last executing test programs: 18.779311147s ago: executing program 1 (id=1813): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1541, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000600)="00000000000000000000000088a8", 0xe}], 0x1) 16.79030191s ago: executing program 1 (id=1816): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r0}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) 15.350590474s ago: executing program 1 (id=1818): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0xffff, 0x0, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee00}, {@in6=@mcast1, 0x0, 0x2b}, @in6=@loopback, {0x0, 0x0, 0x2}, {0x0, 0x200000, 0x7}, {0x40000, 0x0, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x71}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 13.408862755s ago: executing program 1 (id=1820): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000004000000032000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{}, {0x27}}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40007}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000001000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11.795100628s ago: executing program 1 (id=1821): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@deltaction={0x18, 0x31, 0x38ac2e76ffe355d7, 0x70bd2a, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x880}, 0x90) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000080)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/15, 0xf, 0xa0, 0x6, 0x3, 0x5, 0x1635}}, 0x120) syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="1201000000000040f304540700000000000109"], 0x0) write$UHID_INPUT(r0, &(0x7f0000002080)={0xc, {"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", 0x1000}}, 0x1006) 7.369741468s ago: executing program 0 (id=1825): writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001500add427323b472545b45602117fffffff81000e22d991000000000000a8", 0x23}], 0x1) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) open_by_handle_at(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="15000000fe00"], 0x1) 6.667605905s ago: executing program 0 (id=1826): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x2c}, 0x78, r1}) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8916, &(0x7f0000000000)) ioctl(r2, 0x8936, &(0x7f0000000000)) 5.081631867s ago: executing program 0 (id=1827): openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000001000000280001801400040000000000000000000200ffffac1414aa060001000a0080000800060003"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) socket$nl_generic(0x10, 0x3, 0x10) 2.958299557s ago: executing program 0 (id=1828): r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x19, 0x9c, 0x4f, 0x20, 0x7c9, 0xe, 0x5d4f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0xd6, 0x2, 0x2, 0xff, 0xff, 0x0, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x10}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) 456.198566ms ago: executing program 0 (id=1829): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000004000000032000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{}, {0x27}}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40007}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000001000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 440.255647ms ago: executing program 1 (id=1830): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) 0s ago: executing program 0 (id=1831): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002ec0)=ANY=[], 0x28}}, 0x0) kernel console output (not intermixed with test programs): 80201afc>] (show_stack+0x18/0x1c) [ 847.693663][ T9620] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 847.693683][ T9620] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 847.693729][ T9620] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 847.693776][ T9620] r5:84115400 r4:82950610 [ 847.693802][ T9620] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 847.693861][ T9620] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 847.693919][ T9620] r8:76b05f30 r7:00000000 r6:00000000 r5:edc3df68 r4:00000002 [ 847.693934][ T9620] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 847.693978][ T9620] [<80964e18>] (should_fail_usercopy) from [<80589618>] (simple_read_from_buffer+0x80/0x13c) [ 847.694033][ T9620] [<80589598>] (simple_read_from_buffer) from [<8060187c>] (proc_fail_nth_read+0xb8/0x100) [ 847.694100][ T9620] r10:00000001 r9:806017c4 r8:00000002 r7:edc3df68 r6:0000000f r5:76b05f30 [ 847.694124][ T9620] r4:84115400 r3:edc3de9f [ 847.694139][ T9620] [<806017c4>] (proc_fail_nth_read) from [<8054dc90>] (vfs_read+0x98/0x320) [ 847.694199][ T9620] r8:76b05f30 r7:edc3df68 r6:84115400 r5:0000000f r4:84efdf00 [ 847.694238][ T9620] [<8054dbf8>] (vfs_read) from [<8054e938>] (ksys_read+0x74/0xe8) [ 847.694299][ T9620] r10:00000003 r9:84115400 r8:8020029c r7:00000000 r6:00000000 r5:84efdf00 [ 847.694318][ T9620] r4:84efdf03 [ 847.694333][ T9620] [<8054e8c4>] (ksys_read) from [<8054e9bc>] (sys_read+0x10/0x14) [ 847.694385][ T9620] r7:00000003 r6:00000004 r5:76b05f30 r4:0000000f [ 847.694401][ T9620] [<8054e9ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 847.694443][ T9620] Exception stack(0xedc3dfa8 to 0xedc3dff0) [ 847.694478][ T9620] dfa0: 0000000f 76b05f30 00000004 76b05f30 0000000f 00000000 [ 847.694509][ T9620] dfc0: 0000000f 76b05f30 00000004 00000003 002e0000 00000000 00006364 76b060bc [ 847.694533][ T9620] dfe0: 00000158 76b05ed0 000d7df0 0012fe94 [ 848.638149][ T8658] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 848.787708][ T8658] usb 2-1: Using ep0 maxpacket: 32 [ 848.797493][ T8658] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 848.799717][ T8658] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 848.801878][ T8658] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 848.802903][ T8658] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 848.809902][ T8658] usb 2-1: config 0 descriptor?? [ 849.512256][ T8658] usbhid 2-1:0.0: can't add hid device: -71 [ 849.513594][ T8658] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 849.525203][ T8658] usb 2-1: USB disconnect, device number 8 [ 849.631374][ T31] audit: type=1400 audit(849.380:297): avc: denied { map } for pid=9644 comm="syz.1.1510" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19249 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 849.633283][ T31] audit: type=1400 audit(849.380:298): avc: denied { read write } for pid=9644 comm="syz.1.1510" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19249 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 849.828051][ T9649] FAULT_INJECTION: forcing a failure. [ 849.828051][ T9649] name failslab, interval 1, probability 0, space 0, times 0 [ 849.828660][ T9649] CPU: 1 UID: 0 PID: 9649 Comm: syz.1.1511 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 849.828742][ T9649] Hardware name: ARM-Versatile Express [ 849.828770][ T9649] Call trace: [ 849.828814][ T9649] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 849.828924][ T9649] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4f4 [ 849.828945][ T9649] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 849.829313][ T9649] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 849.829764][ T9649] r5:849f0c00 r4:82919a80 [ 849.829976][ T9649] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 849.830092][ T9649] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 849.830472][ T9649] r8:849f0c00 r7:00000c40 r6:86091928 r5:00001000 r4:830016c0 [ 849.830596][ T9649] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 849.830691][ T9649] [<80500f2c>] (__kmalloc_noprof) from [<807baf34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 849.830931][ T9649] r10:849f0c00 r9:8309f000 r8:00000000 r7:836cb990 r6:86091928 r5:00001000 [ 849.830982][ T9649] r4:00000000 [ 849.831101][ T9649] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 849.831176][ T9649] r10:849f0c00 r9:00000000 r8:00000004 r7:4004550c r6:00000004 r5:81cd6278 [ 849.831199][ T9649] r4:86091928 r3:826c0200 [ 849.831216][ T9649] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 849.831273][ T9649] r9:86091900 r8:00000004 r7:00000000 r6:00000000 r5:4004550c r4:86091900 [ 849.831294][ T9649] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 849.831573][ T9649] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 849.831779][ T9649] r7:00000000 r6:86091901 r5:00000000 r4:4004550c [ 849.831963][ T9649] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 849.832042][ T9649] Exception stack(0xedb41fa8 to 0xedb41ff0) [ 849.832689][ T9649] 1fa0: 00000000 00000000 00000004 4004550c 00000000 00000000 [ 849.832777][ T9649] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b8a0bc [ 849.832806][ T9649] 1fe0: 76b89ec0 76b89eb0 000193a4 00131fc0 [ 849.832940][ T9649] r10:00000036 r9:849f0c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 849.833055][ T9649] r4:00000000 [ 849.845157][ T9649] ERROR: Out of memory at tomoyo_realpath_from_path. [ 853.143111][ T31] audit: type=1400 audit(852.890:299): avc: denied { write } for pid=9686 comm="syz.1.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 854.488403][ T31] audit: type=1400 audit(854.240:300): avc: denied { accept } for pid=9693 comm="syz.0.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 857.994118][ T31] audit: type=1400 audit(857.740:301): avc: granted { setsecparam } for pid=9714 comm="syz.0.1521" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 859.304254][ T9726] 8021q: VLANs not supported on ip_vti0 [ 863.018173][ T9749] FAULT_INJECTION: forcing a failure. [ 863.018173][ T9749] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 863.019838][ T9749] CPU: 0 UID: 0 PID: 9749 Comm: syz.1.1531 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 863.019931][ T9749] Hardware name: ARM-Versatile Express [ 863.019955][ T9749] Call trace: [ 863.019992][ T9749] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 863.020536][ T9749] r7:00000000 r6:00000000 r5:60000113 r4:8225b4f4 [ 863.020554][ T9749] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 863.020598][ T9749] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 863.020652][ T9749] r5:83948c00 r4:82919ad4 [ 863.020666][ T9749] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 863.020715][ T9749] [<80964bd8>] (should_fail_ex) from [<8051c2b4>] (should_fail_alloc_page+0x68/0x74) [ 863.020773][ T9749] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:ee2e9d48 [ 863.020788][ T9749] [<8051c24c>] (should_fail_alloc_page) from [<804eaaf0>] (prepare_alloc_pages.constprop.0+0x94/0x1b4) [ 863.020830][ T9749] [<804eaa5c>] (prepare_alloc_pages.constprop.0) from [<804f2e54>] (__alloc_frozen_pages_noprof+0xac/0x10d8) [ 863.020892][ T9749] r10:ee2e9f08 r9:00000000 r8:83948c00 r7:00000000 r6:00140cca r5:83948c00 [ 863.020913][ T9749] r4:00000000 r3:ee2e9d48 [ 863.020927][ T9749] [<804f2da8>] (__alloc_frozen_pages_noprof) from [<804f3ef4>] (__folio_alloc_noprof+0x14/0x6c) [ 863.020981][ T9749] r10:ee2e9f08 r9:84dbaf80 r8:00000000 r7:00000000 r6:2000d000 r5:83948c00 [ 863.021220][ T9749] r4:00000215 [ 863.021240][ T9749] [<804f3ee0>] (__folio_alloc_noprof) from [<804c4b5c>] (handle_mm_fault+0xcf4/0x14d8) [ 863.021301][ T9749] r5:83948c00 r4:00000215 [ 863.021317][ T9749] [<804c3e68>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 863.021379][ T9749] r10:00000002 r9:84ba6a00 r8:00000215 r7:2000d000 r6:00000a07 r5:2000d000 [ 863.021420][ T9749] r4:ee2e9f08 [ 863.021435][ T9749] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 863.021494][ T9749] r10:00000137 r9:83948c00 r8:80234128 r7:ee2e9f08 r6:2000d000 r5:00000a07 [ 863.021514][ T9749] r4:8281d1b0 [ 863.021529][ T9749] [<80234774>] (do_DataAbort) from [<80200b0c>] (__dabt_svc+0x4c/0x80) [ 863.021569][ T9749] Exception stack(0xee2e9f08 to 0xee2e9f50) [ 863.021661][ T9749] 9f00: 2000d000 48cd3325 00000000 00000000 3631fd19 00000002 [ 863.021725][ T9749] 9f20: b5003500 20000040 b5403587 83948c00 00000137 ee2e9f84 00000002 ee2e9f58 [ 863.021752][ T9749] 9f40: 8075d39c 819f37f4 20000013 ffffffff [ 863.021778][ T9749] r8:b5403587 r7:ee2e9f3c r6:ffffffff r5:20000013 r4:819f37f4 [ 863.021793][ T9749] [<8075d2e4>] (keyctl_capabilities) from [<8075d698>] (sys_keyctl+0x2b8/0x318) [ 863.021853][ T9749] r9:83948c00 r8:8020029c r7:00000137 r6:0012ff70 r5:00000000 r4:00000000 [ 863.021867][ T9749] [<8075d3e0>] (sys_keyctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 863.021914][ T9749] Exception stack(0xee2e9fa8 to 0xee2e9ff0) [ 863.021942][ T9749] 9fa0: 00000000 00000000 0000001f 20000040 48ce02e9 00000000 [ 863.021970][ T9749] 9fc0: 00000000 00000000 0012ff70 00000137 002e0000 00000000 00006364 76b8a0bc [ 863.021994][ T9749] 9fe0: 76b89ec0 76b89eb0 000193a4 00131fc0 [ 863.022016][ T9749] r5:00000000 r4:00000000 [ 869.553885][ T9785] FAULT_INJECTION: forcing a failure. [ 869.553885][ T9785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 869.557564][ T9785] CPU: 1 UID: 0 PID: 9785 Comm: syz.1.1543 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 869.557687][ T9785] Hardware name: ARM-Versatile Express [ 869.557716][ T9785] Call trace: [ 869.557755][ T9785] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 869.557992][ T9785] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 869.558011][ T9785] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 869.558060][ T9785] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 869.558108][ T9785] r5:8394c800 r4:82950610 [ 869.558123][ T9785] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 869.558178][ T9785] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 869.558268][ T9785] r8:76b89f30 r7:00000000 r6:00000000 r5:ee299f68 r4:00000002 [ 869.558287][ T9785] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 869.558335][ T9785] [<80964e18>] (should_fail_usercopy) from [<80589618>] (simple_read_from_buffer+0x80/0x13c) [ 869.558474][ T9785] [<80589598>] (simple_read_from_buffer) from [<8060187c>] (proc_fail_nth_read+0xb8/0x100) [ 869.558554][ T9785] r10:00000001 r9:806017c4 r8:00000002 r7:ee299f68 r6:0000000f r5:76b89f30 [ 869.558577][ T9785] r4:8394c800 r3:ee299e9f [ 869.558593][ T9785] [<806017c4>] (proc_fail_nth_read) from [<8054dc90>] (vfs_read+0x98/0x320) [ 869.558654][ T9785] r8:76b89f30 r7:ee299f68 r6:8394c800 r5:0000000f r4:84efd180 [ 869.558672][ T9785] [<8054dbf8>] (vfs_read) from [<8054e938>] (ksys_read+0x74/0xe8) [ 869.558729][ T9785] r10:00000003 r9:8394c800 r8:8020029c r7:00000000 r6:00000000 r5:84efd180 [ 869.558746][ T9785] r4:84efd183 [ 869.558761][ T9785] [<8054e8c4>] (ksys_read) from [<8054e9bc>] (sys_read+0x10/0x14) [ 869.558811][ T9785] r7:00000003 r6:00000003 r5:76b89f30 r4:0000000f [ 869.558826][ T9785] [<8054e9ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 869.558931][ T9785] Exception stack(0xee299fa8 to 0xee299ff0) [ 869.558969][ T9785] 9fa0: 0000000f 76b89f30 00000003 76b89f30 0000000f 00000000 [ 869.559007][ T9785] 9fc0: 0000000f 76b89f30 00000003 00000003 002e0000 00000000 00006364 76b8a0bc [ 869.559032][ T9785] 9fe0: 00000158 76b89ed0 000d7df0 0012fe94 [ 874.638253][ T31] audit: type=1400 audit(874.390:302): avc: denied { nlmsg_write } for pid=9811 comm="syz.0.1552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 874.645089][ T9812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9812 comm=syz.0.1552 [ 874.653458][ T31] audit: type=1400 audit(874.400:303): avc: denied { ioctl } for pid=9811 comm="syz.0.1552" path="socket:[18406]" dev="sockfs" ino=18406 ioctlcmd=0x1289 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 875.443734][ T31] audit: type=1400 audit(875.190:304): avc: denied { write } for pid=9809 comm="syz.1.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 875.794660][ T31] audit: type=1400 audit(875.540:305): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.795330][ T31] audit: type=1400 audit(875.540:306): avc: denied { open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.805016][ T31] audit: type=1400 audit(875.550:307): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 876.583275][ T31] audit: type=1400 audit(876.330:308): avc: denied { create } for pid=9820 comm="syz.0.1554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 876.597011][ T31] audit: type=1400 audit(876.340:309): avc: denied { ioctl } for pid=9820 comm="syz.0.1554" path="socket:[18415]" dev="sockfs" ino=18415 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 876.600480][ T31] audit: type=1400 audit(876.350:310): avc: denied { bind } for pid=9820 comm="syz.0.1554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 876.629128][ T31] audit: type=1400 audit(876.380:311): avc: denied { execute } for pid=9820 comm="syz.0.1554" path=2F6D656D66643A0B88E0731AD6467445234AFB881E202864656C6574656429 dev="tmpfs" ino=1039 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 879.683730][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 879.686300][ T31] audit: type=1400 audit(879.430:331): avc: denied { read } for pid=9826 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 879.697690][ T31] audit: type=1400 audit(879.450:332): avc: denied { write } for pid=9826 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 880.186017][ T31] audit: type=1400 audit(879.930:333): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 880.198304][ T31] audit: type=1400 audit(879.940:334): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 880.198743][ T31] audit: type=1400 audit(879.940:335): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 880.233711][ T31] audit: type=1400 audit(879.980:336): avc: denied { write } for pid=9826 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 880.381535][ T31] audit: type=1400 audit(880.130:337): avc: denied { create } for pid=9835 comm="syz.0.1559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 880.419309][ T31] audit: type=1400 audit(880.170:338): avc: denied { setopt } for pid=9835 comm="syz.0.1559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 880.423752][ T31] audit: type=1400 audit(880.170:339): avc: denied { connect } for pid=9835 comm="syz.0.1559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 880.690634][ T31] audit: type=1400 audit(880.440:340): avc: denied { create } for pid=9826 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 884.774076][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 884.774511][ T31] audit: type=1400 audit(884.520:378): avc: denied { connect } for pid=9844 comm="syz.0.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 884.776779][ T31] audit: type=1400 audit(884.530:379): avc: denied { connect } for pid=9844 comm="syz.0.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 884.782637][ T31] audit: type=1400 audit(884.530:380): avc: denied { connect } for pid=9844 comm="syz.0.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 884.816219][ T31] audit: type=1400 audit(884.560:381): avc: denied { ioctl } for pid=9844 comm="syz.0.1561" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x4b71 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 884.824529][ T31] audit: type=1400 audit(884.570:382): avc: denied { read } for pid=9844 comm="syz.0.1561" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 884.830559][ T31] audit: type=1400 audit(884.570:383): avc: denied { read open } for pid=9844 comm="syz.0.1561" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 884.861277][ T31] audit: type=1400 audit(884.610:384): avc: denied { read write } for pid=9844 comm="syz.0.1561" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 884.865096][ T31] audit: type=1400 audit(884.610:385): avc: denied { read open } for pid=9844 comm="syz.0.1561" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 884.900879][ T31] audit: type=1400 audit(884.650:386): avc: denied { ioctl } for pid=9844 comm="syz.0.1561" path="socket:[20498]" dev="sockfs" ino=20498 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 884.914740][ T31] audit: type=1400 audit(884.660:387): avc: denied { ioctl } for pid=9844 comm="syz.0.1561" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 890.006975][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 890.007384][ T31] audit: type=1400 audit(889.750:429): avc: denied { ioctl } for pid=9865 comm="syz.0.1567" path="socket:[20538]" dev="sockfs" ino=20538 ioctlcmd=0x661b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 890.141364][ T31] audit: type=1400 audit(889.890:430): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.144935][ T31] audit: type=1400 audit(889.890:431): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.154915][ T31] audit: type=1400 audit(889.900:432): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.290543][ T31] audit: type=1400 audit(890.040:433): avc: denied { create } for pid=9869 comm="syz.1.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 890.313119][ T31] audit: type=1400 audit(890.060:434): avc: denied { ioctl } for pid=9869 comm="syz.1.1568" path="socket:[20549]" dev="sockfs" ino=20549 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 890.323491][ T31] audit: type=1400 audit(890.070:435): avc: denied { bind } for pid=9869 comm="syz.1.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 890.344430][ T31] audit: type=1400 audit(890.090:436): avc: denied { write } for pid=9869 comm="syz.1.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 890.353146][ T31] audit: type=1400 audit(890.100:437): avc: denied { read } for pid=9869 comm="syz.1.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 890.524620][ T31] audit: type=1400 audit(890.270:438): avc: denied { read } for pid=9865 comm="syz.0.1567" dev="nsfs" ino=4026532774 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 895.098747][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 895.099366][ T31] audit: type=1400 audit(894.850:474): avc: denied { write } for pid=9879 comm="syz.0.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 895.580989][ T31] audit: type=1400 audit(895.330:475): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 895.599184][ T31] audit: type=1400 audit(895.330:476): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 895.599855][ T31] audit: type=1400 audit(895.340:477): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 895.603448][ T31] audit: type=1400 audit(895.350:478): avc: denied { create } for pid=9879 comm="syz.0.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 895.624134][ T31] audit: type=1400 audit(895.370:479): avc: denied { connect } for pid=9879 comm="syz.0.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 896.113727][ T31] audit: type=1400 audit(895.860:480): avc: denied { setopt } for pid=9879 comm="syz.0.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 896.628793][ T31] audit: type=1400 audit(896.380:481): avc: denied { write } for pid=9879 comm="syz.0.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 896.952352][ T31] audit: type=1400 audit(896.700:482): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.957590][ T31] audit: type=1400 audit(896.700:483): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.225327][ T9891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9891 comm=syz.1.1573 [ 900.394840][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 900.395347][ T31] audit: type=1400 audit(900.140:581): avc: denied { getopt } for pid=9902 comm="syz.0.1576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 900.905120][ T31] audit: type=1400 audit(900.650:582): avc: denied { read } for pid=9902 comm="syz.0.1576" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 900.911606][ T31] audit: type=1400 audit(900.660:583): avc: denied { read open } for pid=9902 comm="syz.0.1576" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 900.924931][ T31] audit: type=1400 audit(900.670:584): avc: denied { create } for pid=9902 comm="syz.0.1576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 900.939479][ T31] audit: type=1400 audit(900.680:585): avc: denied { write } for pid=9902 comm="syz.0.1576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 900.955124][ T31] audit: type=1400 audit(900.700:586): avc: denied { module_request } for pid=9902 comm="syz.0.1576" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 901.153321][ T31] audit: type=1400 audit(900.900:587): avc: denied { sys_module } for pid=9902 comm="syz.0.1576" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 901.156292][ T31] audit: type=1400 audit(900.900:588): avc: denied { module_request } for pid=9902 comm="syz.0.1576" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 901.371086][ T31] audit: type=1400 audit(901.120:589): avc: denied { write } for pid=9902 comm="syz.0.1576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 901.430501][ T31] audit: type=1400 audit(901.180:590): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 905.737075][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 905.737600][ T31] audit: type=1400 audit(905.480:629): avc: denied { setopt } for pid=9922 comm="syz.0.1581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 906.007958][ T31] audit: type=1400 audit(905.740:630): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 906.010920][ T31] audit: type=1400 audit(905.740:631): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 906.017682][ T31] audit: type=1400 audit(905.740:632): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 906.201856][ T31] audit: type=1400 audit(905.950:633): avc: denied { read } for pid=9928 comm="syz.1.1582" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 906.206330][ T31] audit: type=1400 audit(905.950:634): avc: denied { read open } for pid=9928 comm="syz.1.1582" path="net:[4026532821]" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 906.218014][ T31] audit: type=1400 audit(905.970:635): avc: denied { create } for pid=9928 comm="syz.1.1582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 906.233133][ T31] audit: type=1400 audit(905.980:636): avc: denied { ioctl } for pid=9928 comm="syz.1.1582" path="socket:[19627]" dev="sockfs" ino=19627 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 906.252516][ T31] audit: type=1400 audit(906.000:637): avc: denied { ioctl } for pid=9922 comm="syz.0.1581" path="socket:[20616]" dev="sockfs" ino=20616 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 906.254701][ T31] audit: type=1400 audit(906.000:638): avc: denied { module_request } for pid=9928 comm="syz.1.1582" kmod="netdev-wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 911.090749][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 911.091358][ T31] audit: type=1400 audit(910.840:678): avc: denied { write } for pid=9947 comm="syz.1.1586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 911.148035][ T31] audit: type=1400 audit(910.900:679): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 911.155075][ T31] audit: type=1400 audit(910.900:680): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 911.164381][ T31] audit: type=1400 audit(910.900:681): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 911.358489][ T31] audit: type=1400 audit(911.110:682): avc: denied { prog_load } for pid=9950 comm="syz.0.1587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 911.360814][ T31] audit: type=1400 audit(911.110:683): avc: denied { bpf } for pid=9950 comm="syz.0.1587" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 911.370801][ T31] audit: type=1400 audit(911.120:684): avc: denied { perfmon } for pid=9950 comm="syz.0.1587" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 911.374298][ T31] audit: type=1400 audit(911.120:685): avc: denied { perfmon } for pid=9950 comm="syz.0.1587" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 911.391534][ T31] audit: type=1400 audit(911.140:686): avc: denied { perfmon } for pid=9950 comm="syz.0.1587" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 911.400540][ T31] audit: type=1400 audit(911.150:687): avc: denied { perfmon } for pid=9950 comm="syz.0.1587" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 915.726980][ T9965] FAULT_INJECTION: forcing a failure. [ 915.726980][ T9965] name failslab, interval 1, probability 0, space 0, times 0 [ 915.727472][ T9965] CPU: 1 UID: 0 PID: 9965 Comm: syz.0.1588 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 915.727560][ T9965] Hardware name: ARM-Versatile Express [ 915.727611][ T9965] Call trace: [ 915.727661][ T9965] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 915.727765][ T9965] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4f4 [ 915.727784][ T9965] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 915.727828][ T9965] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 915.728195][ T9965] r5:854d8000 r4:82919a80 [ 915.728290][ T9965] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 915.728341][ T9965] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 915.728406][ T9965] r8:854d8000 r7:00000c40 r6:860861a8 r5:00001000 r4:830016c0 [ 915.728424][ T9965] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 915.728453][ T9965] [<80500f2c>] (__kmalloc_noprof) from [<807baf34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 915.728485][ T9965] r10:854d8000 r9:8309f000 r8:00000000 r7:85015110 r6:860861a8 r5:00001000 [ 915.728497][ T9965] r4:00000000 [ 915.728505][ T9965] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 915.728536][ T9965] r10:854d8000 r9:00000000 r8:00000004 r7:c0186416 r6:00000004 r5:81cd6278 [ 915.728546][ T9965] r4:860861a8 r3:826c0200 [ 915.728554][ T9965] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 915.728583][ T9965] r9:86086180 r8:00000004 r7:00000000 r6:00000000 r5:c0186416 r4:86086180 [ 915.728592][ T9965] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 915.728615][ T9965] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 915.728642][ T9965] r7:00000000 r6:86086181 r5:00000000 r4:c0186416 [ 915.728651][ T9965] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 915.728671][ T9965] Exception stack(0xdfc25fa8 to 0xdfc25ff0) [ 915.728719][ T9965] 5fa0: 00000000 00000000 00000004 c0186416 00000000 00000000 [ 915.728761][ T9965] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76aa30bc [ 915.728786][ T9965] 5fe0: 76aa2ec0 76aa2eb0 000193a4 00131fc0 [ 915.728803][ T9965] r10:00000036 r9:854d8000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 915.728812][ T9965] r4:00000000 [ 915.747062][ T9965] ERROR: Out of memory at tomoyo_realpath_from_path. [ 916.203421][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 916.211336][ T31] audit: type=1400 audit(915.950:719): avc: denied { read } for pid=9961 comm="syz.1.1590" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 916.215103][ T31] audit: type=1400 audit(915.960:720): avc: denied { read open } for pid=9961 comm="syz.1.1590" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 916.223687][ T31] audit: type=1400 audit(915.970:721): avc: denied { create } for pid=9961 comm="syz.1.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 916.240014][ T31] audit: type=1400 audit(915.990:722): avc: denied { write } for pid=9961 comm="syz.1.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 916.247124][ T31] audit: type=1400 audit(915.990:723): avc: denied { ioctl } for pid=9956 comm="syz.0.1588" path="socket:[19660]" dev="sockfs" ino=19660 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 916.255181][ T31] audit: type=1400 audit(916.000:724): avc: denied { module_request } for pid=9961 comm="syz.1.1590" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 916.536701][ T31] audit: type=1400 audit(916.280:725): avc: denied { sys_module } for pid=9961 comm="syz.1.1590" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 916.539331][ T31] audit: type=1400 audit(916.290:726): avc: denied { module_request } for pid=9961 comm="syz.1.1590" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 916.762204][ T31] audit: type=1400 audit(916.510:727): avc: denied { write } for pid=9961 comm="syz.1.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 917.500494][ T31] audit: type=1400 audit(917.240:728): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 919.553417][ T9985] can: request_module (can-proto-4) failed. [ 921.314951][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 921.316605][ T31] audit: type=1400 audit(921.060:790): avc: denied { write } for pid=9988 comm="syz.0.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 922.024461][ T31] audit: type=1400 audit(921.770:791): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.040448][ T31] audit: type=1400 audit(921.790:792): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.051441][ T31] audit: type=1400 audit(921.790:793): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.314003][ T31] audit: type=1400 audit(922.060:794): avc: denied { write } for pid=9994 comm="syz.1.1597" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.324206][ T31] audit: type=1400 audit(922.070:795): avc: denied { write open } for pid=9994 comm="syz.1.1597" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.407445][ T31] audit: type=1400 audit(922.160:796): avc: denied { ioctl } for pid=9994 comm="syz.1.1597" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x480c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.502479][ T31] audit: type=1400 audit(922.250:797): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.510848][ T31] audit: type=1400 audit(922.250:798): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.516511][ T31] audit: type=1400 audit(922.250:799): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 926.502918][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 926.503512][ T31] audit: type=1400 audit(926.250:873): avc: denied { create } for pid=10008 comm="syz.0.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 926.518470][ T31] audit: type=1400 audit(926.270:874): avc: denied { write } for pid=10008 comm="syz.0.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 927.314192][ T31] audit: type=1400 audit(927.060:875): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.324898][ T31] audit: type=1400 audit(927.070:876): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.329699][ T31] audit: type=1400 audit(927.080:877): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.616556][ T31] audit: type=1400 audit(927.350:878): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.617019][ T31] audit: type=1400 audit(927.360:879): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.617145][ T31] audit: type=1400 audit(927.360:880): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.676734][ T31] audit: type=1400 audit(927.430:881): avc: denied { create } for pid=10014 comm="syz.1.1603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 927.717722][ T31] audit: type=1400 audit(927.470:882): avc: denied { setopt } for pid=10014 comm="syz.1.1603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 931.353896][T10045] netlink: 104 bytes leftover after parsing attributes in process `syz.0.1606'. [ 931.508062][ T31] kauditd_printk_skb: 342 callbacks suppressed [ 931.508482][ T31] audit: type=1400 audit(931.260:1225): avc: denied { ioctl } for pid=10040 comm="syz.1.1607" path="/dev/full" dev="devtmpfs" ino=6 ioctlcmd=0x89f9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 931.689930][ T31] audit: type=1400 audit(931.440:1226): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.694150][ T31] audit: type=1400 audit(931.440:1227): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.710276][ T31] audit: type=1400 audit(931.460:1228): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.791690][ T31] audit: type=1400 audit(931.540:1229): avc: denied { create } for pid=10046 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 931.805348][ T31] audit: type=1400 audit(931.550:1230): avc: denied { ioctl } for pid=10046 comm="syz.0.1608" path="socket:[19871]" dev="sockfs" ino=19871 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 931.819583][ T31] audit: type=1400 audit(931.570:1231): avc: denied { bind } for pid=10046 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 931.822002][ T31] audit: type=1400 audit(931.570:1232): avc: denied { write } for pid=10046 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 931.830562][ T31] audit: type=1400 audit(931.580:1233): avc: denied { write } for pid=10046 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 932.004942][ T31] audit: type=1400 audit(931.750:1234): avc: denied { read } for pid=10048 comm="syz.1.1609" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 935.149541][T10066] FAULT_INJECTION: forcing a failure. [ 935.149541][T10066] name failslab, interval 1, probability 0, space 0, times 0 [ 935.149915][T10066] CPU: 0 UID: 0 PID: 10066 Comm: syz.0.1612 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 935.149957][T10066] Hardware name: ARM-Versatile Express [ 935.149977][T10066] Call trace: [ 935.150027][T10066] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 935.150110][T10066] r7:849f0c00 r6:00000000 r5:60000013 r4:8225b4f4 [ 935.150119][T10066] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 935.150144][T10066] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 935.153887][T10066] r5:849f0c00 r4:82919a80 [ 935.153989][T10066] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 935.154329][T10066] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 935.154461][T10066] r8:00000000 r7:849f0c00 r6:00000cc0 r5:8309d800 r4:830a8c00 [ 935.154624][T10066] [<8051c1b8>] (should_failslab) from [<80500910>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 935.154735][T10066] [<805008c0>] (kmem_cache_alloc_lru_noprof) from [<80574b40>] (alloc_inode+0x68/0xcc) [ 935.154887][T10066] r10:8309d800 r9:81c20e40 r8:84f58d60 r7:830af250 r6:81c20d88 r5:8309d800 [ 935.154898][T10066] r4:84f58d60 [ 935.154907][T10066] [<80574ad8>] (alloc_inode) from [<8058b584>] (path_from_stashed+0xdc/0x308) [ 935.154967][T10066] r7:830af250 r6:dff79e84 r5:81c20e40 r4:84f58d60 [ 935.155076][T10066] [<8058b4a8>] (path_from_stashed) from [<8059dfdc>] (open_namespace+0x44/0xbc) [ 935.155172][T10066] r10:849f0c00 r9:84efd300 r8:00000003 r7:85056a00 r6:849f0c00 r5:00000000 [ 935.155281][T10066] r4:0000894c [ 935.155547][T10066] [<8059df98>] (open_namespace) from [<8059e070>] (open_related_ns+0x1c/0x20) [ 935.155795][T10066] r6:84f58d00 r5:00000000 r4:0000894c [ 935.155962][T10066] [<8059e054>] (open_related_ns) from [<8152bad0>] (sock_ioctl+0x37c/0x600) [ 935.156094][T10066] [<8152b754>] (sock_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 935.156199][T10066] r9:84efd300 r8:00000003 r7:00000000 r6:84efd301 r5:00000000 r4:0000894c [ 935.156366][T10066] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 935.156546][T10066] Exception stack(0xdff79fa8 to 0xdff79ff0) [ 935.156675][T10066] 9fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 935.156796][T10066] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b060bc [ 935.156930][T10066] 9fe0: 76b05ec0 76b05eb0 000193a4 00131fc0 [ 935.157041][T10066] r10:00000036 r9:849f0c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 935.157162][T10066] r4:00000000 [ 936.814940][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 936.815315][ T31] audit: type=1400 audit(936.560:1302): avc: denied { write } for pid=10069 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 936.921267][ T31] audit: type=1400 audit(936.670:1303): avc: denied { write } for pid=10074 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 937.333604][ T31] audit: type=1400 audit(937.080:1304): avc: denied { create } for pid=10069 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 937.357972][ T31] audit: type=1400 audit(937.110:1305): avc: denied { write } for pid=10069 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 937.363252][ T31] audit: type=1400 audit(937.110:1306): avc: denied { write } for pid=10069 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 937.398564][ T31] audit: type=1400 audit(937.150:1307): avc: denied { write } for pid=10074 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 937.877243][ T31] audit: type=1400 audit(937.620:1308): avc: denied { getopt } for pid=10069 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 937.910444][ T31] audit: type=1400 audit(937.660:1309): avc: denied { write } for pid=10074 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 938.389910][ T31] audit: type=1400 audit(938.140:1310): avc: denied { read } for pid=10069 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 938.404276][ T31] audit: type=1400 audit(938.150:1311): avc: denied { write } for pid=10074 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 942.009339][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 942.009727][ T31] audit: type=1400 audit(941.760:1371): avc: denied { read } for pid=10093 comm="syz.1.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 942.016123][ T31] audit: type=1400 audit(941.760:1372): avc: denied { write } for pid=10093 comm="syz.1.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 942.538849][ T31] audit: type=1400 audit(942.290:1373): avc: denied { write } for pid=10093 comm="syz.1.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 943.020032][ T31] audit: type=1400 audit(942.770:1374): avc: denied { write } for pid=10093 comm="syz.1.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 943.300522][ T31] audit: type=1400 audit(943.050:1375): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 943.304532][ T31] audit: type=1400 audit(943.050:1376): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 943.318133][ T31] audit: type=1400 audit(943.070:1377): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 943.511922][ T31] audit: type=1400 audit(943.260:1378): avc: denied { create } for pid=10100 comm="syz.0.1622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 943.527410][ T31] audit: type=1400 audit(943.280:1379): avc: denied { ioctl } for pid=10100 comm="syz.0.1622" path="socket:[20941]" dev="sockfs" ino=20941 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 943.534767][ T31] audit: type=1400 audit(943.280:1380): avc: denied { bind } for pid=10100 comm="syz.0.1622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 947.100087][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 947.100454][ T31] audit: type=1400 audit(946.850:1407): avc: denied { ioctl } for pid=10106 comm="syz.0.1625" path="socket:[19970]" dev="sockfs" ino=19970 ioctlcmd=0x5345 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 947.171902][ T31] audit: type=1400 audit(946.920:1408): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 947.174306][ T31] audit: type=1400 audit(946.920:1409): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 947.177671][ T31] audit: type=1400 audit(946.930:1410): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 947.404427][ T31] audit: type=1400 audit(947.150:1411): avc: denied { create } for pid=10115 comm="syz.1.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 947.408288][ T31] audit: type=1400 audit(947.160:1412): avc: denied { write } for pid=10115 comm="syz.1.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 947.411752][ T31] audit: type=1400 audit(947.160:1413): avc: denied { module_request } for pid=10115 comm="syz.1.1626" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 947.623207][ T31] audit: type=1400 audit(947.370:1414): avc: denied { read } for pid=10115 comm="syz.1.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 947.664704][ T31] audit: type=1400 audit(947.410:1415): avc: denied { read write } for pid=10115 comm="syz.1.1626" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 947.670028][ T31] audit: type=1400 audit(947.420:1416): avc: denied { read write open } for pid=10115 comm="syz.1.1626" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.222902][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 952.223177][ T31] audit: type=1400 audit(951.970:1547): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.225953][ T31] audit: type=1400 audit(951.970:1548): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.242406][ T31] audit: type=1400 audit(951.990:1549): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.250330][ T31] audit: type=1400 audit(952.000:1550): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.263073][ T31] audit: type=1400 audit(952.010:1551): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.264992][ T31] audit: type=1400 audit(952.010:1552): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 952.402115][ T31] audit: type=1400 audit(952.150:1553): avc: denied { read write } for pid=10152 comm="syz.0.1640" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 952.406074][ T31] audit: type=1400 audit(952.150:1554): avc: denied { read write open } for pid=10152 comm="syz.0.1640" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 952.430920][ T31] audit: type=1400 audit(952.180:1555): avc: denied { mounton } for pid=10152 comm="syz.0.1640" path="/191/file0" dev="tmpfs" ino=1019 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 952.448212][ T31] audit: type=1400 audit(952.200:1556): avc: denied { create } for pid=10153 comm="syz.1.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 952.854169][T10161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=10161 comm=syz.0.1642 [ 952.901655][T10161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10161 comm=syz.0.1642 [ 956.331346][T10184] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10184 comm=syz.1.1652 [ 957.422044][ T31] kauditd_printk_skb: 143 callbacks suppressed [ 957.422550][ T31] audit: type=1400 audit(957.170:1696): avc: denied { write } for pid=10191 comm="syz.0.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 957.443221][ T31] audit: type=1400 audit(957.190:1697): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 957.462109][ T31] audit: type=1400 audit(957.210:1698): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 957.477474][ T31] audit: type=1400 audit(957.230:1699): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 957.658620][ T31] audit: type=1400 audit(957.410:1700): avc: denied { create } for pid=10197 comm="syz.1.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 957.674142][ T31] audit: type=1400 audit(957.420:1701): avc: denied { create } for pid=10197 comm="syz.1.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 957.695017][ T31] audit: type=1400 audit(957.440:1702): avc: denied { write } for pid=10197 comm="syz.1.1658" path="socket:[20155]" dev="sockfs" ino=20155 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 957.708643][ T31] audit: type=1400 audit(957.460:1703): avc: denied { write } for pid=10197 comm="syz.1.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 957.730214][ T31] audit: type=1400 audit(957.480:1704): avc: denied { module_request } for pid=10197 comm="syz.1.1658" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 957.908318][ T31] audit: type=1400 audit(957.660:1705): avc: denied { write } for pid=10191 comm="syz.0.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 959.643417][T10205] block nbd1: NBD_DISCONNECT [ 962.530105][ T31] kauditd_printk_skb: 112 callbacks suppressed [ 962.530536][ T31] audit: type=1400 audit(962.280:1818): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 962.546604][ T31] audit: type=1400 audit(962.290:1819): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 962.547054][ T31] audit: type=1400 audit(962.290:1820): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 962.758068][ T31] audit: type=1400 audit(962.510:1821): avc: denied { create } for pid=10230 comm="syz.1.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 962.773961][ T31] audit: type=1400 audit(962.520:1822): avc: denied { ioctl } for pid=10230 comm="syz.1.1667" path="socket:[21154]" dev="sockfs" ino=21154 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 962.789506][ T31] audit: type=1400 audit(962.540:1823): avc: denied { bind } for pid=10230 comm="syz.1.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 962.803759][ T31] audit: type=1400 audit(962.550:1824): avc: denied { write } for pid=10230 comm="syz.1.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 962.822145][ T31] audit: type=1400 audit(962.570:1825): avc: denied { write } for pid=10230 comm="syz.1.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.330068][ T31] audit: type=1400 audit(963.080:1826): avc: denied { write } for pid=10230 comm="syz.1.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.811264][ T31] audit: type=1400 audit(963.560:1827): avc: denied { read } for pid=10230 comm="syz.1.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 964.387344][T10235] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=617 sclass=netlink_route_socket pid=10235 comm=syz.0.1668 [ 965.930868][T10238] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15668 sclass=netlink_route_socket pid=10238 comm=syz.0.1668 [ 967.602829][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 967.603297][ T31] audit: type=1400 audit(967.350:1858): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 967.609041][ T31] audit: type=1400 audit(967.350:1859): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 967.612932][ T31] audit: type=1400 audit(967.360:1860): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 967.837583][ T31] audit: type=1400 audit(967.590:1861): avc: denied { create } for pid=10246 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 967.841591][ T31] audit: type=1400 audit(967.590:1862): avc: denied { write } for pid=10246 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 967.856661][ T31] audit: type=1400 audit(967.610:1863): avc: denied { module_request } for pid=10246 comm="syz.0.1671" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 968.062165][ T31] audit: type=1400 audit(967.810:1864): avc: denied { read } for pid=10246 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.097166][ T31] audit: type=1400 audit(967.850:1865): avc: denied { create } for pid=10246 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.100033][ T31] audit: type=1400 audit(967.850:1866): avc: denied { write } for pid=10246 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.106123][ T31] audit: type=1400 audit(967.850:1867): avc: denied { read } for pid=10246 comm="syz.0.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 972.668363][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 972.676302][ T31] audit: type=1400 audit(972.420:1933): avc: denied { create } for pid=10266 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 972.683017][ T31] audit: type=1400 audit(972.430:1934): avc: denied { write } for pid=10266 comm="syz.1.1678" path="socket:[21205]" dev="sockfs" ino=21205 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 972.699483][ T31] audit: type=1400 audit(972.450:1935): avc: denied { write } for pid=10266 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 972.742327][ T31] audit: type=1400 audit(972.490:1936): avc: denied { create } for pid=10266 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 972.756286][ T31] audit: type=1400 audit(972.500:1937): avc: denied { create } for pid=10266 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 972.784378][ T31] audit: type=1400 audit(972.530:1938): avc: denied { write } for pid=10266 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 972.793752][ T31] audit: type=1400 audit(972.540:1939): avc: denied { create } for pid=10266 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 972.897042][ T31] audit: type=1400 audit(972.640:1940): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 972.914629][ T31] audit: type=1400 audit(972.660:1941): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 972.917857][ T31] audit: type=1400 audit(972.660:1942): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 973.563599][T10273] FAULT_INJECTION: forcing a failure. [ 973.563599][T10273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 973.565163][T10273] CPU: 0 UID: 0 PID: 10273 Comm: syz.0.1677 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 973.565257][T10273] Hardware name: ARM-Versatile Express [ 973.565278][T10273] Call trace: [ 973.565310][T10273] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 973.565457][T10273] r7:eacb9e20 r6:00000000 r5:60000013 r4:8225b4f4 [ 973.565513][T10273] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 973.565554][T10273] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 973.565595][T10273] r5:83a63c00 r4:82950610 [ 973.565608][T10273] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 973.565656][T10273] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 973.565705][T10273] r8:000000c1 r7:eacb9e20 r6:20001200 r5:00000000 r4:eacb9f20 [ 973.565718][T10273] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 973.565878][T10273] [<80964e18>] (should_fail_usercopy) from [<8152d230>] (copy_msghdr_from_user+0x50/0x130) [ 973.565943][T10273] [<8152d1e0>] (copy_msghdr_from_user) from [<8152d388>] (___sys_sendmsg+0x78/0xd0) [ 973.565994][T10273] r8:000000c1 r7:00000000 r6:85056f00 r5:eacb9f20 r4:eacb9e64 [ 973.566010][T10273] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 973.566070][T10273] r10:00000128 r9:83a63c00 r8:84efd480 r7:000000c1 r6:20001200 r5:84efd481 [ 973.566090][T10273] r4:00000004 [ 973.566105][T10273] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 973.566159][T10273] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 973.566178][T10273] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 973.566244][T10273] Exception stack(0xeacb9fa8 to 0xeacb9ff0) [ 973.566280][T10273] 9fa0: 00000000 00000000 00000004 20001200 000000c1 00000000 [ 973.566312][T10273] 9fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76aa30bc [ 973.566334][T10273] 9fe0: 76aa2ec0 76aa2eb0 000193a4 00131fc0 [ 976.926169][T10300] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10300 comm=syz.1.1687 [ 977.733729][ T31] kauditd_printk_skb: 234 callbacks suppressed [ 977.734114][ T31] audit: type=1400 audit(977.480:2177): avc: denied { read } for pid=10303 comm="syz.0.1689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 977.791198][ T31] audit: type=1400 audit(977.540:2178): avc: denied { read } for pid=10306 comm="syz.1.1690" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 977.794894][ T31] audit: type=1400 audit(977.540:2179): avc: denied { read open } for pid=10306 comm="syz.1.1690" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 977.804527][ T31] audit: type=1400 audit(977.550:2180): avc: denied { read write } for pid=10303 comm="syz.0.1689" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 977.812477][ T31] audit: type=1400 audit(977.560:2181): avc: denied { read write open } for pid=10303 comm="syz.0.1689" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 977.823052][ T31] audit: type=1400 audit(977.570:2182): avc: denied { setattr } for pid=10303 comm="syz.0.1689" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 977.828401][ T31] audit: type=1400 audit(977.570:2183): avc: denied { create } for pid=10306 comm="syz.1.1690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 977.846617][ T31] audit: type=1400 audit(977.590:2184): avc: denied { read } for pid=10303 comm="syz.0.1689" dev="nsfs" ino=4026532774 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 977.852878][ T31] audit: type=1400 audit(977.590:2185): avc: denied { read open } for pid=10303 comm="syz.0.1689" path="net:[4026532774]" dev="nsfs" ino=4026532774 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 977.868788][ T31] audit: type=1400 audit(977.600:2186): avc: denied { read write } for pid=10306 comm="syz.1.1690" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 979.772966][T10321] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=359 sclass=netlink_tcpdiag_socket pid=10321 comm=syz.0.1695 [ 982.899473][ T31] kauditd_printk_skb: 140 callbacks suppressed [ 982.899869][ T31] audit: type=1400 audit(982.650:2327): avc: denied { create } for pid=10358 comm="syz.1.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 982.920411][ T31] audit: type=1400 audit(982.650:2328): avc: denied { bpf } for pid=10358 comm="syz.1.1711" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 982.920833][ T31] audit: type=1400 audit(982.660:2329): avc: denied { map_create } for pid=10358 comm="syz.1.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 982.921167][ T31] audit: type=1400 audit(982.670:2330): avc: denied { bpf } for pid=10358 comm="syz.1.1711" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 982.942575][ T31] audit: type=1400 audit(982.690:2331): avc: denied { create } for pid=10358 comm="syz.1.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 982.956544][ T31] audit: type=1400 audit(982.700:2332): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 982.960616][ T31] audit: type=1400 audit(982.710:2333): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 982.962777][ T31] audit: type=1400 audit(982.710:2334): avc: denied { write } for pid=10358 comm="syz.1.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 982.968326][ T31] audit: type=1400 audit(982.720:2335): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 983.069001][ T31] audit: type=1400 audit(982.820:2336): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 983.258361][T10362] FAULT_INJECTION: forcing a failure. [ 983.258361][T10362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 983.266535][T10362] CPU: 0 UID: 0 PID: 10362 Comm: syz.0.1712 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 983.266653][T10362] Hardware name: ARM-Versatile Express [ 983.266682][T10362] Call trace: [ 983.266717][T10362] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 983.266805][T10362] r7:20001180 r6:00000000 r5:60000013 r4:8225b4f4 [ 983.266822][T10362] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 983.266864][T10362] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 983.266911][T10362] r5:849f5400 r4:82950610 [ 983.266924][T10362] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 983.266974][T10362] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 983.267030][T10362] r8:20001180 r7:20001180 r6:00001000 r5:85b06ec0 r4:00000002 [ 983.267044][T10362] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 983.267090][T10362] [<80964e18>] (should_fail_usercopy) from [<8049a884>] (vmemdup_user+0x40/0x16c) [ 983.267137][T10362] [<8049a844>] (vmemdup_user) from [<80586f90>] (setxattr_copy+0x58/0x90) [ 983.267193][T10362] r9:849f5400 r8:20001180 r7:00000005 r6:00001000 r5:00000000 r4:eb361e48 [ 983.267209][T10362] [<80586f38>] (setxattr_copy) from [<8058719c>] (path_setxattrat+0x7c/0x17c) [ 983.267255][T10362] r5:00000000 r4:20001140 [ 983.267269][T10362] [<80587120>] (path_setxattrat) from [<8058749c>] (sys_fsetxattr+0x30/0x38) [ 983.267320][T10362] r8:8020029c r7:000000e4 r6:0012ff70 r5:00000000 r4:00000001 [ 983.267335][T10362] [<8058746c>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 983.267374][T10362] Exception stack(0xeb361fa8 to 0xeb361ff0) [ 983.267407][T10362] 1fa0: 00000001 00000000 00000005 20001140 20001180 00000002 [ 983.267437][T10362] 1fc0: 00000001 00000000 0012ff70 000000e4 002e0000 00000000 00006364 76b060bc [ 983.267461][T10362] 1fe0: 76b05ec0 76b05eb0 000193a4 00131fc0 [ 987.958783][ T31] kauditd_printk_skb: 88 callbacks suppressed [ 987.959226][ T31] audit: type=1400 audit(987.710:2425): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.961492][ T31] audit: type=1400 audit(987.710:2426): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.963869][ T31] audit: type=1400 audit(987.710:2427): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 988.017846][ T31] audit: type=1400 audit(987.770:2428): avc: denied { create } for pid=10388 comm="syz.1.1723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 988.024030][ T31] audit: type=1400 audit(987.770:2429): avc: denied { write } for pid=10388 comm="syz.1.1723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 988.030397][ T31] audit: type=1400 audit(987.780:2430): avc: denied { module_request } for pid=10388 comm="syz.1.1723" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 988.288410][ T31] audit: type=1400 audit(988.030:2431): avc: denied { create } for pid=10391 comm="syz.0.1724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 988.291133][ T31] audit: type=1400 audit(988.040:2432): avc: denied { read } for pid=10388 comm="syz.1.1723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 988.303474][ T31] audit: type=1400 audit(988.050:2433): avc: denied { setopt } for pid=10391 comm="syz.0.1724" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 988.330574][ T31] audit: type=1400 audit(988.080:2434): avc: denied { create } for pid=10391 comm="syz.0.1724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 990.807620][T10417] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10417 comm=syz.1.1732 [ 993.254468][ T31] kauditd_printk_skb: 169 callbacks suppressed [ 993.254930][ T31] audit: type=1400 audit(993.000:2604): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.283259][ T31] audit: type=1400 audit(993.030:2605): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.296576][ T31] audit: type=1400 audit(993.030:2606): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.397844][ T31] audit: type=1400 audit(993.150:2607): avc: denied { create } for pid=10432 comm="syz.1.1735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 993.413238][ T31] audit: type=1400 audit(993.160:2608): avc: denied { setopt } for pid=10432 comm="syz.1.1735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 993.421665][ T31] audit: type=1400 audit(993.170:2609): avc: denied { connect } for pid=10432 comm="syz.1.1735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 993.441151][ T31] audit: type=1400 audit(993.190:2610): avc: denied { ioctl } for pid=10432 comm="syz.1.1735" path="socket:[22529]" dev="sockfs" ino=22529 ioctlcmd=0x127c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 993.623357][ T31] audit: type=1400 audit(993.370:2611): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.625365][ T31] audit: type=1400 audit(993.370:2612): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.661251][ T31] audit: type=1400 audit(993.410:2613): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.354070][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 998.355508][ T31] audit: type=1400 audit(998.100:2719): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.369300][ T31] audit: type=1400 audit(998.120:2720): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.374524][ T31] audit: type=1400 audit(998.120:2721): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.522982][ T31] audit: type=1400 audit(998.270:2722): avc: denied { create } for pid=10464 comm="syz.1.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 998.581938][ T31] audit: type=1400 audit(998.330:2723): avc: denied { setopt } for pid=10464 comm="syz.1.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 998.586323][ T31] audit: type=1400 audit(998.330:2724): avc: denied { connect } for pid=10464 comm="syz.1.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 998.591187][ T31] audit: type=1400 audit(998.340:2725): avc: denied { read } for pid=10464 comm="syz.1.1745" name="dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.593026][ T31] audit: type=1400 audit(998.340:2726): avc: denied { read open } for pid=10464 comm="syz.1.1745" path="/dev/dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.642314][ T31] audit: type=1400 audit(998.390:2727): avc: denied { ioctl } for pid=10464 comm="syz.1.1745" path="/dev/dsp" dev="devtmpfs" ino=725 ioctlcmd=0x5010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.669098][ T31] audit: type=1400 audit(998.420:2728): avc: denied { create } for pid=10464 comm="syz.1.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 999.874552][T10472] fuse: Bad value for 'fd' [ 1003.099213][T10488] fuse: Bad value for 'fd' [ 1003.530023][ T31] kauditd_printk_skb: 117 callbacks suppressed [ 1003.533111][ T31] audit: type=1400 audit(1003.280:2846): avc: denied { create } for pid=10489 comm="syz.0.1754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1004.084271][ T31] audit: type=1400 audit(1003.830:2847): avc: denied { module_request } for pid=10489 comm="syz.0.1754" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1004.341649][ T31] audit: type=1400 audit(1004.090:2848): avc: denied { sys_module } for pid=10489 comm="syz.0.1754" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1004.347607][ T31] audit: type=1400 audit(1004.100:2849): avc: denied { module_request } for pid=10489 comm="syz.0.1754" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1004.450003][ T31] audit: type=1400 audit(1004.200:2850): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1004.452359][ T31] audit: type=1400 audit(1004.200:2851): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1004.457513][ T31] audit: type=1400 audit(1004.210:2852): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1004.609164][ T31] audit: type=1400 audit(1004.360:2853): avc: denied { setopt } for pid=10489 comm="syz.0.1754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1004.613175][ T31] audit: type=1400 audit(1004.360:2854): avc: denied { connect } for pid=10489 comm="syz.0.1754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1004.738057][ T31] audit: type=1400 audit(1004.480:2855): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1008.657009][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 1008.657334][ T31] audit: type=1400 audit(1008.390:2885): avc: denied { read write } for pid=10508 comm="syz.1.1758" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1008.668997][ T31] audit: type=1400 audit(1008.420:2886): avc: denied { read write open } for pid=10508 comm="syz.1.1758" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1008.684057][ T31] audit: type=1400 audit(1008.430:2887): avc: denied { remount } for pid=10508 comm="syz.1.1758" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1008.822273][ T31] audit: type=1400 audit(1008.540:2888): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1008.822687][ T31] audit: type=1400 audit(1008.540:2889): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1008.822767][ T31] audit: type=1400 audit(1008.550:2890): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1008.822853][ T31] audit: type=1400 audit(1008.550:2891): avc: denied { create } for pid=10510 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1008.822927][ T31] audit: type=1400 audit(1008.550:2892): avc: denied { write } for pid=10510 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1008.822995][ T31] audit: type=1400 audit(1008.550:2893): avc: denied { module_request } for pid=10510 comm="syz.0.1759" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1009.179194][ T31] audit: type=1400 audit(1008.930:2894): avc: denied { read } for pid=10510 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1009.574566][T10514] FAULT_INJECTION: forcing a failure. [ 1009.574566][T10514] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.586160][T10514] CPU: 0 UID: 0 PID: 10514 Comm: syz.1.1761 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1009.586310][T10514] Hardware name: ARM-Versatile Express [ 1009.586340][T10514] Call trace: [ 1009.586379][T10514] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1009.586485][T10514] r7:00000c40 r6:00000000 r5:60000113 r4:8225b4f4 [ 1009.586504][T10514] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1009.586550][T10514] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1009.586598][T10514] r5:83948c00 r4:82919a80 [ 1009.586614][T10514] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 1009.586688][T10514] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 1009.586751][T10514] r8:83948c00 r7:00000c40 r6:8602a928 r5:00001000 r4:830016c0 [ 1009.586772][T10514] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 1009.586814][T10514] [<80500f2c>] (__kmalloc_noprof) from [<807baf34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1009.586869][T10514] r10:83948c00 r9:8309f000 r8:00000000 r7:836b8b28 r6:8602a928 r5:00001000 [ 1009.586888][T10514] r4:00000000 [ 1009.586903][T10514] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1009.586963][T10514] r10:83948c00 r9:00000000 r8:00000004 r7:8004500f r6:00000004 r5:81cd6278 [ 1009.586984][T10514] r4:8602a928 r3:826c0200 [ 1009.586998][T10514] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 1009.587055][T10514] r9:8602a900 r8:00000004 r7:00000000 r6:00000000 r5:8004500f r4:8602a900 [ 1009.587071][T10514] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 1009.587114][T10514] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 1009.587168][T10514] r7:00000000 r6:8602a901 r5:00000000 r4:8004500f [ 1009.587184][T10514] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1009.587222][T10514] Exception stack(0xebbedfa8 to 0xebbedff0) [ 1009.587253][T10514] dfa0: 00000000 00000000 00000004 8004500f 00000000 00000000 [ 1009.587285][T10514] dfc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b8a0bc [ 1009.587309][T10514] dfe0: 76b89ec0 76b89eb0 000193a4 00131fc0 [ 1009.587340][T10514] r10:00000036 r9:83948c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1009.587358][T10514] r4:00000000 [ 1009.602386][T10514] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1014.035311][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 1014.036181][ T31] audit: type=1400 audit(1013.780:2982): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1014.063874][ T31] audit: type=1400 audit(1013.810:2983): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1014.081563][ T31] audit: type=1400 audit(1013.830:2984): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1014.282891][ T31] audit: type=1400 audit(1014.030:2985): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1014.309308][ T31] audit: type=1400 audit(1014.060:2986): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1014.312675][ T31] audit: type=1400 audit(1014.060:2987): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1014.647777][ T31] audit: type=1400 audit(1014.400:2988): avc: denied { create } for pid=10540 comm="syz.1.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1014.691286][ T31] audit: type=1400 audit(1014.440:2989): avc: denied { read write } for pid=10540 comm="syz.1.1768" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1014.694868][ T31] audit: type=1400 audit(1014.440:2990): avc: denied { read write open } for pid=10540 comm="syz.1.1768" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1014.716178][ T31] audit: type=1400 audit(1014.460:2991): avc: denied { create } for pid=10540 comm="syz.1.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1019.171532][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 1019.171949][ T31] audit: type=1400 audit(1018.920:3061): avc: denied { read } for pid=10569 comm="syz.1.1777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1019.288742][ T31] audit: type=1400 audit(1019.040:3062): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1019.294773][ T31] audit: type=1400 audit(1019.040:3063): avc: denied { read write } for pid=10569 comm="syz.1.1777" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1019.304397][ T31] audit: type=1400 audit(1019.050:3064): avc: denied { read write open } for pid=10569 comm="syz.1.1777" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1019.310700][ T31] audit: type=1400 audit(1019.060:3065): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1019.319601][ T31] audit: type=1400 audit(1019.070:3066): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1019.332193][ T31] audit: type=1400 audit(1019.080:3067): avc: denied { setattr } for pid=10569 comm="syz.1.1777" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1019.350105][ T31] audit: type=1400 audit(1019.100:3068): avc: denied { read } for pid=10569 comm="syz.1.1777" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1019.354074][ T31] audit: type=1400 audit(1019.100:3069): avc: denied { read open } for pid=10569 comm="syz.1.1777" path="net:[4026532821]" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1019.369883][ T31] audit: type=1400 audit(1019.120:3070): avc: denied { create } for pid=10569 comm="syz.1.1777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1023.904388][T10598] FAULT_INJECTION: forcing a failure. [ 1023.904388][T10598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1023.904944][T10598] CPU: 1 UID: 0 PID: 10598 Comm: syz.0.1784 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1023.905017][T10598] Hardware name: ARM-Versatile Express [ 1023.905044][T10598] Call trace: [ 1023.905091][T10598] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1023.905204][T10598] r7:84f58d00 r6:00000000 r5:60000013 r4:8225b4f4 [ 1023.905226][T10598] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1023.905500][T10598] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1023.906079][T10598] r5:83240000 r4:82950610 [ 1023.906513][T10598] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 1023.906872][T10598] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 1023.907388][T10598] r8:00000004 r7:84f58d00 r6:200000c0 r5:200000c0 r4:82c1c5d0 [ 1023.907464][T10598] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 1023.907601][T10598] [<80964e18>] (should_fail_usercopy) from [<818fdea4>] (vlan_ioctl_handler+0x3c/0x4a0) [ 1023.907695][T10598] [<818fde68>] (vlan_ioctl_handler) from [<8152b94c>] (sock_ioctl+0x1f8/0x600) [ 1023.907905][T10598] r9:84dafc00 r8:00000004 r7:850e3900 r6:84f58d00 r5:200000c0 r4:82c1c5d0 [ 1023.908174][T10598] [<8152b754>] (sock_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 1023.908245][T10598] r9:84dafc00 r8:00000004 r7:200000c0 r6:84dafc01 r5:00000000 r4:00008982 [ 1023.908272][T10598] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1023.908318][T10598] Exception stack(0xec9c9fa8 to 0xec9c9ff0) [ 1023.908356][T10598] 9fa0: 00000000 00000000 00000004 00008982 200000c0 00000000 [ 1023.908386][T10598] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76ae50bc [ 1023.908409][T10598] 9fe0: 76ae4ec0 76ae4eb0 000193a4 00131fc0 [ 1023.908442][T10598] r10:00000036 r9:83240000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1023.908462][T10598] r4:00000000 [ 1024.209064][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 1024.209490][ T31] audit: type=1400 audit(1023.960:3129): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1024.222808][ T31] audit: type=1400 audit(1023.970:3130): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1024.225337][ T31] audit: type=1400 audit(1023.970:3131): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1024.482821][ T31] audit: type=1400 audit(1024.230:3132): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1024.506717][ T31] audit: type=1400 audit(1024.240:3133): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1024.509513][ T31] audit: type=1400 audit(1024.260:3134): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1024.778157][ T31] audit: type=1400 audit(1024.530:3135): avc: denied { create } for pid=10601 comm="syz.1.1786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1024.814836][ T31] audit: type=1400 audit(1024.560:3136): avc: denied { create } for pid=10601 comm="syz.1.1786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1024.844718][ T31] audit: type=1400 audit(1024.590:3137): avc: denied { ioctl } for pid=10601 comm="syz.1.1786" path="socket:[22748]" dev="sockfs" ino=22748 ioctlcmd=0x54a5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1026.035292][ T31] audit: type=1400 audit(1025.780:3138): avc: denied { create } for pid=10604 comm="syz.0.1787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1029.388841][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 1029.389136][ T31] audit: type=1400 audit(1029.140:3193): avc: denied { write } for pid=10616 comm="syz.1.1790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1030.037124][ T31] audit: type=1400 audit(1029.790:3194): avc: denied { create } for pid=10622 comm="syz.0.1792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1030.046810][ T31] audit: type=1400 audit(1029.790:3195): avc: denied { write } for pid=10622 comm="syz.0.1792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1030.074145][ T31] audit: type=1400 audit(1029.820:3196): avc: denied { write } for pid=10622 comm="syz.0.1792" path="socket:[22782]" dev="sockfs" ino=22782 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1030.089146][ T31] audit: type=1400 audit(1029.840:3197): avc: denied { write } for pid=10622 comm="syz.0.1792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1030.218622][ T31] audit: type=1400 audit(1029.970:3198): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1030.227227][ T31] audit: type=1400 audit(1029.970:3199): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1030.227696][ T31] audit: type=1400 audit(1029.970:3200): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1030.660869][ T31] audit: type=1400 audit(1030.410:3201): avc: denied { create } for pid=10629 comm="syz.0.1793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1030.686417][ T31] audit: type=1400 audit(1030.430:3202): avc: denied { ioctl } for pid=10629 comm="syz.0.1793" path="socket:[22021]" dev="sockfs" ino=22021 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1031.068860][T10632] FAULT_INJECTION: forcing a failure. [ 1031.068860][T10632] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.070575][T10632] CPU: 0 UID: 0 PID: 10632 Comm: syz.0.1794 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1031.070691][T10632] Hardware name: ARM-Versatile Express [ 1031.070722][T10632] Call trace: [ 1031.070761][T10632] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1031.070872][T10632] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4f4 [ 1031.070901][T10632] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1031.070954][T10632] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1031.071007][T10632] r5:84c2e000 r4:82919a80 [ 1031.071025][T10632] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 1031.071086][T10632] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 1031.071152][T10632] r8:84c2e000 r7:00000d40 r6:8602a568 r5:00000019 r4:83001240 [ 1031.071170][T10632] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 1031.071214][T10632] [<80500f2c>] (__kmalloc_noprof) from [<807bae3c>] (tomoyo_encode2+0x64/0xf0) [ 1031.071273][T10632] r10:00000fff r9:8309f000 r8:00000000 r7:836b8198 r6:8602a568 r5:83f35ffd [ 1031.071297][T10632] r4:83f35fef [ 1031.071314][T10632] [<807badd8>] (tomoyo_encode2) from [<807baeec>] (tomoyo_encode+0x24/0x30) [ 1031.071370][T10632] r9:8309f000 r8:00000000 r7:836b8198 r6:8602a568 r5:00001000 r4:83f35ff0 [ 1031.071389][T10632] [<807baec8>] (tomoyo_encode) from [<807baf78>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1031.071440][T10632] r5:00001000 r4:83f35000 [ 1031.071457][T10632] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1031.071522][T10632] r10:84c2e000 r9:00000000 r8:00000004 r7:0000894c r6:00000004 r5:81cd6278 [ 1031.071546][T10632] r4:8602a568 r3:826c0200 [ 1031.071564][T10632] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 1031.071627][T10632] r9:8602a540 r8:00000004 r7:00000000 r6:00000000 r5:0000894c r4:8602a540 [ 1031.071652][T10632] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 1031.071701][T10632] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 1031.071755][T10632] r7:00000000 r6:8602a541 r5:00000000 r4:0000894c [ 1031.071772][T10632] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1031.071814][T10632] Exception stack(0xeca29fa8 to 0xeca29ff0) [ 1031.071852][T10632] 9fa0: 00000000 00000000 00000004 0000894c 00000000 00000000 [ 1031.071901][T10632] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b060bc [ 1031.071932][T10632] 9fe0: 76b05ec0 76b05eb0 000193a4 00131fc0 [ 1031.071966][T10632] r10:00000036 r9:84c2e000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1031.071986][T10632] r4:00000000 [ 1031.092856][T10632] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1031.589204][T10636] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1796'. [ 1034.711117][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 1034.711604][ T31] audit: type=1400 audit(1034.460:3286): avc: denied { map_create } for pid=10653 comm="syz.1.1805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1034.736250][ T31] audit: type=1400 audit(1034.480:3287): avc: denied { perfmon } for pid=10653 comm="syz.1.1805" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1034.736471][ T31] audit: type=1400 audit(1034.480:3288): avc: denied { map_read map_write } for pid=10653 comm="syz.1.1805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1034.736661][ T31] audit: type=1400 audit(1034.480:3289): avc: denied { prog_load } for pid=10653 comm="syz.1.1805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1034.760363][ T31] audit: type=1400 audit(1034.510:3290): avc: denied { bpf } for pid=10653 comm="syz.1.1805" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1034.839584][ T31] audit: type=1400 audit(1034.590:3291): avc: denied { prog_load } for pid=10653 comm="syz.1.1805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1034.858514][ T31] audit: type=1400 audit(1034.610:3292): avc: denied { bpf } for pid=10653 comm="syz.1.1805" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1034.863239][ T31] audit: type=1400 audit(1034.610:3293): avc: denied { perfmon } for pid=10653 comm="syz.1.1805" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1034.874505][ T31] audit: type=1400 audit(1034.620:3294): avc: denied { perfmon } for pid=10653 comm="syz.1.1805" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1034.910028][ T31] audit: type=1400 audit(1034.640:3295): avc: denied { perfmon } for pid=10653 comm="syz.1.1805" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1037.177529][T10662] random: crng reseeded on system resumption [ 1039.931502][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 1039.931966][ T31] audit: type=1400 audit(1039.680:3364): avc: denied { module_request } for pid=10670 comm="syz.0.1811" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1040.703495][ T31] audit: type=1400 audit(1040.450:3365): avc: denied { mount } for pid=10670 comm="syz.0.1811" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1040.903172][ T31] audit: type=1400 audit(1040.650:3366): avc: denied { read write } for pid=7590 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.912300][ T31] audit: type=1400 audit(1040.650:3367): avc: denied { read write open } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.969897][ T31] audit: type=1400 audit(1040.720:3368): avc: denied { ioctl } for pid=7590 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.987648][ T31] audit: type=1400 audit(1040.740:3369): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.992660][ T31] audit: type=1400 audit(1040.740:3370): avc: denied { read write open } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.998306][ T31] audit: type=1400 audit(1040.750:3371): avc: denied { ioctl } for pid=8220 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1041.812613][ T31] audit: type=1400 audit(1041.560:3372): avc: denied { prog_load } for pid=10677 comm="syz.0.1814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1041.813554][ T31] audit: type=1400 audit(1041.560:3373): avc: denied { bpf } for pid=10677 comm="syz.0.1814" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1044.116352][T10381] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 1044.347297][T10381] usb 1-1: Using ep0 maxpacket: 32 [ 1044.449182][T10381] usb 1-1: config 0 has an invalid interface number: 12 but max is 0 [ 1044.451345][T10381] usb 1-1: config 0 has no interface number 0 [ 1044.452440][T10381] usb 1-1: config 0 interface 12 has no altsetting 0 [ 1044.670353][T10381] usb 1-1: New USB device found, idVendor=2c42, idProduct=1202, bcdDevice=85.40 [ 1044.671763][T10381] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1044.672817][T10381] usb 1-1: Product: syz [ 1044.673541][T10381] usb 1-1: Manufacturer: syz [ 1044.674361][T10381] usb 1-1: SerialNumber: syz [ 1044.698491][T10381] usb 1-1: config 0 descriptor?? [ 1045.052199][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 1045.054446][ T31] audit: type=1400 audit(1044.790:3452): avc: denied { ioctl } for pid=10688 comm="syz.0.1817" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1045.063345][ T31] audit: type=1400 audit(1044.810:3453): avc: denied { ioctl } for pid=10688 comm="syz.0.1817" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1045.305146][ T31] audit: type=1400 audit(1045.050:3454): avc: denied { ioctl } for pid=10688 comm="syz.0.1817" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1045.376281][ T31] audit: type=1400 audit(1045.120:3455): avc: denied { ioctl } for pid=10688 comm="syz.0.1817" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x550c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1045.380893][ T31] audit: type=1400 audit(1045.130:3456): avc: denied { ioctl } for pid=10688 comm="syz.0.1817" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1045.457833][ T31] audit: type=1400 audit(1045.210:3457): avc: denied { ioctl } for pid=10688 comm="syz.0.1817" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1045.535932][ T31] audit: type=1400 audit(1045.280:3458): avc: denied { create } for pid=10696 comm="syz.1.1818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1045.591143][ T31] audit: type=1400 audit(1045.340:3459): avc: denied { write } for pid=10696 comm="syz.1.1818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1045.606769][ T31] audit: type=1400 audit(1045.340:3460): avc: denied { nlmsg_write } for pid=10696 comm="syz.1.1818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1045.693498][T10381] f81534 1-1:0.12: f81534_get_register: reg: 1003 failed: -71 [ 1045.694669][T10381] f81534 1-1:0.12: f81534_find_config_idx: read failed: -71 [ 1045.696299][T10381] f81534 1-1:0.12: f81534_calc_num_ports: find idx failed: -71 [ 1045.697688][T10381] f81534 1-1:0.12: probe with driver f81534 failed with error -71 [ 1045.710206][T10381] usb 1-1: USB disconnect, device number 9 [ 1045.809089][ T31] audit: type=1400 audit(1045.560:3461): avc: denied { create } for pid=10696 comm="syz.1.1818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1048.672135][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.672711][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.673228][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.673376][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.673501][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.673618][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.673742][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.673860][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.674001][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.674122][T10705] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 1048.709504][T10705] hid-generic 00A0:0006:0003.0003: hidraw0: HID v0.05 Device [syz1] on syz0 [ 1049.751015][T10705] usb 2-1: new full-speed USB device number 9 using dummy_hcd [ 1050.069719][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 1050.070267][ T31] audit: type=1400 audit(1049.820:3529): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.134098][ T31] audit: type=1400 audit(1049.880:3530): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.208557][ T31] audit: type=1400 audit(1049.960:3531): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.221734][ T31] audit: type=1400 audit(1049.960:3532): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.264488][ T31] audit: type=1400 audit(1050.010:3533): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.349809][ T31] audit: type=1400 audit(1050.100:3534): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.381184][T10705] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1050.381756][T10705] usb 2-1: can't read configurations, error -61 [ 1050.383890][ T31] audit: type=1400 audit(1050.130:3535): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.419354][ T31] audit: type=1400 audit(1050.170:3536): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.424459][ T31] audit: type=1400 audit(1050.170:3537): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.469160][ T31] audit: type=1400 audit(1050.220:3538): avc: denied { ioctl } for pid=10718 comm="syz.1.1821" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1050.512454][T10705] usb 2-1: new full-speed USB device number 10 using dummy_hcd [ 1051.031325][T10705] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1051.031625][T10705] usb 2-1: can't read configurations, error -61 [ 1051.032233][T10705] usb usb2-port1: attempt power cycle [ 1051.386908][T10705] usb 2-1: new full-speed USB device number 11 using dummy_hcd [ 1051.756618][T10705] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1051.757088][T10705] usb 2-1: can't read configurations, error -61 [ 1051.886529][T10705] usb 2-1: new full-speed USB device number 12 using dummy_hcd [ 1052.092002][T10705] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1052.092382][T10705] usb 2-1: can't read configurations, error -61 [ 1052.093523][T10705] usb usb2-port1: unable to enumerate USB device [ 1055.838876][ T31] kauditd_printk_skb: 70 callbacks suppressed [ 1055.839470][ T31] audit: type=1400 audit(1055.590:3609): avc: denied { name_bind } for pid=10736 comm="syz.0.1827" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1055.850911][ T31] audit: type=1400 audit(1055.590:3610): avc: denied { node_bind } for pid=10736 comm="syz.0.1827" saddr=::ffff:0.0.0.0 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1055.992075][ T31] audit: type=1400 audit(1055.740:3611): avc: denied { create } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.025098][ T31] audit: type=1400 audit(1055.770:3612): avc: denied { create } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.058321][ T31] audit: type=1400 audit(1055.810:3613): avc: denied { write } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.061971][ T31] audit: type=1400 audit(1055.810:3614): avc: denied { read } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.064333][ T31] audit: type=1400 audit(1055.810:3615): avc: denied { read } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.129200][ T31] audit: type=1400 audit(1055.880:3616): avc: denied { write } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.203204][ T31] audit: type=1400 audit(1055.950:3617): avc: denied { create } for pid=10736 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.604387][ T31] audit: type=1400 audit(1056.350:3618): avc: denied { read write } for pid=8220 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1057.626190][ T8658] usb 1-1: new full-speed USB device number 10 using dummy_hcd [ 1057.874515][ T8658] usb 1-1: config 0 has an invalid interface number: 214 but max is 0 [ 1057.874892][ T8658] usb 1-1: config 0 has no interface number 0 [ 1057.875178][ T8658] usb 1-1: config 0 interface 214 altsetting 2 endpoint 0x2 has invalid maxpacket 512, setting to 64 [ 1057.875288][ T8658] usb 1-1: config 0 interface 214 has no altsetting 0 [ 1057.951758][ T8658] usb 1-1: New USB device found, idVendor=07c9, idProduct=000e, bcdDevice=5d.4f [ 1057.952136][ T8658] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1057.952431][ T8658] usb 1-1: Product: syz [ 1057.952493][ T8658] usb 1-1: Manufacturer: syz [ 1057.952608][ T8658] usb 1-1: SerialNumber: syz [ 1057.989934][ T8658] usb 1-1: config 0 descriptor?? [ 1058.051330][T10739] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 1058.453523][T10739] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 1058.878286][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0002: -71 [ 1059.387400][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.597421][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to read reg index 0x0001: -71 [ 1059.599278][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to read reg index 0x0006: -71 [ 1059.599718][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): invalid MAC address, using random [ 1059.606881][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0006: -71 [ 1059.608667][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0005: -71 [ 1059.616180][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.626335][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.636326][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.646810][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.648563][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0002: -71 [ 1059.651165][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.653174][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0002: -71 [ 1059.654486][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to read reg index 0x0001: -71 [ 1059.658052][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to read reg index 0x0001: -71 [ 1059.659931][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0001: -71 [ 1059.667465][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x001f: -71 [ 1059.669047][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x0019: -71 [ 1059.670127][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x001f: -71 [ 1059.686458][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000d: -71 [ 1059.688011][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000e: -71 [ 1059.706598][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000d: -71 [ 1059.708158][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to read reg index 0x000e: -71 [ 1059.709468][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000d: -71 [ 1059.726744][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000e: -71 [ 1059.728191][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000d: -71 [ 1059.729448][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to write reg index 0x000e: -71 [ 1059.737334][ T8658] ax88179_178a 1-1:0.214 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 1059.779356][ T8658] ax88179_178a 1-1:0.214 eth1: register 'ax88179_178a' at usb-dummy_hcd.0-1, AT-UMC2000 USB 3.0/USB 3.1 Gen 1 to Gigabit Ethernet Adapter, ce:d2:6d:4a:e9:32 [ 1059.812035][ T8658] usb 1-1: USB disconnect, device number 10 [ 1059.814479][ T8658] ax88179_178a 1-1:0.214 eth1: unregister 'ax88179_178a' usb-dummy_hcd.0-1, AT-UMC2000 USB 3.0/USB 3.1 Gen 1 to Gigabit Ethernet Adapter [ 1059.927972][ T8658] ------------[ cut here ]------------ [ 1059 ** replaying previous printk message ** [ 1059.928571][ T8658] WARNING: CPU: 0 PID: 8658 at lib/debugobjects.c:612 debug_print_object+0xc4/0xd8 [ 1059.930250][ T8658] ODEBUG: free active (active state 0) object: 84e2680c object type: work_struct hint: usbnet_deferred_kevent+0x0/0x394 [ 1059.932660][ T8658] Modules linked in: [ 1059.933903][ T8658] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1059.934477][ T8658] CPU: 0 UID: 0 PID: 8658 Comm: kworker/0:1 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1059.935713][ T8658] Hardware name: ARM-Versatile Express [ 1059.939983][ T8658] Workqueue: usb_hub_wq hub_event [ 1059.940648][ T8658] Call trace: [ 1059.940873][ T8658] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1059.941260][ T8658] r7:00000000 r6:8282083c r5:00000000 r4:8225b4f4 [ 1059.941511][ T8658] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 1059.941849][ T8658] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1059.942157][ T8658] r5:00000000 r4:82a6dd18 [ 1059.942359][ T8658] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 1059.942686][ T8658] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 1059.943092][ T8658] r3:8280c684 r2:00000001 r1:8224203c r0:822499d4 [ 1059.943347][ T8658] r7:808ce424 [ 1059.943502][ T8658] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 1059.943837][ T8658] [<8025865c>] (__warn) from [<802589cc>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1059.944150][ T8658] r8:00000009 r7:822b3eb0 r6:eae2da74 r5:8392c800 r4:00000000 [ 1059.944402][ T8658] [<802587e8>] (warn_slowpath_fmt) from [<808ce424>] (debug_print_object+0xc4/0xd8) [ 1059.944764][ T8658] r10:00000005 r9:84e26000 r8:81c01f18 r7:822df134 r6:82ad9d64 r5:eae2db1c [ 1059.945066][ T8658] r4:8280ccbc [ 1059.945233][ T8658] [<808ce360>] (debug_print_object) from [<808cfe70>] (debug_check_no_obj_freed+0x25c/0x2a4) [ 1059.945863][ T8658] r8:84e27000 r7:84e2680c r6:00000100 r5:00000003 r4:00000000 [ 1059.946480][ T8658] [<808cfc14>] (debug_check_no_obj_freed) from [<804fc71c>] (kfree+0x190/0x394) [ 1059.946938][ T8658] r10:00000100 r9:8297ee84 r8:84e26000 r7:804fd5c0 r6:83002480 r5:ddea8c80 [ 1059.947225][ T8658] r4:84e26000 [ 1059.947381][ T8658] [<804fc58c>] (kfree) from [<804fd5c0>] (kvfree+0x2c/0x30) [ 1059.947852][ T8658] r10:00000100 r9:8297ee84 r8:84e26000 r7:00000000 r6:85b05a00 r5:848a5980 [ 1059.948285][ T8658] r4:84e26000 [ 1059.948504][ T8658] [<804fd594>] (kvfree) from [<815a8958>] (netdev_release+0x2c/0x34) [ 1059.948934][ T8658] r5:848a5980 r4:84e26000 [ 1059.949240][ T8658] [<815a892c>] (netdev_release) from [<80b2a124>] (device_release+0x38/0xa8) [ 1059.949955][ T8658] r5:848a5980 r4:84e263c0 [ 1059.950149][ T8658] [<80b2a0ec>] (device_release) from [<819fe210>] (kobject_put+0xa0/0x1f4) [ 1059.950511][ T8658] r5:81d4f0e4 r4:84e263c0 [ 1059.950717][ T8658] [<819fe170>] (kobject_put) from [<80b2a350>] (put_device+0x18/0x1c) [ 1059.951057][ T8658] r7:000000c0 r6:00000000 r5:00000000 r4:84e26000 [ 1059.951382][ T8658] [<80b2a338>] (put_device) from [<81559dac>] (free_netdev+0x18c/0x244) [ 1059.951942][ T8658] [<81559c20>] (free_netdev) from [<80e1d074>] (usbnet_disconnect+0xb8/0xfc) [ 1059.952264][ T8658] r7:863d0800 r6:84e267d4 r5:84e266c0 r4:00000000 [ 1059.952486][ T8658] [<80e1cfbc>] (usbnet_disconnect) from [<80e0cf4c>] (ax88179_disconnect+0x28/0x2c) [ 1059.952845][ T8658] r8:863d0088 r7:863d0874 r6:863d0830 r5:00000000 r4:863d0000 [ 1059.953103][ T8658] [<80e0cf24>] (ax88179_disconnect) from [<80e86c64>] (usb_unbind_interface+0x84/0x2b4) [ 1059.953444][ T8658] [<80e86be0>] (usb_unbind_interface) from [<80b323d8>] (device_remove+0x64/0x6c) [ 1059.953907][ T8658] r10:00000100 r9:863d0088 r8:00000044 r7:863d0874 r6:8297ee84 r5:00000000 [ 1059.954169][ T8658] r4:863d0830 [ 1059.954340][ T8658] [<80b32374>] (device_remove) from [<80b338c8>] (device_release_driver_internal+0x18c/0x200) [ 1059.954698][ T8658] r5:00000000 r4:863d0830 [ 1059.954854][ T8658] [<80b3373c>] (device_release_driver_internal) from [<80b33954>] (device_release_driver+0x18/0x1c) [ 1059.955202][ T8658] r9:863d0088 r8:833df440 r7:833df438 r6:833df40c r5:863d0830 r4:833df430 [ 1059.955557][ T8658] [<80b3393c>] (device_release_driver) from [<80b31a2c>] (bus_remove_device+0xcc/0x120) [ 1059.956053][ T8658] [<80b31960>] (bus_remove_device) from [<80b2bd88>] (device_del+0x148/0x38c) [ 1059.956381][ T8658] r9:863d0088 r8:8392c800 r7:04208060 r6:00000000 r5:863d0830 r4:863d0874 [ 1059.956668][ T8658] [<80b2bc40>] (device_del) from [<80e846b4>] (usb_disable_device+0xd4/0x1e8) [ 1059.957082][ T8658] r10:00000100 r9:00000000 r8:00000000 r7:863d0800 r6:863d0000 r5:85a08b88 [ 1059.957457][ T8658] r4:00000002 [ 1059.957642][ T8658] [<80e845e0>] (usb_disable_device) from [<80e793c4>] (usb_disconnect+0xec/0x2ac) [ 1059.958244][ T8658] r9:85816a00 r8:863d00cc r7:83c83000 r6:863d0088 r5:863d0000 r4:60000113 [ 1059.958655][ T8658] [<80e792d8>] (usb_disconnect) from [<80e7c3b8>] (hub_event+0x1194/0x1950) [ 1059.959062][ T8658] r10:00000100 r9:83c58b2c r8:83c82800 r7:863d0000 r6:83c58400 r5:00000001 [ 1059.959422][ T8658] r4:00000001 [ 1059.959603][ T8658] [<80e7b224>] (hub_event) from [<8027e2bc>] (process_one_work+0x1b4/0x4f4) [ 1059.960082][ T8658] r10:833df670 r9:8326c205 r8:8392c800 r7:dddced40 r6:8326c200 r5:83c58b2c [ 1059.960669][ T8658] r4:85848600 [ 1059.960873][ T8658] [<8027e108>] (process_one_work) from [<8027ef04>] (worker_thread+0x1fc/0x3d8) [ 1059.961276][ T8658] r10:61c88647 r9:8392c800 r8:8584862c r7:82804d40 r6:dddced40 r5:dddced60 [ 1059.961633][ T8658] r4:85848600 [ 1059.961804][ T8658] [<8027ed08>] (worker_thread) from [<80285f30>] (kthread+0x12c/0x280) [ 1059.962181][ T8658] r10:00000000 r9:85848600 r8:8027ed08 r7:df959e60 r6:85848680 r5:8392c800 [ 1059.962597][ T8658] r4:00000001 [ 1059.962786][ T8658] [<80285e04>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1059.963315][ T8658] Exception stack(0xeae2dfb0 to 0xeae2dff8) [ 1059.963624][ T8658] dfa0: 00000000 00000000 00000000 00000000 [ 1059.964080][ T8658] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1059.964465][ T8658] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1059.964811][ T8658] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e04 [ 1059.965231][ T8658] r4:84de5700 [ 1059.969072][ T8658] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:41:56 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000002 R02=ebb4b030 R03=00000030 R04=84be0840 R05=eae2d800 R06=8295a2b0 R07=00000001 R08=82828458 R09=00000000 R10=00001432 R11=eae2d79c R12=eae2d740 R13=eae2d780 R14=81a30b3c R15=80a6aca8 PSR=80000193 N--- A S svc32 s00=645f7465 s01=63697665 d00=63697665645f7465 s02=28202965 s03=6e696e75 d01=6e696e7528202965 s04=61697469 s05=657a696c d02=657a696c61697469 s06=203a2964 s07=6c696146 d03=6c696146203a2964 s08=74206465 s09=7277206f d04=7277206f74206465 s10=20657469 s11=20676572 d05=2067657220657469 s12=65646e69 s13=78302078 d06=7830207865646e69 s14=39313030 s15=372d203a d07=372d203a39313030 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84766508 R01=00000001 R02=00407fff R03=00000001 R04=00000005 R05=0040a000 R06=00000001 R07=00000002 R08=84766504 R09=00000000 R10=108ecca1 R11=dfa3dbf4 R12=00000002 R13=dfa3dbb0 R14=dfa3dbfc R15=81a03304 PSR=80000113 N--- A S svc32 s00=6365735f s01=61646e6f d00=61646e6f6365735f s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010