717704>] (security_socket_sendmsg+0x64/0x1e4) [ 3740.046883][T24818] [<807176a0>] (security_socket_sendmsg) from [<814871dc>] (__sock_sendmsg+0x1c/0x78) [ 3740.047149][T24818] r7:832af680 r6:832af680 r5:ec5a9f38 r4:ec5a9f38 [ 3740.047317][T24818] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 3740.047608][T24818] r7:832af680 r6:00000000 r5:2400c011 r4:ec5a9f38 [ 3740.047757][T24818] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 3740.048001][T24818] r10:ec5a9e34 r9:20000000 r8:2400c011 r7:00000000 r6:832af680 r5:ec5a9f38 [ 3740.048199][T24818] r4:00000000 [ 3740.048311][T24818] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 3740.048555][T24818] r10:00000128 r9:83e04800 r8:8020029c r7:2400c011 r6:20000000 r5:832af680 [ 3740.048771][T24818] r4:00000000 [ 3740.048894][T24818] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3740.049119][T24818] Exception stack(0xec5a9fa8 to 0xec5a9ff0) [ 3740.049295][T24818] 9fa0: 00000000 00000000 00000004 20000000 2400c011 00000000 [ 3740.049498][T24818] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bf20bc [ 3740.049766][T24818] 9fe0: 76bf1ec0 76bf1eb0 00018af0 00133450 [ 3740.049925][T24818] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 3743.536086][ T31] kauditd_printk_skb: 95 callbacks suppressed [ 3743.536180][ T31] audit: type=1400 audit(3743.400:67332): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3743.542753][ T31] audit: type=1400 audit(3743.400:67333): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3743.543677][ T31] audit: type=1400 audit(3743.400:67334): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3743.564880][ T31] audit: type=1400 audit(3743.430:67335): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3743.570508][ T31] audit: type=1400 audit(3743.430:67336): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3743.580603][ T31] audit: type=1400 audit(3743.440:67337): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.581420][ T31] audit: type=1400 audit(3743.440:67338): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.592552][ T31] audit: type=1400 audit(3743.450:67339): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.795209][ T31] audit: type=1400 audit(3743.660:67340): avc: denied { create } for pid=24831 comm="syz.1.5198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3743.829746][ T31] audit: type=1400 audit(3743.690:67341): avc: denied { setopt } for pid=24831 comm="syz.1.5198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3747.241075][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.241715][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.244035][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.244961][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.245302][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.245857][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.246220][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.246541][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.246880][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.247203][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.247580][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.247915][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.253389][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.253755][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.256507][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.257229][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.257686][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.258377][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.259120][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.259650][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.260090][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.260460][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.260782][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.261113][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.261446][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.261776][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.270643][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.271182][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.271557][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.276875][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.277427][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.277762][T24217] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 3747.303403][T24217] hid-generic 0000:0000:0000.0021: hidraw0: HID v0.00 Device [syz1] on syz0 [ 3747.622564][T24217] usb 2-1: new full-speed USB device number 50 using dummy_hcd [ 3747.793475][T24217] usb 2-1: too many configurations: 233, using maximum allowed: 8 [ 3747.831796][T24217] usb 2-1: config 0 has no interfaces? [ 3747.857959][T24217] usb 2-1: config 0 has no interfaces? [ 3747.884191][T24217] usb 2-1: config 0 has no interfaces? [ 3747.902442][T24217] usb 2-1: config 0 has no interfaces? [ 3747.922375][T24217] usb 2-1: config 0 has no interfaces? [ 3747.938855][T24217] usb 2-1: config 0 has no interfaces? [ 3747.952487][T24217] usb 2-1: config 0 has no interfaces? [ 3747.969281][T24217] usb 2-1: config 0 has no interfaces? [ 3747.969715][T24217] usb 2-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 3747.970060][T24217] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3747.983986][T24217] usb 2-1: config 0 descriptor?? [ 3748.209757][T22020] usb 2-1: USB disconnect, device number 50 [ 3748.810669][ T31] kauditd_printk_skb: 265 callbacks suppressed [ 3748.810791][ T31] audit: type=1400 audit(3748.670:67607): avc: denied { create } for pid=24873 comm="syz.0.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3748.820145][ T31] audit: type=1400 audit(3748.680:67608): avc: denied { ioctl } for pid=24873 comm="syz.0.5205" path="socket:[59562]" dev="sockfs" ino=59562 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3748.825613][ T31] audit: type=1400 audit(3748.690:67609): avc: denied { bind } for pid=24873 comm="syz.0.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3748.831647][ T31] audit: type=1400 audit(3748.690:67610): avc: denied { write } for pid=24873 comm="syz.0.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3748.991374][ T31] audit: type=1400 audit(3748.850:67611): avc: denied { read } for pid=24870 comm="syz.1.5204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3749.070029][ T31] audit: type=1400 audit(3748.930:67612): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3749.074857][ T31] audit: type=1400 audit(3748.940:67613): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3749.078778][ T31] audit: type=1400 audit(3748.940:67614): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3749.263077][ T31] audit: type=1400 audit(3749.130:67615): avc: denied { create } for pid=24875 comm="syz.1.5206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3749.282547][ T31] audit: type=1400 audit(3749.140:67616): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3749.818108][T24880] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=24880 comm=syz.1.5208 [ 3754.170382][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 3754.170446][ T31] audit: type=1400 audit(3754.030:67688): avc: denied { ioctl } for pid=24896 comm="syz.0.5213" path="socket:[59621]" dev="sockfs" ino=59621 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3754.178938][ T31] audit: type=1400 audit(3754.040:67689): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3754.186080][ T31] audit: type=1400 audit(3754.050:67690): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3754.187913][ T31] audit: type=1400 audit(3754.050:67691): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3754.189672][ T31] audit: type=1400 audit(3754.050:67692): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3754.192609][ T31] audit: type=1400 audit(3754.050:67693): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3754.688208][ T31] audit: type=1400 audit(3754.550:67694): avc: denied { ioctl } for pid=24896 comm="syz.0.5213" path="socket:[59621]" dev="sockfs" ino=59621 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3754.837196][ T31] audit: type=1400 audit(3754.700:67695): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3754.840250][ T31] audit: type=1400 audit(3754.700:67696): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3754.843387][ T31] audit: type=1400 audit(3754.700:67697): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3758.606900][T24919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24919 comm=syz.0.5218 [ 3759.211098][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 3759.211197][ T31] audit: type=1400 audit(3759.070:67737): avc: denied { create } for pid=24921 comm="syz.1.5219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3759.225151][ T31] audit: type=1400 audit(3759.090:67738): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3759.230326][ T31] audit: type=1400 audit(3759.090:67739): avc: denied { ioctl } for pid=24921 comm="syz.1.5219" path="socket:[59033]" dev="sockfs" ino=59033 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3759.239172][ T31] audit: type=1400 audit(3759.100:67740): avc: denied { bind } for pid=24921 comm="syz.1.5219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3759.240027][ T31] audit: type=1400 audit(3759.100:67741): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3759.241746][ T31] audit: type=1400 audit(3759.100:67742): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3759.247078][ T31] audit: type=1400 audit(3759.110:67743): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3759.252784][ T31] audit: type=1400 audit(3759.110:67744): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3759.268827][ T31] audit: type=1400 audit(3759.130:67745): avc: denied { write } for pid=24921 comm="syz.1.5219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3759.623944][ T31] audit: type=1400 audit(3759.490:67746): avc: denied { write } for pid=24913 comm="syz.0.5218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3764.328297][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 3764.328410][ T31] audit: type=1400 audit(3764.190:67799): avc: denied { create } for pid=24947 comm="syz.0.5225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3764.340210][ T31] audit: type=1400 audit(3764.200:67800): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3764.347004][T24948] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24948 comm=syz.0.5225 [ 3764.347593][ T31] audit: type=1400 audit(3764.210:67801): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3764.352432][ T31] audit: type=1400 audit(3764.210:67802): avc: denied { setopt } for pid=24947 comm="syz.0.5225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3764.358268][ T31] audit: type=1400 audit(3764.220:67803): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3764.359295][ T31] audit: type=1400 audit(3764.220:67804): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3764.360441][ T31] audit: type=1400 audit(3764.220:67805): avc: denied { connect } for pid=24947 comm="syz.0.5225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3764.366856][ T31] audit: type=1400 audit(3764.230:67806): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3764.374534][ T31] audit: type=1400 audit(3764.240:67807): avc: denied { ioctl } for pid=24947 comm="syz.0.5225" path="socket:[59682]" dev="sockfs" ino=59682 ioctlcmd=0x9401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3764.388614][ T31] audit: type=1400 audit(3764.250:67808): avc: denied { write } for pid=24947 comm="syz.0.5225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3769.673190][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 3769.673281][ T31] audit: type=1400 audit(3769.530:67873): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3769.675021][ T31] audit: type=1400 audit(3769.530:67874): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3769.676360][ T31] audit: type=1400 audit(3769.540:67875): avc: denied { create } for pid=24982 comm="syz.0.5239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3769.677794][ T31] audit: type=1400 audit(3769.540:67876): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3769.683105][ T31] audit: type=1400 audit(3769.540:67877): avc: denied { ioctl } for pid=24982 comm="syz.0.5239" path="socket:[59132]" dev="sockfs" ino=59132 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3769.692697][ T31] audit: type=1400 audit(3769.550:67878): avc: denied { bind } for pid=24982 comm="syz.0.5239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3769.693821][ T31] audit: type=1400 audit(3769.560:67879): avc: denied { write } for pid=24982 comm="syz.0.5239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3769.702780][ T31] audit: type=1400 audit(3769.560:67880): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3769.712851][ T31] audit: type=1400 audit(3769.570:67881): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3769.714247][ T31] audit: type=1400 audit(3769.570:67882): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3774.713874][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 3774.713957][ T31] audit: type=1400 audit(3774.580:67955): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3774.718507][ T31] audit: type=1400 audit(3774.580:67956): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3774.722883][ T31] audit: type=1400 audit(3774.590:67957): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3774.744724][ T31] audit: type=1400 audit(3774.600:67958): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3774.756617][ T31] audit: type=1400 audit(3774.620:67959): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3774.757960][ T31] audit: type=1400 audit(3774.620:67960): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3774.760142][ T31] audit: type=1400 audit(3774.620:67961): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3774.790756][ T31] audit: type=1400 audit(3774.650:67962): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3775.014052][ T31] audit: type=1400 audit(3774.880:67963): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3775.017997][ T31] audit: type=1400 audit(3774.880:67964): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3776.177743][T25025] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5132 sclass=netlink_audit_socket pid=25025 comm=syz.0.5256 [ 3777.239617][T25038] FAULT_INJECTION: forcing a failure. [ 3777.239617][T25038] name failslab, interval 1, probability 0, space 0, times 0 [ 3777.240179][T25038] CPU: 0 UID: 0 PID: 25038 Comm: syz.1.5253 Not tainted 6.12.0-syzkaller #0 [ 3777.240468][T25038] Hardware name: ARM-Versatile Express [ 3777.240674][T25038] Call trace: [ 3777.240843][T25038] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3777.241188][T25038] r7:00000c40 r6:85441c28 r5:60000013 r4:8203df48 [ 3777.241393][T25038] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3777.241715][T25038] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3777.242467][T25038] r5:00000000 r4:8271925c [ 3777.242788][T25038] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3777.243092][T25038] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 3777.243413][T25038] r6:85441c28 r5:00001000 r4:82c016c0 [ 3777.243623][T25038] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 3777.243922][T25038] [<804ce1b8>] (__kmalloc_noprof) from [<807522c0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3777.244253][T25038] r10:84326c00 r9:82c9f800 r8:00000000 r7:8482caa0 r6:85441c28 r5:00001000 [ 3777.244500][T25038] r4:00000000 [ 3777.244642][T25038] [<80752284>] (tomoyo_realpath_from_path) from [<8074e404>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3777.245039][T25038] r10:84326c00 r9:00000000 r8:00000004 r7:40189429 r6:00000004 r5:81ad1968 [ 3777.245367][T25038] r4:85441c28 r3:824ba340 [ 3777.245547][T25038] [<8074e338>] (tomoyo_path_number_perm) from [<80752cd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3777.245872][T25038] r9:85441c00 r8:00000004 r7:00000000 r6:00000000 r5:40189429 r4:85441c00 [ 3777.246111][T25038] [<80752cb4>] (tomoyo_file_ioctl) from [<8070131c>] (security_file_ioctl+0x64/0x1e4) [ 3777.246417][T25038] [<807012b8>] (security_file_ioctl) from [<80530600>] (sys_ioctl+0x50/0xd98) [ 3777.246715][T25038] r7:00000000 r6:85441c01 r5:00000000 r4:40189429 [ 3777.246904][T25038] [<805305b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3777.247566][T25038] Exception stack(0xecfa5fa8 to 0xecfa5ff0) [ 3777.247837][T25038] 5fa0: 00000000 00000000 00000004 40189429 00000000 00000000 [ 3777.248179][T25038] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b8f0bc [ 3777.248494][T25038] 5fe0: 76b8eec0 76b8eeb0 00018af0 00133450 [ 3777.248747][T25038] r10:00000036 r9:84326c00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 3777.249032][T25038] r4:00000000 [ 3777.250169][T25038] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3779.819146][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 3779.819242][ T31] audit: type=1400 audit(3779.680:68056): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3779.820556][ T31] audit: type=1400 audit(3779.680:68057): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3779.822766][ T31] audit: type=1400 audit(3779.690:68058): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3779.842683][ T31] audit: type=1400 audit(3779.700:68059): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3779.850516][ T31] audit: type=1400 audit(3779.710:68060): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3779.851337][ T31] audit: type=1400 audit(3779.710:68061): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3779.853289][ T31] audit: type=1400 audit(3779.710:68062): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3779.854060][ T31] audit: type=1400 audit(3779.710:68063): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3780.066551][ T31] audit: type=1400 audit(3779.930:68064): avc: denied { read } for pid=25034 comm="syz.0.5260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3780.075660][ T31] audit: type=1400 audit(3779.940:68065): avc: denied { write } for pid=25034 comm="syz.0.5260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3780.101347][T25055] FAULT_INJECTION: forcing a failure. [ 3780.101347][T25055] name failslab, interval 1, probability 0, space 0, times 0 [ 3780.101732][T25055] CPU: 1 UID: 0 PID: 25055 Comm: syz.1.5265 Not tainted 6.12.0-syzkaller #0 [ 3780.102220][T25055] Hardware name: ARM-Versatile Express [ 3780.102651][T25055] Call trace: [ 3780.102836][T25055] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3780.104106][T25055] r7:837a2400 r6:00000cc0 r5:60000013 r4:8203df48 [ 3780.104742][T25055] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3780.105552][T25055] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3780.105964][T25055] r5:00000000 r4:8271925c [ 3780.106190][T25055] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3780.106585][T25055] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 3780.107013][T25055] r6:00000cc0 r5:ffffffff r4:82cac6c0 [ 3780.107270][T25055] [<804e9074>] (should_failslab) from [<804cd864>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 3780.107756][T25055] [<804cd814>] (kmem_cache_alloc_node_noprof) from [<81494ac4>] (__alloc_skb+0x138/0x160) [ 3780.108229][T25055] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cac6c0 r5:ffffffff [ 3780.108603][T25055] r4:82606000 [ 3780.108795][T25055] [<8149498c>] (__alloc_skb) from [<815aa118>] (netlink_alloc_large_skb+0x88/0xa0) [ 3780.109231][T25055] r8:00000000 r7:84fef400 r6:00000024 r5:832ae000 r4:00000140 [ 3780.109552][T25055] [<815aa090>] (netlink_alloc_large_skb) from [<815aa720>] (netlink_sendmsg+0x134/0x43c) [ 3780.110015][T25055] r5:832ae000 r4:ed06df38 [ 3780.110245][T25055] [<815aa5ec>] (netlink_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 3780.110679][T25055] r10:00000000 r9:ed06ddd4 r8:ed06ddd4 r7:832ae000 r6:832ae000 r5:ed06df38 [ 3780.111064][T25055] r4:00000000 [ 3780.111255][T25055] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 3780.111704][T25055] r7:832ae000 r6:00000000 r5:00000840 r4:ed06df38 [ 3780.112625][T25055] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 3780.113773][T25055] r10:ed06de34 r9:20000100 r8:00000840 r7:00000000 r6:832ae000 r5:ed06df38 [ 3780.114575][T25055] r4:00000000 [ 3780.114830][T25055] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 3780.115359][T25055] r10:00000128 r9:837a2400 r8:8020029c r7:00000840 r6:20000100 r5:832ae000 [ 3780.116305][T25055] r4:00000000 [ 3780.116707][T25055] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3780.117269][T25055] Exception stack(0xed06dfa8 to 0xed06dff0) [ 3780.117574][T25055] dfa0: 00000000 00000000 00000003 20000100 00000840 00000000 [ 3780.117990][T25055] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bf20bc [ 3780.118371][T25055] dfe0: 76bf1ec0 76bf1eb0 00018af0 00133450 [ 3780.118673][T25055] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 3784.830650][ T31] kauditd_printk_skb: 122 callbacks suppressed [ 3784.830708][ T31] audit: type=1400 audit(3784.690:68188): avc: denied { sys_module } for pid=25099 comm="syz.1.5284" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3784.835923][ T31] audit: type=1400 audit(3784.700:68189): avc: denied { module_request } for pid=25099 comm="syz.1.5284" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3784.841200][ T31] audit: type=1400 audit(3784.700:68190): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3784.845178][ T31] audit: type=1400 audit(3784.710:68191): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3784.862652][ T31] audit: type=1400 audit(3784.710:68192): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3784.863806][ T31] audit: type=1400 audit(3784.710:68193): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3784.866276][ T31] audit: type=1400 audit(3784.710:68194): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3785.074105][ T31] audit: type=1400 audit(3784.940:68195): avc: denied { write } for pid=25099 comm="syz.1.5284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3785.092945][ T31] audit: type=1400 audit(3784.960:68196): avc: denied { write } for pid=25099 comm="syz.1.5284" path="socket:[59956]" dev="sockfs" ino=59956 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3785.098197][ T31] audit: type=1400 audit(3784.960:68197): avc: denied { write } for pid=25099 comm="syz.1.5284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3785.403964][T25106] FAULT_INJECTION: forcing a failure. [ 3785.403964][T25106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3785.404556][T25106] CPU: 1 UID: 0 PID: 25106 Comm: syz.1.5285 Not tainted 6.12.0-syzkaller #0 [ 3785.404809][T25106] Hardware name: ARM-Versatile Express [ 3785.404970][T25106] Call trace: [ 3785.405127][T25106] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3785.405431][T25106] r7:ed5a1e30 r6:20001180 r5:60000013 r4:8203df48 [ 3785.405630][T25106] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3785.405887][T25106] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3785.406135][T25106] r5:00000000 r4:8274e844 [ 3785.406277][T25106] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3785.406530][T25106] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 3785.406789][T25106] r6:20001180 r5:00000000 r4:ed5a1f38 [ 3785.406948][T25106] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 3785.407203][T25106] [<808e6b5c>] (should_fail_usercopy) from [<81489ff0>] (copy_msghdr_from_user+0x50/0x130) [ 3785.407500][T25106] [<81489fa0>] (copy_msghdr_from_user) from [<8148a148>] (___sys_sendmsg+0x78/0xd0) [ 3785.407793][T25106] r8:20040850 r7:00000000 r6:832afb80 r5:ed5a1f38 r4:ed5a1e74 [ 3785.408033][T25106] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 3785.408340][T25106] r10:00000128 r9:84322400 r8:8020029c r7:20040850 r6:20001180 r5:832afb80 [ 3785.408620][T25106] r4:00000000 [ 3785.408767][T25106] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3785.409051][T25106] Exception stack(0xed5a1fa8 to 0xed5a1ff0) [ 3785.409258][T25106] 1fa0: 00000000 00000000 00000004 20001180 20040850 00000000 [ 3785.409527][T25106] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bf20bc [ 3785.409789][T25106] 1fe0: 76bf1ec0 76bf1eb0 00018af0 00133450 [ 3785.409991][T25106] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 3789.841651][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 3789.841885][ T31] audit: type=1400 audit(3789.700:68284): avc: denied { ioctl } for pid=25130 comm="syz.1.5294" path="socket:[59333]" dev="sockfs" ino=59333 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3789.854711][ T31] audit: type=1400 audit(3789.720:68285): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3789.855928][ T31] audit: type=1400 audit(3789.720:68286): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3789.856717][ T31] audit: type=1400 audit(3789.720:68287): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3789.862877][ T31] audit: type=1400 audit(3789.720:68288): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3789.873612][ T31] audit: type=1400 audit(3789.720:68289): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3790.350185][ T31] audit: type=1400 audit(3790.210:68290): avc: denied { listen } for pid=25130 comm="syz.1.5294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3790.361231][ T31] audit: type=1400 audit(3790.220:68291): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3790.369621][ T31] audit: type=1400 audit(3790.230:68292): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3790.371681][ T31] audit: type=1400 audit(3790.230:68293): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3793.261216][T25155] FAULT_INJECTION: forcing a failure. [ 3793.261216][T25155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3793.262239][T25155] CPU: 0 UID: 0 PID: 25155 Comm: syz.0.5301 Not tainted 6.12.0-syzkaller #0 [ 3793.262956][T25155] Hardware name: ARM-Versatile Express [ 3793.263209][T25155] Call trace: [ 3793.263501][T25155] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3793.263936][T25155] r7:b5403587 r6:00000000 r5:60000013 r4:8203df48 [ 3793.264204][T25155] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3793.264574][T25155] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3793.264960][T25155] r5:00000000 r4:8274e844 [ 3793.265163][T25155] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3793.265548][T25155] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 3793.265927][T25155] r6:00000000 r5:836ce820 r4:76b47bb8 [ 3793.266166][T25155] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 3793.266836][T25155] [<808e6b5c>] (should_fail_usercopy) from [<8020b824>] (setup_sigframe+0x124/0x1c4) [ 3793.267432][T25155] [<8020b700>] (setup_sigframe) from [<8020bc8c>] (do_work_pending+0x2f4/0x4f8) [ 3793.267934][T25155] r10:00000128 r9:b5403587 r8:00000000 r7:836ce820 r6:76b47bb8 r5:ed7edfb0 [ 3793.268275][T25155] r4:836ce000 [ 3793.268449][T25155] [<8020b998>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3793.268841][T25155] Exception stack(0xed7edfb0 to 0xed7edff8) [ 3793.269111][T25155] dfa0: fffffffc 20002940 10080000 00000000 [ 3793.269472][T25155] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b480bc [ 3793.269824][T25155] dfe0: 76b47ec0 76b47eb0 00018af0 00133450 60000010 00000004 [ 3793.270141][T25155] r10:00000128 r9:836ce000 r8:8020029c r7:00000128 r6:00131400 r5:00000000 [ 3793.270534][T25155] r4:00000000 [ 3794.847839][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 3794.847922][ T31] audit: type=1400 audit(3794.710:68341): avc: denied { create } for pid=25164 comm="syz.0.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3794.862456][ T31] audit: type=1400 audit(3794.720:68342): avc: denied { write } for pid=25164 comm="syz.0.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3794.867928][ T31] audit: type=1400 audit(3794.730:68343): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3794.869577][T25165] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=25165 comm=syz.0.5305 [ 3794.884699][ T31] audit: type=1400 audit(3794.750:68344): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3794.887200][ T31] audit: type=1400 audit(3794.750:68345): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3794.890965][ T31] audit: type=1400 audit(3794.750:68346): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3794.893495][ T31] audit: type=1400 audit(3794.760:68347): avc: denied { create } for pid=25164 comm="syz.0.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3794.906483][ T31] audit: type=1400 audit(3794.770:68348): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3794.907378][ T31] audit: type=1400 audit(3794.770:68349): avc: denied { write } for pid=25164 comm="syz.0.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3794.922827][ T31] audit: type=1400 audit(3794.780:68350): avc: denied { create } for pid=25164 comm="syz.0.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3799.907889][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 3799.907954][ T31] audit: type=1400 audit(3799.770:68397): avc: denied { create } for pid=25195 comm="syz.1.5316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3799.926144][ T31] audit: type=1400 audit(3799.790:68398): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3799.929102][ T31] audit: type=1400 audit(3799.790:68399): avc: denied { setopt } for pid=25195 comm="syz.1.5316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3799.941238][ T31] audit: type=1400 audit(3799.800:68400): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3799.952568][ T31] audit: type=1400 audit(3799.810:68401): avc: denied { connect } for pid=25195 comm="syz.1.5316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3799.953366][ T31] audit: type=1400 audit(3799.810:68402): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3799.954944][ T31] audit: type=1400 audit(3799.810:68403): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3799.955727][ T31] audit: type=1400 audit(3799.810:68404): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3799.956470][ T31] audit: type=1400 audit(3799.820:68405): avc: denied { read } for pid=25196 comm="syz.0.5315" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3799.962274][ T31] audit: type=1400 audit(3799.820:68406): avc: denied { read open } for pid=25196 comm="syz.0.5315" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3803.549389][T25214] FAULT_INJECTION: forcing a failure. [ 3803.549389][T25214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3803.550700][T25214] CPU: 1 UID: 0 PID: 25214 Comm: syz.1.5320 Not tainted 6.12.0-syzkaller #0 [ 3803.551086][T25214] Hardware name: ARM-Versatile Express [ 3803.551303][T25214] Call trace: [ 3803.551572][T25214] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3803.552593][T25214] r7:00000001 r6:8223883c r5:60000013 r4:8203df48 [ 3803.553075][T25214] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 3803.553404][T25214] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3803.553788][T25214] r5:00000000 r4:8274e844 [ 3803.554208][T25214] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 3803.555009][T25214] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 3803.555343][T25214] r6:8223883c r5:20000080 r4:84d51000 [ 3803.555602][T25214] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 3803.555956][T25214] [<808e6b5c>] (should_fail_usercopy) from [<808ecbc4>] (strncpy_from_user+0x20/0x194) [ 3803.556313][T25214] [<808ecba4>] (strncpy_from_user) from [<80525fdc>] (getname_flags.part.0+0x44/0x18c) [ 3803.556717][T25214] r10:00000015 r9:837ad400 r8:00000000 r7:00000001 r6:8223883c r5:20000080 [ 3803.557035][T25214] r4:84d51000 [ 3803.557216][T25214] [<80525f98>] (getname_flags.part.0) from [<8052b07c>] (getname_flags+0x3c/0x50) [ 3803.557595][T25214] r9:837ad400 r8:00000000 r7:85019200 r6:ffffff9c r5:00000001 r4:20000080 [ 3803.557919][T25214] [<8052b040>] (getname_flags) from [<8052b5e4>] (user_path_at+0x2c/0x64) [ 3803.558430][T25214] r5:00000001 r4:eda21f6c [ 3803.558638][T25214] [<8052b5b8>] (user_path_at) from [<80547a50>] (sys_mount+0x158/0x260) [ 3803.559007][T25214] r6:00000000 r5:00000000 r4:00000000 [ 3803.559238][T25214] [<805478f8>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3803.559647][T25214] Exception stack(0xeda21fa8 to 0xeda21ff0) [ 3803.559925][T25214] 1fa0: 00000000 00000000 20000080 20000080 00000000 00261002 [ 3803.560520][T25214] 1fc0: 00000000 00000000 00131400 00000015 00000000 00006364 003d0f00 76bf20bc [ 3803.560981][T25214] 1fe0: 76bf1ec0 76bf1eb0 00018af0 00133450 [ 3803.561351][T25214] r10:00000015 r9:837ad400 r8:8020029c r7:00000015 r6:00131400 r5:00000000 [ 3803.561666][T25214] r4:00000000 [ 3805.290493][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 3805.290610][ T31] audit: type=1400 audit(3805.150:68474): avc: denied { ioctl } for pid=25220 comm="syz.0.5323" path="socket:[60169]" dev="sockfs" ino=60169 ioctlcmd=0x662c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3805.301704][ T31] audit: type=1400 audit(3805.160:68475): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3805.306212][ T31] audit: type=1400 audit(3805.170:68476): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3805.308048][ T31] audit: type=1400 audit(3805.170:68477): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3805.309059][ T31] audit: type=1400 audit(3805.170:68478): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3805.311191][ T31] audit: type=1400 audit(3805.170:68479): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3805.428838][ T31] audit: type=1400 audit(3805.290:68480): avc: denied { ioctl } for pid=25224 comm="syz.1.5324" path="socket:[60176]" dev="sockfs" ino=60176 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3805.798540][ T31] audit: type=1400 audit(3805.660:68481): avc: denied { create } for pid=25220 comm="syz.0.5323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3805.807744][ T31] audit: type=1400 audit(3805.670:68482): avc: denied { write } for pid=25220 comm="syz.0.5323" path="socket:[60470]" dev="sockfs" ino=60470 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3805.810961][ T31] audit: type=1400 audit(3805.670:68483): avc: denied { write } for pid=25220 comm="syz.0.5323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3809.711425][T25267] batadv_slave_1: entered promiscuous mode [ 3809.715738][T25267] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5338'. [ 3810.190411][T25274] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5341'. [ 3810.293905][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 3810.293962][ T31] audit: type=1400 audit(3810.160:68569): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3810.295560][ T31] audit: type=1400 audit(3810.160:68570): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3810.297765][ T31] audit: type=1400 audit(3810.160:68571): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3810.496181][ T31] audit: type=1400 audit(3810.360:68572): avc: denied { read write } for pid=23706 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3810.498386][ T31] audit: type=1400 audit(3810.360:68573): avc: denied { read write open } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3810.500486][ T31] audit: type=1400 audit(3810.360:68574): avc: denied { ioctl } for pid=23706 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3810.574272][ T31] audit: type=1400 audit(3810.430:68575): avc: denied { sys_module } for pid=25266 comm="syz.0.5339" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3810.575384][ T31] audit: type=1400 audit(3810.430:68576): avc: denied { module_request } for pid=25266 comm="syz.0.5339" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3810.668716][ T31] audit: type=1400 audit(3810.530:68577): avc: denied { write } for pid=25266 comm="syz.0.5339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3810.726078][ T31] audit: type=1400 audit(3810.590:68578): avc: denied { create } for pid=25278 comm="syz.1.5343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3813.320665][T25302] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 3814.716761][T25326] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5352'. [ 3815.376064][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 3815.376160][ T31] audit: type=1400 audit(3815.240:68666): avc: denied { read } for pid=25330 comm="syz.1.5354" name="card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3815.379893][ T31] audit: type=1400 audit(3815.240:68667): avc: denied { read open } for pid=25330 comm="syz.1.5354" path="/dev/dri/card1" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3815.389379][ T31] audit: type=1400 audit(3815.250:68668): avc: denied { ioctl } for pid=25330 comm="syz.1.5354" path="/dev/dri/card1" dev="devtmpfs" ino=616 ioctlcmd=0x640c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3815.413835][ T31] audit: type=1400 audit(3815.280:68669): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3815.418505][ T31] audit: type=1400 audit(3815.280:68670): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3815.439221][ T31] audit: type=1400 audit(3815.300:68671): avc: denied { append } for pid=2901 comm="syslogd" name="messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3815.440257][ T31] audit: type=1400 audit(3815.300:68672): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3815.440928][ T31] audit: type=1400 audit(3815.300:68673): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=19 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3815.460587][ T31] audit: type=1400 audit(3815.320:68674): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3815.461437][ T31] audit: type=1400 audit(3815.320:68675): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3816.642794][T25343] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5359'. [ 3816.643346][T25343] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5359'. [ 3818.735428][T25369] ------------[ cut here ]------------ [ 3818.736169][T25369] WARNING: CPU: 0 PID: 25369 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 3818.736897][T25369] Modules linked in: [ 3818.738957][T25369] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3818.739811][T25369] CPU: 0 UID: 0 PID: 25369 Comm: syz.1.5371 Not tainted 6.12.0-syzkaller #0 [ 3818.741614][T25369] Hardware name: ARM-Versatile Express [ 3818.742467][T25369] Call trace: [ 3818.742755][T25369] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 3818.743226][T25369] r7:00000000 r6:82622f44 r5:00000000 r4:8203df48 [ 3818.743646][T25369] [<8199d55c>] (show_stack) from [<819bba40>] (dump_stack_lvl+0x54/0x7c) [ 3818.744185][T25369] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 3818.744700][T25369] r5:00000000 r4:82870d18 [ 3818.745205][T25369] [<819bba68>] (dump_stack) from [<8199e0a0>] (panic+0x120/0x374) [ 3818.745641][T25369] [<8199df80>] (panic) from [<802420d8>] (get_taint+0x0/0x1c) [ 3818.746715][T25369] r3:8260c5c4 r2:00000001 r1:82026320 r0:8202dd88 [ 3818.748368][T25369] r7:8048cc2c [ 3818.748631][T25369] [<80242064>] (check_panic_on_warn) from [<8024223c>] (__warn+0x80/0x188) [ 3818.750395][T25369] [<802421bc>] (__warn) from [<802424bc>] (warn_slowpath_fmt+0x178/0x1f4) [ 3818.750939][T25369] r8:00000009 r7:82055a40 r6:edf55d24 r5:83672400 r4:00000000 [ 3818.751852][T25369] [<80242348>] (warn_slowpath_fmt) from [<8048cc2c>] (kunmap_local_indexed+0x20c/0x224) [ 3818.752464][T25369] r10:ffefdfe8 r9:83ac5800 r8:20000000 r7:00000000 r6:00000003 r5:83672400 [ 3818.752876][T25369] r4:ffefd000 [ 3818.753041][T25369] [<8048ca20>] (kunmap_local_indexed) from [<805069d4>] (move_pages+0x7e8/0x149c) [ 3818.754063][T25369] r7:00000000 r6:85292900 r5:def9726c r4:ffefb000 [ 3818.754444][T25369] [<805061ec>] (move_pages) from [<80582e98>] (userfaultfd_ioctl+0x111c/0x2080) [ 3818.755056][T25369] r10:83ac5800 r9:edf55e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 3818.755510][T25369] r4:85113080 [ 3818.755729][T25369] [<80581d7c>] (userfaultfd_ioctl) from [<805306e4>] (sys_ioctl+0x134/0xd98) [ 3818.756361][T25369] r10:83672400 r9:8528fd80 r8:00000003 r7:20000040 r6:8528fd81 r5:00000000 [ 3818.756938][T25369] r4:c028aa05 [ 3818.757297][T25369] [<805305b0>] (sys_ioctl) from [<8020028c>] (__sys_trace_return+0x0/0x10) [ 3818.757748][T25369] Exception stack(0xedf55fa8 to 0xedf55ff0) [ 3818.758379][T25369] 5fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 3818.759022][T25369] 5fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76bf20bc [ 3818.759725][T25369] 5fe0: 76bf1ec0 76bf1eb0 00018af0 00133450 [ 3818.760079][T25369] r10:00000036 r9:83672400 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 3818.760606][T25369] r4:00000000 [ 3818.762625][T25369] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:34:35 Registers: info registers vcpu 0 CPU#0 R00=84025440 R01=00000031 R02=eb9bb000 R03=eb9bb018 R04=8287345b R05=84025440 R06=809ea0b8 R07=8287347c R08=8287341c R09=00000061 R10=00000001 R11=edf55a64 R12=00000002 R13=edf55a58 R14=827584b4 R15=809ea0c8 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=8203df48 R02=00000001 R03=819bd8b0 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=000000ad R11=df805f14 R12=df805f18 R13=df805f08 R14=819bc544 R15=819bd8c0 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000