last executing test programs: 10.954052169s ago: executing program 1 (id=1718): setxattr$incfs_metadata(&(0x7f0000000000)='./cgroup\x00', &(0x7f0000000080), 0x0, 0x0, 0x1) removexattr(&(0x7f0000000200)='./cgroup\x00', &(0x7f0000000240)=@known='user.incfs.metadata\x00') 10.824285438s ago: executing program 1 (id=1719): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x60}, 0x1, 0x0, 0x0, 0x8040}, 0x0) 10.694011006s ago: executing program 1 (id=1720): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000180)={&(0x7f0000000040)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000001c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000500)={0x0, 0x0, r2, r3, 0x3, 0x1, 0x4, 0x5, {0x200002, 0x5, 0x2005, 0xa, 0x8000, 0x3, 0x4, 0x5, 0x9, 0xd25, 0x7, 0x60b, 0x6d, 0xfffd, "6fd5aa7203dceeb0be00ac360e3600000300"}}) 10.553886826s ago: executing program 1 (id=1721): r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000083667d1040206402d14e0102030109021b000100000000090400000190f19c00090584"], 0x0) syz_usb_disconnect(r0) r1 = syz_open_dev$I2C(&(0x7f0000000000), 0x2, 0x40402) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000040)={0x1, 0x2, 0x2, &(0x7f0000000400)={0x14, "b9085deea0480b2a85891e1dd1ecdf582cc8dca27f0000b45eac3c285b00"}}) 2.084401982s ago: executing program 0 (id=1746): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000620000095"], &(0x7f0000000200)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x0, 0x0}, 0x10) 1.891579064s ago: executing program 0 (id=1747): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi0\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) 1.781513621s ago: executing program 0 (id=1748): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ADD_TX_TS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x8801}, 0x20000800) 1.301509272s ago: executing program 0 (id=1749): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000ec0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="030300000000fcffffff0c00000008000300", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x0) 813.214665ms ago: executing program 0 (id=1750): connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000d5e9bd40eb030200c0ba050000010902115c01000000000904000001b504b100090581"], 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x400a5}, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x40, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/95) 482.777887ms ago: executing program 1 (id=1751): r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000280)={0x11, 0x0, r2, 0x1, 0x11, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="02011400012918000e1a80009f0001140000002f0600ac141430e0000003808a8972bd0b72e41082b1a3d206", @ANYBLOB="363d60be312a894a0ad8b1847ecd706f971fd8ba38e2dcccbc09c00700e2aeacc799fc70e1a37aab31c9c653530627fd6245fa47050af6"], 0xdd12}], 0x1, 0x0, 0x0, 0x4000007}, 0x4000) 232.499834ms ago: executing program 1 (id=1752): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f23, 0x0, 0x2, 0x9, 0x1, 0x40000cc7, 0x200fff, 0x5c952399, 0x5, 0x3ff, 0x802, 0x8, 0x10001, 0x1, 0x9, 0xe1cb, 0x6, 0x402, 0x3, 0x395, 0x80000089, 0xfffffffd, 0x9, 0xfffffff5, 0xffffeadb, 0x7, 0x3c, 0x8, 0x3, 0x8000000, 0x2ec0]}) 0s ago: executing program 0 (id=1753): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) bind$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x20) syz_emit_ethernet(0x8e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa1acd1f78800d86dd608a37f200587300fe8000000000000000000000000000bbfe8000000000000000000000000000aa00000000", @ANYRES8], 0x0) kernel console output (not intermixed with test programs): 6901][ T8977] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 757.086929][ T8977] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 757.086998][ T8977] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 757.087070][ T8977] r7:00000c40 r6:00000000 r5:8451d400 r4:82918a10 [ 757.087102][ T8977] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 757.087177][ T8977] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 757.087280][ T8977] r8:00000000 r7:00000c40 r6:00000000 r5:00001000 r4:830016c0 [ 757.087314][ T8977] [<805370e0>] (should_failslab) from [<80516254>] (__kmalloc_noprof+0xa4/0x590) [ 757.087386][ T8977] [<805161b0>] (__kmalloc_noprof) from [<807e0440>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 757.087475][ T8977] r10:00000000 r9:830a6000 r8:00000000 r7:8343caa0 r6:8537a0e8 r5:00001000 [ 757.087503][ T8977] r4:00000000 [ 757.087523][ T8977] [<807e0404>] (tomoyo_realpath_from_path) from [<807dc510>] (tomoyo_path_number_perm+0xcc/0x22c) [ 757.087600][ T8977] r10:00000000 r9:00000003 r8:8537a0c0 r7:84009422 r6:81cd98e8 r5:00000004 [ 757.087631][ T8977] r4:8537a0e8 r3:826c1240 [ 757.087648][ T8977] [<807dc444>] (tomoyo_path_number_perm) from [<807e0e64>] (tomoyo_file_ioctl+0x1c/0x20) [ 757.087725][ T8977] r10:8451d400 r9:00000003 r8:8537a0c0 r7:00000000 r6:00000000 r5:84009422 [ 757.087759][ T8977] r4:8537a0c0 [ 757.087784][ T8977] [<807e0e48>] (tomoyo_file_ioctl) from [<8078ccd0>] (security_file_ioctl+0x80/0x1d4) [ 757.087863][ T8977] [<8078cc50>] (security_file_ioctl) from [<80581fac>] (sys_ioctl+0x4c/0xb58) [ 757.087949][ T8977] r7:00000000 r6:84009422 r5:8537a0c1 r4:00000000 [ 757.087979][ T8977] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 757.088042][ T8977] Exception stack(0xecc65fa8 to 0xecc65ff0) [ 757.088087][ T8977] 5fa0: 00000000 00000000 00000003 84009422 00000000 00000000 [ 757.088129][ T8977] 5fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f750dc [ 757.088164][ T8977] 5fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 757.088209][ T8977] r10:00000036 r9:8451d400 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 757.088253][ T8977] r4:00000000 [ 757.107852][ T8977] ERROR: Out of memory at tomoyo_realpath_from_path. [ 757.839390][ T8985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8985 comm=syz.1.1429 [ 761.280703][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 761.285974][ T29] audit: type=1400 audit(761.180:9718): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.310132][ T29] audit: type=1400 audit(761.210:9719): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.322051][ T29] audit: type=1400 audit(761.210:9720): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.424377][ T29] audit: type=1400 audit(761.330:9721): avc: denied { unmount } for pid=7910 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 761.516529][ T29] audit: type=1400 audit(761.420:9722): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.518591][ T29] audit: type=1400 audit(761.420:9723): avc: denied { open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.525320][ T29] audit: type=1400 audit(761.420:9724): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.537660][ T29] audit: type=1400 audit(761.440:9725): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.546271][ T29] audit: type=1400 audit(761.440:9726): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.551583][ T29] audit: type=1400 audit(761.440:9727): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 762.689376][ T9013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=9013 comm=syz.0.1438 [ 762.997724][ T9018] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9018 comm=syz.1.1441 [ 763.532656][ T9023] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65534 sclass=netlink_tcpdiag_socket pid=9023 comm=syz.1.1441 [ 763.893721][ T9027] can: request_module (can-proto-5) failed. [ 765.369063][ T9043] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9043 comm=syz.1.1451 [ 766.283577][ T29] kauditd_printk_skb: 183 callbacks suppressed [ 766.284078][ T29] audit: type=1400 audit(766.190:9911): avc: denied { read } for pid=9046 comm="syz.0.1452" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.290825][ T29] audit: type=1400 audit(766.190:9912): avc: denied { read open } for pid=9046 comm="syz.0.1452" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.297046][ T29] audit: type=1400 audit(766.200:9913): avc: denied { read } for pid=9046 comm="syz.0.1452" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.303329][ T29] audit: type=1400 audit(766.210:9914): avc: denied { read open } for pid=9046 comm="syz.0.1452" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.346141][ T29] audit: type=1400 audit(766.250:9915): avc: denied { create } for pid=9046 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 766.365797][ T29] audit: type=1400 audit(766.270:9916): avc: denied { read } for pid=9046 comm="syz.0.1452" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.369083][ T29] audit: type=1400 audit(766.270:9917): avc: denied { read open } for pid=9046 comm="syz.0.1452" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.436510][ T29] audit: type=1400 audit(766.340:9918): avc: denied { read } for pid=9046 comm="syz.0.1452" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.477838][ T29] audit: type=1400 audit(766.350:9919): avc: denied { read open } for pid=9046 comm="syz.0.1452" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 766.644704][ T29] audit: type=1400 audit(766.550:9920): avc: denied { execute } for pid=9046 comm="syz.0.1452" path=2F6D656D66643A73797A30202864656C6574656429 dev="tmpfs" ino=1104 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 769.100864][ T9058] FAULT_INJECTION: forcing a failure. [ 769.100864][ T9058] name failslab, interval 1, probability 0, space 0, times 0 [ 769.129392][ T9058] CPU: 0 UID: 0 PID: 9058 Comm: syz.1.1456 Not tainted syzkaller #0 PREEMPT [ 769.129584][ T9058] Hardware name: ARM-Versatile Express [ 769.129621][ T9058] Call trace: [ 769.129671][ T9058] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 769.129804][ T9058] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 769.129831][ T9058] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 769.129897][ T9058] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 769.130033][ T9058] r7:00000000 r6:00000000 r5:859e9800 r4:82918a10 [ 769.130063][ T9058] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 769.130137][ T9058] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 769.130221][ T9058] r8:859e9800 r7:00000000 r6:00000dc0 r5:00000000 r4:830a1540 [ 769.130246][ T9058] [<805370e0>] (should_failslab) from [<80514f7c>] (kmem_cache_alloc_noprof+0x54/0x450) [ 769.130311][ T9058] [<80514f28>] (kmem_cache_alloc_noprof) from [<8079c178>] (security_file_alloc+0x30/0x184) [ 769.130445][ T9058] r10:ed4a5f18 r9:83986000 r8:852aa300 r7:83382800 r6:82ae7084 r5:852aa300 [ 769.130474][ T9058] r4:852aa300 [ 769.130505][ T9058] [<8079c148>] (security_file_alloc) from [<80568cf8>] (init_file+0x48/0x100) [ 769.130578][ T9058] r7:83382800 r6:00000000 r5:8291b92c r4:852aa300 [ 769.130599][ T9058] [<80568cb0>] (init_file) from [<80569468>] (alloc_empty_file+0x68/0x13c) [ 769.130665][ T9058] r7:83382800 r6:00000000 r5:8291b92c r4:824a6910 [ 769.130685][ T9058] [<80569400>] (alloc_empty_file) from [<8057d5d4>] (path_openat+0x44/0x140c) [ 769.130768][ T9058] r8:00000001 r7:ed4a5e50 r6:ed4a5e50 r5:859e9800 r4:ffffff9c [ 769.130827][ T9058] [<8057d590>] (path_openat) from [<8057ea4c>] (do_filp_open+0xb0/0x14c) [ 769.130960][ T9058] r10:00000142 r9:83986000 r8:00000001 r7:ed4a5f18 r6:ed4a5e50 r5:859e9800 [ 769.130991][ T9058] r4:ffffff9c [ 769.131012][ T9058] [<8057e99c>] (do_filp_open) from [<80563b20>] (do_sys_openat2+0x94/0x100) [ 769.131122][ T9058] r9:859e9800 r8:8020029c r7:ffffff9c r6:ed4a5f50 r5:83986000 r4:00000004 [ 769.131147][ T9058] [<80563a8c>] (do_sys_openat2) from [<80563f08>] (sys_openat+0x80/0xd0) [ 769.131220][ T9058] r7:00000142 r6:00000000 r5:20000040 r4:ffffff9c [ 769.131240][ T9058] [<80563e88>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 769.131297][ T9058] Exception stack(0xed4a5fa8 to 0xed4a5ff0) [ 769.131339][ T9058] 5fa0: 00000000 00000000 ffffff9c 20000040 00000000 00000000 [ 769.131418][ T9058] 5fc0: 00000000 00000000 0012e624 00000142 003462d8 00000000 00000001 76f750dc [ 769.131457][ T9058] 5fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 769.131495][ T9058] r6:0012e624 r5:00000000 r4:00000000 [ 771.300010][ T29] kauditd_printk_skb: 141 callbacks suppressed [ 771.311485][ T29] audit: type=1400 audit(771.200:10062): avc: denied { write } for pid=9051 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 771.388167][ T29] audit: type=1400 audit(771.290:10063): avc: denied { create } for pid=9063 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 771.429733][ T29] audit: type=1400 audit(771.330:10064): avc: denied { write } for pid=9063 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 771.475182][ T9064] netlink: 'syz.1.1458': attribute type 2 has an invalid length. [ 771.475658][ T9064] netlink: 'syz.1.1458': attribute type 1 has an invalid length. [ 771.493454][ T9064] netlink: 'syz.1.1458': attribute type 1 has an invalid length. [ 771.493832][ T9064] netlink: 'syz.1.1458': attribute type 1 has an invalid length. [ 771.494009][ T9064] netlink: 'syz.1.1458': attribute type 1 has an invalid length. [ 771.507603][ T29] audit: type=1400 audit(771.410:10065): avc: denied { create } for pid=9063 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 771.546455][ T29] audit: type=1400 audit(771.450:10066): avc: denied { write } for pid=9063 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 771.615207][ T29] audit: type=1400 audit(771.520:10067): avc: denied { ioctl } for pid=9063 comm="syz.1.1458" path="socket:[19919]" dev="sockfs" ino=19919 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 771.623165][ T29] audit: type=1400 audit(771.520:10068): avc: denied { module_request } for pid=9063 comm="syz.1.1458" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 772.081720][ T29] audit: type=1400 audit(771.940:10069): avc: denied { write } for pid=9051 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 772.082148][ T29] audit: type=1400 audit(771.940:10070): avc: denied { write } for pid=9051 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 772.082452][ T29] audit: type=1400 audit(771.950:10071): avc: denied { ioctl } for pid=9051 comm="syz.0.1454" path="socket:[19278]" dev="sockfs" ino=19278 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 776.303165][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 776.303903][ T29] audit: type=1400 audit(776.200:10144): avc: denied { read } for pid=9079 comm="syz.1.1464" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.307611][ T29] audit: type=1400 audit(776.210:10145): avc: denied { read open } for pid=9079 comm="syz.1.1464" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.317662][ T29] audit: type=1400 audit(776.220:10146): avc: denied { ioctl } for pid=9079 comm="syz.1.1464" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.330691][ T29] audit: type=1400 audit(776.230:10147): avc: denied { ioctl } for pid=9079 comm="syz.1.1464" path="socket:[19310]" dev="sockfs" ino=19310 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 776.428422][ T29] audit: type=1400 audit(776.330:10148): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 776.454182][ T29] audit: type=1400 audit(776.360:10149): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 776.461938][ T29] audit: type=1400 audit(776.360:10150): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 776.590461][ T29] audit: type=1400 audit(776.490:10151): avc: denied { read write } for pid=9082 comm="syz.0.1465" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.609883][ T29] audit: type=1400 audit(776.510:10152): avc: denied { read write open } for pid=9082 comm="syz.0.1465" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.639689][ T29] audit: type=1400 audit(776.540:10153): avc: denied { ioctl } for pid=9082 comm="syz.0.1465" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x4b40 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.856878][ T9086] FAULT_INJECTION: forcing a failure. [ 776.856878][ T9086] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 776.862539][ T9086] CPU: 0 UID: 0 PID: 9086 Comm: syz.1.1466 Not tainted syzkaller #0 PREEMPT [ 776.862722][ T9086] Hardware name: ARM-Versatile Express [ 776.862756][ T9086] Call trace: [ 776.862863][ T9086] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 776.863000][ T9086] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 776.863020][ T9086] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 776.863081][ T9086] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 776.863148][ T9086] r7:200037c0 r6:00000000 r5:8451ec00 r4:8294f690 [ 776.863167][ T9086] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 776.863242][ T9086] [<8099a780>] (should_fail_ex) from [<8099a9b8>] (should_fail+0x14/0x18) [ 776.863312][ T9086] r8:04000018 r7:200037c0 r6:ed701e28 r5:00000000 r4:ed701f20 [ 776.863332][ T9086] [<8099a9a4>] (should_fail) from [<8099a9d8>] (should_fail_usercopy+0x1c/0x20) [ 776.863383][ T9086] [<8099a9bc>] (should_fail_usercopy) from [<8158f2a4>] (copy_msghdr_from_user+0x50/0x1e0) [ 776.863481][ T9086] [<8158f254>] (copy_msghdr_from_user) from [<8158f4ac>] (___sys_sendmsg+0x78/0xd0) [ 776.863546][ T9086] r8:04000018 r7:00000000 r6:854a6000 r5:ed701f20 r4:ed701e6c [ 776.863569][ T9086] [<8158f434>] (___sys_sendmsg) from [<8159152c>] (__sys_sendmsg+0x8c/0xe0) [ 776.863635][ T9086] r9:8451ec00 r8:852aa840 r7:04000018 r6:200037c0 r5:852aa841 r4:00000004 [ 776.863654][ T9086] [<815914a0>] (__sys_sendmsg) from [<81591594>] (sys_sendmsg+0x14/0x18) [ 776.863720][ T9086] r8:8020029c r7:00000128 r6:0012e624 r5:00000000 r4:00000000 [ 776.863784][ T9086] [<81591580>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 776.863861][ T9086] Exception stack(0xed701fa8 to 0xed701ff0) [ 776.863907][ T9086] 1fa0: 00000000 00000000 00000004 200037c0 04000018 00000000 [ 776.863947][ T9086] 1fc0: 00000000 00000000 0012e624 00000128 003462d8 00000000 00000001 76f750dc [ 776.863978][ T9086] 1fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 779.367998][ T9099] lo: entered promiscuous mode [ 779.526960][ T9098] lo: left promiscuous mode [ 781.406381][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 781.407622][ T29] audit: type=1400 audit(781.310:10203): avc: denied { read } for pid=9107 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 781.453272][ T29] audit: type=1400 audit(781.360:10204): avc: denied { create } for pid=9107 comm="syz.1.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 781.467720][ T29] audit: type=1400 audit(781.370:10205): avc: denied { write } for pid=9107 comm="syz.1.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 781.519283][ T29] audit: type=1400 audit(781.420:10206): avc: denied { write } for pid=9107 comm="syz.1.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 782.339032][ T29] audit: type=1400 audit(782.240:10207): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 782.351743][ T29] audit: type=1400 audit(782.250:10208): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 782.352142][ T29] audit: type=1400 audit(782.250:10209): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 782.622358][ T29] audit: type=1400 audit(782.520:10210): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 782.687048][ T29] audit: type=1400 audit(782.590:10211): avc: denied { read append } for pid=9110 comm="syz.1.1473" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 782.695693][ T29] audit: type=1400 audit(782.600:10212): avc: denied { read open } for pid=9110 comm="syz.1.1473" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 785.542236][ T9116] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9116 comm=syz.1.1474 [ 786.480781][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 786.501750][ T29] audit: type=1400 audit(786.380:10236): avc: denied { read } for pid=9120 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.698817][ T29] audit: type=1400 audit(786.600:10237): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 786.707810][ T29] audit: type=1400 audit(786.610:10238): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 786.720486][ T29] audit: type=1400 audit(786.620:10239): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 786.779245][ T29] audit: type=1400 audit(786.680:10240): avc: denied { read } for pid=9120 comm="syz.0.1476" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.791745][ T29] audit: type=1400 audit(786.690:10241): avc: denied { read open } for pid=9120 comm="syz.0.1476" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.845321][ T29] audit: type=1400 audit(786.750:10242): avc: denied { ioctl } for pid=9120 comm="syz.0.1476" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x4807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 786.928385][ T29] audit: type=1400 audit(786.830:10243): avc: denied { ioctl } for pid=9120 comm="syz.0.1476" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 787.065888][ T29] audit: type=1400 audit(786.970:10244): avc: denied { read } for pid=9122 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 787.075890][ T29] audit: type=1400 audit(786.980:10245): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 787.565516][ T9127] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=359 sclass=netlink_audit_socket pid=9127 comm=syz.1.1479 [ 791.581608][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 791.583259][ T29] audit: type=1400 audit(791.480:10321): avc: denied { ioctl } for pid=9134 comm="syz.1.1482" path="socket:[19391]" dev="sockfs" ino=19391 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 791.729436][ T29] audit: type=1400 audit(791.630:10322): avc: denied { write } for pid=9136 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 791.816819][ T29] audit: type=1400 audit(791.720:10323): avc: denied { write } for pid=9136 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 791.819796][ T29] audit: type=1400 audit(791.720:10324): avc: denied { module_request } for pid=9136 comm="syz.0.1483" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 791.944534][ T29] audit: type=1400 audit(791.850:10325): avc: denied { read } for pid=9136 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 792.332504][ T29] audit: type=1400 audit(792.230:10326): avc: denied { read } for pid=9136 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 792.332946][ T29] audit: type=1400 audit(792.230:10327): avc: denied { setattr } for pid=9136 comm="syz.0.1483" name="NETLINK" dev="sockfs" ino=20071 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 792.381619][ T29] audit: type=1400 audit(792.280:10328): avc: denied { write } for pid=9136 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 792.381964][ T29] audit: type=1400 audit(792.280:10329): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 792.382155][ T29] audit: type=1400 audit(792.280:10330): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 796.719402][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 796.720724][ T29] audit: type=1400 audit(796.620:10384): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 796.747383][ T29] audit: type=1400 audit(796.650:10385): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 796.750222][ T29] audit: type=1400 audit(796.650:10386): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 796.785196][ T9163] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9163 comm=syz.1.1489 [ 797.046037][ T29] audit: type=1400 audit(796.950:10387): avc: denied { read } for pid=9164 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 797.648859][ T29] audit: type=1400 audit(797.550:10388): avc: denied { create } for pid=9164 comm="syz.0.1490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 797.827654][ T29] audit: type=1400 audit(797.730:10389): avc: denied { read write } for pid=9164 comm="syz.0.1490" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 797.833485][ T29] audit: type=1400 audit(797.740:10390): avc: denied { read write open } for pid=9164 comm="syz.0.1490" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 797.839907][ T29] audit: type=1400 audit(797.740:10391): avc: denied { ioctl } for pid=9164 comm="syz.0.1490" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 797.859772][ T29] audit: type=1400 audit(797.760:10392): avc: denied { ioctl } for pid=9164 comm="syz.0.1490" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 797.879784][ T29] audit: type=1400 audit(797.780:10393): avc: denied { ioctl } for pid=9164 comm="syz.0.1490" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 798.121817][ T2878] usb 1-1: new high-speed USB device number 28 using dummy_hcd [ 798.408629][ T2878] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 798.410033][ T2878] usb 1-1: config 0 has no interfaces? [ 798.544490][ T2878] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 798.545666][ T2878] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 798.551450][ T2878] usb 1-1: Product: syz [ 798.552438][ T2878] usb 1-1: Manufacturer: syz [ 798.567507][ T2878] usb 1-1: config 0 descriptor?? [ 798.844115][ T2878] usb 1-1: USB disconnect, device number 28 [ 799.070530][ T9166] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=9166 comm=syz.0.1490 [ 802.290482][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 802.295579][ T29] audit: type=1400 audit(802.190:10434): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 802.312359][ T29] audit: type=1400 audit(802.210:10435): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 802.316879][ T29] audit: type=1400 audit(802.220:10436): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 802.548103][ T29] audit: type=1400 audit(802.450:10437): avc: denied { read } for pid=9185 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 802.696877][ T29] audit: type=1400 audit(802.600:10438): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 802.708740][ T29] audit: type=1400 audit(802.600:10439): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 802.732430][ T29] audit: type=1400 audit(802.630:10440): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 802.932094][ T29] audit: type=1400 audit(802.830:10441): avc: denied { read } for pid=9188 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 803.004953][ T29] audit: type=1400 audit(802.910:10442): avc: denied { create } for pid=9188 comm="syz.1.1494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 803.060322][ T29] audit: type=1400 audit(802.960:10443): avc: denied { ioctl } for pid=9188 comm="syz.1.1494" path="socket:[20134]" dev="sockfs" ino=20134 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 803.481782][ T9191] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9191 comm=syz.1.1495 [ 803.536468][ T9191] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9191 comm=syz.1.1495 [ 804.772331][ T9196] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9196 comm=syz.1.1496 [ 807.295664][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 807.296177][ T29] audit: type=1400 audit(807.200:10518): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.350674][ T29] audit: type=1400 audit(807.250:10519): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.366440][ T29] audit: type=1400 audit(807.270:10520): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.392483][ T29] audit: type=1400 audit(807.290:10521): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.461916][ T29] audit: type=1400 audit(807.360:10522): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.467162][ T29] audit: type=1400 audit(807.370:10523): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.478609][ T29] audit: type=1400 audit(807.380:10524): avc: denied { write } for pid=9197 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 807.812360][ T29] audit: type=1400 audit(807.720:10525): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 807.816846][ T29] audit: type=1400 audit(807.720:10526): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 807.835436][ T29] audit: type=1400 audit(807.740:10527): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 808.072210][ T9201] FAULT_INJECTION: forcing a failure. [ 808.072210][ T9201] name failslab, interval 1, probability 0, space 0, times 0 [ 808.074614][ T9201] CPU: 0 UID: 0 PID: 9201 Comm: syz.1.1498 Not tainted syzkaller #0 PREEMPT [ 808.074747][ T9201] Hardware name: ARM-Versatile Express [ 808.074777][ T9201] Call trace: [ 808.074826][ T9201] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 808.074976][ T9201] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 808.075000][ T9201] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 808.075067][ T9201] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 808.075129][ T9201] r7:00000000 r6:00000000 r5:859eb000 r4:82918a10 [ 808.075147][ T9201] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 808.075207][ T9201] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 808.075280][ T9201] r8:859eb000 r7:00000000 r6:00000cc0 r5:00000000 r4:830a1a80 [ 808.075304][ T9201] [<805370e0>] (should_failslab) from [<80514f7c>] (kmem_cache_alloc_noprof+0x54/0x450) [ 808.075365][ T9201] [<80514f28>] (kmem_cache_alloc_noprof) from [<805763b0>] (getname_flags.part.0+0x28/0x190) [ 808.075436][ T9201] r10:00000142 r9:859eb000 r8:8020029c r7:00000000 r6:824a6930 r5:00189bb4 [ 808.075460][ T9201] r4:00189bb4 [ 808.075476][ T9201] [<80576388>] (getname_flags.part.0) from [<8057c024>] (getname_flags+0x3c/0x50) [ 808.075540][ T9201] r9:859eb000 r8:8020029c r7:ffffff9c r6:edd55f50 r5:00000000 r4:00189bb4 [ 808.075560][ T9201] [<8057bfe8>] (getname_flags) from [<80563af0>] (do_sys_openat2+0x64/0x100) [ 808.075623][ T9201] r5:00189bb4 r4:00000000 [ 808.075640][ T9201] [<80563a8c>] (do_sys_openat2) from [<80563f08>] (sys_openat+0x80/0xd0) [ 808.075702][ T9201] r7:00000142 r6:00000000 r5:00189bb4 r4:ffffff9c [ 808.075721][ T9201] [<80563e88>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 808.075774][ T9201] Exception stack(0xedd55fa8 to 0xedd55ff0) [ 808.075817][ T9201] 5fa0: 00000000 00000000 ffffff9c 00189bb4 00020002 00000000 [ 808.075891][ T9201] 5fc0: 00000000 00000000 00000000 00000142 00000003 00000000 00000001 76f750dc [ 808.075927][ T9201] 5fe0: 76f72d68 76f72d54 0010af14 00111af8 [ 808.075969][ T9201] r6:00000000 r5:00000000 r4:00000000 [ 812.312144][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 812.312357][ T29] audit: type=1400 audit(812.220:10587): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.334119][ T29] audit: type=1400 audit(812.240:10588): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.347760][ T29] audit: type=1400 audit(812.250:10589): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.364417][ T29] audit: type=1400 audit(812.270:10590): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.381554][ T29] audit: type=1400 audit(812.280:10591): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.411933][ T29] audit: type=1400 audit(812.300:10592): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.435904][ T29] audit: type=1400 audit(812.340:10593): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.471719][ T29] audit: type=1400 audit(812.370:10594): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.471950][ T29] audit: type=1400 audit(812.370:10595): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 812.489271][ T29] audit: type=1400 audit(812.370:10596): avc: denied { write } for pid=9212 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 813.382323][ T3686] usb 1-1: new high-speed USB device number 29 using dummy_hcd [ 813.601686][ T3686] usb 1-1: device descriptor read/64, error -71 [ 813.852053][ T3686] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 814.061793][ T3686] usb 1-1: device descriptor read/64, error -71 [ 814.172151][ T3686] usb usb1-port1: attempt power cycle [ 814.511938][ T3686] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 814.639601][ T3686] usb 1-1: device descriptor read/8, error -71 [ 814.871689][ T3686] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 814.905506][ T3686] usb 1-1: device descriptor read/8, error -71 [ 815.017797][ T3686] usb usb1-port1: unable to enumerate USB device [ 817.860281][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 817.860596][ T29] audit: type=1400 audit(817.760:10724): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 817.876354][ T29] audit: type=1400 audit(817.780:10725): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 817.878824][ T29] audit: type=1400 audit(817.780:10726): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 818.023679][ T29] audit: type=1400 audit(817.930:10727): avc: denied { read } for pid=9229 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 818.063981][ T29] audit: type=1400 audit(817.960:10728): avc: denied { nlmsg_write } for pid=9229 comm="syz.1.1509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 818.130777][ T29] audit: type=1400 audit(818.030:10729): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 818.135760][ T29] audit: type=1400 audit(818.040:10730): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 818.147829][ T29] audit: type=1400 audit(818.050:10731): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 818.346315][ T29] audit: type=1400 audit(818.250:10732): avc: denied { read } for pid=9231 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 818.402007][ T29] audit: type=1400 audit(818.310:10733): avc: denied { mounton } for pid=9231 comm="syz.1.1510" path="/197/file1" dev="tmpfs" ino=1081 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 819.317841][ T9237] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9237 comm=syz.1.1511 [ 823.252235][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 823.259012][ T29] audit: type=1400 audit(823.150:10777): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 823.265214][ T29] audit: type=1400 audit(823.170:10778): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 823.290508][ T29] audit: type=1400 audit(823.190:10779): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 823.499293][ T29] audit: type=1400 audit(823.400:10780): avc: denied { read } for pid=9255 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 823.560636][ T29] audit: type=1400 audit(823.460:10781): avc: denied { mounton } for pid=9255 comm="syz.0.1516" path="/112/file1" dev="tmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 823.589759][ T29] audit: type=1400 audit(823.490:10782): avc: denied { mount } for pid=9255 comm="syz.0.1516" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 823.734167][ T29] audit: type=1400 audit(823.640:10783): avc: denied { unmount } for pid=7910 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 823.809314][ T29] audit: type=1400 audit(823.710:10784): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 823.824293][ T29] audit: type=1400 audit(823.730:10785): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 823.828250][ T29] audit: type=1400 audit(823.730:10786): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 826.080394][ T9273] FAULT_INJECTION: forcing a failure. [ 826.080394][ T9273] name failslab, interval 1, probability 0, space 0, times 0 [ 826.080855][ T9273] CPU: 1 UID: 0 PID: 9273 Comm: syz.0.1523 Not tainted syzkaller #0 PREEMPT [ 826.080918][ T9273] Hardware name: ARM-Versatile Express [ 826.080967][ T9273] Call trace: [ 826.081082][ T9273] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 826.081175][ T9273] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 826.081199][ T9273] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 826.081252][ T9273] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 826.081284][ T9273] r7:00000000 r6:00000000 r5:8386c800 r4:82918a10 [ 826.081292][ T9273] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 826.081321][ T9273] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 826.081356][ T9273] r8:8386c800 r7:00000000 r6:00000dc0 r5:00000000 r4:830a1540 [ 826.081364][ T9273] [<805370e0>] (should_failslab) from [<80514f7c>] (kmem_cache_alloc_noprof+0x54/0x450) [ 826.081394][ T9273] [<80514f28>] (kmem_cache_alloc_noprof) from [<8079c178>] (security_file_alloc+0x30/0x184) [ 826.081433][ T9273] r10:8386c800 r9:00000003 r8:84cefa80 r7:84a7d800 r6:82ae7084 r5:84cefa80 [ 826.081443][ T9273] r4:84cefa80 [ 826.081450][ T9273] [<8079c148>] (security_file_alloc) from [<80568cf8>] (init_file+0x48/0x100) [ 826.081482][ T9273] r7:84a7d800 r6:00000000 r5:8291b92c r4:84cefa80 [ 826.081490][ T9273] [<80568cb0>] (init_file) from [<80569468>] (alloc_empty_file+0x68/0x13c) [ 826.081518][ T9273] r7:84a7d800 r6:00000000 r5:8291b92c r4:824a6910 [ 826.081526][ T9273] [<80569400>] (alloc_empty_file) from [<805636e8>] (dentry_open+0x28/0x68) [ 826.081654][ T9273] r8:84cefc00 r7:834a6a00 r6:8386c800 r5:ee179e84 r4:00000005 [ 826.081696][ T9273] [<805636c0>] (dentry_open) from [<805b9488>] (open_namespace+0x70/0xd4) [ 826.081731][ T9273] r5:00000000 r4:00000005 [ 826.081769][ T9273] [<805b9418>] (open_namespace) from [<805b9508>] (open_related_ns+0x1c/0x20) [ 826.081828][ T9273] r6:851f1f00 r5:00000000 r4:0000894c [ 826.081850][ T9273] [<805b94ec>] (open_related_ns) from [<8158fe40>] (sock_ioctl+0x350/0x4c0) [ 826.081883][ T9273] [<8158faf0>] (sock_ioctl) from [<805821a4>] (sys_ioctl+0x244/0xb58) [ 826.082027][ T9273] r9:00000003 r8:84cefc00 r7:00000000 r6:0000894c r5:84cefc01 r4:00000000 [ 826.082107][ T9273] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 826.082134][ T9273] Exception stack(0xee179fa8 to 0xee179ff0) [ 826.082157][ T9273] 9fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 826.082251][ T9273] 9fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f810dc [ 826.082266][ T9273] 9fe0: 76f80e88 76f80e78 00018734 0012fc20 [ 826.082359][ T9273] r10:00000036 r9:8386c800 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 826.082418][ T9273] r4:00000000 [ 828.987401][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 828.987791][ T29] audit: type=1400 audit(828.890:10851): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 828.993572][ T29] audit: type=1400 audit(828.900:10852): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 829.003241][ T29] audit: type=1400 audit(828.910:10853): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 829.160344][ T29] audit: type=1400 audit(829.060:10854): avc: denied { read } for pid=9277 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 829.190411][ T29] audit: type=1400 audit(829.090:10855): avc: denied { create } for pid=9277 comm="syz.0.1525" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 829.227259][ T29] audit: type=1400 audit(829.130:10856): avc: denied { create } for pid=9277 comm="syz.0.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 829.248023][ T29] audit: type=1400 audit(829.150:10857): avc: denied { write } for pid=9277 comm="syz.0.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 829.272536][ T29] audit: type=1400 audit(829.170:10858): avc: denied { module_request } for pid=9277 comm="syz.0.1525" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 829.476723][ T29] audit: type=1400 audit(829.380:10859): avc: denied { read } for pid=9277 comm="syz.0.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 829.509331][ T29] audit: type=1400 audit(829.410:10860): avc: denied { create } for pid=9277 comm="syz.0.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 832.225407][ T9295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9295 comm=syz.1.1528 [ 834.021994][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 834.022288][ T29] audit: type=1400 audit(833.920:10915): avc: denied { write } for pid=9298 comm="syz.0.1530" name="dev" dev="proc" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 834.046312][ T29] audit: type=1400 audit(833.950:10916): avc: denied { write } for pid=9298 comm="syz.0.1530" path="/proc/311/net/dev" dev="proc" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 834.156092][ T29] audit: type=1400 audit(834.060:10917): avc: denied { mount } for pid=9298 comm="syz.0.1530" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 834.186973][ T29] audit: type=1400 audit(834.090:10918): avc: denied { write } for pid=9298 comm="syz.0.1530" name="dev" dev="proc" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 834.308009][ T29] audit: type=1400 audit(834.210:10919): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 834.325968][ T29] audit: type=1400 audit(834.230:10920): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 834.347875][ T29] audit: type=1400 audit(834.250:10921): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 834.563755][ T29] audit: type=1400 audit(834.470:10922): avc: denied { read } for pid=9301 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 834.630371][ T29] audit: type=1400 audit(834.530:10923): avc: denied { read } for pid=9301 comm="syz.0.1531" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 834.657079][ T29] audit: type=1400 audit(834.560:10924): avc: denied { read open } for pid=9301 comm="syz.0.1531" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 835.430320][ T9306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9306 comm=syz.0.1533 [ 835.787694][ T9308] FAULT_INJECTION: forcing a failure. [ 835.787694][ T9308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 835.788107][ T9308] CPU: 1 UID: 0 PID: 9308 Comm: syz.0.1534 Not tainted syzkaller #0 PREEMPT [ 835.788224][ T9308] Hardware name: ARM-Versatile Express [ 835.788255][ T9308] Call trace: [ 835.788350][ T9308] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 835.788480][ T9308] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 835.788645][ T9308] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 835.788806][ T9308] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 835.788933][ T9308] r7:00000000 r6:00000000 r5:859eec00 r4:8294f690 [ 835.789059][ T9308] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 835.789624][ T9308] [<8099a780>] (should_fail_ex) from [<8099a9b8>] (should_fail+0x14/0x18) [ 835.789965][ T9308] r8:00000000 r7:00000000 r6:854a6f00 r5:0000000e r4:00000001 [ 835.790348][ T9308] [<8099a9a4>] (should_fail) from [<8099a9d8>] (should_fail_usercopy+0x1c/0x20) [ 835.790420][ T9308] [<8099a9bc>] (should_fail_usercopy) from [<8158edd8>] (do_sock_getsockopt+0x128/0x1e8) [ 835.790490][ T9308] [<8158ecb0>] (do_sock_getsockopt) from [<81591210>] (__sys_getsockopt+0x94/0xdc) [ 835.790647][ T9308] r9:859eec00 r8:852aa9c0 r7:ee2d9f50 r6:0000000e r5:ee2d9f58 r4:852aa9c1 [ 835.790971][ T9308] [<8159117c>] (__sys_getsockopt) from [<81591274>] (sys_getsockopt+0x1c/0x24) [ 835.791244][ T9308] r8:8020029c r7:00000127 r6:0012e624 r5:00000000 r4:20001c40 [ 835.791493][ T9308] [<81591258>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 835.791635][ T9308] Exception stack(0xee2d9fa8 to 0xee2d9ff0) [ 835.791685][ T9308] 9fa0: 20001c40 00000000 00000003 00000001 0000000e 00000000 [ 835.791848][ T9308] 9fc0: 20001c40 00000000 0012e624 00000127 003462d8 00000000 00000001 76f810dc [ 835.791891][ T9308] 9fe0: 76f80e88 76f80e78 00018734 0012fc20 [ 839.218832][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 839.219352][ T29] audit: type=1400 audit(839.120:10981): avc: denied { read } for pid=9325 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 839.307297][ T29] audit: type=1400 audit(839.210:10982): avc: denied { create } for pid=9325 comm="syz.1.1540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 839.318190][ T29] audit: type=1400 audit(839.220:10983): avc: denied { write } for pid=9325 comm="syz.1.1540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 839.640683][ T29] audit: type=1400 audit(839.540:10984): avc: denied { read } for pid=9321 comm="syz.0.1539" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 839.698395][ T29] audit: type=1400 audit(839.600:10985): avc: denied { read open } for pid=9321 comm="syz.0.1539" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 839.726596][ T29] audit: type=1400 audit(839.630:10986): avc: denied { create } for pid=9321 comm="syz.0.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 839.800269][ T29] audit: type=1400 audit(839.700:10987): avc: denied { create } for pid=9321 comm="syz.0.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 839.848404][ T29] audit: type=1400 audit(839.750:10988): avc: denied { write } for pid=9321 comm="syz.0.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 839.907656][ T29] audit: type=1400 audit(839.810:10989): avc: denied { module_request } for pid=9321 comm="syz.0.1539" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 840.353071][ T29] audit: type=1400 audit(840.260:10990): avc: denied { map_create } for pid=9321 comm="syz.0.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 842.182190][ T9335] vcan0: tx drop: invalid sa for name 0x0000000000000002 [ 843.028177][ T9334] syz.1.1542: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 843.029300][ T9334] CPU: 1 UID: 0 PID: 9334 Comm: syz.1.1542 Not tainted syzkaller #0 PREEMPT [ 843.029335][ T9334] Hardware name: ARM-Versatile Express [ 843.029347][ T9334] Call trace: [ 843.029363][ T9334] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 843.029449][ T9334] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 843.029462][ T9334] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 843.029504][ T9334] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 843.029567][ T9334] r7:00000000 r6:822bdbe0 r5:8386a400 r4:00000000 [ 843.029577][ T9334] [<8021ed80>] (dump_stack) from [<80506d78>] (warn_alloc+0xdc/0x184) [ 843.029638][ T9334] [<80506c9c>] (warn_alloc) from [<804f4ee0>] (__vmalloc_node_range_noprof+0xbc/0x668) [ 843.029670][ T9334] r3:1ffffff8 r2:822bdbe0 [ 843.029683][ T9334] r7:822bdc18 r6:00000dc0 r5:ff800000 r4:df800000 [ 843.029713][ T9334] [<804f4e24>] (__vmalloc_node_range_noprof) from [<80516f64>] (__kvmalloc_node_noprof+0x298/0x714) [ 843.029751][ T9334] r10:853f2800 r9:000029c0 r8:8386a400 r7:00000000 r6:00000000 r5:00000400 [ 843.029761][ T9334] r4:1ffffff8 [ 843.029768][ T9334] [<80516ccc>] (__kvmalloc_node_noprof) from [<81763360>] (xt_alloc_entry_offsets+0x28/0x34) [ 843.029806][ T9334] r10:853f2800 r9:20000090 r8:ee3e9de8 r7:000003f8 r6:00000000 r5:ee3e9de0 [ 843.029815][ T9334] r4:853f2840 [ 843.029823][ T9334] [<81763338>] (xt_alloc_entry_offsets) from [<81827ff4>] (translate_table+0x80/0x604) [ 843.029884][ T9334] [<81827f74>] (translate_table) from [<81829750>] (do_arpt_set_ctl+0x208/0x82c) [ 843.029920][ T9334] r10:00000000 r9:20000090 r8:851f0f80 r7:000003f8 r6:853f2840 r5:ee3e9de0 [ 843.029929][ T9334] r4:853f2800 [ 843.029937][ T9334] [<81829548>] (do_arpt_set_ctl) from [<816eb078>] (nf_setsockopt+0x54/0x70) [ 843.029972][ T9334] r10:00000126 r9:8386a400 r8:00000448 r7:854a7680 r6:00000060 r5:81829548 [ 843.030014][ T9334] r4:829f1ec8 [ 843.030056][ T9334] [<816eb028>] (nf_setsockopt) from [<81789d64>] (ip_setsockopt+0x88/0x98) [ 843.030090][ T9334] r6:8524cd80 r5:00000448 r4:00000060 [ 843.030198][ T9334] [<81789ce0>] (ip_setsockopt) from [<8179a374>] (tcp_setsockopt+0x3c/0x58) [ 843.030299][ T9334] r6:00000060 r5:00000000 r4:81789cdc [ 843.030317][ T9334] [<8179a33c>] (tcp_setsockopt) from [<81591eac>] (sock_common_setsockopt+0x38/0x40) [ 843.030369][ T9334] r4:8179a338 [ 843.030384][ T9334] [<81591e78>] (sock_common_setsockopt) from [<8158d6f4>] (do_sock_setsockopt+0x70/0xc8) [ 843.030442][ T9334] r4:81591e74 [ 843.030459][ T9334] [<8158d684>] (do_sock_setsockopt) from [<81591110>] (__sys_setsockopt+0x7c/0xc4) [ 843.030527][ T9334] r8:00000000 r7:852aad80 r6:852aad81 r5:00000060 r4:00000000 [ 843.030543][ T9334] [<81591094>] (__sys_setsockopt) from [<81591174>] (sys_setsockopt+0x1c/0x24) [ 843.030627][ T9334] r8:8020029c r7:00000126 r6:00346318 r5:00000000 r4:00000448 [ 843.030648][ T9334] [<81591158>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 843.030697][ T9334] Exception stack(0xee3e9fa8 to 0xee3e9ff0) [ 843.030737][ T9334] 9fa0: 00000448 00000000 00000005 00000000 00000060 20000040 [ 843.030774][ T9334] 9fc0: 00000448 00000000 00346318 00000126 003462d8 00000000 00000001 76f750dc [ 843.030802][ T9334] 9fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 843.035066][ T9334] Mem-Info: [ 843.035596][ T9334] active_anon:3153 inactive_anon:0 isolated_anon:0 [ 843.035596][ T9334] active_file:4077 inactive_file:37662 isolated_file:0 [ 843.035596][ T9334] unevictable:768 dirty:14 writeback:0 [ 843.035596][ T9334] slab_reclaimable:1159 slab_unreclaimable:5734 [ 843.035596][ T9334] mapped:2566 shmem:2410 pagetables:398 [ 843.035596][ T9334] sec_pagetables:0 bounce:0 [ 843.035596][ T9334] kernel_misc_reclaimable:0 [ 843.035596][ T9334] free:432976 free_pcp:1306 free_cma:4032 [ 843.035921][ T9334] Node 0 active_anon:12612kB inactive_anon:0kB active_file:16308kB inactive_file:150648kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10264kB dirty:56kB writeback:0kB shmem:9640kB kernel_stack:1520kB pagetables:1592kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 843.036378][ T9334] Normal free:1376952kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1988kB unevictable:0kB writepending:20kB zspages:0kB present:1556480kB managed:1426896kB mlocked:0kB bounce:0kB free_pcp:5224kB local_pcp:2908kB free_cma:0kB [ 843.036534][ T9334] lowmem_reserve[]: 0 4224 4224 [ 843.037185][ T9334] Normal: 22*4kB (UME) 10*8kB (UME) 117*16kB (UME) 78*32kB (UME) 52*64kB (UME) 4*128kB (UE) 4*256kB (ME) 11*512kB (UME) 6*1024kB (UME) 2*2048kB (M) 330*4096kB (UM) = 1376952kB [ 843.064347][ T9334] 44149 total pagecache pages [ 843.065149][ T9334] 0 pages in swap cache [ 843.065823][ T9334] Free swap = 124996kB [ 843.066485][ T9334] Total swap = 124996kB [ 843.067279][ T9334] 524288 pages RAM [ 843.067918][ T9334] 135168 pages HighMem/MovableOnly [ 843.068635][ T9334] 32396 pages reserved [ 843.069301][ T9334] 4096 pages cma reserved [ 843.446487][ T9337] FAULT_INJECTION: forcing a failure. [ 843.446487][ T9337] name failslab, interval 1, probability 0, space 0, times 0 [ 843.464264][ T9337] CPU: 0 UID: 0 PID: 9337 Comm: syz.1.1543 Not tainted syzkaller #0 PREEMPT [ 843.464359][ T9337] Hardware name: ARM-Versatile Express [ 843.464377][ T9337] Call trace: [ 843.464400][ T9337] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 843.464464][ T9337] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 843.464473][ T9337] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 843.464503][ T9337] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 843.464535][ T9337] r7:00000c40 r6:00000000 r5:8386bc00 r4:82918a10 [ 843.464592][ T9337] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 843.464630][ T9337] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 843.464666][ T9337] r8:00000000 r7:00000c40 r6:00000000 r5:00001000 r4:830016c0 [ 843.464675][ T9337] [<805370e0>] (should_failslab) from [<80516254>] (__kmalloc_noprof+0xa4/0x590) [ 843.464703][ T9337] [<805161b0>] (__kmalloc_noprof) from [<807e0440>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 843.464744][ T9337] r10:00000000 r9:830a6000 r8:00000000 r7:834c36e8 r6:852aa868 r5:00001000 [ 843.464754][ T9337] r4:00000000 [ 843.464762][ T9337] [<807e0404>] (tomoyo_realpath_from_path) from [<807dc510>] (tomoyo_path_number_perm+0xcc/0x22c) [ 843.464799][ T9337] r10:00000000 r9:00000003 r8:852aa840 r7:00000002 r6:81cd98e8 r5:00000004 [ 843.464810][ T9337] r4:852aa868 r3:826c1240 [ 843.464818][ T9337] [<807dc444>] (tomoyo_path_number_perm) from [<807e0e64>] (tomoyo_file_ioctl+0x1c/0x20) [ 843.464854][ T9337] r10:8386bc00 r9:00000003 r8:852aa840 r7:200001c0 r6:200001c0 r5:00000002 [ 843.464864][ T9337] r4:852aa840 [ 843.464871][ T9337] [<807e0e48>] (tomoyo_file_ioctl) from [<8078ccd0>] (security_file_ioctl+0x80/0x1d4) [ 843.464927][ T9337] [<8078cc50>] (security_file_ioctl) from [<80581fac>] (sys_ioctl+0x4c/0xb58) [ 843.464975][ T9337] r7:200001c0 r6:00000002 r5:852aa841 r4:00000000 [ 843.464985][ T9337] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 843.465010][ T9337] Exception stack(0xdf971fa8 to 0xdf971ff0) [ 843.465031][ T9337] 1fa0: 00000000 00000000 00000003 00000002 200001c0 00000000 [ 843.465050][ T9337] 1fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f750dc [ 843.465065][ T9337] 1fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 843.465084][ T9337] r10:00000036 r9:8386bc00 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 843.465093][ T9337] r4:00000000 [ 843.480472][ T9337] ERROR: Out of memory at tomoyo_realpath_from_path. [ 844.521814][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 844.522323][ T29] audit: type=1400 audit(844.410:11040): avc: denied { read write } for pid=9338 comm="syz.1.1544" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 844.545046][ T29] audit: type=1400 audit(844.450:11041): avc: denied { read write open } for pid=9338 comm="syz.1.1544" path="/dev/udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 844.592624][ T29] audit: type=1400 audit(844.500:11042): avc: denied { ioctl } for pid=9338 comm="syz.1.1544" path="/dev/udmabuf" dev="devtmpfs" ino=664 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 844.649859][ T29] audit: type=1400 audit(844.550:11043): avc: denied { read } for pid=9338 comm="syz.1.1544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 844.777839][ T29] audit: type=1400 audit(844.680:11044): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 844.780145][ T29] audit: type=1400 audit(844.680:11045): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 844.784468][ T29] audit: type=1400 audit(844.690:11046): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 845.015292][ T29] audit: type=1400 audit(844.920:11047): avc: denied { read } for pid=9342 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 845.162602][ T29] audit: type=1400 audit(845.060:11048): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 845.166377][ T29] audit: type=1400 audit(845.070:11049): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 848.818398][ T9354] nvme_fabrics: missing parameter 'transport=%s' [ 848.818725][ T9354] nvme_fabrics: missing parameter 'nqn=%s' [ 849.597863][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 849.601554][ T29] audit: type=1400 audit(849.500:11099): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 849.605418][ T29] audit: type=1400 audit(849.510:11100): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 849.608633][ T29] audit: type=1400 audit(849.510:11101): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 849.854859][ T29] audit: type=1400 audit(849.760:11102): avc: denied { read } for pid=9362 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 849.909321][ T29] audit: type=1400 audit(849.810:11103): avc: denied { create } for pid=9362 comm="syz.1.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 849.930325][ T29] audit: type=1400 audit(849.830:11104): avc: denied { write } for pid=9362 comm="syz.1.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 850.006727][ T29] audit: type=1400 audit(849.910:11105): avc: denied { write } for pid=9362 comm="syz.1.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 850.333385][ T29] audit: type=1400 audit(850.240:11106): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.352757][ T29] audit: type=1400 audit(850.260:11107): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.365075][ T29] audit: type=1400 audit(850.270:11108): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 854.881516][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 854.882939][ T29] audit: type=1400 audit(854.780:11166): avc: denied { ioctl } for pid=9383 comm="syz.1.1559" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x534a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 855.431987][ T29] audit: type=1400 audit(855.340:11167): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.441739][ T29] audit: type=1400 audit(855.340:11168): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.442222][ T29] audit: type=1400 audit(855.340:11169): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.519368][ T29] audit: type=1400 audit(855.420:11170): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.524676][ T29] audit: type=1400 audit(855.430:11171): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.535624][ T29] audit: type=1400 audit(855.440:11172): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.633235][ T29] audit: type=1400 audit(855.520:11173): avc: denied { read } for pid=9389 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 855.788621][ T29] audit: type=1400 audit(855.690:11174): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.803811][ T29] audit: type=1400 audit(855.710:11175): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 859.941385][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 859.941852][ T29] audit: type=1400 audit(859.840:11214): avc: denied { read } for pid=9403 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 860.070937][ T29] audit: type=1400 audit(859.960:11215): avc: denied { name_bind } for pid=9403 comm="syz.0.1565" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 860.077584][ T29] audit: type=1400 audit(859.980:11216): avc: denied { node_bind } for pid=9403 comm="syz.0.1565" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 860.139363][ T29] audit: type=1400 audit(860.040:11217): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.146669][ T29] audit: type=1400 audit(860.050:11218): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.153602][ T29] audit: type=1400 audit(860.060:11219): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.344207][ T29] audit: type=1400 audit(860.250:11220): avc: denied { read } for pid=9405 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 860.381724][ T29] audit: type=1400 audit(860.280:11221): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.385211][ T29] audit: type=1400 audit(860.290:11222): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.408780][ T29] audit: type=1400 audit(860.310:11223): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 864.279258][ T9425] fuse: Unknown parameter 'f´?' [ 865.029996][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 865.030607][ T29] audit: type=1400 audit(864.930:11301): avc: denied { read } for pid=9427 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.548813][ T29] audit: type=1400 audit(865.450:11302): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.556272][ T29] audit: type=1400 audit(865.460:11303): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.562668][ T29] audit: type=1400 audit(865.470:11304): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.726797][ T29] audit: type=1400 audit(865.630:11305): avc: denied { read } for pid=9430 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.787054][ T29] audit: type=1400 audit(865.690:11306): avc: denied { mounton } for pid=9430 comm="syz.1.1573" path="/227/file1" dev="tmpfs" ino=1248 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 865.800051][ T29] audit: type=1400 audit(865.700:11307): avc: denied { mount } for pid=9430 comm="syz.1.1573" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 865.923224][ T29] audit: type=1400 audit(865.830:11308): avc: denied { unmount } for pid=7372 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 865.975515][ T29] audit: type=1400 audit(865.880:11309): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.980168][ T29] audit: type=1400 audit(865.880:11310): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 866.350544][ T9433] FAULT_INJECTION: forcing a failure. [ 866.350544][ T9433] name failslab, interval 1, probability 0, space 0, times 0 [ 866.371666][ T9433] CPU: 1 UID: 0 PID: 9433 Comm: syz.1.1574 Not tainted syzkaller #0 PREEMPT [ 866.371850][ T9433] Hardware name: ARM-Versatile Express [ 866.371885][ T9433] Call trace: [ 866.371934][ T9433] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 866.372087][ T9433] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 866.372113][ T9433] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 866.372186][ T9433] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 866.372269][ T9433] r7:00000000 r6:00000000 r5:83869800 r4:82918a10 [ 866.372290][ T9433] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 866.372365][ T9433] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 866.372454][ T9433] r8:83869800 r7:00000000 r6:00000cc0 r5:00000000 r4:830b0c00 [ 866.372477][ T9433] [<805370e0>] (should_failslab) from [<80515824>] (kmem_cache_alloc_node_noprof+0x58/0x458) [ 866.372587][ T9433] [<805157cc>] (kmem_cache_alloc_node_noprof) from [<8159bca4>] (__alloc_skb+0x90/0x198) [ 866.372694][ T9433] r10:00000000 r9:0000000a r8:00000cc0 r7:830b0c00 r6:00000000 r5:ffffffff [ 866.372718][ T9433] r4:00000000 [ 866.372736][ T9433] [<8159bc14>] (__alloc_skb) from [<816bed8c>] (netlink_alloc_large_skb+0x8c/0xa8) [ 866.372822][ T9433] r8:00000000 r7:84e2e800 r6:00000030 r5:834a7b80 r4:00000140 [ 866.372845][ T9433] [<816bed00>] (netlink_alloc_large_skb) from [<816bf550>] (netlink_sendmsg+0x134/0x444) [ 866.372913][ T9433] r5:834a7b80 r4:dfe01f20 [ 866.372932][ T9433] [<816bf41c>] (netlink_sendmsg) from [<8158e214>] (__sock_sendmsg+0x44/0x78) [ 866.373029][ T9433] r10:04020850 r9:00000000 r8:dfe01dcc r7:00000000 r6:834a7b80 r5:dfe01f20 [ 866.373053][ T9433] r4:00000000 [ 866.373071][ T9433] [<8158e1d0>] (__sock_sendmsg) from [<8158f0d0>] (____sys_sendmsg+0x238/0x2c4) [ 866.373149][ T9433] r7:00000000 r6:00000000 r5:834a7b80 r4:dfe01f20 [ 866.373169][ T9433] [<8158ee98>] (____sys_sendmsg) from [<8158f4d0>] (___sys_sendmsg+0x9c/0xd0) [ 866.373248][ T9433] r10:00000128 r9:20000140 r8:04020850 r7:00000000 r6:834a7b80 r5:dfe01f20 [ 866.373271][ T9433] r4:00000000 [ 866.373290][ T9433] [<8158f434>] (___sys_sendmsg) from [<8159152c>] (__sys_sendmsg+0x8c/0xe0) [ 866.373363][ T9433] r9:83869800 r8:85fd83c0 r7:04020850 r6:20000140 r5:85fd83c1 r4:00000004 [ 866.373385][ T9433] [<815914a0>] (__sys_sendmsg) from [<81591594>] (sys_sendmsg+0x14/0x18) [ 866.373455][ T9433] r8:8020029c r7:00000128 r6:0012e624 r5:00000000 r4:00000000 [ 866.373474][ T9433] [<81591580>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 866.373530][ T9433] Exception stack(0xdfe01fa8 to 0xdfe01ff0) [ 866.373575][ T9433] 1fa0: 00000000 00000000 00000004 20000140 04020850 00000000 [ 866.373615][ T9433] 1fc0: 00000000 00000000 0012e624 00000128 003462d8 00000000 00000001 76f750dc [ 866.373649][ T9433] 1fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 870.074284][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 870.074728][ T29] audit: type=1400 audit(869.980:11366): avc: denied { read } for pid=9446 comm="syz.1.1578" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.078692][ T29] audit: type=1400 audit(869.980:11367): avc: denied { read open } for pid=9446 comm="syz.1.1578" path="/dev/audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.153678][ T29] audit: type=1400 audit(870.060:11368): avc: denied { create } for pid=9446 comm="syz.1.1578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 870.200356][ T9447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9447 comm=syz.1.1578 [ 870.268866][ T29] audit: type=1400 audit(870.170:11369): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.291721][ T29] audit: type=1400 audit(870.190:11370): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.291985][ T29] audit: type=1400 audit(870.190:11371): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.392930][ T29] audit: type=1400 audit(870.290:11372): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.393198][ T29] audit: type=1400 audit(870.290:11373): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.393378][ T29] audit: type=1400 audit(870.290:11374): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.534989][ T29] audit: type=1400 audit(870.430:11375): avc: denied { read } for pid=9449 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.210247][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 875.210483][ T29] audit: type=1400 audit(875.110:11436): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.233577][ T29] audit: type=1400 audit(875.140:11437): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.244161][ T29] audit: type=1400 audit(875.150:11438): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.372723][ T29] audit: type=1400 audit(875.280:11439): avc: denied { read } for pid=9473 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.409388][ T29] audit: type=1400 audit(875.310:11440): avc: denied { read } for pid=9473 comm="syz.1.1585" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.428050][ T29] audit: type=1400 audit(875.330:11441): avc: denied { read open } for pid=9473 comm="syz.1.1585" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.447133][ T29] audit: type=1400 audit(875.350:11442): avc: denied { ioctl } for pid=9473 comm="syz.1.1585" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.471540][ T29] audit: type=1400 audit(875.370:11443): avc: denied { ioctl } for pid=9473 comm="syz.1.1585" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.488622][ T29] audit: type=1400 audit(875.390:11444): avc: denied { ioctl } for pid=9473 comm="syz.1.1585" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b71 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 875.546268][ T29] audit: type=1400 audit(875.450:11445): avc: denied { ioctl } for pid=9473 comm="syz.1.1585" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b66 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 878.297056][ T9492] SELinux: policydb version 1526031191 does not match my version range 15-35 [ 878.297635][ T9492] SELinux: failed to load policy [ 881.060485][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 881.060756][ T29] audit: type=1400 audit(880.960:11524): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 881.079379][ T29] audit: type=1400 audit(880.980:11525): avc: denied { open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 881.082987][ T29] audit: type=1400 audit(880.990:11526): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 881.086095][ T29] audit: type=1400 audit(880.990:11527): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 881.151888][ T29] audit: type=1400 audit(881.050:11528): avc: denied { read } for pid=9504 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 881.181868][ T29] audit: type=1400 audit(881.080:11529): avc: denied { write } for pid=9504 comm="syz.0.1596" name="i2c-2" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 881.189853][ T29] audit: type=1400 audit(881.090:11530): avc: denied { open } for pid=9504 comm="syz.0.1596" path="/dev/i2c-2" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 881.198098][ T29] audit: type=1400 audit(881.100:11531): avc: denied { read } for pid=9505 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 881.215629][ T29] audit: type=1400 audit(881.120:11532): avc: denied { read } for pid=9504 comm="syz.0.1596" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 881.227782][ T29] audit: type=1400 audit(881.130:11533): avc: denied { read open } for pid=9504 comm="syz.0.1596" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 885.676895][ T9540] FAULT_INJECTION: forcing a failure. [ 885.676895][ T9540] name failslab, interval 1, probability 0, space 0, times 0 [ 885.693861][ T9540] CPU: 1 UID: 0 PID: 9540 Comm: syz.1.1607 Not tainted syzkaller #0 PREEMPT [ 885.694048][ T9540] Hardware name: ARM-Versatile Express [ 885.694080][ T9540] Call trace: [ 885.694125][ T9540] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 885.694256][ T9540] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 885.694276][ T9540] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 885.694333][ T9540] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 885.694403][ T9540] r7:00000d40 r6:00000000 r5:859eec00 r4:82918a10 [ 885.694421][ T9540] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 885.694487][ T9540] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 885.694560][ T9540] r8:00000000 r7:00000d40 r6:00000000 r5:00000021 r4:83001240 [ 885.694578][ T9540] [<805370e0>] (should_failslab) from [<80516254>] (__kmalloc_noprof+0xa4/0x590) [ 885.694635][ T9540] [<805161b0>] (__kmalloc_noprof) from [<807e034c>] (tomoyo_encode2+0x64/0xec) [ 885.694716][ T9540] r10:00000fff r9:830a6000 r8:00000000 r7:8343caa0 r6:85fd8ce8 r5:85accffc [ 885.694739][ T9540] r4:85accfe6 [ 885.694756][ T9540] [<807e02e8>] (tomoyo_encode2) from [<807e03f8>] (tomoyo_encode+0x24/0x30) [ 885.694835][ T9540] r9:830a6000 r8:00000000 r7:8343caa0 r6:85fd8ce8 r5:00001000 r4:85accfe7 [ 885.694855][ T9540] [<807e03d4>] (tomoyo_encode) from [<807e0484>] (tomoyo_realpath_from_path+0x80/0x16c) [ 885.694923][ T9540] r5:00001000 r4:85acc000 [ 885.694940][ T9540] [<807e0404>] (tomoyo_realpath_from_path) from [<807dc510>] (tomoyo_path_number_perm+0xcc/0x22c) [ 885.695027][ T9540] r10:00000000 r9:00000003 r8:85fd8cc0 r7:84009422 r6:81cd98e8 r5:00000004 [ 885.695052][ T9540] r4:85fd8ce8 r3:826c1240 [ 885.695069][ T9540] [<807dc444>] (tomoyo_path_number_perm) from [<807e0e64>] (tomoyo_file_ioctl+0x1c/0x20) [ 885.695147][ T9540] r10:859eec00 r9:00000003 r8:85fd8cc0 r7:00000000 r6:00000000 r5:84009422 [ 885.695168][ T9540] r4:85fd8cc0 [ 885.695185][ T9540] [<807e0e48>] (tomoyo_file_ioctl) from [<8078ccd0>] (security_file_ioctl+0x80/0x1d4) [ 885.695251][ T9540] [<8078cc50>] (security_file_ioctl) from [<80581fac>] (sys_ioctl+0x4c/0xb58) [ 885.695324][ T9540] r7:00000000 r6:84009422 r5:85fd8cc1 r4:00000000 [ 885.695342][ T9540] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 885.695394][ T9540] Exception stack(0xea725fa8 to 0xea725ff0) [ 885.695434][ T9540] 5fa0: 00000000 00000000 00000003 84009422 00000000 00000000 [ 885.695476][ T9540] 5fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f750dc [ 885.695506][ T9540] 5fe0: 76f74e88 76f74e78 00018734 0012fc20 [ 885.695545][ T9540] r10:00000036 r9:859eec00 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 885.695565][ T9540] r4:00000000 [ 885.723040][ T9540] ERROR: Out of memory at tomoyo_realpath_from_path. [ 886.070613][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 886.072684][ T29] audit: type=1400 audit(885.970:11673): avc: denied { read } for pid=9547 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 886.100372][ T29] audit: type=1400 audit(886.000:11674): avc: denied { read } for pid=9548 comm="syz.0.1611" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 886.109670][ T29] audit: type=1400 audit(886.010:11675): avc: denied { create } for pid=9547 comm="syz.1.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 886.116394][ T29] audit: type=1400 audit(886.020:11676): avc: denied { ioctl } for pid=9547 comm="syz.1.1612" path="socket:[20932]" dev="sockfs" ino=20932 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 886.120156][ T29] audit: type=1400 audit(886.020:11677): avc: denied { read open } for pid=9548 comm="syz.0.1611" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 886.123497][ T29] audit: type=1400 audit(886.020:11678): avc: denied { write } for pid=9547 comm="syz.1.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 886.170223][ T29] audit: type=1400 audit(886.070:11679): avc: denied { read } for pid=9547 comm="syz.1.1612" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 886.173293][ T29] audit: type=1400 audit(886.070:11680): avc: denied { open } for pid=9547 comm="syz.1.1612" path="net:[4026532821]" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 886.184705][ T29] audit: type=1400 audit(886.090:11681): avc: denied { create } for pid=9547 comm="syz.1.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 886.188702][ T29] audit: type=1400 audit(886.090:11682): avc: denied { getattr } for pid=9548 comm="syz.0.1611" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 887.466330][ T9564] FAULT_INJECTION: forcing a failure. [ 887.466330][ T9564] name failslab, interval 1, probability 0, space 0, times 0 [ 887.466590][ T9564] CPU: 0 UID: 0 PID: 9564 Comm: syz.0.1618 Not tainted syzkaller #0 PREEMPT [ 887.466643][ T9564] Hardware name: ARM-Versatile Express [ 887.466664][ T9564] Call trace: [ 887.466688][ T9564] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 887.466748][ T9564] r7:60000013 r6:60000013 r5:822a20bc r4:00000000 [ 887.466758][ T9564] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 887.466786][ T9564] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 887.466819][ T9564] r7:00000c40 r6:00000000 r5:83868c00 r4:82918a10 [ 887.466827][ T9564] [<8021ed80>] (dump_stack) from [<8099a940>] (should_fail_ex+0x1c0/0x224) [ 887.466891][ T9564] [<8099a780>] (should_fail_ex) from [<8053714c>] (should_failslab+0x6c/0x94) [ 887.466928][ T9564] r8:00000000 r7:00000c40 r6:00000000 r5:00001000 r4:830016c0 [ 887.466937][ T9564] [<805370e0>] (should_failslab) from [<80516254>] (__kmalloc_noprof+0xa4/0x590) [ 887.466973][ T9564] [<805161b0>] (__kmalloc_noprof) from [<807e0440>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 887.467015][ T9564] r10:00000000 r9:830a7400 r8:00000000 r7:85470dd0 r6:84cefaa8 r5:00001000 [ 887.467026][ T9564] r4:00000000 [ 887.467034][ T9564] [<807e0404>] (tomoyo_realpath_from_path) from [<807dc510>] (tomoyo_path_number_perm+0xcc/0x22c) [ 887.467071][ T9564] r10:00000000 r9:00000004 r8:84cefa80 r7:000089f1 r6:81cd98e8 r5:00000004 [ 887.467083][ T9564] r4:84cefaa8 r3:826c1240 [ 887.467091][ T9564] [<807dc444>] (tomoyo_path_number_perm) from [<807e0e64>] (tomoyo_file_ioctl+0x1c/0x20) [ 887.467128][ T9564] r10:83868c00 r9:00000004 r8:84cefa80 r7:20000280 r6:20000280 r5:000089f1 [ 887.467138][ T9564] r4:84cefa80 [ 887.467152][ T9564] [<807e0e48>] (tomoyo_file_ioctl) from [<8078ccd0>] (security_file_ioctl+0x80/0x1d4) [ 887.467304][ T9564] [<8078cc50>] (security_file_ioctl) from [<80581fac>] (sys_ioctl+0x4c/0xb58) [ 887.467414][ T9564] r7:20000280 r6:000089f1 r5:84cefa80 r4:00000000 [ 887.467519][ T9564] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 887.467805][ T9564] Exception stack(0xea9fdfa8 to 0xea9fdff0) [ 887.467887][ T9564] dfa0: 00000000 00000000 00000004 000089f1 20000280 00000000 [ 887.467927][ T9564] dfc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f810dc [ 887.468088][ T9564] dfe0: 76f80e88 76f80e78 00018734 0012fc20 [ 887.468382][ T9564] r10:00000036 r9:83868c00 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 887.468444][ T9564] r4:00000000 [ 887.469168][ T9564] ERROR: Out of memory at tomoyo_realpath_from_path. [ 891.082401][ T29] kauditd_printk_skb: 170 callbacks suppressed [ 891.082791][ T29] audit: type=1400 audit(890.990:11853): avc: denied { read } for pid=9596 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 891.119612][ T29] audit: type=1400 audit(891.020:11854): avc: denied { create } for pid=9596 comm="syz.0.1630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 891.142486][ T29] audit: type=1400 audit(891.040:11855): avc: denied { create } for pid=9596 comm="syz.0.1630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 891.195553][ T29] audit: type=1400 audit(891.100:11856): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.196049][ T29] audit: type=1400 audit(891.100:11857): avc: denied { open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.199985][ T29] audit: type=1400 audit(891.100:11858): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.291822][ T29] audit: type=1400 audit(891.170:11859): avc: denied { read } for pid=9599 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 891.390825][ T29] audit: type=1400 audit(891.290:11860): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.392225][ T29] audit: type=1400 audit(891.290:11861): avc: denied { open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.396505][ T29] audit: type=1400 audit(891.300:11862): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.586939][ T9605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=9605 comm=syz.0.1632 [ 895.323821][ T9640] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=9640 comm=syz.1.1646 [ 897.050120][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 897.050529][ T29] audit: type=1400 audit(896.950:11964): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.075081][ T29] audit: type=1400 audit(896.980:11965): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.077700][ T29] audit: type=1400 audit(896.980:11966): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.232608][ T29] audit: type=1400 audit(897.130:11967): avc: denied { read } for pid=9644 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 897.242899][ T29] audit: type=1400 audit(897.150:11968): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.246640][ T29] audit: type=1400 audit(897.150:11969): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.248123][ T29] audit: type=1400 audit(897.150:11970): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.309095][ T29] audit: type=1400 audit(897.210:11971): avc: denied { read } for pid=9645 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 897.327646][ T29] audit: type=1400 audit(897.230:11972): avc: denied { read } for pid=9644 comm="syz.0.1648" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 897.336640][ T29] audit: type=1400 audit(897.240:11973): avc: denied { read open } for pid=9644 comm="syz.0.1648" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 900.825885][ T9662] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9662 comm=syz.0.1654 [ 902.101670][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 902.102309][ T29] audit: type=1400 audit(902.000:12057): avc: denied { read } for pid=9673 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 902.140302][ T29] audit: type=1400 audit(902.040:12058): avc: denied { read write } for pid=9673 comm="syz.1.1659" name="uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 902.148387][ T29] audit: type=1400 audit(902.040:12059): avc: denied { open } for pid=9673 comm="syz.1.1659" path="/dev/uhid" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 902.164624][ T29] audit: type=1400 audit(902.070:12060): avc: denied { execmem } for pid=9673 comm="syz.1.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 902.789826][ T29] audit: type=1400 audit(902.690:12061): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 902.820685][ T29] audit: type=1400 audit(902.720:12062): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 902.824731][ T29] audit: type=1400 audit(902.730:12063): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 902.992300][ T29] audit: type=1400 audit(902.880:12064): avc: denied { read } for pid=9675 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 903.019018][ T29] audit: type=1400 audit(902.920:12065): avc: denied { create } for pid=9675 comm="syz.0.1660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 903.076241][ T29] audit: type=1400 audit(902.970:12066): avc: denied { write } for pid=9675 comm="syz.0.1660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 905.315302][ T9695] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9695 comm=syz.1.1667 [ 905.327786][ T9695] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9695 comm=syz.1.1667 [ 905.334094][ T9695] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9695 comm=syz.1.1667 [ 905.379566][ T9695] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9695 comm=syz.1.1667 [ 907.514066][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 907.514413][ T29] audit: type=1400 audit(907.420:12132): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.519989][ T29] audit: type=1400 audit(907.420:12133): avc: denied { read write open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.526604][ T29] audit: type=1400 audit(907.430:12134): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.598840][ T29] audit: type=1400 audit(907.500:12135): avc: denied { read } for pid=9701 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.626411][ T29] audit: type=1400 audit(907.530:12136): avc: denied { create } for pid=9701 comm="syz.1.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 907.631988][ T29] audit: type=1400 audit(907.530:12137): avc: denied { ioctl } for pid=9701 comm="syz.1.1670" path="socket:[21869]" dev="sockfs" ino=21869 ioctlcmd=0x8942 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 907.642902][ T29] audit: type=1400 audit(907.540:12138): avc: denied { setopt } for pid=9701 comm="syz.1.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 907.677746][ T29] audit: type=1400 audit(907.580:12139): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.679196][ T29] audit: type=1400 audit(907.580:12140): avc: denied { open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.691328][ T29] audit: type=1400 audit(907.590:12141): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 912.769619][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 912.770137][ T29] audit: type=1400 audit(912.670:12219): avc: denied { write } for pid=9726 comm="syz.0.1681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 912.859967][ T29] audit: type=1400 audit(912.760:12220): avc: denied { read } for pid=9730 comm="syz.1.1683" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 912.860531][ T29] audit: type=1400 audit(912.760:12221): avc: denied { open } for pid=9730 comm="syz.1.1683" path="net:[4026532821]" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 913.487927][ T29] audit: type=1400 audit(913.390:12222): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.488351][ T29] audit: type=1400 audit(913.390:12223): avc: denied { open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.498901][ T29] audit: type=1400 audit(913.390:12224): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.559385][ T29] audit: type=1400 audit(913.460:12225): avc: denied { read } for pid=9734 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.608447][ T29] audit: type=1400 audit(913.510:12226): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.609011][ T29] audit: type=1400 audit(913.510:12227): avc: denied { open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.615437][ T29] audit: type=1400 audit(913.510:12228): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.178324][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 918.178774][ T29] audit: type=1400 audit(918.080:12273): avc: denied { read write } for pid=7910 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.186016][ T29] audit: type=1400 audit(918.090:12274): avc: denied { read write open } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.186951][ T29] audit: type=1400 audit(918.090:12275): avc: denied { ioctl } for pid=7910 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.223443][ T29] audit: type=1400 audit(918.130:12276): avc: denied { read } for pid=9756 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.508169][ T29] audit: type=1400 audit(918.410:12277): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.509378][ T29] audit: type=1400 audit(918.410:12278): avc: denied { open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.510375][ T29] audit: type=1400 audit(918.410:12279): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 918.605279][ T29] audit: type=1400 audit(918.510:12280): avc: denied { read } for pid=9759 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 918.666466][ T29] audit: type=1400 audit(918.560:12281): avc: denied { mounton } for pid=9759 comm="syz.1.1694" path="/proc/723/cgroup" dev="proc" ino=21369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 918.686537][ T29] audit: type=1400 audit(918.590:12282): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 923.417176][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 923.417536][ T29] audit: type=1400 audit(923.320:12349): avc: denied { read } for pid=9798 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 923.624213][ T29] audit: type=1400 audit(923.530:12350): avc: denied { name_bind } for pid=9798 comm="syz.0.1706" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 923.624690][ T29] audit: type=1400 audit(923.530:12351): avc: denied { node_bind } for pid=9798 comm="syz.0.1706" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 923.755229][ T29] audit: type=1400 audit(923.660:12352): avc: denied { create } for pid=9798 comm="syz.0.1706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 923.894858][ T29] audit: type=1400 audit(923.800:12353): avc: denied { read write } for pid=9798 comm="syz.0.1706" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 923.895419][ T29] audit: type=1400 audit(923.800:12354): avc: denied { open } for pid=9798 comm="syz.0.1706" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 923.900808][ T29] audit: type=1400 audit(923.800:12355): avc: denied { ioctl } for pid=9798 comm="syz.0.1706" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.113128][ T29] audit: type=1400 audit(924.020:12356): avc: denied { ioctl } for pid=9798 comm="syz.0.1706" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.253329][ T9184] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 924.424732][ T9184] usb 1-1: Using ep0 maxpacket: 32 [ 924.488971][ T9184] usb 1-1: config 0 has no interfaces? [ 924.511925][ T9184] usb 1-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 924.513589][ T9184] usb 1-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 924.515851][ T9184] usb 1-1: Product: syz [ 924.536226][ T9184] usb 1-1: Manufacturer: syz [ 924.566687][ T9184] usb 1-1: config 0 descriptor?? [ 924.667045][ T29] audit: type=1400 audit(924.570:12357): avc: denied { ioctl } for pid=9798 comm="syz.0.1706" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.877071][ T29] audit: type=1400 audit(924.780:12358): avc: denied { ioctl } for pid=9798 comm="syz.0.1706" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 931.259567][ T29] audit: type=1400 audit(931.160:12359): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.272283][ T29] audit: type=1400 audit(931.160:12360): avc: denied { open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.274759][ T29] audit: type=1400 audit(931.160:12361): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.385830][ T29] audit: type=1400 audit(931.290:12362): avc: denied { read } for pid=9810 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 931.648375][ T29] audit: type=1400 audit(931.550:12363): avc: denied { create } for pid=9810 comm="syz.1.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 931.655021][ T29] audit: type=1400 audit(931.560:12364): avc: denied { getopt } for pid=9810 comm="syz.1.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 931.726085][ T29] audit: type=1400 audit(931.630:12365): avc: denied { read write } for pid=7372 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.728173][ T29] audit: type=1400 audit(931.630:12366): avc: denied { open } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.730526][ T29] audit: type=1400 audit(931.630:12367): avc: denied { ioctl } for pid=7372 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.858668][ T29] audit: type=1400 audit(931.760:12368): avc: denied { read } for pid=9832 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.273329][ T9] usb 1-1: USB disconnect, device number 33 [ 938.367564][ T29] kauditd_printk_skb: 115 callbacks suppressed [ 938.368611][ T29] audit: type=1400 audit(938.270:12484): avc: denied { read } for pid=9878 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.398731][ T29] audit: type=1400 audit(938.300:12485): avc: denied { read write } for pid=9878 comm="syz.0.1722" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.410058][ T29] audit: type=1400 audit(938.310:12486): avc: denied { read write open } for pid=9878 comm="syz.0.1722" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.418571][ T29] audit: type=1400 audit(938.320:12487): avc: denied { create } for pid=9878 comm="syz.0.1722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 938.432645][ T29] audit: type=1400 audit(938.340:12488): avc: denied { setopt } for pid=9878 comm="syz.0.1722" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 938.437907][ T9879] syz_tun: entered allmulticast mode [ 938.467220][ T9878] syz_tun: left allmulticast mode [ 938.558177][ T29] audit: type=1400 audit(938.460:12489): avc: denied { read } for pid=9880 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.586602][ T29] audit: type=1400 audit(938.490:12490): avc: denied { create } for pid=9880 comm="syz.0.1723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 938.595703][ T29] audit: type=1400 audit(938.500:12491): avc: denied { setopt } for pid=9880 comm="syz.0.1723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 938.624897][ T9881] af_packet: tpacket_rcv: packet too big, clamped from 4 to 4294967272. macoff=96 [ 938.748843][ T29] audit: type=1400 audit(938.650:12492): avc: denied { read } for pid=9882 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.772976][ T29] audit: type=1400 audit(938.680:12493): avc: denied { read } for pid=9882 comm="syz.0.1724" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 938.824696][ T9883] binder: 9882:9883 ioctl c0306201 20000640 returned -22 [ 938.944274][ T9885] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1725'. [ 941.804312][ T9917] tmpfs: Unsupported parameter 'huge' [ 942.285399][ T9924] input: syz0 as /devices/virtual/input/input6 [ 943.574947][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 943.575312][ T29] audit: type=1400 audit(943.480:12571): avc: denied { read } for pid=9945 comm="syz.0.1744" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 943.589691][ T29] audit: type=1400 audit(943.490:12572): avc: denied { read open } for pid=9945 comm="syz.0.1744" path="/231/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 943.623906][ T9948] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 943.624676][ T9948] block device autoloading is deprecated and will be removed. [ 943.634371][ T29] audit: type=1400 audit(943.530:12573): avc: denied { ioctl } for pid=9945 comm="syz.0.1744" path="/231/file0/file0" dev="fuse" ino=64 ioctlcmd=0x912 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 943.658739][ T29] audit: type=1400 audit(943.560:12574): avc: denied { unmount } for pid=7910 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 943.753411][ T29] audit: type=1400 audit(943.660:12575): avc: denied { read } for pid=9952 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 943.879451][ T29] audit: type=1400 audit(943.780:12576): avc: denied { read } for pid=9954 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 943.902025][ T29] audit: type=1400 audit(943.800:12577): avc: denied { create } for pid=9954 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 943.905772][ T29] audit: type=1400 audit(943.810:12578): avc: denied { ioctl } for pid=9954 comm="syz.0.1746" path="socket:[22619]" dev="sockfs" ino=22619 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 943.916999][ T29] audit: type=1400 audit(943.820:12579): avc: denied { prog_load } for pid=9954 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 943.918527][ T29] audit: type=1400 audit(943.820:12580): avc: denied { bpf } for pid=9954 comm="syz.0.1746" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 945.423620][ T3043] usb 1-1: new high-speed USB device number 34 using dummy_hcd [ 945.603075][ T3043] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 945.603466][ T3043] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 945.624056][ T3043] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 945.626437][ T3043] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 945.628141][ T3043] usb 1-1: Manufacturer: syz [ 945.635068][ T3043] usb 1-1: config 0 descriptor?? [ 945.912063][ T3043] rc_core: IR keymap rc-hauppauge not found [ 945.912478][ T3043] Registered IR keymap rc-empty [ 945.915489][ T3043] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0 [ 945.916902][ T3043] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0/input7 [ 945.943401][ T3043] usb 1-1: USB disconnect, device number 34 [ 945.954460][ T9982] 8<--- cut here --- [ 945.955446][ T9982] Unable to handle kernel paging request at virtual address fee04f23 when write [ 945.960008][ T9982] [fee04f23] *pgd=80000080007003, *pmd=00000000 [ 945.966627][ T9982] Internal error: Oops: a06 [#1] SMP ARM [ 945.969490][ T9982] Modules linked in: [ 945.970136][ T9982] CPU: 0 UID: 0 PID: 9982 Comm: syz.1.1752 Not tainted syzkaller #0 PREEMPT [ 945.970514][ T9982] Hardware name: ARM-Versatile Express [ 945.970799][ T9982] PC is at parport_attach+0x174/0x1d0 [ 945.971319][ T9982] LR is at parport_attach+0x164/0x1d0 [ 945.971712][ T9982] pc : [<814013b4>] lr : [<814013a4>] psr: 60000013 [ 945.972056][ T9982] sp : ea8cdd30 ip : ea8cdd30 fp : ea8cdd54 [ 945.972383][ T9982] r10: 82b29b30 r9 : 00000003 r8 : 845b8540 [ 945.972727][ T9982] r7 : ea8cdd90 r6 : 845b8540 r5 : 00000000 r4 : 00000000 [ 945.973117][ T9982] r3 : fee04f23 r2 : 81e24f44 r1 : 00000001 r0 : 81401024 [ 945.973533][ T9982] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 945.973914][ T9982] Control: 30c5387d Table: 8454ea00 DAC: fffffffd [ 945.974734][ T9982] Register r0 information: non-slab/vmalloc memory [ 945.976142][ T9982] Register r1 information: non-paged memory [ 945.976589][ T9982] Register r2 information: non-slab/vmalloc memory [ 945.977005][ T9982] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 945.978173][ T9982] Register r4 information: NULL pointer [ 945.978684][ T9982] Register r5 information: NULL pointer [ 945.978997][ T9982] Register r6 information: slab kmalloc-192 start 845b8540 pointer offset 0 size 192 [ 945.980068][ T9982] Register r7 information: 2-page vmalloc region starting at 0xea8cc000 allocated at kernel_clone+0xac/0x3f4 [ 945.980727][ T9982] Register r8 information: slab kmalloc-192 start 845b8540 pointer offset 0 size 192 [ 945.981482][ T9982] Register r9 information: non-paged memory [ 945.981839][ T9982] Register r10 information: non-slab/vmalloc memory [ 945.982241][ T9982] Register r11 information: 2-page vmalloc region starting at 0xea8cc000 allocated at kernel_clone+0xac/0x3f4 [ 945.982724][ T9982] Register r12 information: 2-page vmalloc region starting at 0xea8cc000 allocated at kernel_clone+0xac/0x3f4 [ 945.983227][ T9982] Process syz.1.1752 (pid: 9982, stack limit = 0xea8cc000) [ 945.983570][ T9982] Stack: (0xea8cdd30 to 0xea8ce000) [ 945.983822][ T9982] dd20: ea8cdd4c ea8cdd40 829d4280 829d4280 [ 945.984294][ T9982] dd40: 81e25404 00000000 ea8cdd8c ea8cdd58 813fcfe0 8140124c 40946400 00000000 [ 945.984674][ T9982] dd60: ea8cdd7c 200000c0 845b8540 b5403587 40946400 8386bc00 00000003 845b8570 [ 945.985075][ T9982] dd80: ea8cde4c ea8cdd90 813f8918 813fcee0 656d6f63 705f6964 6f707261 00007472 [ 945.985428][ T9982] dda0: 00000000 00004f23 00000000 00000002 00000009 00000001 40000cc7 00200fff [ 945.985760][ T9982] ddc0: 5c952399 00000005 000003ff 00000802 00000008 00010001 00000001 00000009 [ 945.986131][ T9982] dde0: 0000e1cb 00000006 00000402 00000003 00000395 80000089 fffffffd 00000009 [ 945.986507][ T9982] de00: fffffff5 ffffeadb 00000007 0000003c 00000008 00000003 08000000 00002ec0 [ 945.986885][ T9982] de20: 00000000 2db3ba7f 00000000 852aae40 845b8540 200000c0 40946400 8386bc00 [ 945.987505][ T9982] de40: ea8cdf14 ea8cde50 813f9498 813f8850 ea8cde4c 2db3ba7f 00000000 00000000 [ 945.988022][ T9982] de60: 824b15ec ea8cdea4 0000005f 8414c448 00000064 845768c4 ea8cdee4 ea8cde88 [ 945.988524][ T9982] de80: 807b4124 807aa7a0 00000064 00000001 00000000 ea8cdea4 851aa310 8343ccc0 [ 945.989202][ T9982] dea0: 00006400 0000000b ea8cde98 00000000 ea8cdd38 2db3ba7f 00000000 852aae40 [ 945.989628][ T9982] dec0: 40946400 200000c0 200000c0 852aae40 00000003 8386bc00 ea8cdef4 ea8cdee8 [ 945.990265][ T9982] dee0: 807b4254 2db3ba7f ea8cdf14 00000000 852aae41 40946400 200000c0 852aae40 [ 945.990807][ T9982] df00: 00000003 8386bc00 ea8cdfa4 ea8cdf18 805821a4 813f93a0 ecac8b10 8386bc00 [ 945.991617][ T9982] df20: ea8cdf3c ea8cdf30 81aa6e78 81aa6d48 ea8cdf54 ea8cdf40 8025ba7c 8028ef68 [ 945.992193][ T9982] df40: ea8cdfb0 40000000 ea8cdf84 ea8cdf58 80221a54 8025ba38 00000000 8281cf7c [ 945.992607][ T9982] df60: ea8cdfb0 0013ddc0 ecac8b10 802219a8 00000000 2db3ba7f ea8cdfac 00000000 [ 945.992966][ T9982] df80: 00000000 00346310 00000036 8020029c 8386bc00 00000036 00000000 ea8cdfa8 [ 945.993452][ T9982] dfa0: 80200060 80581f6c 00000000 00000000 00000003 40946400 200000c0 00000000 [ 945.993802][ T9982] dfc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f750dc [ 945.994274][ T9982] dfe0: 76f74e88 76f74e78 00018734 0012fc20 60000010 00000003 00000000 00000000 [ 945.994747][ T9982] Call trace: [ 945.995008][ T9982] [<81401240>] (parport_attach) from [<813fcfe0>] (comedi_device_attach+0x10c/0x248) [ 945.995600][ T9982] r6:00000000 r5:81e25404 r4:829d4280 [ 945.995841][ T9982] [<813fced4>] (comedi_device_attach) from [<813f8918>] (do_devconfig_ioctl+0xd4/0x21c) [ 945.996378][ T9982] r10:845b8570 r9:00000003 r8:8386bc00 r7:40946400 r6:b5403587 r5:845b8540 [ 945.996740][ T9982] r4:200000c0 [ 945.996909][ T9982] [<813f8844>] (do_devconfig_ioctl) from [<813f9498>] (comedi_unlocked_ioctl+0x104/0x1c80) [ 945.997418][ T9982] r8:8386bc00 r7:40946400 r6:200000c0 r5:845b8540 r4:852aae40 [ 945.997750][ T9982] [<813f9394>] (comedi_unlocked_ioctl) from [<805821a4>] (sys_ioctl+0x244/0xb58) [ 945.998178][ T9982] r10:8386bc00 r9:00000003 r8:852aae40 r7:200000c0 r6:40946400 r5:852aae41 [ 945.998518][ T9982] r4:00000000 [ 945.998761][ T9982] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 945.999177][ T9982] Exception stack(0xea8cdfa8 to 0xea8cdff0) [ 945.999457][ T9982] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 945.999842][ T9982] dfc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f750dc [ 946.000225][ T9982] dfe0: 76f74e88 76f74e78 00018734 0012fc20 [ 946.000483][ T9982] r10:00000036 r9:8386bc00 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 946.000848][ T9982] r4:00000000 [ 946.001508][ T9982] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 946.004388][ T9982] ---[ end trace 0000000000000000 ]--- [ 946.018772][ T9982] Kernel panic - not syncing: Fatal exception [ 946.023703][ T9982] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:10:52 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000004 R03=81aa76b4 R04=00000006 R05=828f7d88 R06=8321bc00 R07=828f7d80 R08=8321bc00 R09=828f7d88 R10=00000000 R11=df881d9c R12=df881da0 R13=df881d90 R14=80340808 R15=81aa76c4 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000000 R03=00000001 R04=ddddb488 R05=00000002 R06=00000001 R07=00000004 R08=00000102 R09=83302400 R10=00000080 R11=df805f34 R12=df805f28 R13=df805ef0 R14=81aa6e58 R15=80307150 PSR=200f0113 --C- A S svc32 s00=756e2065 s01=7265626d d00=7265626d756e2065 s02=54205b5d s03=33343033 d01=3334303354205b5d s04=6e69205d s05=3a747570 d02=3a7475706e69205d s06=6f674920 s07=756c5072 d03=756c50726f674920 s08=53552d67 s09=52492042 d04=5249204253552d67 s10=63655220 s11=65766965 d05=6576696563655220 s12=73612072 s13=65642f20 d06=65642f2073612072 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000