last executing test programs: 19.559493399s ago: executing program 1 (id=388): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000240)={0x3, &(0x7f0000000440)=[{0x20, 0x2, 0x81, 0xfffff034}, {0x20, 0x0, 0x5, 0xfffff010}, {0x6, 0x0, 0x2}]}, 0x10) 19.0503238s ago: executing program 1 (id=389): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x8, 0x9}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000f00), 0xffffffffffffffff) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = socket$inet6(0xa, 0x3, 0xff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0xc3ac}, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000f40)={0x4, 0x1, '\x00', [@ra={0x5, 0x2, 0xa}, @ra={0x5, 0x2, 0x5000}, @ra={0x5, 0x2, 0x7}, @padn]}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080), r3, 0x0, 0x3, 0x1}}, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'dummy0\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000500)=""/31, 0x1f, 0x40000000009) 18.431625725s ago: executing program 1 (id=390): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) openat$comedi(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregs(0xe, r0, 0xffffffffffffdcaf, &(0x7f0000000040)=""/45) 18.30115711s ago: executing program 1 (id=391): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) 11.439503891s ago: executing program 0 (id=392): syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9a"], 0x0) 11.269496229s ago: executing program 0 (id=393): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001300)={0x6c, 0x9, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private0}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e1f}, @IPSET_ATTR_CIDR2={0x5}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x10040003}, 0x8008880) 10.916765113s ago: executing program 0 (id=394): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 9.540639129s ago: executing program 1 (id=395): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_io_uring_setup(0x110, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x185) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fallocate(r1, 0x0, 0x1000000, 0x3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r1, 0x2000000) 9.020130231s ago: executing program 1 (id=396): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='vegas', 0x5) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, 0x0, &(0x7f00000000c0)) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, 0x0) 8.010603162s ago: executing program 0 (id=397): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$kcm(0xa, 0x922000000003, 0x11) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) r4 = io_uring_setup(0x241a, &(0x7f0000000740)={0x0, 0x8812, 0x1, 0x1, 0x20b}) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000240)=r1, 0x1) r5 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x4000}, 0x6, 0x0, 0x4, 0x0, 0x0, 0x2, 'syz1\x00', 0x0}) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) dup(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x404}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r6}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) setpriority(0x0, 0x0, 0xacf0165) fchmod(0xffffffffffffffff, 0x150) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0x40405515, 0x0) fdatasync(r0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) 6.299523953s ago: executing program 0 (id=398): openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x1000d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3c}, 0x94) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x8b1a, &(0x7f0000000040)) 0s ago: executing program 0 (id=399): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0xd, 0x4, 0x4, 0x800, 0x4, 0x4, 0x7, 0x54c6cff3, 0x22, 0x2, 0x1, 0x1, 0x1, 0x6, 0x101, 0xfffffffe, 0x7f, 0x3, 0x40000003, 0x89, 0xcae3, 0x0, 0x20001e5b, 0x3, 0xe66, 0x3, 0x8, 0x4086, 0x0, 0xfffffff8]}) ioctl$COMEDI_SETRSUBD(r0, 0x6410) kernel console output (not intermixed with test programs): [ 47.173177][ T31] audit: type=1400 audit(47.090:56): avc: denied { read write } for pid=3092 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.175346][ T31] audit: type=1400 audit(47.100:57): avc: denied { open } for pid=3092 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:7736' (ED25519) to the list of known hosts. [ 59.033479][ T31] audit: type=1400 audit(58.950:58): avc: denied { name_bind } for pid=3095 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.480695][ T31] audit: type=1400 audit(60.400:59): avc: denied { execute } for pid=3096 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.541628][ T31] audit: type=1400 audit(60.450:60): avc: denied { execute_no_trans } for pid=3096 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.369229][ T31] audit: type=1400 audit(63.290:61): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.374761][ T31] audit: type=1400 audit(63.290:62): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.385641][ T3096] cgroup: Unknown subsys name 'net' [ 63.390603][ T31] audit: type=1400 audit(63.310:63): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.545340][ T3096] cgroup: Unknown subsys name 'cpuset' [ 63.550684][ T3096] cgroup: Unknown subsys name 'hugetlb' [ 63.551566][ T3096] cgroup: Unknown subsys name 'rlimit' [ 63.764898][ T31] audit: type=1400 audit(63.690:64): avc: denied { setattr } for pid=3096 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.766808][ T31] audit: type=1400 audit(63.690:65): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 63.769913][ T31] audit: type=1400 audit(63.690:66): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.944000][ T3098] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.948613][ T31] audit: type=1400 audit(63.870:67): avc: denied { relabelto } for pid=3098 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 71.434884][ T3096] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.294907][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 73.304055][ T31] audit: type=1400 audit(73.220:71): avc: denied { execmem } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 73.376000][ T31] audit: type=1400 audit(73.290:72): avc: denied { read } for pid=3101 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.377634][ T31] audit: type=1400 audit(73.300:73): avc: denied { open } for pid=3101 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.381810][ T31] audit: type=1400 audit(73.300:74): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 73.409179][ T31] audit: type=1400 audit(73.330:75): avc: denied { module_request } for pid=3102 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.411195][ T31] audit: type=1400 audit(73.330:76): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.484517][ T31] audit: type=1400 audit(73.410:77): avc: denied { sys_module } for pid=3102 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.944495][ T31] audit: type=1400 audit(73.870:78): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.039612][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.050283][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.171245][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.181991][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.906547][ T3101] hsr_slave_0: entered promiscuous mode [ 75.910370][ T3101] hsr_slave_1: entered promiscuous mode [ 76.025228][ T3102] hsr_slave_0: entered promiscuous mode [ 76.026647][ T3102] hsr_slave_1: entered promiscuous mode [ 76.029635][ T3102] debugfs: 'hsr0' already exists in 'hsr' [ 76.031299][ T3102] Cannot create hsr debugfs directory [ 76.382041][ T31] audit: type=1400 audit(76.300:79): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.386196][ T31] audit: type=1400 audit(76.310:80): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.401056][ T3101] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.415613][ T3101] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.430547][ T3101] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.449332][ T3101] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.511854][ T3102] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.520159][ T3102] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.535455][ T3102] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.542634][ T3102] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.185794][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.195394][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.741542][ T3102] veth0_vlan: entered promiscuous mode [ 79.779778][ T3102] veth1_vlan: entered promiscuous mode [ 79.838200][ T3102] veth0_macvtap: entered promiscuous mode [ 79.853556][ T3102] veth1_macvtap: entered promiscuous mode [ 79.861660][ T3101] veth0_vlan: entered promiscuous mode [ 79.886416][ T3101] veth1_vlan: entered promiscuous mode [ 79.925474][ T1057] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.926221][ T1057] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.926350][ T1057] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.926416][ T1057] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.026158][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 80.026420][ T31] audit: type=1400 audit(79.950:82): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.033992][ T31] audit: type=1400 audit(79.960:83): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.60IRos/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.039186][ T31] audit: type=1400 audit(79.960:84): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.044377][ T3101] veth0_macvtap: entered promiscuous mode [ 80.047661][ T31] audit: type=1400 audit(79.970:85): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.60IRos/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 80.051873][ T31] audit: type=1400 audit(79.970:86): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.60IRos/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 80.058256][ T3101] veth1_macvtap: entered promiscuous mode [ 80.076375][ T31] audit: type=1400 audit(80.000:87): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.080590][ T31] audit: type=1400 audit(80.000:88): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.093684][ T31] audit: type=1400 audit(80.010:89): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="gadgetfs" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 80.093939][ T31] audit: type=1400 audit(80.010:90): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 80.094126][ T31] audit: type=1400 audit(80.010:91): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 80.117229][ T3794] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.117587][ T3794] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.117849][ T3794] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.118042][ T3794] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.228286][ T3102] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 80.900448][ T3797] kernel profiling enabled (shift: 5) [ 83.108000][ T3841] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3841 comm=syz.1.9 [ 83.118022][ T3841] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3841 comm=syz.1.9 [ 83.795228][ T3854] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3854 comm=syz.1.16 [ 86.173237][ T3892] Zero length message leads to an empty skb [ 87.247105][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 87.247280][ T31] audit: type=1400 audit(87.170:123): avc: denied { bind } for pid=3907 comm="syz.0.32" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 87.250647][ T31] audit: type=1400 audit(87.170:124): avc: denied { name_bind } for pid=3907 comm="syz.0.32" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 87.250984][ T31] audit: type=1400 audit(87.170:125): avc: denied { node_bind } for pid=3907 comm="syz.0.32" saddr=224.0.0.2 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 87.259365][ T31] audit: type=1400 audit(87.180:126): avc: denied { setattr } for pid=3907 comm="syz.0.32" name="CAN_RAW" dev="sockfs" ino=2496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 87.270205][ T31] audit: type=1400 audit(87.190:127): avc: denied { setopt } for pid=3907 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 87.471306][ T3917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3917 comm=syz.0.34 [ 88.227233][ T31] audit: type=1400 audit(88.150:128): avc: denied { create } for pid=3921 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 88.231707][ T31] audit: type=1400 audit(88.150:129): avc: denied { ioctl } for pid=3921 comm="syz.0.36" path="socket:[2518]" dev="sockfs" ino=2518 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 88.426283][ T3924] dlm: non-version read from control device 180 [ 88.642522][ T31] audit: type=1400 audit(88.560:130): avc: denied { getopt } for pid=3930 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 88.945223][ T729] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 89.136731][ T729] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 89.137915][ T729] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 89.139200][ T729] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 89.142093][ T729] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 89.144169][ T729] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 89.149912][ T729] usb 1-1: config 0 descriptor?? [ 89.444160][ T31] audit: type=1400 audit(89.370:131): avc: denied { read } for pid=3940 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 89.594061][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.595242][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.596241][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.597364][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.598372][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.599373][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.600259][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.601113][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.602050][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.602958][ T729] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 89.614330][ T729] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 89.860371][ T3736] usb 1-1: USB disconnect, device number 2 [ 89.949699][ T31] audit: type=1400 audit(89.870:132): avc: denied { write } for pid=3940 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 90.031489][ T3963] FAULT_INJECTION: forcing a failure. [ 90.031489][ T3963] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 90.034902][ T3963] CPU: 0 UID: 0 PID: 3963 Comm: syz.0.44 Not tainted syzkaller #0 PREEMPT [ 90.035213][ T3963] Hardware name: ARM-Versatile Express [ 90.035487][ T3963] Call trace: [ 90.035747][ T3963] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 90.036689][ T3963] r7:00000000 r6:00000000 r5:60000013 r4:8224dfd0 [ 90.036779][ T3963] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 90.036837][ T3963] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 90.036885][ T3963] r5:83aae000 r4:8294f510 [ 90.036899][ T3963] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 90.036951][ T3963] [<80985534>] (should_fail_ex) from [<80985770>] (should_fail+0x14/0x18) [ 90.037007][ T3963] r8:76f86f30 r7:00000000 r6:00000000 r5:ea7f5f68 r4:00000002 [ 90.037020][ T3963] [<8098575c>] (should_fail) from [<80985790>] (should_fail_usercopy+0x1c/0x20) [ 90.037072][ T3963] [<80985774>] (should_fail_usercopy) from [<8059956c>] (simple_read_from_buffer+0x80/0x13c) [ 90.037122][ T3963] [<805994ec>] (simple_read_from_buffer) from [<80615664>] (proc_fail_nth_read+0xb8/0x108) [ 90.037202][ T3963] r10:00000001 r9:806155ac r8:00000002 r7:ea7f5f68 r6:0000000f r5:76f86f30 [ 90.037231][ T3963] r4:83aae000 r3:ea7f5e9f [ 90.037246][ T3963] [<806155ac>] (proc_fail_nth_read) from [<8055e534>] (vfs_read+0x98/0x324) [ 90.037305][ T3963] r8:76f86f30 r7:ea7f5f68 r6:83aae000 r5:0000000f r4:84e1b480 [ 90.037323][ T3963] [<8055e49c>] (vfs_read) from [<8055f244>] (ksys_read+0x74/0xe8) [ 90.037377][ T3963] r10:00000003 r9:83aae000 r8:8020029c r7:00000000 r6:00000000 r5:84e1b480 [ 90.037396][ T3963] r4:84e1b483 [ 90.037410][ T3963] [<8055f1d0>] (ksys_read) from [<8055f2c8>] (sys_read+0x10/0x14) [ 90.037486][ T3963] r7:00000003 r6:00000004 r5:76f86f30 r4:0000000f [ 90.037501][ T3963] [<8055f2b8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 90.037622][ T3963] Exception stack(0xea7f5fa8 to 0xea7f5ff0) [ 90.037790][ T3963] 5fa0: 0000000f 76f86f30 00000004 76f86f30 0000000f 00000000 [ 90.037841][ T3963] 5fc0: 0000000f 76f86f30 00000004 00000003 00300000 00000000 00006364 76f870bc [ 90.037866][ T3963] 5fe0: 00000158 76f86ed0 000d81d0 001303dc [ 92.164678][ T3974] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3974 comm=syz.1.47 [ 92.361524][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 92.361831][ T31] audit: type=1400 audit(92.280:137): avc: denied { write } for pid=3977 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 92.392194][ T3980] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3980 comm=syz.1.49 [ 92.955545][ T31] audit: type=1400 audit(92.880:138): avc: denied { create } for pid=3985 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 92.964919][ T31] audit: type=1400 audit(92.890:139): avc: denied { setopt } for pid=3985 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 93.133533][ T31] audit: type=1400 audit(93.050:140): avc: denied { setattr } for pid=3990 comm="syz.0.54" name="" dev="pipefs" ino=2600 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 93.585549][ T31] audit: type=1400 audit(93.510:141): avc: denied { allowed } for pid=4000 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 93.601845][ T31] audit: type=1400 audit(93.520:142): avc: denied { create } for pid=4000 comm="syz.0.59" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 93.625328][ T31] audit: type=1400 audit(93.550:143): avc: denied { prog_load } for pid=4000 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 93.636936][ T31] audit: type=1400 audit(93.560:144): avc: denied { bpf } for pid=4000 comm="syz.0.59" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 93.638547][ T31] audit: type=1400 audit(93.560:145): avc: denied { perfmon } for pid=4000 comm="syz.0.59" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 93.699892][ T31] audit: type=1400 audit(93.620:146): avc: denied { prog_run } for pid=4000 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 94.754908][ T4005] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4005 comm=syz.0.60 [ 96.017797][ T4007] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 96.494143][ T4023] syz.1.64 uses obsolete (PF_INET,SOCK_PACKET) [ 96.793680][ T4025] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4025 comm=syz.0.65 [ 97.373244][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 97.373560][ T31] audit: type=1400 audit(97.280:161): avc: denied { getopt } for pid=4028 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.377489][ T31] audit: type=1400 audit(97.300:162): avc: denied { write } for pid=4028 comm="syz.0.67" path="socket:[2676]" dev="sockfs" ino=2676 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.901137][ T31] audit: type=1400 audit(97.820:163): avc: denied { ioctl } for pid=4028 comm="syz.0.67" path="socket:[2678]" dev="sockfs" ino=2678 ioctlcmd=0x89ef scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.609023][ T31] audit: type=1400 audit(99.530:164): avc: denied { ioctl } for pid=4045 comm="syz.0.70" path="socket:[3437]" dev="sockfs" ino=3437 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.838958][ T31] audit: type=1400 audit(99.760:165): avc: denied { create } for pid=4054 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 99.848289][ T31] audit: type=1400 audit(99.760:166): avc: denied { listen } for pid=4054 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 101.631901][ T31] audit: type=1400 audit(101.550:167): avc: denied { setattr } for pid=4068 comm="syz.1.77" name="NETLINK" dev="sockfs" ino=2721 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 101.818697][ T4075] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 102.147061][ T31] audit: type=1400 audit(102.070:168): avc: denied { ioctl } for pid=4078 comm="syz.1.80" path="socket:[3486]" dev="sockfs" ino=3486 ioctlcmd=0x662b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 102.170606][ T31] audit: type=1400 audit(102.090:169): avc: denied { map } for pid=4078 comm="syz.1.80" path="socket:[3487]" dev="sockfs" ino=3487 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 102.173549][ T31] audit: type=1400 audit(102.090:170): avc: denied { read } for pid=4078 comm="syz.1.80" path="socket:[3487]" dev="sockfs" ino=3487 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 103.039479][ T4107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4107 comm=syz.0.89 [ 103.048252][ T4107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4107 comm=syz.0.89 [ 103.135060][ T4108] mmap: syz.0.90 (4108): VmData 29376512 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 105.000260][ T31] audit: type=1400 audit(104.920:171): avc: denied { ioctl } for pid=4151 comm="syz.0.97" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2815 ioctlcmd=0x9402 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.002288][ T31] audit: type=1400 audit(104.920:172): avc: denied { connect } for pid=4151 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.276366][ C0] vxcan1: j1939_tp_rxtimer: 0x85800000: rx timeout, send abort [ 106.280539][ C0] vxcan1: j1939_xtp_rx_abort_one: 0x85800000: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 106.291669][ T31] audit: type=1400 audit(106.210:173): avc: denied { read } for pid=2908 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 106.291898][ T31] audit: type=1400 audit(106.210:174): avc: denied { search } for pid=2908 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 106.292037][ T31] audit: type=1400 audit(106.210:175): avc: denied { search } for pid=2908 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 106.292177][ T31] audit: type=1400 audit(106.210:176): avc: denied { add_name } for pid=2908 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 106.292285][ T31] audit: type=1400 audit(106.210:177): avc: denied { create } for pid=2908 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 106.292420][ T31] audit: type=1400 audit(106.210:178): avc: denied { append open } for pid=2908 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 106.292516][ T31] audit: type=1400 audit(106.210:179): avc: denied { getattr } for pid=2908 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 109.050324][ T4179] sock: sock_timestamping_bind_phc: sock not bind to device [ 112.256149][ T31] audit: type=1400 audit(112.180:180): avc: denied { write } for pid=4202 comm="syz.0.113" path="socket:[2892]" dev="sockfs" ino=2892 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 112.767371][ T31] audit: type=1400 audit(112.690:181): avc: denied { shutdown } for pid=4202 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.127259][ T4238] FAULT_INJECTION: forcing a failure. [ 116.127259][ T4238] name failslab, interval 1, probability 0, space 0, times 0 [ 116.129035][ T4238] CPU: 1 UID: 0 PID: 4238 Comm: syz.1.128 Not tainted syzkaller #0 PREEMPT [ 116.129140][ T4238] Hardware name: ARM-Versatile Express [ 116.129165][ T4238] Call trace: [ 116.129203][ T4238] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 116.129307][ T4238] r7:00000d40 r6:00000000 r5:60000013 r4:8224dfd0 [ 116.129325][ T4238] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 116.129374][ T4238] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 116.129423][ T4238] r5:83aab000 r4:82918790 [ 116.129438][ T4238] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 116.129488][ T4238] [<80985534>] (should_fail_ex) from [<8052e594>] (should_failslab+0x6c/0x94) [ 116.129554][ T4238] r8:00000000 r7:00000d40 r6:00000018 r5:855f7ffd r4:83001240 [ 116.129571][ T4238] [<8052e528>] (should_failslab) from [<80509a98>] (__kmalloc_noprof+0x9c/0x568) [ 116.129623][ T4238] [<805099fc>] (__kmalloc_noprof) from [<807d1a80>] (tomoyo_encode2+0x64/0xf0) [ 116.129693][ T4238] r10:00000fff r9:8309f800 r8:00000000 r7:850a8440 r6:84e1b268 r5:855f7ffd [ 116.129711][ T4238] r4:855f7ff0 [ 116.129727][ T4238] [<807d1a1c>] (tomoyo_encode2) from [<807d1b30>] (tomoyo_encode+0x24/0x30) [ 116.129779][ T4238] r9:8309f800 r8:00000000 r7:850a8440 r6:84e1b268 r5:00001000 r4:855f7ff1 [ 116.129797][ T4238] [<807d1b0c>] (tomoyo_encode) from [<807d1bbc>] (tomoyo_realpath_from_path+0x80/0x17c) [ 116.129843][ T4238] r5:00001000 r4:855f7000 [ 116.129856][ T4238] [<807d1b3c>] (tomoyo_realpath_from_path) from [<807cdcbc>] (tomoyo_path_number_perm+0xcc/0x22c) [ 116.129916][ T4238] r10:83aab000 r9:00000000 r8:84e1b240 r7:40045436 r6:00000004 r5:81cd6588 [ 116.129960][ T4238] r4:84e1b268 r3:826c0240 [ 116.129978][ T4238] [<807cdbf0>] (tomoyo_path_number_perm) from [<807d259c>] (tomoyo_file_ioctl+0x1c/0x20) [ 116.130041][ T4238] r9:00000003 r8:84e1b240 r7:0000003e r6:0000003e r5:40045436 r4:84e1b240 [ 116.130058][ T4238] [<807d2580>] (tomoyo_file_ioctl) from [<8077ee60>] (security_file_ioctl+0x64/0x1e4) [ 116.130104][ T4238] [<8077edfc>] (security_file_ioctl) from [<80577ce4>] (sys_ioctl+0x4c/0xba0) [ 116.130159][ T4238] r7:0000003e r6:84e1b241 r5:00000000 r4:40045436 [ 116.130176][ T4238] [<80577c98>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 116.130219][ T4238] Exception stack(0xe04c1fa8 to 0xe04c1ff0) [ 116.130253][ T4238] 1fa0: 00000000 00000000 00000003 40045436 0000003e 00000000 [ 116.130284][ T4238] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f4b0bc [ 116.130311][ T4238] 1fe0: 76f4aec0 76f4aeb0 000195a4 00132510 [ 116.130342][ T4238] r10:00000036 r9:83aab000 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 116.130359][ T4238] r4:00000000 [ 116.159749][ T4238] ERROR: Out of memory at tomoyo_realpath_from_path. [ 116.161363][ T31] audit: type=1400 audit(116.080:182): avc: denied { ioctl } for pid=4237 comm="syz.1.128" path="socket:[3739]" dev="sockfs" ino=3739 ioctlcmd=0x5436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 116.787726][ T31] audit: type=1400 audit(116.710:183): avc: denied { write } for pid=4247 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 116.927808][ T4252] FAULT_INJECTION: forcing a failure. [ 116.927808][ T4252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.928875][ T4252] CPU: 0 UID: 0 PID: 4252 Comm: syz.1.134 Not tainted syzkaller #0 PREEMPT [ 116.929205][ T4252] Hardware name: ARM-Versatile Express [ 116.929444][ T4252] Call trace: [ 116.930306][ T4252] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 116.931625][ T4252] r7:e0459e20 r6:00000000 r5:60000013 r4:8224dfd0 [ 116.931714][ T4252] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 116.931810][ T4252] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 116.931865][ T4252] r5:83aa9800 r4:8294f510 [ 116.931879][ T4252] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 116.931932][ T4252] [<80985534>] (should_fail_ex) from [<80985770>] (should_fail+0x14/0x18) [ 116.931993][ T4252] r8:00000010 r7:e0459e20 r6:20000240 r5:00000000 r4:e0459f20 [ 116.932009][ T4252] [<8098575c>] (should_fail) from [<80985790>] (should_fail_usercopy+0x1c/0x20) [ 116.932062][ T4252] [<80985774>] (should_fail_usercopy) from [<81555248>] (copy_msghdr_from_user+0x50/0x130) [ 116.932117][ T4252] [<815551f8>] (copy_msghdr_from_user) from [<815553a0>] (___sys_sendmsg+0x78/0xd0) [ 116.932167][ T4252] r8:00000010 r7:00000000 r6:83764780 r5:e0459f20 r4:e0459e64 [ 116.932182][ T4252] [<81555328>] (___sys_sendmsg) from [<8155585c>] (__sys_sendmsg+0x8c/0xe0) [ 116.932255][ T4252] r10:00000128 r9:83aa9800 r8:857c6240 r7:00000010 r6:20000240 r5:857c6241 [ 116.932280][ T4252] r4:00000003 [ 116.932296][ T4252] [<815557d0>] (__sys_sendmsg) from [<815558c4>] (sys_sendmsg+0x14/0x18) [ 116.932376][ T4252] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 116.932392][ T4252] [<815558b0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 116.932509][ T4252] Exception stack(0xe0459fa8 to 0xe0459ff0) [ 116.932682][ T4252] 9fa0: 00000000 00000000 00000003 20000240 00000010 00000000 [ 116.932731][ T4252] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f4b0bc [ 116.932758][ T4252] 9fe0: 76f4aec0 76f4aeb0 000195a4 00132510 [ 117.253489][ T4258] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=4258 comm=syz.1.138 [ 117.357242][ T31] audit: type=1400 audit(117.280:184): avc: denied { ioctl } for pid=4261 comm="syz.1.139" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.298149][ T4275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4275 comm=syz.0.144 [ 118.567662][ T31] audit: type=1400 audit(118.490:185): avc: denied { read } for pid=4285 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 119.523281][ T31] audit: type=1400 audit(119.440:186): avc: denied { getopt } for pid=4292 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 119.530476][ T4293] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4293 comm=syz.0.149 [ 125.572522][ T31] audit: type=1400 audit(125.490:187): avc: denied { execute } for pid=4315 comm="syz.0.157" path=2F6D656D66643A0B88E0731AD6467445234AFB881E202864656C6574656429 dev="tmpfs" ino=1031 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 126.504677][ T4321] FAULT_INJECTION: forcing a failure. [ 126.504677][ T4321] name failslab, interval 1, probability 0, space 0, times 0 [ 126.506862][ T4321] CPU: 1 UID: 0 PID: 4321 Comm: syz.1.159 Not tainted syzkaller #0 PREEMPT [ 126.506984][ T4321] Hardware name: ARM-Versatile Express [ 126.507010][ T4321] Call trace: [ 126.507059][ T4321] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 126.507204][ T4321] r7:00000000 r6:00000000 r5:60000013 r4:8224dfd0 [ 126.507223][ T4321] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 126.507275][ T4321] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 126.507324][ T4321] r5:83aabc00 r4:82918790 [ 126.507339][ T4321] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 126.507394][ T4321] [<80985534>] (should_fail_ex) from [<8052e594>] (should_failslab+0x6c/0x94) [ 126.507457][ T4321] r8:83aabc00 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 126.507476][ T4321] [<8052e528>] (should_failslab) from [<8050eac0>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 126.507530][ T4321] [<8050ea70>] (kmem_cache_alloc_node_noprof) from [<81560444>] (__alloc_skb+0x138/0x160) [ 126.507592][ T4321] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 126.507612][ T4321] r4:828060c0 [ 126.507626][ T4321] [<8156030c>] (__alloc_skb) from [<816820fc>] (netlink_alloc_large_skb+0x8c/0xa4) [ 126.507687][ T4321] r8:00000000 r7:85866400 r6:00000014 r5:8504cf00 r4:00000140 [ 126.507705][ T4321] [<81682070>] (netlink_alloc_large_skb) from [<816828bc>] (netlink_sendmsg+0x134/0x444) [ 126.507758][ T4321] r5:8504cf00 r4:eaaa9f20 [ 126.507773][ T4321] [<81682788>] (netlink_sendmsg) from [<81552c34>] (__sock_sendmsg+0x44/0x78) [ 126.507835][ T4321] r10:00000000 r9:eaaa9dc4 r8:eaaa9dc4 r7:00000000 r6:8504cf00 r5:eaaa9f20 [ 126.507854][ T4321] r4:00000000 [ 126.507867][ T4321] [<81552bf0>] (__sock_sendmsg) from [<815533fc>] (____sys_sendmsg+0x298/0x2cc) [ 126.507917][ T4321] r7:00000000 r6:8504cf00 r5:00040004 r4:eaaa9f20 [ 126.507932][ T4321] [<81553164>] (____sys_sendmsg) from [<815553c4>] (___sys_sendmsg+0x9c/0xd0) [ 126.507989][ T4321] r10:eaaa9e24 r9:20000940 r8:00040004 r7:00000000 r6:8504cf00 r5:eaaa9f20 [ 126.508008][ T4321] r4:00000000 [ 126.508023][ T4321] [<81555328>] (___sys_sendmsg) from [<8155585c>] (__sys_sendmsg+0x8c/0xe0) [ 126.508088][ T4321] r10:00000128 r9:83aabc00 r8:84e1b9c0 r7:00040004 r6:20000940 r5:84e1b9c1 [ 126.508106][ T4321] r4:00000003 [ 126.508120][ T4321] [<815557d0>] (__sys_sendmsg) from [<815558c4>] (sys_sendmsg+0x14/0x18) [ 126.508173][ T4321] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 126.508192][ T4321] [<815558b0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 126.508235][ T4321] Exception stack(0xeaaa9fa8 to 0xeaaa9ff0) [ 126.508273][ T4321] 9fa0: 00000000 00000000 00000003 20000940 00040004 00000000 [ 126.508307][ T4321] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f4b0bc [ 126.508331][ T4321] 9fe0: 76f4aec0 76f4aeb0 000195a4 00132510 [ 128.419550][ T4327] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4327 comm=syz.1.162 [ 132.664014][ T4348] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4348 comm=syz.1.168 [ 138.800720][ T4368] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4368 comm=syz.1.175 [ 142.002248][ T31] audit: type=1400 audit(141.920:188): avc: denied { create } for pid=4375 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 145.692548][ T4388] capability: warning: `syz.1.182' uses deprecated v2 capabilities in a way that may be insecure [ 148.072103][ T31] audit: type=1400 audit(147.990:189): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 156.138938][ T4437] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 159.086966][ T31] audit: type=1400 audit(159.010:190): avc: denied { read } for pid=4472 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 164.679233][ T4505] FAULT_INJECTION: forcing a failure. [ 164.679233][ T4505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 164.681751][ T4505] CPU: 1 UID: 0 PID: 4505 Comm: syz.1.209 Not tainted syzkaller #0 PREEMPT [ 164.681966][ T4505] Hardware name: ARM-Versatile Express [ 164.682018][ T4505] Call trace: [ 164.682068][ T4505] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 164.682171][ T4505] r7:00000000 r6:00000000 r5:60000013 r4:8224dfd0 [ 164.682191][ T4505] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 164.682302][ T4505] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 164.682377][ T4505] r5:854aa400 r4:8294f510 [ 164.682457][ T4505] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 164.682518][ T4505] [<80985534>] (should_fail_ex) from [<80985770>] (should_fail+0x14/0x18) [ 164.682618][ T4505] r8:dfa09f68 r7:00000000 r6:855e3000 r5:855e3004 r4:00000000 [ 164.682653][ T4505] [<8098575c>] (should_fail) from [<80985790>] (should_fail_usercopy+0x1c/0x20) [ 164.682709][ T4505] [<80985774>] (should_fail_usercopy) from [<80599778>] (simple_transaction_get+0x8c/0x124) [ 164.682772][ T4505] [<805996ec>] (simple_transaction_get) from [<807aa0e0>] (selinux_transaction_write+0x40/0x7c) [ 164.682833][ T4505] r9:00000000 r8:dfa09f68 r7:854aa400 r6:807ac8d0 r5:84e1be40 r4:00000000 [ 164.682852][ T4505] [<807aa0a0>] (selinux_transaction_write) from [<8055ee30>] (vfs_write+0xac/0x44c) [ 164.682973][ T4505] r7:854aa400 r6:00000000 r5:84e1be40 r4:807aa0a0 [ 164.682993][ T4505] [<8055ed84>] (vfs_write) from [<8055f340>] (ksys_write+0x74/0xe8) [ 164.683058][ T4505] r10:00000004 r9:854aa400 r8:8020029c r7:00000000 r6:00000000 r5:84e1be40 [ 164.683080][ T4505] r4:84e1be43 [ 164.683097][ T4505] [<8055f2cc>] (ksys_write) from [<8055f3c4>] (sys_write+0x10/0x14) [ 164.683154][ T4505] r7:00000004 r6:001304b8 r5:00000000 r4:00000000 [ 164.683169][ T4505] [<8055f3b4>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 164.683214][ T4505] Exception stack(0xdfa09fa8 to 0xdfa09ff0) [ 164.683255][ T4505] 9fa0: 00000000 00000000 00000004 00000000 00000000 00000000 [ 164.683286][ T4505] 9fc0: 00000000 00000000 001304b8 00000004 00300000 00000000 00006364 76f4b0bc [ 164.683310][ T4505] 9fe0: 76f4aec0 76f4aeb0 000195a4 00132510 [ 164.696454][ T4505] SELinux: syz.1.209 (4505) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 165.300775][ T4517] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4517 comm=syz.0.214 [ 168.655271][ T4530] FAULT_INJECTION: forcing a failure. [ 168.655271][ T4530] name failslab, interval 1, probability 0, space 0, times 0 [ 168.655526][ T4530] CPU: 0 UID: 0 PID: 4530 Comm: syz.0.218 Not tainted syzkaller #0 PREEMPT [ 168.655572][ T4530] Hardware name: ARM-Versatile Express [ 168.655585][ T4530] Call trace: [ 168.655608][ T4530] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 168.655667][ T4530] r7:00000000 r6:00000000 r5:60000013 r4:8224dfd0 [ 168.655678][ T4530] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 168.655703][ T4530] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 168.655729][ T4530] r5:84263c00 r4:82918790 [ 168.655736][ T4530] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 168.655774][ T4530] [<80985534>] (should_fail_ex) from [<8052e594>] (should_failslab+0x6c/0x94) [ 168.655809][ T4530] r8:84263c00 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 168.655817][ T4530] [<8052e528>] (should_failslab) from [<8050eac0>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 168.655843][ T4530] [<8050ea70>] (kmem_cache_alloc_node_noprof) from [<81560444>] (__alloc_skb+0x138/0x160) [ 168.655874][ T4530] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 168.655883][ T4530] r4:828060c0 [ 168.655890][ T4530] [<8156030c>] (__alloc_skb) from [<816820fc>] (netlink_alloc_large_skb+0x8c/0xa4) [ 168.655974][ T4530] r8:00000000 r7:85867800 r6:00000020 r5:8504d900 r4:00000140 [ 168.656001][ T4530] [<81682070>] (netlink_alloc_large_skb) from [<816828bc>] (netlink_sendmsg+0x134/0x444) [ 168.656062][ T4530] r5:8504d900 r4:dfc55e98 [ 168.656158][ T4530] [<81682788>] (netlink_sendmsg) from [<81552c34>] (__sock_sendmsg+0x44/0x78) [ 168.656216][ T4530] r10:00000122 r9:84e1ba80 r8:84e1ba81 r7:76f85e1c r6:8504d900 r5:dfc55e98 [ 168.656330][ T4530] r4:00000000 [ 168.656353][ T4530] [<81552bf0>] (__sock_sendmsg) from [<81554bb8>] (__sys_sendto+0x110/0x160) [ 168.656408][ T4530] r7:76f85e1c r6:8504d900 r5:00000000 r4:00000000 [ 168.656435][ T4530] [<81554aa8>] (__sys_sendto) from [<81554c24>] (sys_sendto+0x1c/0x24) [ 168.656578][ T4530] r9:84263c00 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f85e1c [ 168.656696][ T4530] [<81554c08>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 168.656731][ T4530] Exception stack(0xdfc55fa8 to 0xdfc55ff0) [ 168.656796][ T4530] 5fa0: 76f85e1c 0000000c 00000003 76f85eb0 00000020 00000000 [ 168.656828][ T4530] 5fc0: 76f85e1c 0000000c 00000000 00000122 00000003 00000000 76f85eb0 76f870bc [ 168.656842][ T4530] 5fe0: 00000000 76f85df0 000d81d0 001349a8 [ 168.756239][ T4533] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4533 comm=syz.0.219 [ 171.426382][ T4558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=4558 comm=syz.1.227 [ 171.814433][ T31] audit: type=1400 audit(171.730:191): avc: denied { create } for pid=4574 comm="syz.0.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 172.095189][ T4575] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4575 comm=syz.0.231 [ 174.414670][ T31] audit: type=1400 audit(174.330:192): avc: denied { name_bind } for pid=4588 comm="syz.1.236" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 174.416909][ T31] audit: type=1400 audit(174.340:193): avc: denied { node_bind } for pid=4588 comm="syz.1.236" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 175.983463][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 176.164493][ T23] usb 2-1: Using ep0 maxpacket: 16 [ 176.176286][ T23] usb 2-1: unable to get BOS descriptor or descriptor too short [ 176.185465][ T23] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 176.186464][ T23] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 176.187541][ T23] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 176.197051][ T23] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 176.197896][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 176.198597][ T23] usb 2-1: Product: syz [ 176.199093][ T23] usb 2-1: Manufacturer: syz [ 176.199596][ T23] usb 2-1: SerialNumber: syz [ 176.514911][ T23] usb 2-1: 0:2 : does not exist [ 176.551710][ T23] usb 2-1: USB disconnect, device number 2 [ 179.329965][ T4641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1539 sclass=netlink_tcpdiag_socket pid=4641 comm=syz.1.248 [ 179.360720][ T4641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4641 comm=syz.1.248 [ 179.363971][ T4641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4641 comm=syz.1.248 [ 179.379235][ T4641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4641 comm=syz.1.248 [ 179.383464][ T4641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4641 comm=syz.1.248 [ 179.386233][ T4641] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4641 comm=syz.1.248 [ 180.331866][ T4660] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4660 comm=syz.0.257 [ 180.927718][ T4671] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4671 comm=syz.0.262 [ 181.585966][ T4683] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4683 comm=syz.0.267 [ 181.694388][ T4685] FAULT_INJECTION: forcing a failure. [ 181.694388][ T4685] name failslab, interval 1, probability 0, space 0, times 0 [ 181.694598][ T4685] CPU: 0 UID: 0 PID: 4685 Comm: syz.0.268 Not tainted syzkaller #0 PREEMPT [ 181.694643][ T4685] Hardware name: ARM-Versatile Express [ 181.694672][ T4685] Call trace: [ 181.694698][ T4685] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 181.694756][ T4685] r7:00000d40 r6:00000000 r5:60000013 r4:8224dfd0 [ 181.694773][ T4685] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 181.694799][ T4685] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 181.694824][ T4685] r5:83aa8c00 r4:82918790 [ 181.694832][ T4685] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 181.694859][ T4685] [<80985534>] (should_fail_ex) from [<8052e594>] (should_failslab+0x6c/0x94) [ 181.694907][ T4685] r8:00000000 r7:00000d40 r6:0000001d r5:84f93ffc r4:83001240 [ 181.694958][ T4685] [<8052e528>] (should_failslab) from [<80509a98>] (__kmalloc_noprof+0x9c/0x568) [ 181.695043][ T4685] [<805099fc>] (__kmalloc_noprof) from [<807d1a80>] (tomoyo_encode2+0x64/0xf0) [ 181.695151][ T4685] r10:00000fff r9:8309e400 r8:00000000 r7:8342db28 r6:857c6868 r5:84f93ffc [ 181.695221][ T4685] r4:84f93fea [ 181.695292][ T4685] [<807d1a1c>] (tomoyo_encode2) from [<807d1b30>] (tomoyo_encode+0x24/0x30) [ 181.695453][ T4685] r9:8309e400 r8:00000000 r7:8342db28 r6:857c6868 r5:00001000 r4:84f93feb [ 181.695496][ T4685] [<807d1b0c>] (tomoyo_encode) from [<807d1bbc>] (tomoyo_realpath_from_path+0x80/0x17c) [ 181.695525][ T4685] r5:00001000 r4:84f93000 [ 181.695719][ T4685] [<807d1b3c>] (tomoyo_realpath_from_path) from [<807cdcbc>] (tomoyo_path_number_perm+0xcc/0x22c) [ 181.695826][ T4685] r10:83aa8c00 r9:00000000 r8:857c6840 r7:00005100 r6:00000004 r5:81cd6588 [ 181.695921][ T4685] r4:857c6868 r3:826c0240 [ 181.696083][ T4685] [<807cdbf0>] (tomoyo_path_number_perm) from [<807d259c>] (tomoyo_file_ioctl+0x1c/0x20) [ 181.696147][ T4685] r9:00000004 r8:857c6840 r7:00000000 r6:00000000 r5:00005100 r4:857c6840 [ 181.696156][ T4685] [<807d2580>] (tomoyo_file_ioctl) from [<8077ee60>] (security_file_ioctl+0x64/0x1e4) [ 181.696181][ T4685] [<8077edfc>] (security_file_ioctl) from [<80577ce4>] (sys_ioctl+0x4c/0xba0) [ 181.696208][ T4685] r7:00000000 r6:857c6841 r5:00000000 r4:00005100 [ 181.696317][ T4685] [<80577c98>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 181.696364][ T4685] Exception stack(0xe02edfa8 to 0xe02edff0) [ 181.696437][ T4685] dfa0: 00000000 00000000 00000004 00005100 00000000 00000000 [ 181.696529][ T4685] dfc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f870bc [ 181.696679][ T4685] dfe0: 76f86ec0 76f86eb0 000195a4 00132510 [ 181.696727][ T4685] r10:00000036 r9:83aa8c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 181.696800][ T4685] r4:00000000 [ 181.697316][ T4685] ERROR: Out of memory at tomoyo_realpath_from_path. [ 181.775948][ T4687] FAULT_INJECTION: forcing a failure. [ 181.775948][ T4687] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.778296][ T4687] CPU: 1 UID: 0 PID: 4687 Comm: syz.0.269 Not tainted syzkaller #0 PREEMPT [ 181.778407][ T4687] Hardware name: ARM-Versatile Express [ 181.778432][ T4687] Call trace: [ 181.778473][ T4687] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 181.778581][ T4687] r7:85865400 r6:00000000 r5:60000013 r4:8224dfd0 [ 181.778602][ T4687] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 181.778654][ T4687] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 181.778707][ T4687] r5:83aab000 r4:8294f510 [ 181.778723][ T4687] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 181.778786][ T4687] [<80985534>] (should_fail_ex) from [<80985770>] (should_fail+0x14/0x18) [ 181.778853][ T4687] r8:83aab000 r7:85865400 r6:dfca9e1c r5:00000000 r4:00000000 [ 181.778871][ T4687] [<8098575c>] (should_fail) from [<80985790>] (should_fail_usercopy+0x1c/0x20) [ 181.778924][ T4687] [<80985774>] (should_fail_usercopy) from [<81556e24>] (copy_to_sockptr_offset+0x64/0x108) [ 181.778983][ T4687] [<81556dc0>] (copy_to_sockptr_offset) from [<8155dbb0>] (sk_getsockopt+0x4a4/0xe98) [ 181.779057][ T4687] r7:85865400 r6:00000000 r5:dfca9e1c r4:00000000 [ 181.779076][ T4687] [<8155d710>] (sk_getsockopt) from [<81553080>] (do_sock_getsockopt+0x108/0x1ec) [ 181.779143][ T4687] r10:00000127 r9:83aab000 r8:20004b40 r7:b5403587 r6:8504cf00 r5:00000011 [ 181.779165][ T4687] r4:00000001 [ 181.779181][ T4687] [<81552f78>] (do_sock_getsockopt) from [<81554f88>] (__sys_getsockopt+0x94/0xdc) [ 181.779238][ T4687] r8:84e1be40 r7:dfca9f50 r6:00000011 r5:dfca9f58 r4:84e1be41 [ 181.779256][ T4687] [<81554ef4>] (__sys_getsockopt) from [<81554fec>] (sys_getsockopt+0x1c/0x24) [ 181.779314][ T4687] r8:8020029c r7:00000127 r6:001304b8 r5:00000000 r4:20004b40 [ 181.779331][ T4687] [<81554fd0>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 181.779378][ T4687] Exception stack(0xdfca9fa8 to 0xdfca9ff0) [ 181.779419][ T4687] 9fa0: 20004b40 00000000 00000003 00000001 00000011 00000000 [ 181.779453][ T4687] 9fc0: 20004b40 00000000 001304b8 00000127 00300000 00000000 00006364 76f870bc [ 181.779479][ T4687] 9fe0: 76f86ec0 76f86eb0 000195a4 00132510 [ 183.246008][ T31] audit: type=1400 audit(183.170:194): avc: granted { setsecparam } for pid=4706 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 183.946497][ T31] audit: type=1400 audit(183.870:195): avc: denied { getopt } for pid=4718 comm="syz.1.283" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.950046][ T31] audit: type=1400 audit(183.870:196): avc: denied { create } for pid=4718 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 183.954169][ T31] audit: type=1400 audit(183.870:197): avc: denied { ioctl } for pid=4718 comm="syz.1.283" path="socket:[4753]" dev="sockfs" ino=4753 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 183.964775][ T31] audit: type=1400 audit(183.890:198): avc: denied { read } for pid=4718 comm="syz.1.283" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 187.597465][ T31] audit: type=1400 audit(187.520:199): avc: denied { write } for pid=4746 comm="syz.1.294" path="socket:[4824]" dev="sockfs" ino=4824 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 188.156326][ T31] audit: type=1400 audit(188.080:200): avc: denied { map } for pid=4757 comm="syz.1.299" path="/dev/input/event0" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 188.561605][ T31] audit: type=1400 audit(188.480:201): avc: denied { read write } for pid=4766 comm="syz.1.303" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 188.565227][ T31] audit: type=1400 audit(188.480:202): avc: denied { open } for pid=4766 comm="syz.1.303" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 188.849233][ T31] audit: type=1400 audit(188.770:203): avc: denied { mount } for pid=4770 comm="syz.1.304" name="/" dev="ramfs" ino=5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 189.078497][ T4775] fuse: Unknown parameter 'groud_id' [ 189.103394][ T31] audit: type=1400 audit(189.010:204): avc: denied { map } for pid=4774 comm="syz.1.306" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4874 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 189.103868][ T31] audit: type=1400 audit(189.010:205): avc: denied { read write } for pid=4774 comm="syz.1.306" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4874 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 201.796517][ T4875] FAULT_INJECTION: forcing a failure. [ 201.796517][ T4875] name failslab, interval 1, probability 0, space 0, times 0 [ 201.799599][ T4875] CPU: 1 UID: 0 PID: 4875 Comm: syz.0.349 Not tainted syzkaller #0 PREEMPT [ 201.799719][ T4875] Hardware name: ARM-Versatile Express [ 201.799744][ T4875] Call trace: [ 201.799782][ T4875] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 201.799892][ T4875] r7:00000c40 r6:00000000 r5:60000013 r4:8224dfd0 [ 201.799911][ T4875] [<80201b08>] (show_stack) from [<8021f91c>] (dump_stack_lvl+0x70/0x7c) [ 201.799961][ T4875] [<8021f8ac>] (dump_stack_lvl) from [<8021f940>] (dump_stack+0x18/0x1c) [ 201.800011][ T4875] r5:84896000 r4:82918790 [ 201.800036][ T4875] [<8021f928>] (dump_stack) from [<809856f8>] (should_fail_ex+0x1c4/0x228) [ 201.800089][ T4875] [<80985534>] (should_fail_ex) from [<8052e594>] (should_failslab+0x6c/0x94) [ 201.800153][ T4875] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 201.800171][ T4875] [<8052e528>] (should_failslab) from [<80509a98>] (__kmalloc_noprof+0x9c/0x568) [ 201.800218][ T4875] [<805099fc>] (__kmalloc_noprof) from [<807d1b78>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 201.800281][ T4875] r10:84896000 r9:8309e400 r8:00000000 r7:83420770 r6:84e1b328 r5:00001000 [ 201.800300][ T4875] r4:00000000 [ 201.800314][ T4875] [<807d1b3c>] (tomoyo_realpath_from_path) from [<807cdcbc>] (tomoyo_path_number_perm+0xcc/0x22c) [ 201.800371][ T4875] r10:84896000 r9:00000000 r8:84e1b300 r7:c400941b r6:00000004 r5:81cd6588 [ 201.800393][ T4875] r4:84e1b328 r3:826c0240 [ 201.800409][ T4875] [<807cdbf0>] (tomoyo_path_number_perm) from [<807d259c>] (tomoyo_file_ioctl+0x1c/0x20) [ 201.800462][ T4875] r9:00000003 r8:84e1b300 r7:00000000 r6:00000000 r5:c400941b r4:84e1b300 [ 201.800480][ T4875] [<807d2580>] (tomoyo_file_ioctl) from [<8077ee60>] (security_file_ioctl+0x64/0x1e4) [ 201.800528][ T4875] [<8077edfc>] (security_file_ioctl) from [<80577ce4>] (sys_ioctl+0x4c/0xba0) [ 201.800580][ T4875] r7:00000000 r6:84e1b301 r5:00000000 r4:c400941b [ 201.800595][ T4875] [<80577c98>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 201.800635][ T4875] Exception stack(0xeaf29fa8 to 0xeaf29ff0) [ 201.800668][ T4875] 9fa0: 00000000 00000000 00000003 c400941b 00000000 00000000 [ 201.800698][ T4875] 9fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f870bc [ 201.800724][ T4875] 9fe0: 76f86ec0 76f86eb0 000195a4 00132510 [ 201.800754][ T4875] r10:00000036 r9:84896000 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 201.800772][ T4875] r4:00000000 [ 201.836959][ T4875] ERROR: Out of memory at tomoyo_realpath_from_path. [ 202.827544][ T31] audit: type=1400 audit(202.750:206): avc: denied { remount } for pid=4881 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 202.839641][ T31] audit: type=1400 audit(202.760:207): avc: denied { create } for pid=4881 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 202.885287][ T31] audit: type=1400 audit(202.810:208): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 205.893269][ T74] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 206.063762][ T74] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 206.064054][ T74] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 206.064315][ T74] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 206.064554][ T74] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 206.064715][ T74] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 206.078572][ T74] usb 2-1: config 0 descriptor?? [ 206.516290][ T74] hid_parser_main: 5 callbacks suppressed [ 206.519063][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.520320][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.523878][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.533473][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.534118][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.534469][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.534752][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.535045][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.535330][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.535608][ T74] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 206.549387][ T74] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 206.809533][ T3736] usb 2-1: USB disconnect, device number 3 [ 208.748453][ T4959] syzkaller0: entered promiscuous mode [ 208.753537][ T4959] syzkaller0: entered allmulticast mode [ 211.741195][ T31] audit: type=1400 audit(211.660:209): avc: denied { create } for pid=4952 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 211.773075][ T31] audit: type=1400 audit(211.690:210): avc: denied { bind } for pid=4952 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 228.043422][ T31] audit: type=1400 audit(227.960:211): avc: denied { setopt } for pid=4975 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 229.355949][ T4985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4985 comm=syz.1.377 [ 235.265678][ T31] audit: type=1400 audit(235.190:212): avc: denied { ioctl } for pid=4995 comm="syz.1.381" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 235.266491][ T4996] binder: 4995:4996 unknown command 0 [ 235.266841][ T4996] binder: 4995:4996 ioctl c0306201 20002380 returned -22 [ 246.917042][ T31] audit: type=1400 audit(246.840:213): avc: denied { connect } for pid=5019 comm="syz.1.388" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.324448][ T31] audit: type=1400 audit(247.250:214): avc: denied { setopt } for pid=5019 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 250.191726][ T31] audit: type=1400 audit(250.110:215): avc: denied { connect } for pid=5026 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 257.334990][ T31] audit: type=1400 audit(257.250:216): avc: denied { watch watch_reads } for pid=5038 comm="syz.1.395" path="/193" dev="tmpfs" ino=1038 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 266.600636][ T5051] 8<--- cut here --- [ 266.600825][ T5051] Unable to handle kernel paging request at virtual address fee04f27 when write [ 266.600927][ T5051] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 266.602076][ T5051] Internal error: Oops: a06 [#1] SMP ARM [ 266.605852][ T5051] Modules linked in: [ 266.606393][ T5051] CPU: 1 UID: 0 PID: 5051 Comm: syz.0.399 Not tainted syzkaller #0 PREEMPT [ 266.606846][ T5051] Hardware name: ARM-Versatile Express [ 266.607356][ T5051] PC is at parport_attach+0x174/0x1d0 [ 266.608053][ T5051] LR is at parport_attach+0x164/0x1d0 [ 266.608567][ T5051] pc : [<813cb600>] lr : [<813cb5f0>] psr: 60000013 [ 266.608923][ T5051] sp : df9f1d30 ip : df9f1d30 fp : df9f1d54 [ 266.609282][ T5051] r10: 82b24900 r9 : 00000003 r8 : 83c856c0 [ 266.609585][ T5051] r7 : df9f1d90 r6 : 83c856c0 r5 : 00000000 r4 : 00000000 [ 266.609899][ T5051] r3 : fee04f27 r2 : 81e1765c r1 : 00000001 r0 : 813cb270 [ 266.610325][ T5051] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 266.610705][ T5051] Control: 30c5387d Table: 858ffb40 DAC: 00000000 [ 266.611028][ T5051] Register r0 information: non-slab/vmalloc memory [ 266.611832][ T5051] Register r1 information: non-paged memory [ 266.612182][ T5051] Register r2 information: non-slab/vmalloc memory [ 266.612438][ T5051] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 266.613041][ T5051] Register r4 information: NULL pointer [ 266.613294][ T5051] Register r5 information: NULL pointer [ 266.613750][ T5051] Register r6 information: slab kmalloc-192 start 83c856c0 pointer offset 0 size 192 [ 266.614728][ T5051] Register r7 information: 2-page vmalloc region starting at 0xdf9f0000 allocated at kernel_clone+0xac/0x3ec [ 266.615175][ T5051] Register r8 information: slab kmalloc-192 start 83c856c0 pointer offset 0 size 192 [ 266.615592][ T5051] Register r9 information: non-paged memory [ 266.615836][ T5051] Register r10 information: non-slab/vmalloc memory [ 266.616091][ T5051] Register r11 information: 2-page vmalloc region starting at 0xdf9f0000 allocated at kernel_clone+0xac/0x3ec [ 266.616496][ T5051] Register r12 information: 2-page vmalloc region starting at 0xdf9f0000 allocated at kernel_clone+0xac/0x3ec [ 266.616984][ T5051] Process syz.0.399 (pid: 5051, stack limit = 0xdf9f0000) [ 266.617311][ T5051] Stack: (0xdf9f1d30 to 0xdf9f2000) [ 266.617534][ T5051] 1d20: 823ecc98 83c856c0 829d1b3c 829d1b3c [ 266.617853][ T5051] 1d40: 81e17b1c 83c85704 df9f1d8c df9f1d58 813c768c 813cb498 200000c0 00000000 [ 266.618183][ T5051] 1d60: df9f1d7c 200000c0 83c856c0 b5403587 200000c0 84263c00 40946400 00000003 [ 266.618479][ T5051] 1d80: df9f1e4c df9f1d90 813c31d8 813c7590 656d6f63 705f6964 6f707261 00007472 [ 266.618793][ T5051] 1da0: 00000000 00004f27 0000000d 00000004 00000004 00000800 00000004 00000004 [ 266.619102][ T5051] 1dc0: 00000007 54c6cff3 00000022 00000002 00000001 00000001 00000001 00000006 [ 266.619402][ T5051] 1de0: 00000101 fffffffe 0000007f 00000003 40000003 00000089 0000cae3 00000000 [ 266.619701][ T5051] 1e00: 20001e5b 00000003 00000e66 00000003 00000008 00004086 00000000 fffffff8 [ 266.620023][ T5051] 1e20: 00000000 ee699ae5 00000000 84e1ba80 83c856c0 200000c0 200000c0 84263c00 [ 266.620323][ T5051] 1e40: df9f1f14 df9f1e50 813c41a4 813c30e4 00000000 00000000 00000000 ee699ae5 [ 266.620619][ T5051] 1e60: 00000000 00000000 8245d5b4 0000005f 83e23de0 83c856f0 841cfb94 84263c00 [ 266.620935][ T5051] 1e80: df9f1ee4 df9f1e90 807a5fa4 8079c39c 00000064 00000001 00000000 df9f1eac [ 266.621234][ T5051] 1ea0: 84df5190 8342d770 00006400 0000000b df9f1ea0 00000000 00000000 ee699ae5 [ 266.621548][ T5051] 1ec0: 84e1ba80 40946400 200000c0 200000c0 84e1ba80 00000003 df9f1ef4 df9f1ee8 [ 266.621865][ T5051] 1ee0: 807a60c4 ee699ae5 df9f1f14 40946400 00000000 84e1ba81 200000c0 84e1ba80 [ 266.622200][ T5051] 1f00: 00000003 84263c00 df9f1fa4 df9f1f18 80577dc8 813c3bd4 ecac8b10 84263c00 [ 266.622505][ T5051] 1f20: df9f1f3c df9f1f30 81a36298 81a36168 df9f1f54 df9f1f40 8025c478 8028d90c [ 266.623140][ T5051] 1f40: df9f1fb0 40000000 df9f1f84 df9f1f58 802229ec 8025c434 00000000 8281cf74 [ 266.623669][ T5051] 1f60: df9f1fb0 0014ca70 ecac8b10 80222940 00000000 ee699ae5 df9f1fac 00000000 [ 266.624008][ T5051] 1f80: 00000000 00316308 00000036 8020029c 84263c00 00000036 00000000 df9f1fa8 [ 266.624304][ T5051] 1fa0: 80200060 80577ca4 00000000 00000000 00000003 40946400 200000c0 00000000 [ 266.624605][ T5051] 1fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f870bc [ 266.624920][ T5051] 1fe0: 76f86ec0 76f86eb0 000195a4 00132510 60000010 00000003 00000000 00000000 [ 266.625244][ T5051] Call trace: [ 266.625480][ T5051] [<813cb48c>] (parport_attach) from [<813c768c>] (comedi_device_attach+0x108/0x250) [ 266.625857][ T5051] r6:83c85704 r5:81e17b1c r4:829d1b3c [ 266.626105][ T5051] [<813c7584>] (comedi_device_attach) from [<813c31d8>] (do_devconfig_ioctl+0x100/0x220) [ 266.626462][ T5051] r10:00000003 r9:40946400 r8:84263c00 r7:200000c0 r6:b5403587 r5:83c856c0 [ 266.626742][ T5051] r4:200000c0 [ 266.626894][ T5051] [<813c30d8>] (do_devconfig_ioctl) from [<813c41a4>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 266.627247][ T5051] r8:84263c00 r7:200000c0 r6:200000c0 r5:83c856c0 r4:84e1ba80 [ 266.627493][ T5051] [<813c3bc8>] (comedi_unlocked_ioctl) from [<80577dc8>] (sys_ioctl+0x130/0xba0) [ 266.627840][ T5051] r10:84263c00 r9:00000003 r8:84e1ba80 r7:200000c0 r6:84e1ba81 r5:00000000 [ 266.628120][ T5051] r4:40946400 [ 266.628265][ T5051] [<80577c98>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 266.628561][ T5051] Exception stack(0xdf9f1fa8 to 0xdf9f1ff0) [ 266.628792][ T5051] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 266.629089][ T5051] 1fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f870bc [ 266.629382][ T5051] 1fe0: 76f86ec0 76f86eb0 000195a4 00132510 [ 266.629613][ T5051] r10:00000036 r9:84263c00 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 266.629913][ T5051] r4:00000000 [ 266.630356][ T5051] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 266.630965][ T5051] ---[ end trace 0000000000000000 ]--- [ 266.631721][ T5051] Kernel panic - not syncing: Fatal exception [ 266.633964][ T5051] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:19:35 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=8224dfd0 R02=00000001 R03=840d6000 R04=00000000 R05=dddd00c0 R06=81a392f8 R07=83f0e3c0 R08=83aaec00 R09=840d6000 R10=00000000 R11=df975a54 R12=df975a00 R13=df975a10 R14=81a42cd0 R15=8028ff44 PSR=60000193 -ZC- A S svc32 s00=ffffffff s01=00000103 d00=00000103ffffffff s02=ff023680 s03=03ffffff d01=03ffffffff023680 s04=00368803 s05=90030008 d02=9003000800368803 s06=ffff0236 s07=0303ffff d03=0303ffffffff0236 s08=08003698 s09=36a00300 d04=36a0030008003698 s10=030b8002 s11=1a080b80 d05=1a080b80030b8002 s12=00000014 s13=00000000 d06=0000000000000014 s14=00000001 s15=36a80301 d07=36a8030100000001 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00080004 s33=05038002 d16=0503800200080004 s34=08038000 s35=03880205 d17=0388020508038000 s36=36800308 s37=ffffff02 d18=ffffff0236800308 s38=880303ff s39=00080036 d19=00080036880303ff s40=02369003 s41=ffffffff d20=ffffffff02369003 s42=36980303 s43=03000800 d21=0300080036980303 s44=800236a0 s45=0b80030b d22=0b80030b800236a0 s46=00141a08 s47=00000000 d23=0000000000141a08 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=bbf3d00e s53=590b2e75 d26=590b2e75bbf3d00e s54=7f92926d s55=10c0d369 d27=10c0d3697f92926d s56=bac112eb s57=ed84122d d28=ed84122dbac112eb s58=3902b72a s59=26c5c1ca d29=26c5c1ca3902b72a s60=3916b7cb s61=4636cfd3 d30=4636cfd33916b7cb s62=27e5f658 s63=de8e0d22 d31=de8e0d2227e5f658 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83f05440 R01=0000000d R02=eb827000 R03=eb827018 R04=840b303a R05=83f05440 R06=80a8d844 R07=840b303a R08=828270a8 R09=00000000 R10=00000547 R11=df9f199c R12=00000002 R13=df9f1990 R14=82959404 R15=80a8d854 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000