last executing test programs: 5.989420862s ago: executing program 0 (id=9054): setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getuid() r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000001840)={0x6, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @rand_addr=0x64010100}}}, 0x104) (fail_nth: 3) socketpair(0x6, 0x6, 0x3, 0x0) 5.891188465s ago: executing program 0 (id=9055): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[], 0x33fe0}}, 0x4008010) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40440c0}, 0x4000890) sendto$inet6(0xffffffffffffffff, 0x0, 0x2, 0x10, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, 0x0, 0x0) 3.312210703s ago: executing program 0 (id=9061): mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffc000/0x2000)=nil) r0 = msgget$private(0x0, 0x5c) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/189) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc8, r1, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5ecacc3c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4044800}, 0x4000001) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x2710, @local}, 0x10, 0x80000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000300)={'ip_vti0\x00', {0x2, 0x4e24, @rand_addr=0x64010102}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa8, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x23, 0x21}}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xfff8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5e0}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x804}, 0x800) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000004c0)=""/113) r4 = fcntl$dupfd(r2, 0x0, r2) syz_genetlink_get_family_id$team(&(0x7f0000000540), r4) sendmsg$NL80211_CMD_NEW_MPATH(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x38, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfe91, 0x48}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0x4852) r5 = socket(0x0, 0x6, 0x1) msgget$private(0x0, 0x20) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f0000000680)='wg0\x00', 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f00000006c0)) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000740), r4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000780)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SURVEY(r4, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r6, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x4884) ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000880), 0x5, 0x0) preadv2(r8, &(0x7f0000000a00)=[{&(0x7f00000008c0)=""/139, 0x8b}, {&(0x7f0000000980)=""/112, 0x70}], 0x2, 0x8, 0x67, 0x8) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000a80), r4) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r5, &(0x7f0000000b80)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x70, r9, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0xc, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x3}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x16}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x10) openat$yama_ptrace_scope(0xffffff9c, &(0x7f0000000bc0), 0x2, 0x0) sendmsg$NL80211_CMD_GET_STATION(r4, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c40)={0x44, r6, 0x2, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x1}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x629}, @NL80211_ATTR_STA_CAPABILITY={0x6}, @NL80211_ATTR_STA_TX_POWER={0x6}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x6f91}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040800}, 0xc000) connect$inet(r4, &(0x7f0000000d40)={0x2, 0x5, @empty}, 0x10) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040805}, 0x44000) 2.807650314s ago: executing program 0 (id=9063): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x101382, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x5450, 0x0) 2.65992804s ago: executing program 1 (id=9064): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x90}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40044}, 0x0) (fail_nth: 2) close_range(r0, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 2.590238202s ago: executing program 0 (id=9065): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=ANY=[], 0x33fe0}}, 0x4008010) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe8a40, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40044591, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$FBIOPUTCMAP(r3, 0x4605, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x5450, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40884}, 0x4010) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) socket(0x29, 0x0, 0x6) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0xe2401861ab39a254) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 1.978854838s ago: executing program 1 (id=9066): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @remote, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000d4}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x2b0, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xac, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0xfffffeec, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1041}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x462}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x88, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000000, @empty, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x81, @dev={0xfe, 0x80, '\x00', 0x37}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2664}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MEDIA={0xe8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8000009}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x8000}, 0x20048011) 830.610206ms ago: executing program 1 (id=9067): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x8801, 0x0) write$UHID_INPUT(r1, 0x0, 0x0) r2 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$SW_SYNC_IOC_INC(r3, 0x40045701, &(0x7f0000000000)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = inotify_init1(0x0) r7 = dup2(r6, r6) close_range(r7, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r8 = openat$selinux_policy(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r8, 0x5451, 0x0) sendto$l2tp(r7, 0x0, 0x0, 0x40, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r10 = openat$cgroup_devices(r9, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r10, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r5, 0x40049409, 0x0) r11 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r11, 0x5450, 0x0) ioctl$GIO_CMAP(r4, 0x5451, 0x0) 618.171625ms ago: executing program 1 (id=9068): r0 = openat$sequencer(0xffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) socketpair(0x2, 0x8000a, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(r1, &(0x7f0000000080)=""/154, 0x9a, 0x4002, &(0x7f0000000140)={0xa, 0x4e20, 0x200, @loopback}, 0x1c) tee(r2, r0, 0x6, 0x9) pwritev2(r0, &(0x7f0000000600)=[{&(0x7f0000000180)="d2390471dc88901c6400875d94db8b6fd617178194bb9aeba905d52f335c8f3e612f756505929191c94b7b2dfde3b7c6f7de6482add36785f217039341fbf9b9b508f298b221ee14f3e9ee5917f2cff5", 0x50}, {&(0x7f0000000200)='~', 0x1}, {&(0x7f0000000240)="c1053e1cc224f8bf4c8f168aa91286198066ff29fd1f43e92c76c186c14f9cb0d34f4b369cabc13f54b71adedd0c64a26da4eedc3b14468784d54d86a26d08294a4654471f99e41f11d543d92594af694ee77049196de55502f31dcf8935f23aa6b32475be18fb19385f4ee2c02654e96154060fe181cda5dc636d7c0a78c3635b62a73dd3c25990cbcba928870b71806145270f19b78a41bb4d223023d11bfbcbd5e15ccf7480ff0699a0ef5c1fd8c6e2cdf9737968eb78ec49865bca752f43a1ef282d4163ca51964b6bfb9bb4cc26e0d12ea1ae022ae434c36be033027ee7f33b16a202", 0xe5}, {&(0x7f0000000340)="9e6434a2fd321ef5ad0bb4aedd0c5ed115830b2e5f50cdbbbbe1a197ab4456002a41c40cbd6cb7cb8995313f32fac838b43ab35f7c9ef2e9ba0e17a65dfdb71ebd53a90555b40be0d6114fd6e4a1a37a0e50fe787fbdaa2aaeb03bc9eab1a4e123c24affc81e633b51f6ae5fd05cb84d7ab5379207a3f432162ac9dafec73f5344d5680a97028bfbf99150206d5a40c633ed2c44429973f912", 0x99}, {&(0x7f0000000400)="db07dfccb77f25733e98f2476fc9707c7d5b32d894f32ad88b241b2493fbac3da9f30623f10933f255c3887ab719f215b9f9f335735f60a1f7fdcaac600bc552858e42f135eb0b62e949bf74466f835c37ef2f6c658222456f7b28b69488dc5b31a3e2c9531a32f169d996da2b846d388f11a77737398be6a8937a90663d59cf92d4ecaea44f877c0be8e0ea1fbc68ff2c87cfc5d6425846a17906a3758e6a61728f89069ae3af19640e3084b2068a45a441b47d169cb72cb3281c91d2ed15e318e09a5c3016", 0xc6}, {&(0x7f0000000500)="a1acbe1d979e95e0dd809a50b5c3c952f90325408f137083c91c04dc9040e1a48ebc74981653c7f942b0", 0x2a}, {&(0x7f0000000540)="5c2a5a34b2", 0x5}, {&(0x7f0000000580)="c7eccb2e9a957d4ecb0a51a73ce19e01f1b4db218e64a20506c8e047c23c8dc4119016627a44add7cd4f6d3a8d6a0b0344c5aa8e4909170ed9bc2748fe2e2edb8fb02eb5", 0x44}], 0x8, 0xff, 0xfffffff1, 0x12) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) tee(0xffffffffffffffff, r2, 0x6, 0x3) r3 = openat$iommufd(0xffffff9c, &(0x7f0000000640), 0x2a842, 0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f0000000680)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r3, 0x3ba0, &(0x7f00000006c0)={0x48, 0x2, r4, 0x0, 0x0, 0x0, 0x0, 0x1}) getsockopt$packet_int(r2, 0x107, 0xe, &(0x7f0000000740), &(0x7f0000000780)=0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000800), r2) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000840)={@remote, @multicast1, 0x0}, &(0x7f0000000880)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x40, 0x7800, 0x4, 0xa30c9e0, {{0x17, 0x4, 0x2, 0x6, 0x5c, 0x66, 0x0, 0xe, 0x6, 0x0, @broadcast, @private=0xa010101, {[@cipso={0x86, 0x2b, 0x0, [{0x0, 0xa, "0df561f3782f760a"}, {0x6, 0xb, "76857e338c27cbdabf"}, {0x2, 0x10, "82306fabb9e61a5368e9b557c7ea"}]}, @timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0x1, [{@multicast2, 0x8}, {@local, 0x3}, {@loopback, 0x1}]}, @noop]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000a00)={'ip6gre0\x00', &(0x7f0000000980)={'syztnl2\x00', 0x0, 0x2b, 0x6, 0xff, 0x4, 0x20, @remote, @loopback, 0x7, 0x7800, 0x9, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000ac0)={'ip6_vti0\x00', &(0x7f0000000a40)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x7, 0xff, 0x4, @private2, @remote, 0x1, 0x0, 0x8001, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000b40)={'gretap0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x0, 0xfffffe66, {{0x6, 0x4, 0x2, 0x3a, 0x18, 0x64, 0x0, 0x55, 0x2f, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, {[@ra={0x94, 0x4, 0x1}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000cc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b80)={0xc8, r5, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x4}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x9900ba5ee2710143}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x4002) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000d00)={0x6, 'syzkaller0\x00', {}, 0x3}) r11 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000d40), 0x80, 0x0) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000dc0), r2) sendmsg$NL80211_CMD_REGISTER_FRAME(r11, &(0x7f0000000f00)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x98, r12, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x81, 0x5b, "ca8ac4423e4bce96d514cf5556c0cdc402626b0e4df4df4a7f2ac38e65280cc7924a09b4620d464b8f00c6c9c2f7bf06a568acd98ed9b85db790bd5ec784cfa07108a78bc12102b00e12874e1b080ced64dd2d71c67ba26e5728644c3a15a63328836aac84d022c9a6cbc264f45490e5bc5584499439e55c553e217097"}]}, 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x200008d0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000f80)={{{@in=@private, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@private1}}, &(0x7f0000001080)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000f40), &(0x7f00000010c0)=@v3={0x3000000, [{0x800, 0x81}, {0xff, 0x7c}], r14}, 0x18, 0x1) syz_open_dev$dri(&(0x7f0000001100), 0x7, 0x80000) sendmsg$NFNL_MSG_ACCT_NEW(r11, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x68, 0x0, 0x7, 0x3, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x200}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x8010}, 0x80) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r11, 0x3b82, &(0x7f0000001300)={0x18, r4, 0x7, 0x0, &(0x7f0000001280)=[{0x5, 0xd}, {0xffffffffffffffff, 0x4}, {0x1, 0x6}, {}, {0x9, 0x85}, {0x81, 0x9}, {0x8, 0x1ff}]}) r15 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r15, &(0x7f0000001700)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000016c0)={&(0x7f00000014c0)={0x1dc, r5, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x4}, 0x40) 271.348659ms ago: executing program 1 (id=9069): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r5 = openat$full(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close(r5) r6 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r6, 0x10, 0x70bd29, 0x25dfdbfa}, 0x14}}, 0x2004c894) setresuid(0x0, r2, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x30, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x3}, @val={0x8}, @val={0xc, 0x99, {0x15, 0x3d}}}}}, 0x30}}, 0x2000004) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$BINDER_FREEZE(r7, 0x5450, 0x0) r8 = socket$kcm(0x2, 0x3, 0x2) sendmsg$IPCTNL_MSG_CT_GET_DYING(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$F2FS_IOC_GARBAGE_COLLECT(r8, 0x5450, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x20}}, 0x20008010) 135.736504ms ago: executing program 1 (id=9070): r0 = openat$dma_heap(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r1, 0x40044145, &(0x7f0000000040)=0xba8) r2 = openat$iommufd(0xffffff9c, &(0x7f0000000080), 0x288400, 0x0) ioctl$IOMMU_VFIO_SET_IOMMU(r2, 0x3b66, 0x3) (async) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) write$binfmt_aout(r3, &(0x7f0000000100)={{0x107, 0x9, 0x5, 0xa5, 0x209, 0x7, 0xa6, 0x4}, "e1a40623b91a8574b5b5318b946914f6dca7faec784c56ab77ab564aedfb8b60c2af1b4abc1a14d16926576b96a06af9ffba0f8771b2a57c5f789e5cb1ba6f078d5add788dac54fcb385c0eeb1f5816167ce9f41c9faf10b59f0e88d6752450f9a1e0a489d7d1b1b4dc6a3615183d4d5ed6f498fb938534e84c8e20be5e14e27b9f529a48c27ce53ab45ec451ef3fa0a0d2ec3fae75265c86621c3480f56448c4f5fd246063022f281aa0a3805d67def70b569f35f5cbe8e93973711d6ae1246f667ce91c754794f3cbcd9a744c0f1e3e054", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5f2) (async) ioctl$IOMMU_OPTION$IOMMU_OPTION_RLIMIT_MODE(r4, 0x3b87, &(0x7f0000000700)={0x18, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffff801}) syz_usb_connect(0x3, 0x577, &(0x7f0000000740)={{0x12, 0x1, 0x200, 0x49, 0xf6, 0xdb, 0x8, 0x424, 0xc001, 0x2b91, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x565, 0x1, 0x7, 0x81, 0x40, 0x8, [{{0x9, 0x4, 0x5f, 0x9, 0xa, 0x59, 0xb9, 0xd0, 0x7b, [@cdc_ncm={{0x6, 0x24, 0x6, 0x0, 0x1, ')'}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x4, 0x7000, 0x6}, {0x6, 0x24, 0x1a, 0x2, 0xa}, [@call_mgmt={0x5, 0x24, 0x1, 0x3, 0x10}, @dmm={0x7, 0x24, 0x14, 0x1, 0x2}, @mdlm={0x15, 0x24, 0x12, 0x8}, @obex={0x5, 0x24, 0x15, 0xa}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0xa}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x40}]}, @hid_hid={0x9, 0x21, 0x2400, 0xcd, 0x1, {0x22, 0x789}}], [{{0x9, 0x5, 0x8, 0x3, 0x400, 0x86, 0x4, 0x0, [@generic={0xc2, 0x10, "45444631b4d79392b9ad09754b4cd7c4575d554d359eedafd469680350e1c60d3c109c9159e8e561ce03638d95a89343210e246437d9a4094965c75d5f1a44de7f637d80fd577c582fad2b4f1983b64a65fcc559f00427822b036d18a046c62eaff1a828405f303df3271837447eb6e7d642766fb755c61a4bd19f56240038fad29cc887b1bc59bb222fc423336342a0194235416419b0470323e5e90a8e6b4877571d29e3405fccc6484417b6d57c0325de965df643a539e1704954309bc4e6"}, @uac_iso={0x7, 0x25, 0x1, 0x83, 0x7, 0xa}]}}, {{0x9, 0x5, 0x9, 0xc, 0x8, 0x5, 0x9, 0x0, [@generic={0x20, 0x10, "456b8bb1505ec513ea9f2c1b457c143d6048471ff330424b75692335819e"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x8, 0x71, 0x4, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xf, 0x4}]}}, {{0x9, 0x5, 0x5, 0x0, 0x8, 0x6, 0x1, 0x10, [@generic={0x88, 0x9, "529dd565a5e7735270e121d3dd08787c1c13aaf33c7031811713a655b12de21bf6cc8c730f51593609fef9c91e3ca196df34d41e4905f63ed0f19f7e5eea345c9b646cdbcd4ee344ca073b26ba33a36d2ecd2abae1299688065f1021366fdf02e26f239e6de53082e8613a2a0da2bd9d0e276171e33ecec45913adfbe930677373f0db093df0"}, @generic={0x2b, 0x1, "509ed35838c357db140decfa224404502a323a496dd17961d278ab2cc860567aa0577c6c7977bcfd35"}]}}, {{0x9, 0x5, 0x6, 0x10, 0x10, 0x2, 0x5e, 0x7f, [@generic={0x49, 0x8, "9367760c412987689f3d784e03ddd5275603430c7cf7841ff602d7f0a34b706c140d28c22c9e0351bde8fe7aa2afbc05d9b687ae818f817eb32dc5edda4a1f763789e50374a325"}]}}, {{0x9, 0x5, 0x3, 0x0, 0x20, 0x6, 0x4, 0x2, [@generic={0xe3, 0x22, "f96f6211b7879fd1857c141412f4bcb064661964e16155e662ff60e07d5e49d580d88b35f94db30f79c36e1e2a558429c1dcc9fb78bf3eec85a446806edd9c49ef5f02e0ae7796d6c414cc5bd1caab6568caa9c41d651c9c50792d581833ca917f3a47f56414ab92c1021525b881d0f3bcb81c46fe201aae25c0b1d12fd92626731edd6ed68f227773885cf4d3a1491960ada0c494dd7963e5601fbb42d35056331438c7de858a57e51f18c66a063d7107cb59becb171b35709d22363dbf42fa891937598e6e0af3f379c92904e555bd6599b2349f635ad48022fdd1432093e795"}]}}, {{0x9, 0x5, 0xc, 0x1, 0x3ff, 0x5, 0x2, 0x9}}, {{0x9, 0x5, 0x6, 0x10, 0x20, 0x4, 0x1, 0x5}}, {{0x9, 0x5, 0xd, 0x0, 0x20, 0x3, 0x2, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0xc6, 0x3}]}}, {{0x9, 0x5, 0x6, 0x8, 0x8, 0xdd, 0x48, 0x9, [@generic={0xd2, 0x23, "f2ea90d77e7910b55e7743ebc7ee1949d8d4374900a732970e19bbfb015e75b95525818b92638e752b4387220fa38651e1c66b2cb46311af481be03082c5fd3f98ec163dbbc1742ca73df5945a843f6a0227f25bd047f2907296cf9ec8826cb03a379192f16ed37af5298ce9fd1144698257a344ed7871b0f295c8e028ee600099f38fcc94a054b8d82622f6e0e17daff3bf5df04a41b4410c790b7eec04efc7177237569385a5d1d35b3071bc55c77b52ecc8795d63d1ccb2668dd16915ff04ee215a36bbff1b71f50672c8be535ab9"}, @generic={0xfa, 0xb, "841dc80f2a1280a60b885ac4f94a60545b95a5c916beb77726690db8940247db291e16768a0aec4be61ce469eeb8270904e2896a3739ff4f7848d1f2d6de5a8d13a74dc3c4522413978be4b00c6fc55cec92437dd7ca5aee799411072fd9e4fd52c78c7681128435c9789d2f4081bfe37af38048fa2b891ba4b48966b6e8198c5f72ce75cfa17aa37fadbab35de56daa12428a8b56e4c86bd154e6b653a33f02531c4fff08da801af9a5cf16cd4a6d45513bae298ec8b2f5de1356742cb35b978b287d560a18a85b347d16421062081f484aeb124a45c3badf32a8a7f4b5bce3901655ba8af4ae55e95ddfbcf3268dd5b20724f36b1b4a9f"}]}}]}}]}}]}}, &(0x7f0000000f80)={0xa, &(0x7f0000000cc0)={0xa, 0x6, 0x110, 0x2, 0x1, 0xb, 0xff, 0xa}, 0x19, &(0x7f0000000d00)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x9, "3415aa183e9e2efbec4950a042215cd6"}]}, 0x2, [{0xe3, &(0x7f0000000d40)=@string={0xe3, 0x3, "17d716ce80448492f4c406bf511e1846d4717ef950da71b2037a2814ed863ce18b7a552a359c0ef14792ca5e355dcfe2335015700148adea41433891e5bc81c5a0e468427c06348b08dfc69e7704a25d9663e9eb5278b6f6ba5b907d7bc4ce3d8beacc9e1e9153df781ae2196b45da3e5fa28e2c61e164d2837adefab561326b30ee8c074ae2f4501236a1df03d481bdd7da4a83aa8227d9e78a02f37ab517e8b495b7f6fdf171c59a15c830b10c1c0052cbce5e31ad8ca1cd3564d6806b7ae84ce1cc1be392f7168a7bad71a885b47fcfe9d931b1c7f92dcd77a014f74154e2b7"}}, {0x102, &(0x7f0000000e40)=@string={0x102, 0x3, "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"}}]}) fsetxattr$security_ima(r4, &(0x7f0000000fc0), &(0x7f0000001000)=@v2={0x5, 0x2, 0x2, 0x3fd846f2, 0x3e, "3a6fb3cf35997b228e9a598168d6d2972c51e19fa2783eb328396ceca2e5b337e762f5a83b3ad9603210dc10f0d193fa7410e245d24ea6e50e65a0dd58f3"}, 0x47, 0x1) (async) r5 = openat$sequencer2(0xffffff9c, &(0x7f0000001080), 0x20000, 0x0) ioctl$SNDCTL_FM_4OP_ENABLE(r5, 0x4004510f, &(0x7f00000010c0)=0xe6f) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001140), r3) sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000001280)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001240)={&(0x7f0000001180)={0xac, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x98, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff01}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffc}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6c7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x67}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xe00}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffff800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4004000}, 0x4008000) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000012c0)='net/snmp\x00') close(r7) r8 = openat$vga_arbiter(0xffffff9c, &(0x7f0000001300), 0x20a182, 0x0) fsetxattr$security_ima(r5, &(0x7f0000001340), &(0x7f0000001380)=@sha1={0x1, "b98407ed5a74224be68548f422e273e885c22151"}, 0x15, 0x2) (async) fsetxattr(r7, &(0x7f00000013c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000001400)='net/snmp\x00', 0x9, 0x1) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r8, 0x89f8, &(0x7f0000001480)={'gre0\x00', &(0x7f0000001440)={'syztnl0\x00', 0x0, 0xb5ccd23ea20881bf, 0x7880, 0x6, 0xffff59c6, {{0x8, 0x4, 0x3, 0x12, 0x20, 0x1, 0x0, 0x2, 0x6, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp_prespec={0x44, 0xc, 0xb0, 0x3, 0x4, [{@loopback, 0xfff}]}]}}}}}) (async) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f00000014c0)) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r2, 0x3ba0, &(0x7f0000001500)={0x48, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) (async) ioctl$IOMMU_IOAS_ALLOC(r2, 0x3b81, &(0x7f0000001580)={0xc, 0x0, 0x0}) ioctl$IOMMU_HWPT_ALLOC$NONE(r1, 0x3b89, &(0x7f00000025c0)={0x28, 0x0, r9, r10, 0x0, 0x0, 0x0, 0x1000, &(0x7f00000015c0)="2220a47e04a8839a1050f256000096154cad219504bb4add1622037c6065275c730ee67ca14f1d76d141621c537518fe0ae751a2100e68f24d0a26079b758e7b6e6f365c44ff56aa6a85831d90b8463d22f5cf92b9e02928e2eb9e05dd3360ffb382a673b2d5bbd79f74717068c2fa736a0ca6b3bf165470d8e89ed1f58614999e3e6530b5eeaf27b0115ebe4d03dd8635b3857ec52f04d910a36899c2d88b1d49b2ac9ee5c81db588ac0bea8d63719591c1e6fe3b45387fb150223ac295739eae4c799a5ae604f5d75a2465bde5067feddf8ae807c92db45d95ee10408f8b531e2928454ed77c6d6c3ed05652916f057f41b4621c12e21692e195a69fbae1a3d5733bfe27896a34e6a2a7865f05257d6d90e898615b2c2ea2cc1a776bebfbf00923bbec5cec6d550953cfbf250df7c6095bebdeb473691e64fa752a9c8cfeca7e8d2b2fd94a54a1acecc56894c75b525ddacb7ae39fb8dbb158dff840db9fcb851717b205a166eb4a330df5b993b7db1fc4a37a390303124de117b34b2bb7dc23363a8c0f0e9e9ec095edf5e17b87016f2ce470d97fcdc170ff084fd1a8529afb5107bf4134c3f9414f362887ed914135b22d06a6a13541e4fdbd0cd4a2c2c17dac274f88f0751f0135345242000c6770dce488a5934f1ab2b18a4d29c48bdf1f96397e3552d20c56b534cb25e9b05c04d81ad717fb0355cd373ba3d41c11f8cfdd1fa22fbdae65ab6e8f703e0eb1aca1288fafd5ccc9d107cb57b8b649d494a63db1d7c5b09f52bf5ebfca5e767f3285d65afcc8ffe51032c88bf18db1005ab35d29d73c8d23db13e1dd0876dc8b781f4069f59a111dda6353439ac261a37e730158cf22663ac92ca3aee0f9d6f1eb78a6ad1c6e4f7f7c0d4db06d5be1ef2aea054045c95779d453b0fd6b296429c1c474d84b9b7700eca8e79c896a6ff7f671a689296f30293846f41d980817e6758fcbe4c09f6a5ca6e5e055145be8ec44c3dc26e0db6279d4b6566d25cece162dcd245fe665dd614e08a00729d95699aba5d60d997755ba002b1170d751074ac193a514fead3a2ce3b0bf4ef7a4b107fa0eb17600a035b18b02d821c80746b2a3b9b6dc5be8673d5fb5cea85106b1ac60f81bc3ea96dac2a02c2c30149ebdc9c1733126b8a1f365fce7ae6fff5ae9ca9e5cae1ba8d3446d514f021fde82fdb77f9c68c045ea1ea3b5bda9877dc3587f61eb5a3e907f0446037d0bdaa39fe8de100f5b99ba2b4f95dc95461b1accf5c6fa0f34930909dca588cfdd0dd57b52a7f986d5e4f5b93275decec8da9af7272fa84eefa3b195f019add86d503150c6c155d03c206dc8280bdb9026ed5d73a7e36b8da77eea620655a6d9f2d60ea812c40b0967565fe3df74c6b5ce0ab95185ab396407b16ff4047b22e3f595e8a5615809d88946e71844162b0033604280a4a145139a64553271336d33e7e7d6e435f23cac3cb71ca2d5769588c0e4f66bca07304fe005654c5d873e95e921ea5212181d3cdda4697de6f47552b67a5ad82a9ce958adaf5b0b7400bcb21b7a95e90a46ce76768532a4d69a3b898aa6f4fa93f5865dbb0af00299844f234d19c68b7404218a7b0a145d48d64dcfd4c390ed737c854ec0335f6bcba1553b541179904b274cd169305b09eeedd7505bce9a877bad5b56afad2082dc0e89bfacd15176839f4fe9b8e53ec3b2ca7d011c071392f4453556290c43d402f1377f3e07e63365935c123ac4ec3ae28263f4896031ef973dae1149ac20b65db3c877b339331e7b476fae3d524ce7f5f0230a807e00579d57c9af62b2b617427d5d1f1dcc6859661a3111f75b04c08f17184e88fc43bfd07ab619d21c937e1ba92decf6e6b3c481f7d454afc66b42aeab8fde9c13fa41ebbebdf34a761bbf37e61f86c38ecb6223eb308e6dab5d963758b07b01121e46f005547fec76256855629c14ab53ad3aad36ae3d3916f25740f8391ecc9f1f7738d4fd3c4d65a1ee1fe9027a00e8614db635f0b67479d552d0c88803aa546c635be983faec11039f77403cda703951983efa4ac316f5983e2691cc32472994a9f6e58ba92748644209b64788dbc0a6fc71055490efe3389269df867e9a59d3dbfa60a290a544cdc9df6a5140015fdb849790c484f53e66532c3b8291524d315a4d23965f52efe83c00a3c9905bb1cfc619f22806cfcf7ade231d0d830c7a40103dd2a7d88fe2be0a1536f10b2496a45683dc831d70320072f3e25efbf6b037396fbb5cdc051fbb6fbdd08f857485b95b99f4964739318f60d663e653e7050e700369fecaf2c3decfcaa58b9763d7f654382db191370918fbdfebeb5cf9a1be7841dd868f429f6350df7e8e233fb7f132905611dae1b6e287e3943cb9f45ac18bea9f8d9e66d0854a528d7aa37e403e76a92960fa801fb6d939b2c9c6816434e48dc55706ce06f831c376b51a4c0db509ad176f07b43ca5ac1957861b4b6cad1a79f75414c34f4e0433be1adb8f14ea1f0347310bc0004ebbb6b7bbad0f9ce75732f2e7733216c14261b6fa2f63a3c4b5fa9d0c4e4490b29a077ea4e6986e44c40b4e48511313a37dd05a9c4c8af3aea5a399e5e19c7c1ca08c792a7b6c56863c9431eecdca90e95d25bc59113529ceb281df69992f5206b160e1db0f0474dc57b363a4f8f9ef48d1dd3382041f4f5f758a357af626f7836de7e3f41393a796c7cfef4684aeca8734a40cd7e143ac65406f16323655ade111fc6f5d2b373af8ddf04e495c51fc751a6e021bff47c0bce4771a2efb49c367bda203097cb69c862e7bfea94c71a6870b3cd6c774192f9ee21b3c03911dc15e382afc9482b96c85eedeab54bd6c562bc5961cd18604adba644f6aadc88e99a21fccbcc2c530fb78450887421e1dc4a0c5fcf2922be7603426517cb6fe68cb54e8d42ee94259f74dbb9a86463497a8d3bc514f0680a63e6ab6c95fde38344ba50d5c57d936a55ecea906452a8a256a45fb0adeba2cda48db1dcc58b6e30c30e31698a84dab5f66841cd6173ebc88178e06542a7136c1d43af649db6973c874ce6befeab78f7f5f609d48310e0ad8e40199a4d8ef18aa37fd19a4520cb6b7ae3c7b170308ce927ae6d5fcccf23755111d9fe18bf5d2b0f19592d28695838de05d4b7d555602045530c04d76e521be289331632e9a6c53acf1bf5c2d90e0558aa167f62733c015d8a7e0c0a2cb453180113eb6b920d439ab9e1544f08536744edd0e5ad2d5c5e0c539a404dc08139914e3f5ac476040056e72216f6981c23dd39dda78c5b913901c45c2eca982840460fd185e8a48354f0e01fbd30a8dfb713d55ec13d86a52ed5358e4ad1d74a2878250d9cc7733684b8f7dd2f03751eb8b7326fbb3c68bc9c8c19f0d10b4cbe8f9ce7245cc93d7b04f241c7eb9e366824c3bb29684f9100aa405984644922c7c876bf19fc68b3741822e0503372d12ab86f5848d12cf535b6f3173924b9220d646a00b623771153df8602d67b5666521895bc27e80bc9bf9468d4848f6767f8e73d5b23b7f0059755264cbbaf5c76d0b1842957a1457412e13ea74c0aea2b13eabddbe4673ce08766c7b1917f6f2d921f312910eae14e4580e32888f648e4cd633e9694c1175d11c859daab0bf32d752d700d185f8b5c316dd8c9dee2018b5f268c5dfdab03f3ad3422ffe61feef3b9f4663982714f30c02a1d5fddfa627c8f9519c02eb09e55e6f00a7b8a74e5be6023b2aa21c968e3d6364c3d4865932566eaf2b3922ee45f1732afce8f189c6b234b34eb64773b6d530a89cdfb7040018fd2b1ff703e58b7ab6480fbc61a522cb61c82c794ef69fc2dc9f51d70b4961b83815ccf08f6ccdfb2ea44a4f40ea01762d062ab7a40a851c75a47c7d037ef322ee38186217a8f2f35ccd818392245fe947034241a126368fd9d5b20113eb04d246f019db3a530370ec6611041913ba5969ede859d5497c9d9af1535116e3e82a2f3311b2729aa3e69549a3c55a15f912d9b69035e7a16777d672b65df726a553967a6a3234b3932217c3cf4bf91cb0f90b7c0a2cd601e4ff50ace90fbe04ca356c1f58a24fe135c745ad40ea41d02b5d3c482fab5dbddeab3f35394cbc84566f7f161e1f4e64f6cf43d2d6e543efdaf593424d06b1e8a758828f70bed49b0b4bb795b06614d1bceb253fa997b2c191fc893a810c0bdb50dd670aa1f4697f19c553e4190645c629080d6c1d23c7439a4c44ac3bc8a455f896c3f043575ff4b6ea6ffb796f8438e1366c99c0fb37e7e4766f29eaafe711b8fc976266c8c72451dc70b3f5e1082d5d781207dbb53841feaf583b74a7ee09a65fdf1dd9a34fab3491a009f94a91465eba95fb1eba077c480ab48bf58f322f359d2d2391ecbbd0958885af69ccb4e7fbddc93a3d7053bf94b16cd910e5468bf5c13601388ffa9cceefa5e93b50a0a50a5b6ccbc50005b1ddeb297fb0665063c58ed57836cf4ed01c019026b17bbcd28ffb31dcdfea0cee5ca94680e8a41704280caccf6fc5055ca4cd5e592227b7f1227a9bb18ed1bdc3d6ab911a2ed87b08debf8dfa3c893dda8a8b4e263d6c15f13abfde0fc24942c4651c017d86369cd4048d6cd040a37cfa9909fb6fe55db6e9476bc1c0d834e126a6eb9ebeb1c1e23a0e12de0879770038ffe2a28e21ee94738b6f45a71ec76deaf0b2a59d2c44d7a8ef3a1763dee6ff9af936c4252c0414bb04d4032a6c1a8e51216198cac19d541663d35e12792238fb9f3742cced0d372522916bafa623111bbadc8bc7f10af2ea77d4b37c3c515c5791daa186b54a384afce127480551a3b4f537dc8d4211991d42a44cc01ddbe3eddb0d1e3a322300f44a5bd7793d90e548e2f6b8215b991d244a666de739d611b142f323b1b21c58aa263fd07c1b68e1b656b04a6886f8289bf1722684c04dd687f943cae9bd7db9b1cf236dcde57d596938c6d37dd19b2af49c79f5175b7ece9933e5331f9cd59a93a3475f43b5849257ef2d4b487697455e42c9fb317facd0ec715e804e24c6939f25335188a02c399234881d239b2ccae450f379e69b884787b04396bea4710a01b0fda63587a62a99e63de200edd0590c52c8c54682cc0f443c915c123945d5364cd06d1f0eb0091d710e602d7bd51ef021baf4d1776e4862f72b8f81a9f938506389db8e3275925a06ea15162da354dea9dcfe01eb55fdd7469640d5d7d358f8d7d8a06b7a24582cf78f9814ca64533592787e6966f8607ad067a621ed1080180214a1ab588c96a562afcc3396f8a84d6c5d40080b1504afa6fb9986b8279d32f65e3eec85c5feb47322c37b4f0de17f3fa59ba39c344d766bc9ec85f98e6ebaefcd55d401676d2a427a651cc4b4d9c2a05017cf08bbe137244d876d702d8868d8de7a8a033d70a6980278ae27a0ce715fb22e8d12de07c41d82ae5b90b11e04a42e023c30de4cada4b1c11df440450e8e1dcde7d803a0c3a2e2adc85ea3baa07813899d7b63f2b62fda4f0dd31c7fe3482bd9e7970ee90900149c811c1048aa5f66621299e55938149dc8bbc580a2278a7bedba75310f8c91cb0f411a425f58b3ad066b1b7aa61e38de6001732ceabbcc36eb198db31ff7633a5b8522028976c7fd27258d77131b565c2f972ce0fbf8ecb590ddfdb4e3277f0335817ece43a42f93a54559afcafae68389dc975244e0d7431e5bc869b3d9c1925df59e50022cdb161fd833817c306d23eb481e16b3b8205db58fab1218b01d652b18381c5f000170cc3238ea7138e76fb50d6698c87adbff623bd7d9c569ea62"}) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000002600), r1) (async) fsetxattr$security_ima(r4, &(0x7f0000002640), &(0x7f0000002680)=@ng={0x4, 0xb, "5a90f1ee2b235fa401fc6a7445084a"}, 0x11, 0x1) r11 = dup3(r5, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_DROP(r11, 0x4143, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f00000026c0)={'wlan1\x00'}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)=[{{&(0x7f0000002700)=@abs, 0x6e, &(0x7f00000027c0)=[{&(0x7f0000002780)}], 0x1, &(0x7f0000002800)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @cred={{0x18}}, @cred={{0x18}}], 0x7c}}, {{&(0x7f0000002880)=@abs, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002900)=""/145, 0x91}, {&(0x7f00000029c0)=""/94, 0x5e}, {&(0x7f0000002a40)=""/68, 0x44}, {&(0x7f0000002ac0)=""/143, 0x8f}, {&(0x7f0000002b80)=""/18, 0x12}, {&(0x7f0000002bc0)=""/99, 0x63}, {&(0x7f0000002c40)=""/173, 0xad}, {&(0x7f0000002d00)=""/45, 0x2d}, {&(0x7f0000002d40)=""/155, 0x9b}], 0x9}}, {{&(0x7f0000002e80), 0x6e, &(0x7f0000003000)=[{&(0x7f0000002f00)=""/239, 0xef}], 0x1, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0xc}}, @cred={{0x18}}], 0x54}}], 0x3, 0x1, &(0x7f0000003140)) 0s ago: executing program 0 (id=9071): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @remote, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000d4}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x2b0, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xac, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0xfffffeec, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1041}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x462}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x88, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000000, @empty, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x81, @dev={0xfe, 0x80, '\x00', 0x37}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2664}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MEDIA={0xe8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8000009}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x8000}, 0x20048011) kernel console output (not intermixed with test programs): t:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4837.051033][ T31] kauditd_printk_skb: 195 callbacks suppressed [ 4837.051612][ T31] audit: type=1400 audit(134222564.955:12516): avc: denied { ioctl } for pid=8281 comm="syz.1.8732" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x534e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4837.149950][ T8290] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8290 comm=syz.0.8735 [ 4837.316352][ T31] audit: type=1400 audit(134222565.235:12517): avc: denied { create } for pid=8291 comm="syz.0.8736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4837.352797][ T31] audit: type=1400 audit(134222565.265:12518): avc: denied { bind } for pid=8291 comm="syz.0.8736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4837.553617][ T31] audit: type=1400 audit(134222565.465:12519): avc: denied { ioctl } for pid=8281 comm="syz.1.8732" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x5330 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4838.067529][ T31] audit: type=1400 audit(134222565.985:12520): avc: denied { bind } for pid=8281 comm="syz.1.8732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4838.144319][ T31] audit: type=1400 audit(134222566.055:12521): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4838.149695][ T31] audit: type=1400 audit(134222566.065:12522): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4838.162416][ T31] audit: type=1400 audit(134222566.075:12523): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4838.266906][ T31] audit: type=1400 audit(134222566.185:12524): avc: denied { read } for pid=8296 comm="syz.1.8737" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4838.269189][ T31] audit: type=1400 audit(134222566.185:12525): avc: denied { read open } for pid=8296 comm="syz.1.8737" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4838.928089][ T8306] FAULT_INJECTION: forcing a failure. [ 4838.928089][ T8306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4838.930398][ T8306] CPU: 1 UID: 0 PID: 8306 Comm: syz.0.8741 Not tainted syzkaller #0 PREEMPT [ 4838.930529][ T8306] Hardware name: ARM-Versatile Express [ 4838.930560][ T8306] Call trace: [ 4838.930607][ T8306] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4838.930745][ T8306] r7:00000000 r6:00000000 r5:60000013 r4:82260d04 [ 4838.930795][ T8306] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4838.930863][ T8306] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4838.930930][ T8306] r5:8530d400 r4:8294f190 [ 4838.930949][ T8306] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4838.931017][ T8306] [<80972c80>] (should_fail_ex) from [<80972ebc>] (should_fail+0x14/0x18) [ 4838.931093][ T8306] r8:76fdbf30 r7:00000000 r6:00000000 r5:dff71f68 r4:00000002 [ 4838.931113][ T8306] [<80972ea8>] (should_fail) from [<80972edc>] (should_fail_usercopy+0x1c/0x20) [ 4838.931173][ T8306] [<80972ec0>] (should_fail_usercopy) from [<8058e6f0>] (simple_read_from_buffer+0x80/0x13c) [ 4838.931242][ T8306] [<8058e670>] (simple_read_from_buffer) from [<8060871c>] (proc_fail_nth_read+0xb8/0x108) [ 4838.931322][ T8306] r10:00000001 r9:80608664 r8:00000002 r7:dff71f68 r6:0000000f r5:76fdbf30 [ 4838.931349][ T8306] r4:8530d400 r3:dff71e9f [ 4838.931368][ T8306] [<80608664>] (proc_fail_nth_read) from [<80553538>] (vfs_read+0x98/0x324) [ 4838.931432][ T8306] r8:76fdbf30 r7:dff71f68 r6:8530d400 r5:0000000f r4:847f7300 [ 4838.931449][ T8306] [<805534a0>] (vfs_read) from [<80554248>] (ksys_read+0x74/0xe8) [ 4838.931514][ T8306] r10:00000003 r9:8530d400 r8:8020029c r7:00000000 r6:00000000 r5:847f7300 [ 4838.931536][ T8306] r4:847f7303 [ 4838.931554][ T8306] [<805541d4>] (ksys_read) from [<805542cc>] (sys_read+0x10/0x14) [ 4838.931628][ T8306] r7:00000003 r6:00000004 r5:76fdbf30 r4:0000000f [ 4838.931666][ T8306] [<805542bc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4838.931722][ T8306] Exception stack(0xdff71fa8 to 0xdff71ff0) [ 4838.931763][ T8306] 1fa0: 0000000f 76fdbf30 00000004 76fdbf30 0000000f 00000000 [ 4838.931801][ T8306] 1fc0: 0000000f 76fdbf30 00000004 00000003 002f0000 00000000 00006364 76fdc0bc [ 4838.931829][ T8306] 1fe0: 00000158 76fdbed0 000d80d8 00130174 [ 4842.276404][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 4842.276720][ T31] audit: type=1400 audit(134222570.195:12580): avc: denied { create } for pid=8325 comm="syz.0.8749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4842.355760][ T31] audit: type=1400 audit(134222570.265:12581): avc: denied { create } for pid=8326 comm="syz.1.8750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4842.371240][ T31] audit: type=1400 audit(134222570.285:12582): avc: denied { write } for pid=8326 comm="syz.1.8750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4842.582702][ T31] audit: type=1400 audit(134222570.495:12583): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4842.588062][ T31] audit: type=1400 audit(134222570.505:12584): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4842.598832][ T31] audit: type=1400 audit(134222570.515:12585): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4842.943538][ T31] audit: type=1400 audit(134222570.855:12586): avc: denied { create } for pid=8329 comm="syz.1.8751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4842.977239][ T31] audit: type=1400 audit(134222570.895:12587): avc: denied { write } for pid=8329 comm="syz.1.8751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4843.001386][ T31] audit: type=1400 audit(134222570.915:12588): avc: denied { write } for pid=8329 comm="syz.1.8751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4843.021255][ T31] audit: type=1400 audit(134222570.935:12589): avc: denied { ioctl } for pid=8329 comm="syz.1.8751" path="socket:[99959]" dev="sockfs" ino=99959 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4845.135909][ T8336] blk_print_req_error: 6 callbacks suppressed [ 4845.146389][ T8336] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.146836][ T8336] buffer_io_error: 6 callbacks suppressed [ 4845.147416][ T8336] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4845.172160][ T8336] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.172549][ T8336] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4845.173055][ T8336] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.173134][ T8336] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4845.173303][ T8336] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.173414][ T8336] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4845.173657][ T8336] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.173712][ T8336] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4845.173824][ T8336] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.173874][ T8336] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4845.174131][ T8336] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.174183][ T8336] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4845.174294][ T8336] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4845.174343][ T8336] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4845.174404][ T8336] nbd0: unable to read partition table [ 4847.302029][ T31] kauditd_printk_skb: 95 callbacks suppressed [ 4847.302489][ T31] audit: type=1400 audit(134222575.215:12685): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.325896][ T31] audit: type=1400 audit(134222575.245:12686): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.347833][ T31] audit: type=1400 audit(134222575.265:12687): avc: denied { read } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.350512][ T31] audit: type=1400 audit(134222575.265:12688): avc: denied { read } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.380742][ T31] audit: type=1400 audit(134222575.295:12689): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.408080][ T31] audit: type=1400 audit(134222575.325:12690): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.421199][ T31] audit: type=1400 audit(134222575.335:12691): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.438820][ T31] audit: type=1400 audit(134222575.355:12692): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.468847][ T31] audit: type=1400 audit(134222575.385:12693): avc: denied { read } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4847.496436][ T31] audit: type=1400 audit(134222575.405:12694): avc: denied { write } for pid=8343 comm="syz.1.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4853.457437][ T31] kauditd_printk_skb: 153 callbacks suppressed [ 4853.458686][ T31] audit: type=1400 audit(134222581.375:12848): avc: denied { create } for pid=8369 comm="syz.0.8764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4853.470476][ T31] audit: type=1400 audit(134222581.385:12849): avc: denied { write } for pid=8369 comm="syz.0.8764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4853.495441][ T31] audit: type=1400 audit(134222581.405:12850): avc: denied { write } for pid=8369 comm="syz.0.8764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4853.502027][ T31] audit: type=1400 audit(134222581.415:12851): avc: denied { read } for pid=8369 comm="syz.0.8764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4854.004189][ T31] audit: type=1400 audit(134222581.915:12852): avc: denied { write } for pid=8369 comm="syz.0.8764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4854.033843][ T31] audit: type=1400 audit(134222581.945:12853): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4854.034150][ T31] audit: type=1400 audit(134222581.945:12854): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4854.038412][ T31] audit: type=1400 audit(134222581.945:12855): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4854.116413][ T31] audit: type=1400 audit(134222582.035:12856): avc: denied { create } for pid=8372 comm="syz.1.8765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4854.520424][ T31] audit: type=1400 audit(134222582.435:12857): avc: denied { create } for pid=8369 comm="syz.0.8764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4858.494252][ T31] kauditd_printk_skb: 164 callbacks suppressed [ 4858.495258][ T31] audit: type=1400 audit(134222586.405:13022): avc: denied { create } for pid=8392 comm="syz.0.8772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4858.508893][ T31] audit: type=1400 audit(134222586.425:13023): avc: denied { write } for pid=8392 comm="syz.0.8772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4858.522715][ T31] audit: type=1400 audit(134222586.435:13024): avc: denied { write } for pid=8392 comm="syz.0.8772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4858.529631][ T31] audit: type=1400 audit(134222586.445:13025): avc: denied { create } for pid=8392 comm="syz.0.8772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4859.343566][ T31] audit: type=1400 audit(134222587.255:13026): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4859.358115][ T31] audit: type=1400 audit(134222587.275:13027): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4859.365670][ T31] audit: type=1400 audit(134222587.275:13028): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4859.574167][ T31] audit: type=1400 audit(134222587.485:13029): avc: denied { create } for pid=8398 comm="syz.1.8774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4859.591436][ T31] audit: type=1400 audit(134222587.505:13030): avc: denied { write } for pid=8398 comm="syz.1.8774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4859.606691][ T31] audit: type=1400 audit(134222587.515:13031): avc: denied { map_create } for pid=8398 comm="syz.1.8774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4863.897643][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 4863.897983][ T31] audit: type=1400 audit(134222591.815:13084): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4863.907827][ T31] audit: type=1400 audit(134222591.825:13085): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4863.917326][ T31] audit: type=1400 audit(134222591.835:13086): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4864.008506][ T31] audit: type=1400 audit(134222591.925:13087): avc: denied { read open } for pid=8435 comm="syz.1.8780" path="net:[4026532780]" dev="nsfs" ino=4026532780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4864.013624][ T31] audit: type=1400 audit(134222591.925:13088): avc: denied { create } for pid=8435 comm="syz.1.8780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4864.027988][ T31] audit: type=1400 audit(134222591.945:13089): avc: denied { ioctl } for pid=8435 comm="syz.1.8780" path="socket:[99042]" dev="sockfs" ino=99042 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4864.038933][ T31] audit: type=1400 audit(134222591.955:13090): avc: denied { bind } for pid=8435 comm="syz.1.8780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4864.049437][ T31] audit: type=1400 audit(134222591.955:13091): avc: denied { write } for pid=8435 comm="syz.1.8780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4864.049942][ T31] audit: type=1400 audit(134222591.965:13092): avc: denied { write } for pid=8435 comm="syz.1.8780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4864.577289][ T31] audit: type=1400 audit(134222592.495:13093): avc: denied { write } for pid=8435 comm="syz.1.8780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4868.690447][ T8459] SELinux: Context system_u:object_r:tmpreaper_exec_t:s0 is not valid (left unmapped). [ 4868.718593][ T8459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8459 comm=syz.0.8787 [ 4868.980044][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 4868.980382][ T31] audit: type=1400 audit(134222596.895:13150): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4868.985796][ T31] audit: type=1400 audit(134222596.895:13151): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4868.998597][ T31] audit: type=1400 audit(134222596.915:13152): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4869.066202][ T31] audit: type=1400 audit(134222596.985:13153): avc: denied { create } for pid=8462 comm="syz.1.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4869.071084][ T31] audit: type=1400 audit(134222596.985:13154): avc: denied { write } for pid=8462 comm="syz.1.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4869.084212][ T31] audit: type=1400 audit(134222596.995:13155): avc: denied { write } for pid=8462 comm="syz.1.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4869.095786][ T31] audit: type=1400 audit(134222597.005:13156): avc: denied { ioctl } for pid=8462 comm="syz.1.8789" path="socket:[100168]" dev="sockfs" ino=100168 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4869.101537][ T31] audit: type=1400 audit(134222597.015:13157): avc: denied { create } for pid=8462 comm="syz.1.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4869.109552][ T31] audit: type=1400 audit(134222597.025:13158): avc: denied { write } for pid=8462 comm="syz.1.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4869.119382][ T31] audit: type=1400 audit(134222597.035:13159): avc: denied { create } for pid=8462 comm="syz.1.8789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4872.787522][ T8481] FAULT_INJECTION: forcing a failure. [ 4872.787522][ T8481] name failslab, interval 1, probability 0, space 0, times 0 [ 4872.789303][ T8481] CPU: 1 UID: 0 PID: 8481 Comm: syz.1.8796 Not tainted syzkaller #0 PREEMPT [ 4872.789393][ T8481] Hardware name: ARM-Versatile Express [ 4872.789412][ T8481] Call trace: [ 4872.789439][ T8481] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4872.789512][ T8481] r7:00000c40 r6:00000000 r5:60000013 r4:82260d04 [ 4872.789522][ T8481] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4872.789557][ T8481] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4872.789586][ T8481] r5:8530ec00 r4:82917c00 [ 4872.789594][ T8481] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4872.789625][ T8481] [<80972c80>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 4872.789660][ T8481] r8:8530ec00 r7:00000c40 r6:8625f0e8 r5:00001000 r4:830016c0 [ 4872.789669][ T8481] [<8051f254>] (should_failslab) from [<80503c50>] (__kmalloc_noprof+0x9c/0x458) [ 4872.789693][ T8481] [<80503bb4>] (__kmalloc_noprof) from [<807c3814>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4872.789728][ T8481] r10:8530ec00 r9:8309f800 r8:00000000 r7:854eaee0 r6:8625f0e8 r5:00001000 [ 4872.789738][ T8481] r4:00000000 [ 4872.789746][ T8481] [<807c37d8>] (tomoyo_realpath_from_path) from [<807bf958>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4872.789778][ T8481] r10:8530ec00 r9:00000000 r8:8625f0c0 r7:0000541b r6:00000004 r5:81cd6504 [ 4872.789789][ T8481] r4:8625f0e8 r3:826c0200 [ 4872.789799][ T8481] [<807bf88c>] (tomoyo_path_number_perm) from [<807c4238>] (tomoyo_file_ioctl+0x1c/0x20) [ 4872.789836][ T8481] r9:00000003 r8:8625f0c0 r7:200000c0 r6:200000c0 r5:0000541b r4:8625f0c0 [ 4872.789845][ T8481] [<807c421c>] (tomoyo_file_ioctl) from [<80770a8c>] (security_file_ioctl+0x64/0x1e4) [ 4872.789872][ T8481] [<80770a28>] (security_file_ioctl) from [<8056cdb8>] (sys_ioctl+0x4c/0xba0) [ 4872.789903][ T8481] r7:200000c0 r6:8625f0c1 r5:00000000 r4:0000541b [ 4872.789911][ T8481] [<8056cd6c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4872.789937][ T8481] Exception stack(0xdffd5fa8 to 0xdffd5ff0) [ 4872.789957][ T8481] 5fa0: 00000000 00000000 00000003 0000541b 200000c0 00000000 [ 4872.789975][ T8481] 5fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f220bc [ 4872.789989][ T8481] 5fe0: 76f21ec0 76f21eb0 0001948c 001322a0 [ 4872.790008][ T8481] r10:00000036 r9:8530ec00 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 4872.790018][ T8481] r4:00000000 [ 4872.797713][ T8481] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4873.993194][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 4873.993577][ T31] audit: type=1400 audit(134222601.905:13243): avc: denied { create } for pid=8502 comm="syz.0.8799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4874.040871][ T31] audit: type=1400 audit(134222601.955:13244): avc: denied { module_request } for pid=8482 comm="syz.1.8797" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4874.166805][ T31] audit: type=1400 audit(134222602.085:13245): avc: denied { sys_module } for pid=8482 comm="syz.1.8797" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4874.169700][ T31] audit: type=1400 audit(134222602.085:13246): avc: denied { module_request } for pid=8482 comm="syz.1.8797" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4874.293077][ T31] audit: type=1400 audit(134222602.205:13247): avc: denied { module_request } for pid=8482 comm="syz.1.8797" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4874.396844][ T31] audit: type=1400 audit(134222602.315:13248): avc: denied { sys_module } for pid=8482 comm="syz.1.8797" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4874.397162][ T31] audit: type=1400 audit(134222602.315:13249): avc: denied { module_request } for pid=8482 comm="syz.1.8797" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4874.498693][ T31] audit: type=1400 audit(134222602.415:13250): avc: denied { module_request } for pid=8482 comm="syz.1.8797" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4874.610276][ T31] audit: type=1400 audit(134222602.525:13251): avc: denied { sys_module } for pid=8482 comm="syz.1.8797" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4874.610615][ T31] audit: type=1400 audit(134222602.525:13252): avc: denied { module_request } for pid=8482 comm="syz.1.8797" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4879.013534][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 4879.014196][ T31] audit: type=1400 audit(134222606.925:13315): avc: denied { read } for pid=8552 comm="syz.1.8814" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4879.017726][ T31] audit: type=1400 audit(134222606.935:13316): avc: denied { open } for pid=8552 comm="syz.1.8814" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4879.028881][ T31] audit: type=1400 audit(134222606.945:13317): avc: denied { ioctl } for pid=8552 comm="syz.1.8814" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x534b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4879.042678][ T31] audit: type=1400 audit(134222606.945:13318): avc: denied { ioctl } for pid=8552 comm="syz.1.8814" path="/dev/uhid" dev="devtmpfs" ino=707 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4879.068233][ T31] audit: type=1400 audit(134222606.985:13319): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4879.069354][ T31] audit: type=1400 audit(134222606.985:13320): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4879.070386][ T31] audit: type=1400 audit(134222606.985:13321): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4879.130401][ T31] audit: type=1400 audit(134222607.045:13322): avc: denied { create } for pid=8554 comm="syz.1.8815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4879.137648][ T31] audit: type=1400 audit(134222607.055:13323): avc: denied { write } for pid=8554 comm="syz.1.8815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4879.171554][ T31] audit: type=1400 audit(134222607.085:13324): avc: denied { write } for pid=8548 comm="syz.0.8812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4884.581956][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 4884.582261][ T31] audit: type=1400 audit(134222612.495:13365): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4884.585276][ T31] audit: type=1400 audit(134222612.495:13366): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4884.588122][ T31] audit: type=1400 audit(134222612.505:13367): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4884.630533][ T31] audit: type=1400 audit(134222612.545:13368): avc: denied { create } for pid=8590 comm="syz.1.8828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4884.643907][ T31] audit: type=1400 audit(134222612.555:13369): avc: denied { write } for pid=8590 comm="syz.1.8828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4884.647677][ T31] audit: type=1400 audit(134222612.565:13370): avc: denied { read } for pid=8590 comm="syz.1.8828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4885.151205][ T31] audit: type=1400 audit(134222613.065:13371): avc: denied { write } for pid=8590 comm="syz.1.8828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4885.793117][ T31] audit: type=1400 audit(134222613.705:13372): avc: denied { create } for pid=8594 comm="syz.0.8829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4885.831729][ T31] audit: type=1400 audit(134222613.745:13373): avc: denied { read } for pid=8594 comm="syz.0.8829" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4885.832080][ T31] audit: type=1400 audit(134222613.745:13374): avc: denied { open } for pid=8594 comm="syz.0.8829" path="net:[4026532645]" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4889.593587][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 4889.593800][ T31] audit: type=1400 audit(134222617.505:13423): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4889.596415][ T31] audit: type=1400 audit(134222617.515:13424): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4889.600220][ T31] audit: type=1400 audit(134222617.515:13425): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4889.653571][ T31] audit: type=1400 audit(134222617.565:13426): avc: denied { create } for pid=8623 comm="syz.1.8840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4889.671966][ T31] audit: type=1400 audit(134222617.585:13427): avc: denied { read } for pid=8623 comm="syz.1.8840" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4889.674046][ T31] audit: type=1400 audit(134222617.585:13428): avc: denied { open } for pid=8623 comm="syz.1.8840" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4889.683489][ T31] audit: type=1400 audit(134222617.595:13429): avc: denied { ioctl } for pid=8623 comm="syz.1.8840" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0xaf14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4889.689503][ T31] audit: type=1400 audit(134222617.605:13430): avc: denied { setopt } for pid=8623 comm="syz.1.8840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4889.694483][ T31] audit: type=1400 audit(134222617.605:13431): avc: denied { connect } for pid=8623 comm="syz.1.8840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4890.201849][ T31] audit: type=1400 audit(134222618.115:13432): avc: denied { ioctl } for pid=8623 comm="syz.1.8840" path="socket:[101429]" dev="sockfs" ino=101429 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4895.440872][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 4895.441654][ T31] audit: type=1400 audit(134222623.355:13456): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4895.441901][ T31] audit: type=1400 audit(134222623.355:13457): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4895.441979][ T31] audit: type=1400 audit(134222623.355:13458): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4895.502251][ T31] audit: type=1400 audit(134222623.415:13459): avc: denied { create } for pid=8653 comm="syz.1.8848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4895.511975][ T31] audit: type=1400 audit(134222623.425:13460): avc: denied { write } for pid=8653 comm="syz.1.8848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4895.515550][ T31] audit: type=1400 audit(134222623.425:13461): avc: denied { read } for pid=8653 comm="syz.1.8848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4895.801491][ T31] audit: type=1400 audit(134222623.715:13462): avc: denied { create } for pid=8657 comm="syz.0.8850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4895.819979][ T8658] FAULT_INJECTION: forcing a failure. [ 4895.819979][ T8658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 4895.821062][ T8658] CPU: 0 UID: 0 PID: 8658 Comm: syz.0.8850 Not tainted syzkaller #0 PREEMPT [ 4895.821125][ T8658] Hardware name: ARM-Versatile Express [ 4895.821144][ T8658] Call trace: [ 4895.821173][ T8658] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4895.821512][ T8658] r7:00000000 r6:00000000 r5:60000013 r4:82260d04 [ 4895.821526][ T8658] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4895.821553][ T8658] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4895.821581][ T8658] r5:83b0bc00 r4:82917c54 [ 4895.821589][ T8658] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4895.821630][ T8658] [<80972c80>] (should_fail_ex) from [<8051f350>] (should_fail_alloc_page+0x68/0x74) [ 4895.821665][ T8658] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:dfb8dbe8 [ 4895.821674][ T8658] [<8051f2e8>] (should_fail_alloc_page) from [<804ed5f4>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 4895.821701][ T8658] [<804ed560>] (prepare_alloc_pages.constprop.0) from [<804f5b1c>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 4895.821734][ T8658] r10:dfb8dd88 r9:00000000 r8:83b0bc00 r7:00000000 r6:00140cca r5:00000002 [ 4895.821746][ T8658] r4:00000000 r3:dfb8dbe8 [ 4895.821755][ T8658] [<804f5a70>] (__alloc_frozen_pages_noprof) from [<804f6bb4>] (__folio_alloc_noprof+0x14/0x6c) [ 4895.821789][ T8658] r10:dfb8dd88 r9:842709c0 r8:85a38780 r7:00000000 r6:00000014 r5:00000002 [ 4895.821799][ T8658] r4:8748dc58 [ 4895.821807][ T8658] [<804f6ba0>] (__folio_alloc_noprof) from [<80497d00>] (shmem_get_folio_gfp.constprop.0+0x21c/0x864) [ 4895.821840][ T8658] r5:00000002 r4:8748dc58 [ 4895.821848][ T8658] [<80497ae4>] (shmem_get_folio_gfp.constprop.0) from [<804984f4>] (shmem_fault+0x80/0x35c) [ 4895.821885][ T8658] r10:00000000 r9:dfb8dd88 r8:83b0bc00 r7:00100cca r6:00000000 r5:8748dc58 [ 4895.821895][ T8658] r4:dfb8dd88 [ 4895.821903][ T8658] [<80498474>] (shmem_fault) from [<804c0b84>] (__do_fault+0x44/0xfc) [ 4895.821940][ T8658] r10:00000000 r9:dfb8dd88 r8:00000000 r7:00000000 r6:20014000 r5:85a38780 [ 4895.821951][ T8658] r4:dfb8dd88 [ 4895.821959][ T8658] [<804c0b40>] (__do_fault) from [<804c75d4>] (handle_mm_fault+0xbdc/0x14dc) [ 4895.821990][ T8658] r7:00000000 r6:20014000 r5:83b0bc00 r4:00000014 [ 4895.821998][ T8658] [<804c69f8>] (handle_mm_fault) from [<804b8f44>] (__get_user_pages+0x254/0x6f0) [ 4895.822031][ T8658] r10:00000014 r9:20014000 r8:83b0bc00 r7:00000000 r6:00000014 r5:85a38780 [ 4895.822041][ T8658] r4:00210008 [ 4895.822049][ T8658] [<804b8cf0>] (__get_user_pages) from [<804bbbc4>] (populate_vma_page_range+0xd8/0x220) [ 4895.822080][ T8658] r10:20000000 r9:842709c0 r8:dfb8deb8 r7:20b36000 r6:20000000 r5:85a38780 [ 4895.822090][ T8658] r4:00000b36 [ 4895.822097][ T8658] [<804bbaec>] (populate_vma_page_range) from [<804bc3a4>] (__mm_populate+0x11c/0x1b8) [ 4895.822128][ T8658] r10:20000000 r9:84270a44 r8:00000001 r7:842709c0 r6:20b36000 r5:20b36000 [ 4895.822138][ T8658] r4:85a38780 [ 4895.822146][ T8658] [<804bc288>] (__mm_populate) from [<8049cc60>] (vm_mmap_pgoff+0x18c/0x204) [ 4895.822177][ T8658] r10:842709c0 r9:20000000 r8:00b36000 r7:dfb8df18 r6:00000000 r5:00000002 [ 4895.822188][ T8658] r4:20000000 [ 4895.822196][ T8658] [<8049cad4>] (vm_mmap_pgoff) from [<804cebec>] (ksys_mmap_pgoff+0x48/0xec) [ 4895.822230][ T8658] r10:000000c0 r9:83b0bc00 r8:8020029c r7:20000000 r6:00b36000 r5:00000002 [ 4895.822240][ T8658] r4:00008031 [ 4895.822248][ T8658] [<804ceba4>] (ksys_mmap_pgoff) from [<804cecac>] (sys_mmap_pgoff+0x1c/0x24) [ 4895.822281][ T8658] r8:8020029c r7:000000c0 r6:00130250 r5:00000000 r4:00000003 [ 4895.822290][ T8658] [<804cec90>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4895.822320][ T8658] Exception stack(0xdfb8dfa8 to 0xdfb8dff0) [ 4895.822345][ T8658] dfa0: 00000003 00000000 20000000 00b36000 00000002 00008031 [ 4895.822363][ T8658] dfc0: 00000003 00000000 00130250 000000c0 002f0000 00000000 00006364 76fdc0bc [ 4895.822377][ T8658] dfe0: 76fdbec0 76fdbeb0 0001948c 001322a0 [ 4896.024164][ T31] audit: type=1400 audit(134222623.935:13463): avc: denied { write } for pid=8653 comm="syz.1.8848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4897.202487][ T31] audit: type=1400 audit(134222625.115:13464): avc: denied { listen } for pid=8657 comm="syz.0.8850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4898.027295][ T31] audit: type=1400 audit(134222625.945:13465): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4900.592712][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 4900.596535][ T31] audit: type=1400 audit(134222628.505:13489): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4900.605647][ T31] audit: type=1400 audit(134222628.515:13490): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4900.606142][ T31] audit: type=1400 audit(134222628.515:13491): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4900.606480][ T31] audit: type=1400 audit(134222628.525:13492): avc: denied { write } for pid=8677 comm="syz.0.8857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4900.642142][ T31] audit: type=1400 audit(134222628.555:13493): avc: denied { create } for pid=8680 comm="syz.1.8858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4901.714079][ T31] audit: type=1400 audit(134222629.625:13494): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4901.716954][ T31] audit: type=1400 audit(134222629.625:13495): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4901.719093][ T31] audit: type=1400 audit(134222629.635:13496): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4901.836245][ T31] audit: type=1400 audit(134222629.745:13497): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4901.856057][ T31] audit: type=1400 audit(134222629.765:13498): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4907.473187][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 4907.473578][ T31] audit: type=1400 audit(134222635.385:13542): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4907.473832][ T31] audit: type=1400 audit(134222635.385:13543): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4907.482557][ T31] audit: type=1400 audit(134222635.385:13544): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4907.528299][ T31] audit: type=1400 audit(134222635.445:13545): avc: denied { create } for pid=8705 comm="syz.1.8868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4907.536645][ T31] audit: type=1400 audit(134222635.455:13546): avc: denied { write } for pid=8705 comm="syz.1.8868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4907.550416][ T31] audit: type=1400 audit(134222635.465:13547): avc: denied { read } for pid=8705 comm="syz.1.8868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4908.059686][ T31] audit: type=1400 audit(134222635.975:13548): avc: denied { write } for pid=8705 comm="syz.1.8868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4908.165671][ T31] audit: type=1400 audit(134222636.085:13549): avc: denied { create } for pid=8708 comm="syz.0.8869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4908.170949][ T31] audit: type=1400 audit(134222636.085:13550): avc: denied { read write } for pid=8708 comm="syz.0.8869" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4908.171805][ T31] audit: type=1400 audit(134222636.085:13551): avc: denied { open } for pid=8708 comm="syz.0.8869" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4912.890278][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 4912.895437][ T31] audit: type=1400 audit(134222640.805:13575): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4912.896088][ T31] audit: type=1400 audit(134222640.805:13576): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4912.896296][ T31] audit: type=1400 audit(134222640.805:13577): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4912.953938][ T31] audit: type=1400 audit(134222640.865:13578): avc: denied { create } for pid=8724 comm="syz.1.8873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4912.971097][ T31] audit: type=1400 audit(134222640.885:13579): avc: denied { write } for pid=8724 comm="syz.1.8873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4913.900438][ T31] audit: type=1400 audit(134222641.815:13580): avc: denied { create } for pid=8726 comm="syz.0.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4913.909573][ T31] audit: type=1400 audit(134222641.825:13581): avc: denied { create } for pid=8726 comm="syz.0.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4913.919307][ T31] audit: type=1400 audit(134222641.835:13582): avc: denied { create } for pid=8726 comm="syz.0.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4913.922797][ T31] audit: type=1400 audit(134222641.835:13583): avc: denied { write } for pid=8726 comm="syz.0.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4913.926910][ T31] audit: type=1400 audit(134222641.835:13584): avc: denied { read } for pid=8726 comm="syz.0.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4918.379063][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 4918.379530][ T31] audit: type=1400 audit(134222646.295:13604): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4918.383912][ T31] audit: type=1400 audit(134222646.295:13605): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4918.395444][ T31] audit: type=1400 audit(134222646.305:13606): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4918.461880][ T31] audit: type=1400 audit(134222646.375:13607): avc: denied { create } for pid=8740 comm="syz.1.8878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4918.468617][ T31] audit: type=1400 audit(134222646.375:13608): avc: denied { write } for pid=8740 comm="syz.1.8878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4919.004411][ T31] audit: type=1400 audit(134222646.915:13609): avc: denied { read write } for pid=8740 comm="syz.1.8878" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4919.007693][ T31] audit: type=1400 audit(134222646.925:13610): avc: denied { open } for pid=8740 comm="syz.1.8878" path="/dev/vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4919.016058][ T31] audit: type=1400 audit(134222646.935:13611): avc: denied { ioctl } for pid=8740 comm="syz.1.8878" path="/dev/vhost-net" dev="devtmpfs" ino=708 ioctlcmd=0x551c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4919.341630][ T31] audit: type=1400 audit(134222647.255:13612): avc: denied { create } for pid=8743 comm="syz.0.8879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4919.352348][ T31] audit: type=1400 audit(134222647.265:13613): avc: denied { ioctl } for pid=8743 comm="syz.0.8879" path="socket:[101610]" dev="sockfs" ino=101610 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4923.454211][ T31] kauditd_printk_skb: 84 callbacks suppressed [ 4923.455043][ T31] audit: type=1400 audit(134222651.365:13696): avc: denied { create } for pid=8769 comm="syz.0.8889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4923.471978][ T31] audit: type=1400 audit(134222651.385:13697): avc: denied { write } for pid=8769 comm="syz.0.8889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4923.632689][ T31] audit: type=1400 audit(134222651.545:13698): avc: denied { create } for pid=8773 comm="syz.0.8891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4924.281882][ T31] audit: type=1400 audit(134222652.195:13699): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4924.284173][ T31] audit: type=1400 audit(134222652.195:13700): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4924.287511][ T31] audit: type=1400 audit(134222652.195:13701): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4924.355649][ T31] audit: type=1400 audit(134222652.265:13702): avc: denied { create } for pid=8776 comm="syz.1.8892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4924.363184][ T8777] FAULT_INJECTION: forcing a failure. [ 4924.363184][ T8777] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4924.368458][ T8777] CPU: 1 UID: 0 PID: 8777 Comm: syz.1.8892 Not tainted syzkaller #0 PREEMPT [ 4924.368644][ T8777] Hardware name: ARM-Versatile Express [ 4924.368681][ T8777] Call trace: [ 4924.368733][ T8777] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4924.368927][ T8777] r7:dfc05e20 r6:00000000 r5:600f0113 r4:82260d04 [ 4924.368952][ T8777] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4924.369015][ T8777] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4924.369081][ T8777] r5:83b34800 r4:8294f190 [ 4924.369100][ T8777] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4924.369169][ T8777] [<80972c80>] (should_fail_ex) from [<80972ebc>] (should_fail+0x14/0x18) [ 4924.369245][ T8777] r8:24008044 r7:dfc05e20 r6:200002c0 r5:00000000 r4:dfc05f20 [ 4924.369264][ T8777] [<80972ea8>] (should_fail) from [<80972edc>] (should_fail_usercopy+0x1c/0x20) [ 4924.369325][ T8777] [<80972ec0>] (should_fail_usercopy) from [<815470c4>] (copy_msghdr_from_user+0x50/0x130) [ 4924.369401][ T8777] [<81547074>] (copy_msghdr_from_user) from [<8154721c>] (___sys_sendmsg+0x78/0xd0) [ 4924.369471][ T8777] r8:24008044 r7:00000000 r6:85581180 r5:dfc05f20 r4:dfc05e64 [ 4924.369491][ T8777] [<815471a4>] (___sys_sendmsg) from [<815476d8>] (__sys_sendmsg+0x8c/0xe0) [ 4924.369560][ T8777] r10:00000128 r9:83b34800 r8:847f7000 r7:24008044 r6:200002c0 r5:847f7001 [ 4924.369583][ T8777] r4:00000003 [ 4924.369611][ T8777] [<8154764c>] (__sys_sendmsg) from [<81547740>] (sys_sendmsg+0x14/0x18) [ 4924.369676][ T8777] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 4924.369696][ T8777] [<8154772c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4924.369750][ T8777] Exception stack(0xdfc05fa8 to 0xdfc05ff0) [ 4924.369795][ T8777] 5fa0: 00000000 00000000 00000003 200002c0 24008044 00000000 [ 4924.369832][ T8777] 5fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f220bc [ 4924.369864][ T8777] 5fe0: 76f21ec0 76f21eb0 0001948c 001322a0 [ 4924.425081][ T31] audit: type=1400 audit(134222652.335:13703): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4924.429257][ T31] audit: type=1400 audit(134222652.345:13704): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4924.432754][ T31] audit: type=1400 audit(134222652.345:13705): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4924.821128][ T8787] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1013 sclass=netlink_tcpdiag_socket pid=8787 comm=syz.1.8897 [ 4929.300259][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 4929.300622][ T31] audit: type=1400 audit(134222657.215:13811): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4929.300880][ T31] audit: type=1400 audit(134222657.215:13812): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4929.310426][ T31] audit: type=1400 audit(134222657.225:13813): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4929.365109][ T31] audit: type=1400 audit(134222657.275:13814): avc: denied { create } for pid=8821 comm="syz.1.8910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4929.371488][ T31] audit: type=1400 audit(134222657.285:13815): avc: denied { bind } for pid=8821 comm="syz.1.8910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4929.376627][ T31] audit: type=1400 audit(134222657.295:13816): avc: denied { create } for pid=8821 comm="syz.1.8910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4929.387471][ T31] audit: type=1400 audit(134222657.305:13817): avc: denied { ioctl } for pid=8821 comm="syz.1.8910" path="socket:[100721]" dev="sockfs" ino=100721 ioctlcmd=0x9426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4929.394061][ T31] audit: type=1400 audit(134222657.305:13818): avc: denied { accept } for pid=8821 comm="syz.1.8910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4929.405582][ T31] audit: type=1400 audit(134222657.315:13819): avc: denied { write } for pid=8821 comm="syz.1.8910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4929.411908][ T31] audit: type=1400 audit(134222657.325:13820): avc: denied { ioctl } for pid=8821 comm="syz.1.8910" path="socket:[101764]" dev="sockfs" ino=101764 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4931.143111][ T8834] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8834 comm=syz.1.8915 [ 4931.155963][ T8834] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=8834 comm=syz.1.8915 [ 4934.599124][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 4934.599578][ T31] audit: type=1400 audit(134222662.515:13893): avc: denied { create } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4934.599816][ T31] audit: type=1400 audit(134222662.515:13894): avc: denied { write } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4934.608852][ T31] audit: type=1400 audit(134222662.525:13895): avc: denied { module_request } for pid=8847 comm="syz.0.8919" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4934.700861][ T31] audit: type=1400 audit(134222662.615:13896): avc: denied { write } for pid=8845 comm="syz.1.8918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4934.743343][ T31] audit: type=1400 audit(134222662.655:13897): avc: denied { read } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4934.752322][ T31] audit: type=1400 audit(134222662.665:13898): avc: denied { create } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4934.759338][ T31] audit: type=1400 audit(134222662.675:13899): avc: denied { ioctl } for pid=8847 comm="syz.0.8919" path="socket:[101831]" dev="sockfs" ino=101831 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4934.765764][ T31] audit: type=1400 audit(134222662.675:13900): avc: denied { bind } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4934.773570][ T31] audit: type=1400 audit(134222662.685:13901): avc: denied { write } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4934.781389][ T31] audit: type=1400 audit(134222662.695:13902): avc: denied { write } for pid=8847 comm="syz.0.8919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4940.123719][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 4940.124030][ T31] audit: type=1400 audit(134222668.035:13980): avc: denied { create } for pid=8879 comm="syz.0.8929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4940.136586][ T31] audit: type=1400 audit(134222668.055:13981): avc: denied { create } for pid=8879 comm="syz.0.8929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4940.159285][ T31] audit: type=1400 audit(134222668.075:13982): avc: denied { ioctl } for pid=8879 comm="syz.0.8929" path="socket:[100800]" dev="sockfs" ino=100800 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4940.184281][ T31] audit: type=1400 audit(134222668.095:13983): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4940.185109][ T31] audit: type=1400 audit(134222668.095:13984): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4940.193248][ T31] audit: type=1400 audit(134222668.105:13985): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4940.207750][ T31] audit: type=1400 audit(134222668.125:13986): avc: denied { create } for pid=8879 comm="syz.0.8929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4940.212553][ T31] audit: type=1400 audit(134222668.125:13987): avc: denied { ioctl } for pid=8879 comm="syz.0.8929" path="socket:[101871]" dev="sockfs" ino=101871 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4940.267154][ T31] audit: type=1400 audit(134222668.185:13988): avc: denied { create } for pid=8881 comm="syz.1.8930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4940.277850][ T31] audit: type=1400 audit(134222668.185:13989): avc: denied { write } for pid=8881 comm="syz.1.8930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4943.757491][ T8909] FAULT_INJECTION: forcing a failure. [ 4943.757491][ T8909] name failslab, interval 1, probability 0, space 0, times 0 [ 4943.758426][ T8909] CPU: 1 UID: 0 PID: 8909 Comm: syz.0.8940 Not tainted syzkaller #0 PREEMPT [ 4943.758520][ T8909] Hardware name: ARM-Versatile Express [ 4943.758542][ T8909] Call trace: [ 4943.758599][ T8909] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4943.758706][ T8909] r7:00000820 r6:00000000 r5:60000013 r4:82260d04 [ 4943.758725][ T8909] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4943.758816][ T8909] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4943.758886][ T8909] r5:83b21800 r4:82917c00 [ 4943.758906][ T8909] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4943.759132][ T8909] [<80972c80>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 4943.759342][ T8909] r8:83b21800 r7:00000820 r6:8497b958 r5:00000017 r4:83001240 [ 4943.759366][ T8909] [<8051f254>] (should_failslab) from [<80504904>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 4943.759443][ T8909] [<80504864>] (__kmalloc_node_track_caller_noprof) from [<8049b6e8>] (kmemdup_noprof+0x28/0x44) [ 4943.759620][ T8909] r10:00000000 r9:84223004 r8:dfc85bd0 r7:84b75000 r6:8497b958 r5:dfc85bc8 [ 4943.759698][ T8909] r4:00000017 [ 4943.759816][ T8909] [<8049b6c0>] (kmemdup_noprof) from [<807a2180>] (sidtab_sid2str_get+0x54/0xa4) [ 4943.759946][ T8909] r7:84b75000 r6:dfc85bd0 r5:dfc85bc8 r4:84bb80c0 [ 4943.760072][ T8909] [<807a212c>] (sidtab_sid2str_get) from [<807a9688>] (sidtab_entry_to_string+0x34/0x94) [ 4943.760157][ T8909] r7:84b75000 r6:84bb80c0 r5:dfc85bc8 r4:0000005f [ 4943.760211][ T8909] [<807a9654>] (sidtab_entry_to_string) from [<807a9800>] (security_sid_to_context_core+0x118/0x17c) [ 4943.760289][ T8909] r9:dfc85cec r8:84b75000 r7:84223004 r6:dfc85bd0 r5:dfc85bc8 r4:0000005f [ 4943.760312][ T8909] [<807a96e8>] (security_sid_to_context_core) from [<807ac814>] (security_sid_to_context+0x1c/0x24) [ 4943.760517][ T8909] r8:8078c938 r7:8078d93c r6:83b21800 r5:89a96670 r4:dfc85c58 [ 4943.760737][ T8909] [<807ac7f8>] (security_sid_to_context) from [<8078d9bc>] (avc_audit_post_callback+0x80/0x2f4) [ 4943.760845][ T8909] [<8078d93c>] (avc_audit_post_callback) from [<807b4dd0>] (common_lsm_audit+0x104/0x148) [ 4943.760965][ T8909] r10:00000000 r9:dfc85cec r8:8078c938 r7:8078d93c r6:dfc85cec r5:89a96670 [ 4943.761198][ T8909] r4:83b21ff0 [ 4943.761227][ T8909] [<807b4ccc>] (common_lsm_audit) from [<8078de48>] (slow_avc_audit+0xbc/0x114) [ 4943.761331][ T8909] r8:00000055 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 4943.761508][ T8909] [<8078dd8c>] (slow_avc_audit) from [<8078e8cc>] (avc_has_perm+0xd8/0xe8) [ 4943.761581][ T8909] r5:00000000 r4:00000004 [ 4943.761692][ T8909] [<8078e7f4>] (avc_has_perm) from [<80794ce4>] (sock_has_perm+0xd0/0xfc) [ 4943.761863][ T8909] r9:dfc85dc4 r8:83b21800 r7:847d6c80 r6:00000004 r5:853a5200 r4:00000000 [ 4943.761912][ T8909] [<80794c14>] (sock_has_perm) from [<80794d98>] (selinux_socket_sendmsg+0x18/0x1c) [ 4943.761978][ T8909] r8:dfc85dc4 r7:00000000 r6:00000000 r5:dfc85f20 r4:85583b80 [ 4943.762028][ T8909] [<80794d80>] (selinux_socket_sendmsg) from [<8078731c>] (security_socket_sendmsg+0x64/0x1e4) [ 4943.762247][ T8909] [<807872b8>] (security_socket_sendmsg) from [<81543ef8>] (__sock_sendmsg+0x1c/0x78) [ 4943.762473][ T8909] r7:00000000 r6:85583b80 r5:dfc85f20 r4:dfc85f20 [ 4943.762498][ T8909] [<81543edc>] (__sock_sendmsg) from [<81545278>] (____sys_sendmsg+0x298/0x2cc) [ 4943.762574][ T8909] r7:00000000 r6:85583b80 r5:00040000 r4:dfc85f20 [ 4943.762594][ T8909] [<81544fe0>] (____sys_sendmsg) from [<81547240>] (___sys_sendmsg+0x9c/0xd0) [ 4943.762752][ T8909] r10:dfc85e24 r9:200001c0 r8:00040000 r7:00000000 r6:85583b80 r5:dfc85f20 [ 4943.762960][ T8909] r4:00000000 [ 4943.763060][ T8909] [<815471a4>] (___sys_sendmsg) from [<815476d8>] (__sys_sendmsg+0x8c/0xe0) [ 4943.763192][ T8909] r10:00000128 r9:83b21800 r8:851cdb40 r7:00040000 r6:200001c0 r5:851cdb41 [ 4943.763269][ T8909] r4:00000003 [ 4943.763289][ T8909] [<8154764c>] (__sys_sendmsg) from [<81547740>] (sys_sendmsg+0x14/0x18) [ 4943.763353][ T8909] r8:8020029c r7:00000128 r6:00130250 r5:00000000 r4:00000000 [ 4943.763495][ T8909] [<8154772c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4943.763724][ T8909] Exception stack(0xdfc85fa8 to 0xdfc85ff0) [ 4943.763784][ T8909] 5fa0: 00000000 00000000 00000003 200001c0 00040000 00000000 [ 4943.763949][ T8909] 5fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76fbb0bc [ 4943.764143][ T8909] 5fe0: 76fbaec0 76fbaeb0 0001948c 001322a0 [ 4945.797709][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 4945.800667][ T31] audit: type=1400 audit(134222673.715:14049): avc: denied { create } for pid=8913 comm="syz.0.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 4945.807904][ T31] audit: type=1400 audit(134222673.725:14050): avc: denied { module_request } for pid=8913 comm="syz.0.8942" kmod="net-pf-8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4945.921782][ T31] audit: type=1400 audit(134222673.835:14051): avc: denied { create } for pid=8913 comm="syz.0.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4945.926699][ T31] audit: type=1400 audit(134222673.835:14052): avc: denied { write } for pid=8913 comm="syz.0.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4945.927069][ T31] audit: type=1400 audit(134222673.835:14053): avc: denied { module_request } for pid=8913 comm="syz.0.8942" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4946.029837][ T31] audit: type=1400 audit(134222673.945:14054): avc: denied { read } for pid=8913 comm="syz.0.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4946.127573][ T31] audit: type=1400 audit(134222674.045:14055): avc: denied { create } for pid=8917 comm="syz.0.8943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4946.132690][ T31] audit: type=1400 audit(134222674.045:14056): avc: denied { write } for pid=8917 comm="syz.0.8943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4946.153339][ T31] audit: type=1400 audit(134222674.065:14057): avc: denied { write } for pid=8917 comm="syz.0.8943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4946.258884][ T31] audit: type=1400 audit(134222674.175:14058): avc: denied { read } for pid=8919 comm="syz.0.8944" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4951.551066][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 4951.551405][ T31] audit: type=1400 audit(134222679.465:14106): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4951.551669][ T31] audit: type=1400 audit(134222679.465:14107): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4951.557673][ T31] audit: type=1400 audit(134222679.475:14108): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4952.663445][ T31] audit: type=1400 audit(134222680.575:14109): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4952.664156][ T31] audit: type=1400 audit(134222680.575:14110): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4952.675499][ T31] audit: type=1400 audit(134222680.585:14111): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4952.732053][ T31] audit: type=1400 audit(134222680.645:14112): avc: denied { create } for pid=8941 comm="syz.1.8952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4952.740047][ T31] audit: type=1400 audit(134222680.655:14113): avc: denied { ioctl } for pid=8941 comm="syz.1.8952" path="socket:[101962]" dev="sockfs" ino=101962 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4952.745402][ T31] audit: type=1400 audit(134222680.655:14114): avc: denied { bind } for pid=8941 comm="syz.1.8952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4952.751182][ T31] audit: type=1400 audit(134222680.665:14115): avc: denied { write } for pid=8941 comm="syz.1.8952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4958.542256][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 4958.542637][ T31] audit: type=1400 audit(134222686.455:14146): avc: denied { read } for pid=8956 comm="syz.1.8958" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4958.544250][ T31] audit: type=1400 audit(134222686.455:14147): avc: denied { read open } for pid=8956 comm="syz.1.8958" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4958.550459][ T31] audit: type=1400 audit(134222686.465:14148): avc: denied { ioctl } for pid=8956 comm="syz.1.8958" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4958.582072][ T31] audit: type=1400 audit(134222686.495:14149): avc: denied { read } for pid=8956 comm="syz.1.8958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4958.615341][ T31] audit: type=1400 audit(134222686.525:14150): avc: denied { read } for pid=8956 comm="syz.1.8958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4958.617175][ T31] audit: type=1400 audit(134222686.535:14151): avc: denied { write } for pid=8956 comm="syz.1.8958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4958.622389][ T31] audit: type=1400 audit(134222686.535:14152): avc: denied { read } for pid=8956 comm="syz.1.8958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4958.681583][ T31] audit: type=1400 audit(134222686.595:14153): avc: denied { write } for pid=8956 comm="syz.1.8958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4958.700305][ T31] audit: type=1400 audit(134222686.615:14154): avc: denied { create } for pid=8962 comm="syz.0.8959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4958.702947][ T31] audit: type=1400 audit(134222686.615:14155): avc: denied { read } for pid=8956 comm="syz.1.8958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4963.699221][ T31] kauditd_printk_skb: 115 callbacks suppressed [ 4963.699546][ T31] audit: type=1400 audit(134222691.615:14271): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4963.706954][ T31] audit: type=1400 audit(134222691.625:14272): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4963.707235][ T31] audit: type=1400 audit(134222691.625:14273): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4963.795386][ T31] audit: type=1400 audit(134222691.705:14274): avc: denied { write } for pid=8985 comm="syz.1.8965" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4963.799373][ T31] audit: type=1400 audit(134222691.715:14275): avc: denied { write open } for pid=8985 comm="syz.1.8965" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4963.811711][ T31] audit: type=1400 audit(134222691.725:14276): avc: denied { create } for pid=8985 comm="syz.1.8965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4963.823747][ T31] audit: type=1400 audit(134222691.735:14277): avc: denied { ioctl } for pid=8985 comm="syz.1.8965" path="socket:[100953]" dev="sockfs" ino=100953 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4963.823967][ T31] audit: type=1400 audit(134222691.735:14278): avc: denied { bind } for pid=8985 comm="syz.1.8965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4963.824146][ T31] audit: type=1400 audit(134222691.735:14279): avc: denied { write } for pid=8985 comm="syz.1.8965" path="socket:[100953]" dev="sockfs" ino=100953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4963.844271][ T31] audit: type=1400 audit(134222691.755:14280): avc: denied { write } for pid=8985 comm="syz.1.8965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4966.619530][ T8996] fuse: Unknown parameter 'root' [ 4966.636921][ T8996] fuse: Bad value for 'fd' [ 4969.277615][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 4969.278004][ T31] audit: type=1400 audit(134222697.195:14317): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4969.282465][ T31] audit: type=1400 audit(134222697.195:14318): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4969.285771][ T31] audit: type=1400 audit(134222697.195:14319): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4969.343245][ T31] audit: type=1400 audit(134222697.255:14320): avc: denied { create } for pid=9006 comm="syz.1.8973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4969.376017][ T31] audit: type=1400 audit(134222697.285:14321): avc: denied { write } for pid=9006 comm="syz.1.8973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4969.391196][ T31] audit: type=1400 audit(134222697.305:14322): avc: denied { read } for pid=9006 comm="syz.1.8973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4969.893232][ T31] audit: type=1400 audit(134222697.805:14323): avc: denied { write } for pid=9006 comm="syz.1.8973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4970.390232][ T31] audit: type=1400 audit(134222698.305:14324): avc: denied { create } for pid=9009 comm="syz.0.8974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4970.495390][ T31] audit: type=1400 audit(134222698.405:14325): avc: denied { read } for pid=9009 comm="syz.0.8974" name="nbd0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4970.497536][ T31] audit: type=1400 audit(134222698.415:14326): avc: denied { open } for pid=9009 comm="syz.0.8974" path="/dev/nbd0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4970.498790][ T9010] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.498932][ T9010] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4970.499114][ T9010] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.499163][ T9010] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4970.499316][ T9010] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.499366][ T9010] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4970.499463][ T9010] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.499552][ T9010] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4970.499735][ T9010] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.499815][ T9010] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4970.499928][ T9010] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.499976][ T9010] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4970.500083][ T9010] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.500129][ T9010] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4970.500234][ T9010] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4970.500281][ T9010] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4970.500360][ T9010] nbd0: unable to read partition table [ 4974.312557][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 4974.315178][ T31] audit: type=1400 audit(134222702.215:14350): avc: denied { read } for pid=9022 comm="syz.1.8979" name="rtc0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4974.323348][ T31] audit: type=1400 audit(134222702.235:14351): avc: denied { read open } for pid=9022 comm="syz.1.8979" path="/dev/rtc0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4974.403177][ T31] audit: type=1400 audit(134222702.315:14352): avc: denied { execmem } for pid=9022 comm="syz.1.8979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4974.421148][ T31] audit: type=1400 audit(134222702.325:14353): avc: denied { read } for pid=9022 comm="syz.1.8979" name="rtc0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4974.456678][ T31] audit: type=1400 audit(134222702.365:14354): avc: denied { open } for pid=9022 comm="syz.1.8979" path="/dev/rtc0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4974.561592][ T31] audit: type=1400 audit(134222702.465:14355): avc: denied { read write } for pid=9022 comm="syz.1.8979" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4974.575653][ T31] audit: type=1400 audit(134222702.475:14356): avc: denied { open } for pid=9022 comm="syz.1.8979" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4975.123316][ T31] audit: type=1400 audit(134222703.035:14357): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4975.155001][ T31] audit: type=1400 audit(134222703.055:14358): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4975.161834][ T31] audit: type=1400 audit(134222703.055:14359): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4980.769903][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 4980.771066][ T31] audit: type=1400 audit(134222708.685:14392): avc: denied { create } for pid=9042 comm="syz.0.8986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4980.789526][ T31] audit: type=1400 audit(134222708.705:14393): avc: denied { setopt } for pid=9042 comm="syz.0.8986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4981.009490][ T31] audit: type=1400 audit(134222708.925:14394): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4981.012374][ T31] audit: type=1400 audit(134222708.925:14395): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4981.020210][ T31] audit: type=1400 audit(134222708.935:14396): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4981.076292][ T31] audit: type=1400 audit(134222708.995:14397): avc: denied { read } for pid=9045 comm="syz.1.8987" dev="nsfs" ino=4026532780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4981.079952][ T31] audit: type=1400 audit(134222708.995:14398): avc: denied { read open } for pid=9045 comm="syz.1.8987" path="net:[4026532780]" dev="nsfs" ino=4026532780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4981.086260][ T31] audit: type=1400 audit(134222709.005:14399): avc: denied { create } for pid=9045 comm="syz.1.8987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4981.093024][ T31] audit: type=1400 audit(134222709.005:14400): avc: denied { write } for pid=9045 comm="syz.1.8987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4981.096350][ T31] audit: type=1400 audit(134222709.005:14401): avc: denied { read } for pid=9045 comm="syz.1.8987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4985.879525][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 4985.879911][ T31] audit: type=1400 audit(134222713.785:14473): avc: denied { read } for pid=9067 comm="syz.0.8992" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4985.880166][ T31] audit: type=1400 audit(134222713.795:14474): avc: denied { open } for pid=9067 comm="syz.0.8992" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4985.931502][ T31] audit: type=1400 audit(134222713.835:14475): avc: denied { create } for pid=9067 comm="syz.0.8992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4985.989350][ T31] audit: type=1400 audit(134222713.905:14476): avc: denied { write } for pid=9067 comm="syz.0.8992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4986.010035][ T31] audit: type=1400 audit(134222713.925:14477): avc: denied { execmem } for pid=9067 comm="syz.0.8992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4986.370598][ T31] audit: type=1400 audit(134222714.285:14478): avc: denied { create } for pid=9069 comm="syz.0.8993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4986.373667][ T31] audit: type=1400 audit(134222714.285:14479): avc: denied { write } for pid=9069 comm="syz.0.8993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4986.935139][ T31] audit: type=1400 audit(134222714.845:14480): avc: denied { allowed } for pid=9071 comm="syz.0.8994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4986.991032][ T31] audit: type=1400 audit(134222714.905:14481): avc: denied { create } for pid=9071 comm="syz.0.8994" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4986.992942][ T31] audit: type=1400 audit(134222714.905:14482): avc: denied { map } for pid=9071 comm="syz.0.8994" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=102166 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4989.496052][ T9081] FAULT_INJECTION: forcing a failure. [ 4989.496052][ T9081] name failslab, interval 1, probability 0, space 0, times 0 [ 4989.498426][ T9081] CPU: 0 UID: 0 PID: 9081 Comm: syz.0.8996 Not tainted syzkaller #0 PREEMPT [ 4989.498579][ T9081] Hardware name: ARM-Versatile Express [ 4989.498654][ T9081] Call trace: [ 4989.498745][ T9081] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4989.499046][ T9081] r7:00000d40 r6:00000000 r5:60000013 r4:82260d04 [ 4989.499090][ T9081] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4989.499154][ T9081] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4989.499216][ T9081] r5:83b21800 r4:82917c00 [ 4989.499234][ T9081] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4989.499301][ T9081] [<80972c80>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 4989.499380][ T9081] r8:83b21800 r7:00000d40 r6:84779f28 r5:0000001a r4:83001240 [ 4989.499401][ T9081] [<8051f254>] (should_failslab) from [<80503c50>] (__kmalloc_noprof+0x9c/0x458) [ 4989.499458][ T9081] [<80503bb4>] (__kmalloc_noprof) from [<807c371c>] (tomoyo_encode2+0x64/0xf0) [ 4989.499533][ T9081] r10:00000fff r9:8309f800 r8:00000000 r7:854e1a18 r6:84779f28 r5:89d2affd [ 4989.499556][ T9081] r4:89d2afee [ 4989.499576][ T9081] [<807c36b8>] (tomoyo_encode2) from [<807c37cc>] (tomoyo_encode+0x24/0x30) [ 4989.499654][ T9081] r9:8309f800 r8:00000000 r7:854e1a18 r6:84779f28 r5:00001000 r4:89d2afef [ 4989.499675][ T9081] [<807c37a8>] (tomoyo_encode) from [<807c3858>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4989.499736][ T9081] r5:00001000 r4:89d2a000 [ 4989.499756][ T9081] [<807c37d8>] (tomoyo_realpath_from_path) from [<807bf958>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4989.499830][ T9081] r10:83b21800 r9:00000000 r8:84779f00 r7:00005412 r6:00000004 r5:81cd6504 [ 4989.499858][ T9081] r4:84779f28 r3:826c0200 [ 4989.499877][ T9081] [<807bf88c>] (tomoyo_path_number_perm) from [<807c4238>] (tomoyo_file_ioctl+0x1c/0x20) [ 4989.499951][ T9081] r9:00000003 r8:84779f00 r7:00000000 r6:00000000 r5:00005412 r4:84779f00 [ 4989.499972][ T9081] [<807c421c>] (tomoyo_file_ioctl) from [<80770a8c>] (security_file_ioctl+0x64/0x1e4) [ 4989.500031][ T9081] [<80770a28>] (security_file_ioctl) from [<8056cdb8>] (sys_ioctl+0x4c/0xba0) [ 4989.500099][ T9081] r7:00000000 r6:84779f01 r5:00000000 r4:00005412 [ 4989.500118][ T9081] [<8056cd6c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4989.500179][ T9081] Exception stack(0xdf9e1fa8 to 0xdf9e1ff0) [ 4989.500228][ T9081] 1fa0: 00000000 00000000 00000003 00005412 00000000 00000000 [ 4989.500269][ T9081] 1fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76fdc0bc [ 4989.500300][ T9081] 1fe0: 76fdbec0 76fdbeb0 0001948c 001322a0 [ 4989.500346][ T9081] r10:00000036 r9:83b21800 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 4989.500373][ T9081] r4:00000000 [ 4989.522663][ T9081] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4992.206524][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 4992.206927][ T31] audit: type=1400 audit(134222720.125:14536): avc: denied { create } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.221036][ T31] audit: type=1400 audit(134222720.135:14537): avc: denied { create } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.231471][ T31] audit: type=1400 audit(134222720.145:14538): avc: denied { write } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.239780][ T31] audit: type=1400 audit(134222720.155:14539): avc: denied { module_request } for pid=9090 comm="syz.0.9000" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4992.322108][ T31] audit: type=1400 audit(134222720.235:14540): avc: denied { read } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.338029][ T31] audit: type=1400 audit(134222720.255:14541): avc: denied { create } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.340274][ T31] audit: type=1400 audit(134222720.255:14542): avc: denied { write } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.342254][ T31] audit: type=1400 audit(134222720.255:14543): avc: denied { read } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.358213][ T31] audit: type=1400 audit(134222720.275:14544): avc: denied { create } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4992.360562][ T31] audit: type=1400 audit(134222720.275:14545): avc: denied { write } for pid=9090 comm="syz.0.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4993.328831][ T9107] FAULT_INJECTION: forcing a failure. [ 4993.328831][ T9107] name failslab, interval 1, probability 0, space 0, times 0 [ 4993.330888][ T9107] CPU: 0 UID: 0 PID: 9107 Comm: syz.0.9004 Not tainted syzkaller #0 PREEMPT [ 4993.331019][ T9107] Hardware name: ARM-Versatile Express [ 4993.331051][ T9107] Call trace: [ 4993.331100][ T9107] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4993.331521][ T9107] r7:00000d40 r6:00000000 r5:60000013 r4:82260d04 [ 4993.331547][ T9107] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4993.331616][ T9107] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4993.331680][ T9107] r5:849ec800 r4:82917c00 [ 4993.331698][ T9107] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4993.331768][ T9107] [<80972c80>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 4993.331847][ T9107] r8:849ec800 r7:00000d40 r6:847791a8 r5:00000021 r4:83001240 [ 4993.331880][ T9107] [<8051f254>] (should_failslab) from [<80503c50>] (__kmalloc_noprof+0x9c/0x458) [ 4993.331939][ T9107] [<80503bb4>] (__kmalloc_noprof) from [<807c371c>] (tomoyo_encode2+0x64/0xf0) [ 4993.332015][ T9107] r10:00000fff r9:8309e400 r8:00000000 r7:8342ef68 r6:847791a8 r5:89d2affc [ 4993.332039][ T9107] r4:89d2afe6 [ 4993.332060][ T9107] [<807c36b8>] (tomoyo_encode2) from [<807c37cc>] (tomoyo_encode+0x24/0x30) [ 4993.332132][ T9107] r9:8309e400 r8:00000000 r7:8342ef68 r6:847791a8 r5:00001000 r4:89d2afe7 [ 4993.332152][ T9107] [<807c37a8>] (tomoyo_encode) from [<807c3858>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4993.332212][ T9107] r5:00001000 r4:89d2a000 [ 4993.332231][ T9107] [<807c37d8>] (tomoyo_realpath_from_path) from [<807bf958>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4993.332302][ T9107] r10:849ec800 r9:00000000 r8:84779180 r7:00000002 r6:00000004 r5:81cd6504 [ 4993.332328][ T9107] r4:847791a8 r3:826c0200 [ 4993.332345][ T9107] [<807bf88c>] (tomoyo_path_number_perm) from [<807c4238>] (tomoyo_file_ioctl+0x1c/0x20) [ 4993.332417][ T9107] r9:00000003 r8:84779180 r7:20001f80 r6:20001f80 r5:00000002 r4:84779180 [ 4993.332441][ T9107] [<807c421c>] (tomoyo_file_ioctl) from [<80770a8c>] (security_file_ioctl+0x64/0x1e4) [ 4993.332500][ T9107] [<80770a28>] (security_file_ioctl) from [<8056cdb8>] (sys_ioctl+0x4c/0xba0) [ 4993.332569][ T9107] r7:20001f80 r6:84779181 r5:00000000 r4:00000002 [ 4993.332590][ T9107] [<8056cd6c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4993.332648][ T9107] Exception stack(0xdfa05fa8 to 0xdfa05ff0) [ 4993.332693][ T9107] 5fa0: 00000000 00000000 00000003 00000002 20001f80 00000000 [ 4993.332734][ T9107] 5fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76fdc0bc [ 4993.332765][ T9107] 5fe0: 76fdbec0 76fdbeb0 0001948c 001322a0 [ 4993.332809][ T9107] r10:00000036 r9:849ec800 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 4993.332831][ T9107] r4:00000000 [ 4993.366557][ T9107] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4995.980732][ T9126] FAULT_INJECTION: forcing a failure. [ 4995.980732][ T9126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4995.982929][ T9126] CPU: 0 UID: 0 PID: 9126 Comm: syz.0.9011 Not tainted syzkaller #0 PREEMPT [ 4995.983039][ T9126] Hardware name: ARM-Versatile Express [ 4995.983063][ T9126] Call trace: [ 4995.983103][ T9126] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4995.983220][ T9126] r7:00006364 r6:00000000 r5:60000013 r4:82260d04 [ 4995.983241][ T9126] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 4995.983295][ T9126] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 4995.983347][ T9126] r5:84175400 r4:8294f190 [ 4995.983365][ T9126] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 4995.983418][ T9126] [<80972c80>] (should_fail_ex) from [<80972ebc>] (should_fail+0x14/0x18) [ 4995.983480][ T9126] r8:00000000 r7:00006364 r6:76fdc0bc r5:84175c30 r4:76fdbbb8 [ 4995.983497][ T9126] [<80972ea8>] (should_fail) from [<80972edc>] (should_fail_usercopy+0x1c/0x20) [ 4995.983547][ T9126] [<80972ec0>] (should_fail_usercopy) from [<8022b624>] (setup_sigframe+0xe4/0x1c4) [ 4995.983602][ T9126] [<8022b540>] (setup_sigframe) from [<8022bbcc>] (do_work_pending+0x3f4/0x4f8) [ 4995.983681][ T9126] r10:b5403587 r9:76fdbbb8 r8:00000000 r7:84175c30 r6:76fdbb38 r5:df921fb0 [ 4995.983701][ T9126] r4:84175400 [ 4995.983716][ T9126] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 4995.983764][ T9126] Exception stack(0xdf921fb0 to 0xdf921ff8) [ 4995.983801][ T9126] 1fa0: 00000003 20000400 0004c890 00000000 [ 4995.983840][ T9126] 1fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76fdc0bc [ 4995.983872][ T9126] 1fe0: 76fdbec0 76fdbeb0 0001948c 0013229c 60000010 00000003 [ 4995.983908][ T9126] r10:00000128 r9:84175400 r8:8020029c r7:00000128 r6:00130250 r5:00000000 [ 4995.983929][ T9126] r4:00000000 [ 4997.352947][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 4997.353331][ T31] audit: type=1400 audit(134222725.265:14614): avc: denied { create } for pid=9138 comm="syz.0.9015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4997.355456][ T31] audit: type=1400 audit(134222725.275:14615): avc: denied { write } for pid=9138 comm="syz.0.9015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4997.360548][ T31] audit: type=1400 audit(134222725.275:14616): avc: denied { module_request } for pid=9138 comm="syz.0.9015" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4997.450303][ T31] audit: type=1400 audit(134222725.365:14617): avc: denied { read } for pid=9138 comm="syz.0.9015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4997.460160][ T31] audit: type=1400 audit(134222725.375:14618): avc: denied { create } for pid=9138 comm="syz.0.9015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4997.464094][ T31] audit: type=1400 audit(134222725.375:14619): avc: denied { ioctl } for pid=9138 comm="syz.0.9015" path="socket:[102269]" dev="sockfs" ino=102269 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4997.498106][ T31] audit: type=1400 audit(134222725.415:14620): avc: denied { read write } for pid=9138 comm="syz.0.9015" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4997.499399][ T31] audit: type=1400 audit(134222725.415:14621): avc: denied { open } for pid=9138 comm="syz.0.9015" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4997.513605][ T31] audit: type=1400 audit(134222725.425:14622): avc: denied { module_request } for pid=9138 comm="syz.0.9015" kmod="fs-cramfs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4997.714309][ T31] audit: type=1400 audit(134222725.625:14623): avc: denied { read } for pid=9144 comm="syz.0.9016" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4998.595330][ T9156] fuse: Unknown parameter '' [ 5002.153877][ T9182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9182 comm=syz.1.9030 [ 5002.388768][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 5002.388997][ T31] audit: type=1400 audit(134222730.305:14722): avc: denied { ioctl } for pid=9179 comm="syz.0.9029" path="socket:[102347]" dev="sockfs" ino=102347 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5002.421854][ T31] audit: type=1400 audit(134222730.335:14723): avc: denied { create } for pid=9186 comm="syz.1.9032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5002.428061][ T31] audit: type=1400 audit(134222730.345:14724): avc: denied { write } for pid=9186 comm="syz.1.9032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5002.443739][ T31] audit: type=1400 audit(134222730.355:14726): avc: denied { read write } for pid=9186 comm="syz.1.9032" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5002.447962][ T31] audit: type=1400 audit(134222730.365:14727): avc: denied { open } for pid=9186 comm="syz.1.9032" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5002.449759][ T31] audit: type=1400 audit(134222730.355:14725): avc: denied { bind } for pid=9179 comm="syz.0.9029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5002.467169][ T31] audit: type=1400 audit(134222730.385:14728): avc: denied { create } for pid=9186 comm="syz.1.9032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5002.468517][ T31] audit: type=1400 audit(134222730.385:14729): avc: denied { write } for pid=9186 comm="syz.1.9032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5002.469386][ T31] audit: type=1400 audit(134222730.385:14730): avc: denied { read } for pid=9186 comm="syz.1.9032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5002.483242][ T31] audit: type=1400 audit(134222730.395:14731): avc: denied { getopt } for pid=9186 comm="syz.1.9032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5004.995080][ T9196] FAULT_INJECTION: forcing a failure. [ 5004.995080][ T9196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5004.995379][ T9196] CPU: 1 UID: 0 PID: 9196 Comm: syz.1.9035 Not tainted syzkaller #0 PREEMPT [ 5004.995478][ T9196] Hardware name: ARM-Versatile Express [ 5004.995513][ T9196] Call trace: [ 5004.995561][ T9196] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5004.995721][ T9196] r7:b5403587 r6:00000000 r5:60000013 r4:82260d04 [ 5004.995759][ T9196] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 5004.995850][ T9196] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 5004.995980][ T9196] r5:83b26000 r4:8294f190 [ 5004.996013][ T9196] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 5004.996253][ T9196] [<80972c80>] (should_fail_ex) from [<80972ebc>] (should_fail+0x14/0x18) [ 5004.996325][ T9196] r8:00000000 r7:b5403587 r6:00000000 r5:83b26830 r4:76f21cc0 [ 5004.996343][ T9196] [<80972ea8>] (should_fail) from [<80972edc>] (should_fail_usercopy+0x1c/0x20) [ 5004.996859][ T9196] [<80972ec0>] (should_fail_usercopy) from [<8022b2e4>] (preserve_vfp_context+0x78/0xc4) [ 5004.997000][ T9196] [<8022b26c>] (preserve_vfp_context) from [<8022b6ac>] (setup_sigframe+0x16c/0x1c4) [ 5004.997063][ T9196] r5:83b26830 r4:76f21bd8 [ 5004.997261][ T9196] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 5004.997418][ T9196] r10:00000004 r9:b5403587 r8:00000000 r7:83b26830 r6:76f21bd8 r5:dfa35fb0 [ 5004.997742][ T9196] r4:83b26000 [ 5004.997858][ T9196] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 5004.998113][ T9196] Exception stack(0xdfa35fb0 to 0xdfa35ff8) [ 5004.998153][ T9196] 5fa0: 00000001 76f21f20 00000001 00000000 [ 5004.998207][ T9196] 5fc0: 00000001 76f21f20 00000004 00000004 002f0000 00000000 00006364 76f220bc [ 5004.998363][ T9196] 5fe0: 00000158 76f21ed0 000d80d8 0013023c 40000010 00000004 [ 5004.998544][ T9196] r10:00000004 r9:83b26000 r8:8020029c r7:00000004 r6:00000004 r5:76f21f20 [ 5004.998685][ T9196] r4:00000001 [ 5005.595546][T32393] usb 2-1: new full-speed USB device number 40 using dummy_hcd [ 5005.754296][T32393] usb 2-1: unable to get BOS descriptor or descriptor too short [ 5005.760643][T32393] usb 2-1: not running at top speed; connect to a high speed hub [ 5005.770121][T32393] usb 2-1: config 1 interface 0 altsetting 129 endpoint 0x81 has invalid maxpacket 1024, setting to 64 [ 5005.771010][T32393] usb 2-1: config 1 interface 0 has no altsetting 0 [ 5005.781829][T32393] usb 2-1: New USB device found, idVendor=5543, idProduct=006e, bcdDevice= 0.40 [ 5005.782528][T32393] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 5005.783413][T32393] usb 2-1: Product: syz [ 5005.784362][T32393] usb 2-1: Manufacturer: syz [ 5005.785566][T32393] usb 2-1: SerialNumber: syz [ 5005.796445][ T9201] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 5006.015736][T32393] usbhid 2-1:1.0: can't add hid device: -71 [ 5006.025243][T32393] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 5006.032452][T32393] usb 2-1: USB disconnect, device number 40 [ 5008.640276][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 5008.640624][ T31] audit: type=1400 audit(134222736.555:14807): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5008.640873][ T31] audit: type=1400 audit(134222736.555:14808): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5008.652382][ T31] audit: type=1400 audit(134222736.565:14809): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5008.743020][ T31] audit: type=1400 audit(134222736.655:14810): avc: denied { read } for pid=9237 comm="syz.1.9044" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5008.750435][ T31] audit: type=1400 audit(134222736.655:14811): avc: denied { read open } for pid=9237 comm="syz.1.9044" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5008.769244][ T9238] FAULT_INJECTION: forcing a failure. [ 5008.769244][ T9238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5008.769682][ T9238] CPU: 1 UID: 0 PID: 9238 Comm: syz.1.9044 Not tainted syzkaller #0 PREEMPT [ 5008.769774][ T9238] Hardware name: ARM-Versatile Express [ 5008.769800][ T9238] Call trace: [ 5008.769853][ T9238] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5008.769967][ T9238] r7:00000000 r6:00000000 r5:60000013 r4:82260d04 [ 5008.770007][ T9238] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 5008.770115][ T9238] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 5008.770282][ T9238] r5:8530a400 r4:8294f190 [ 5008.770375][ T9238] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 5008.770455][ T9238] [<80972c80>] (should_fail_ex) from [<80972ebc>] (should_fail+0x14/0x18) [ 5008.770559][ T9238] r8:76f21f30 r7:00000000 r6:00000000 r5:dfad5f68 r4:00000002 [ 5008.770581][ T9238] [<80972ea8>] (should_fail) from [<80972edc>] (should_fail_usercopy+0x1c/0x20) [ 5008.770726][ T9238] [<80972ec0>] (should_fail_usercopy) from [<8058e6f0>] (simple_read_from_buffer+0x80/0x13c) [ 5008.770945][ T9238] [<8058e670>] (simple_read_from_buffer) from [<8060871c>] (proc_fail_nth_read+0xb8/0x108) [ 5008.771224][ T9238] r10:00000001 r9:80608664 r8:00000002 r7:dfad5f68 r6:0000000f r5:76f21f30 [ 5008.771269][ T9238] r4:8530a400 r3:dfad5e9f [ 5008.771320][ T9238] [<80608664>] (proc_fail_nth_read) from [<80553538>] (vfs_read+0x98/0x324) [ 5008.771391][ T9238] r8:76f21f30 r7:dfad5f68 r6:8530a400 r5:0000000f r4:847f7c00 [ 5008.771412][ T9238] [<805534a0>] (vfs_read) from [<80554248>] (ksys_read+0x74/0xe8) [ 5008.771501][ T9238] r10:00000003 r9:8530a400 r8:8020029c r7:00000000 r6:00000000 r5:847f7c00 [ 5008.771524][ T9238] r4:847f7c03 [ 5008.771540][ T9238] [<805541d4>] (ksys_read) from [<805542cc>] (sys_read+0x10/0x14) [ 5008.771605][ T9238] r7:00000003 r6:00000004 r5:76f21f30 r4:0000000f [ 5008.771623][ T9238] [<805542bc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5008.771722][ T9238] Exception stack(0xdfad5fa8 to 0xdfad5ff0) [ 5008.771788][ T9238] 5fa0: 0000000f 76f21f30 00000004 76f21f30 0000000f 00000000 [ 5008.771917][ T9238] 5fc0: 0000000f 76f21f30 00000004 00000003 002f0000 00000000 00006364 76f220bc [ 5008.772075][ T9238] 5fe0: 00000158 76f21ed0 000d80d8 00130174 [ 5008.851827][ T31] audit: type=1400 audit(134222736.765:14812): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5008.854454][ T31] audit: type=1400 audit(134222736.765:14813): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5008.860030][ T31] audit: type=1400 audit(134222736.765:14814): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5008.932332][ T31] audit: type=1400 audit(134222736.845:14815): avc: denied { create } for pid=9239 comm="syz.1.9045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5008.939586][ T31] audit: type=1400 audit(134222736.855:14816): avc: denied { read } for pid=9239 comm="syz.1.9045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5014.595159][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 5014.598996][ T31] audit: type=1400 audit(134222742.505:14851): avc: denied { create } for pid=9261 comm="syz.0.9051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5014.611244][ T31] audit: type=1400 audit(134222742.525:14852): avc: denied { write } for pid=9261 comm="syz.0.9051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5014.674761][ T31] audit: type=1400 audit(134222742.575:14853): avc: denied { write } for pid=9261 comm="syz.0.9051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5014.807461][ T31] audit: type=1400 audit(134222742.715:14854): avc: denied { create } for pid=9263 comm="syz.0.9052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5014.830639][ T9264] FAULT_INJECTION: forcing a failure. [ 5014.830639][ T9264] name failslab, interval 1, probability 0, space 0, times 0 [ 5014.832573][ T9264] CPU: 0 UID: 0 PID: 9264 Comm: syz.0.9052 Not tainted syzkaller #0 PREEMPT [ 5014.832670][ T9264] Hardware name: ARM-Versatile Express [ 5014.832702][ T9264] Call trace: [ 5014.832748][ T9264] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5014.832870][ T9264] r7:00000820 r6:00000000 r5:60000013 r4:82260d04 [ 5014.832894][ T9264] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 5014.833046][ T9264] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 5014.833158][ T9264] r5:8530d400 r4:82917c00 [ 5014.833177][ T9264] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 5014.833237][ T9264] [<80972c80>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 5014.833303][ T9264] r8:8530d400 r7:00000820 r6:8497b958 r5:00000017 r4:83001240 [ 5014.833324][ T9264] [<8051f254>] (should_failslab) from [<80504904>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 5014.833376][ T9264] [<80504864>] (__kmalloc_node_track_caller_noprof) from [<8049b6e8>] (kmemdup_noprof+0x28/0x44) [ 5014.833471][ T9264] r10:00000122 r9:84223004 r8:dfad9cc0 r7:84b75000 r6:8497b958 r5:dfad9cb8 [ 5014.833495][ T9264] r4:00000017 [ 5014.833512][ T9264] [<8049b6c0>] (kmemdup_noprof) from [<807a2180>] (sidtab_sid2str_get+0x54/0xa4) [ 5014.833614][ T9264] r7:84b75000 r6:dfad9cc0 r5:dfad9cb8 r4:84bb80c0 [ 5014.833682][ T9264] [<807a212c>] (sidtab_sid2str_get) from [<807a9688>] (sidtab_entry_to_string+0x34/0x94) [ 5014.833811][ T9264] r7:84b75000 r6:84bb80c0 r5:dfad9cb8 r4:0000005f [ 5014.833870][ T9264] [<807a9654>] (sidtab_entry_to_string) from [<807a9800>] (security_sid_to_context_core+0x118/0x17c) [ 5014.833941][ T9264] r9:dfad9ddc r8:84b75000 r7:84223004 r6:dfad9cc0 r5:dfad9cb8 r4:0000005f [ 5014.833959][ T9264] [<807a96e8>] (security_sid_to_context_core) from [<807ac814>] (security_sid_to_context+0x1c/0x24) [ 5014.834023][ T9264] r8:8078c938 r7:8078d93c r6:8530d400 r5:84d92750 r4:dfad9d48 [ 5014.834041][ T9264] [<807ac7f8>] (security_sid_to_context) from [<8078d9bc>] (avc_audit_post_callback+0x80/0x2f4) [ 5014.834096][ T9264] [<8078d93c>] (avc_audit_post_callback) from [<807b4dd0>] (common_lsm_audit+0x104/0x148) [ 5014.834160][ T9264] r10:00000122 r9:dfad9ddc r8:8078c938 r7:8078d93c r6:dfad9ddc r5:84d92750 [ 5014.834183][ T9264] r4:8530dbf0 [ 5014.834201][ T9264] [<807b4ccc>] (common_lsm_audit) from [<8078de48>] (slow_avc_audit+0xbc/0x114) [ 5014.834261][ T9264] r8:00000055 r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 5014.834281][ T9264] [<8078dd8c>] (slow_avc_audit) from [<8078e8cc>] (avc_has_perm+0xd8/0xe8) [ 5014.834415][ T9264] r5:00000000 r4:00000004 [ 5014.834446][ T9264] [<8078e7f4>] (avc_has_perm) from [<80794ce4>] (sock_has_perm+0xd0/0xfc) [ 5014.834531][ T9264] r9:84779240 r8:8530d400 r7:8485dcc0 r6:00000004 r5:853a5800 r4:00000000 [ 5014.834553][ T9264] [<80794c14>] (sock_has_perm) from [<80794d98>] (selinux_socket_sendmsg+0x18/0x1c) [ 5014.834610][ T9264] r8:84779241 r7:76fdae1c r6:00000020 r5:dfad9e98 r4:85582780 [ 5014.834634][ T9264] [<80794d80>] (selinux_socket_sendmsg) from [<8078731c>] (security_socket_sendmsg+0x64/0x1e4) [ 5014.834688][ T9264] [<807872b8>] (security_socket_sendmsg) from [<81543ef8>] (__sock_sendmsg+0x1c/0x78) [ 5014.834793][ T9264] r7:76fdae1c r6:85582780 r5:dfad9e98 r4:00000000 [ 5014.834824][ T9264] [<81543edc>] (__sock_sendmsg) from [<81546a34>] (__sys_sendto+0x110/0x160) [ 5014.834899][ T9264] r7:76fdae1c r6:85582780 r5:00000000 r4:00000000 [ 5014.834921][ T9264] [<81546924>] (__sys_sendto) from [<81546aa0>] (sys_sendto+0x1c/0x24) [ 5014.834991][ T9264] r9:8530d400 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76fdae1c [ 5014.835010][ T9264] [<81546a84>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5014.835064][ T9264] Exception stack(0xdfad9fa8 to 0xdfad9ff0) [ 5014.835110][ T9264] 9fa0: 76fdae1c 0000000c 00000003 76fdaeb0 00000020 00000000 [ 5014.835149][ T9264] 9fc0: 76fdae1c 0000000c 00000000 00000122 00000003 00000000 76fdaeb0 76fdc0bc [ 5014.835178][ T9264] 9fe0: 00000000 76fdadf0 000d80d8 00134738 [ 5014.847109][ T31] audit: type=1400 audit(134222742.745:14855): avc: denied { write } for pid=9263 comm="syz.0.9052" scontext=root:sysadm_r:sysadm_t tsid=95 tclass=kcm_socket permissive=1 [ 5014.848779][ T31] audit: type=1400 audit(134222742.765:14856): avc: denied { read } for pid=9263 comm="syz.0.9052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5015.297487][ T31] audit: type=1400 audit(134222743.215:14857): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5015.298407][ T31] audit: type=1400 audit(134222743.215:14858): avc: denied { open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5015.302643][ T31] audit: type=1400 audit(134222743.215:14859): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5015.469622][ T31] audit: type=1400 audit(134222743.385:14860): avc: denied { create } for pid=9268 comm="syz.0.9054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5016.649786][ T9277] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9277 comm=syz.1.9057 [ 5017.445114][ T9284] FAULT_INJECTION: forcing a failure. [ 5017.445114][ T9284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5017.447348][ T9284] CPU: 0 UID: 0 PID: 9284 Comm: syz.1.9059 Not tainted syzkaller #0 PREEMPT [ 5017.447444][ T9284] Hardware name: ARM-Versatile Express [ 5017.447467][ T9284] Call trace: [ 5017.447505][ T9284] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5017.447666][ T9284] r7:b5403587 r6:00000000 r5:60000013 r4:82260d04 [ 5017.447732][ T9284] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 5017.447785][ T9284] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 5017.447838][ T9284] r5:8530bc00 r4:8294f190 [ 5017.447852][ T9284] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 5017.447907][ T9284] [<80972c80>] (should_fail_ex) from [<80972ebc>] (should_fail+0x14/0x18) [ 5017.447969][ T9284] r8:00000000 r7:b5403587 r6:76f21ca0 r5:00000000 r4:dfb31f0c [ 5017.447983][ T9284] [<80972ea8>] (should_fail) from [<80972edc>] (should_fail_usercopy+0x1c/0x20) [ 5017.448102][ T9284] [<80972ec0>] (should_fail_usercopy) from [<8022b1c8>] (restore_vfp_context+0x3c/0xe0) [ 5017.448210][ T9284] [<8022b18c>] (restore_vfp_context) from [<8022b52c>] (restore_sigframe+0x1fc/0x210) [ 5017.448268][ T9284] r6:76f21ca0 r5:00000000 r4:dfb31fb0 [ 5017.448284][ T9284] [<8022b330>] (restore_sigframe) from [<8022b744>] (sys_sigreturn+0x40/0x60) [ 5017.448340][ T9284] r7:00000077 r6:00130250 r5:00000000 r4:dfb31fb0 [ 5017.448357][ T9284] [<8022b704>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5017.448401][ T9284] Exception stack(0xdfb31fa8 to 0xdfb31ff0) [ 5017.448437][ T9284] 1fa0: 00000000 00000000 fffffffc 20000800 00000800 00000000 [ 5017.448471][ T9284] 1fc0: 00000000 00000000 00130250 00000128 002f0000 00000000 00006364 76f220bc [ 5017.448496][ T9284] 1fe0: 76f21ec0 76f21eb0 0001948c 001322a0 [ 5017.448520][ T9284] r5:00000000 r4:00000000 [ 5018.665380][ T9295] FAULT_INJECTION: forcing a failure. [ 5018.665380][ T9295] name failslab, interval 1, probability 0, space 0, times 0 [ 5018.667243][ T9295] CPU: 0 UID: 0 PID: 9295 Comm: syz.1.9062 Not tainted syzkaller #0 PREEMPT [ 5018.667372][ T9295] Hardware name: ARM-Versatile Express [ 5018.667408][ T9295] Call trace: [ 5018.667458][ T9295] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5018.667583][ T9295] r7:00000c40 r6:00000000 r5:60000013 r4:82260d04 [ 5018.667610][ T9295] [<80201b08>] (show_stack) from [<8021fc6c>] (dump_stack_lvl+0x70/0x7c) [ 5018.667671][ T9295] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 5018.667738][ T9295] r5:849ec800 r4:82917c00 [ 5018.667757][ T9295] [<8021fc78>] (dump_stack) from [<80972e44>] (should_fail_ex+0x1c4/0x228) [ 5018.667827][ T9295] [<80972c80>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 5018.668048][ T9295] r8:849ec800 r7:00000c40 r6:84779f28 r5:00001000 r4:830016c0 [ 5018.668082][ T9295] [<8051f254>] (should_failslab) from [<80503c50>] (__kmalloc_noprof+0x9c/0x458) [ 5018.668157][ T9295] [<80503bb4>] (__kmalloc_noprof) from [<807c3814>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5018.668238][ T9295] r10:849ec800 r9:8309e400 r8:00000000 r7:834d6220 r6:84779f28 r5:00001000 [ 5018.668263][ T9295] r4:00000000 [ 5018.668283][ T9295] [<807c37d8>] (tomoyo_realpath_from_path) from [<807bf958>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5018.668359][ T9295] r10:849ec800 r9:00000000 r8:84779f00 r7:00005450 r6:00000004 r5:81cd6504 [ 5018.668388][ T9295] r4:84779f28 r3:826c0200 [ 5018.668407][ T9295] [<807bf88c>] (tomoyo_path_number_perm) from [<807c4238>] (tomoyo_file_ioctl+0x1c/0x20) [ 5018.668480][ T9295] r9:00000003 r8:84779f00 r7:00000000 r6:00000000 r5:00005450 r4:84779f00 [ 5018.668502][ T9295] [<807c421c>] (tomoyo_file_ioctl) from [<80770a8c>] (security_file_ioctl+0x64/0x1e4) [ 5018.668563][ T9295] [<80770a28>] (security_file_ioctl) from [<8056cdb8>] (sys_ioctl+0x4c/0xba0) [ 5018.668634][ T9295] r7:00000000 r6:84779f01 r5:00000000 r4:00005450 [ 5018.668659][ T9295] [<8056cd6c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5018.668720][ T9295] Exception stack(0xdfb29fa8 to 0xdfb29ff0) [ 5018.668765][ T9295] 9fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 5018.668808][ T9295] 9fc0: 00000000 00000000 00130250 00000036 002f0000 00000000 00006364 76f220bc [ 5018.668842][ T9295] 9fe0: 76f21ec0 76f21eb0 0001948c 001322a0 [ 5018.668895][ T9295] r10:00000036 r9:849ec800 r8:8020029c r7:00000036 r6:00130250 r5:00000000 [ 5018.668920][ T9295] r4:00000000 [ 5018.696130][ T9295] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5020.579206][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 5020.579395][ T31] audit: type=1400 audit(134222748.485:14936): avc: denied { read write } for pid=6999 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5020.579531][ T31] audit: type=1400 audit(134222748.495:14937): avc: denied { read } for pid=9300 comm="syz.0.9065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5020.579667][ T31] audit: type=1400 audit(134222748.495:14938): avc: denied { read } for pid=9300 comm="syz.0.9065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5020.580336][ T31] audit: type=1400 audit(134222748.495:14939): avc: denied { read write open } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5020.580882][ T31] audit: type=1400 audit(134222748.495:14940): avc: denied { ioctl } for pid=6999 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5020.638361][ T31] audit: type=1400 audit(134222748.555:14941): avc: denied { read } for pid=9300 comm="syz.0.9065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5020.642148][ T31] audit: type=1400 audit(134222748.555:14942): avc: denied { write } for pid=9306 comm="syz.1.9067" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5020.642700][ T31] audit: type=1400 audit(134222748.555:14943): avc: denied { open } for pid=9306 comm="syz.1.9067" path="/dev/ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5020.692693][ T31] audit: type=1400 audit(134222748.585:14944): avc: denied { read } for pid=9300 comm="syz.0.9065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5020.704453][ T31] audit: type=1400 audit(134222748.615:14945): avc: denied { read } for pid=9300 comm="syz.0.9065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5020.915737][ T9309] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 5021.605189][T22410] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 5021.755774][T22410] usb 2-1: Using ep0 maxpacket: 8 [ 5021.763153][T22410] usb 2-1: config 7 has an invalid interface number: 95 but max is 0 [ 5021.763458][T22410] usb 2-1: config 7 contains an unexpected descriptor of type 0x1, skipping [ 5021.763740][T22410] usb 2-1: config 7 has no interface number 0 [ 5021.763815][T22410] usb 2-1: config 7 interface 95 altsetting 9 endpoint 0x8 has an invalid bInterval 134, changing to 11 [ 5021.763872][T22410] usb 2-1: config 7 interface 95 altsetting 9 has a duplicate endpoint with address 0xC, skipping [ 5021.763916][T22410] usb 2-1: config 7 interface 95 altsetting 9 has a duplicate endpoint with address 0x6, skipping [ 5021.763954][T22410] usb 2-1: config 7 interface 95 altsetting 9 has a duplicate endpoint with address 0x6, skipping [ 5021.763993][T22410] usb 2-1: config 7 interface 95 has no altsetting 0 [ 5021.781841][T22410] usb 2-1: Dual-Role OTG device on HNP port [ 5021.783052][T22410] usb 2-1: New USB device found, idVendor=0424, idProduct=c001, bcdDevice=2b.91 [ 5021.783281][T22410] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 5021.783443][T22410] usb 2-1: Product: syz [ 5021.783542][T22410] usb 2-1: SerialNumber: syz [ 5022.073095][T22410] usb 2-1: USB disconnect, device number 41 [ 5022.081373][T22410] ------------[ cut here ]------------ [ 5022.081669][T22410] WARNING: CPU: 1 PID: 22410 at lib/refco ** replaying previous printk message ** [ 5022.081669][T22410] WARNING: CPU: 1 PID: 22410 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 5022.083288][T22410] refcount_t: underflow; use-after-free. [ 5022.083589][T22410] Modules linked in: [ 5022.084184][T22410] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 5022.084538][T22410] CPU: 1 UID: 0 PID: 22410 Comm: kworker/1:14 Not tainted syzkaller #0 PREEMPT [ 5022.084895][T22410] Hardware name: ARM-Versatile Express [ 5022.085444][T22410] Workqueue: usb_hub_wq hub_event [ 5022.086233][T22410] Call trace: [ 5022.086398][T22410] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5022.086978][T22410] r7:00000000 r6:8281f77c r5:00000000 r4:82260d04 [ 5022.087216][T22410] [<80201b08>] (show_stack) from [<8021fc50>] (dump_stack_lvl+0x54/0x7c) [ 5022.087458][T22410] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 5022.087779][T22410] r5:00000000 r4:82a77d18 [ 5022.087910][T22410] [<8021fc78>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 5022.088105][T22410] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 5022.088434][T22410] r7:808bbe94 [ 5022.088528][T22410] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 5022.088727][T22410] r3:8280c684 r2:00000001 r1:82247720 r0:8224f19c [ 5022.088898][T22410] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 5022.089113][T22410] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 5022.089382][T22410] r8:00000009 r7:822b9818 r6:dfaddbfc r5:84ba6c00 r4:00000000 [ 5022.089580][T22410] [<80254bd0>] (warn_slowpath_fmt) from [<808bbe94>] (refcount_warn_saturate+0x13c/0x174) [ 5022.089899][T22410] r10:00000100 r9:829d56bc r8:84f07888 r7:84f05074 r6:87935fb4 r5:84f05000 [ 5022.090194][T22410] r4:87935800 [ 5022.090334][T22410] [<808bbd58>] (refcount_warn_saturate) from [<81a14448>] (kobject_put+0x158/0x1f4) [ 5022.090654][T22410] [<81a142f0>] (kobject_put) from [<80b3d9e4>] (put_device+0x18/0x1c) [ 5022.091097][T22410] r7:84f05074 r6:87935fb4 r5:84f05000 r4:87935800 [ 5022.091256][T22410] [<80b3d9cc>] (put_device) from [<81436ed0>] (hdm_disconnect+0x98/0x9c) [ 5022.091484][T22410] [<81436e38>] (hdm_disconnect) from [<80e9d084>] (usb_unbind_interface+0x84/0x2bc) [ 5022.091719][T22410] r7:84f05074 r6:84f05030 r5:00000000 r4:84f07800 [ 5022.091859][T22410] [<80e9d000>] (usb_unbind_interface) from [<80b45b60>] (device_remove+0x64/0x6c) [ 5022.092068][T22410] r10:00000100 r9:84f07888 r8:00000044 r7:84f05074 r6:829d56bc r5:00000000 [ 5022.092247][T22410] r4:84f05030 [ 5022.092340][T22410] [<80b45afc>] (device_remove) from [<80b47050>] (device_release_driver_internal+0x18c/0x200) [ 5022.092596][T22410] r5:00000000 r4:84f05030 [ 5022.092796][T22410] [<80b46ec4>] (device_release_driver_internal) from [<80b470dc>] (device_release_driver+0x18/0x1c) [ 5022.093134][T22410] r9:84f07888 r8:8335dd40 r7:8335dd38 r6:8335dd0c r5:84f05030 r4:8335dd30 [ 5022.093453][T22410] [<80b470c4>] (device_release_driver) from [<80b451a0>] (bus_remove_device+0xcc/0x120) [ 5022.093740][T22410] [<80b450d4>] (bus_remove_device) from [<80b3f438>] (device_del+0x148/0x38c) [ 5022.094022][T22410] r9:84f07888 r8:84ba6c00 r7:04208060 r6:00000000 r5:84f05030 r4:84f05074 [ 5022.094397][T22410] [<80b3f2f0>] (device_del) from [<80e9aac0>] (usb_disable_device+0xd4/0x1e8) [ 5022.094948][T22410] r10:00000100 r9:00000000 r8:00000000 r7:84f05000 r6:84f07800 r5:8689bc48 [ 5022.095352][T22410] r4:00000007 [ 5022.095461][T22410] [<80e9a9ec>] (usb_disable_device) from [<80e8f888>] (usb_disconnect+0xec/0x2ac) [ 5022.095732][T22410] r9:853d7e00 r8:84f078cc r7:83e57800 r6:84f07888 r5:84f07800 r4:60000013 [ 5022.095927][T22410] [<80e8f79c>] (usb_disconnect) from [<80e92884>] (hub_event+0x1194/0x1950) [ 5022.096216][T22410] r10:00000100 r9:83d2892c r8:83e57000 r7:84f07800 r6:83d28200 r5:00000001 [ 5022.096410][T22410] r4:00000001 [ 5022.096544][T22410] [<80e916f0>] (hub_event) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 5022.096837][T22410] r10:8335df70 r9:83274005 r8:84ba6c00 r7:ddde2d40 r6:83274000 r5:83d2892c [ 5022.097108][T22410] r4:847f4c00 [ 5022.097221][T22410] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 5022.097677][T22410] r10:61c88647 r9:84ba6c00 r8:847f4c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 5022.098047][T22410] r4:847f4c00 [ 5022.098191][T22410] [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280) [ 5022.098399][T22410] r10:00000000 r9:847f4c00 r8:8027ade4 r7:dfb4de60 r6:847f4280 r5:84ba6c00 [ 5022.098649][T22410] r4:00000001 [ 5022.098745][T22410] [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 5022.099132][T22410] Exception stack(0xdfaddfb0 to 0xdfaddff8) [ 5022.099339][T22410] dfa0: 00000000 00000000 00000000 00000000 [ 5022.099703][T22410] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 5022.099999][T22410] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 5022.100191][T22410] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 [ 5022.100428][T22410] r4:8488b300 [ 5022.102111][T22410] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:02:46 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000004 R03=81a3b890 R04=00000008 R05=828f7888 R06=00000000 R07=828f7880 R08=83ad8c00 R09=00000028 R10=828f7888 R11=ec41dc64 R12=ec41dc68 R13=ec41dc58 R14=8033d94c R15=81a3b8a0 PSR=600f0093 -ZC- A S svc32 s00=756e2065 s01=7265626d d00=7265626d756e2065 s02=32545b5d s03=30313432 d01=3031343232545b5d s04=7375205d s05=2d322062 d02=2d3220627375205d s06=4e203a31 s07=55207765 d03=552077654e203a31 s08=64204253 s09=63697665 d04=6369766564204253 s10=74732065 s11=676e6972 d05=676e697274732065 s12=4d203a73 s13=313d7266 d06=313d72664d203a73 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83e66c40 R01=00000020 R02=ebaab000 R03=ebaab018 R04=82abb12d R05=83e66c40 R06=80a79cfc R07=82abb151 R08=82826ef8 R09=00000000 R10=00003a90 R11=dfadd8c0 R12=00000002 R13=dfadd8b4 R14=829590c4 R15=80a79d0c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000